standard
turbot/azure_compliance

Pipeline: Detect & correct Subscriptions without activity log alert for create and update SQL servers firewall rule

Detect subscriptions without an activity log alert for create and update SQL servers firewall rule.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run azure_compliance.pipeline.detect_and_correct_subscriptions_without_activity_log_alert_for_create_update_sql_servers_firewall_rule

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = azure_compliance.pipeline.detect_and_correct_subscriptions_without_activity_log_alert_for_create_update_sql_servers_firewall_rule
}

Params

NameTypeRequiredDescriptionDefault
database
connection.steampipe
YesDatabase connection string.connection.steampipe.default
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
verbose, info, error
YesThe verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'.info

Outputs

This pipeline has no outputs.

Tags

category = Compliance
plugin = azure
service = Azure/Monitor