-
Notifications
You must be signed in to change notification settings - Fork 518
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update Policy Library (automated) (#263)
* Update Policy Library (automated) * update custom policy def module Co-authored-by: github-actions <action@github.com> Co-authored-by: Jack Tracey <jack@jacktracey.co.uk>
- Loading branch information
1 parent
cdcda6a
commit f9ede3a
Showing
15 changed files
with
618 additions
and
58 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
150 changes: 150 additions & 0 deletions
150
...tions/lib/policy_definitions/policy_definition_es_deploy_diagnostics_avdscalingplans.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,150 @@ | ||
{ | ||
"name": "Deploy-Diagnostics-AVDScalingPlans", | ||
"type": "Microsoft.Authorization/policyDefinitions", | ||
"apiVersion": "2021-06-01", | ||
"scope": null, | ||
"properties": { | ||
"policyType": "Custom", | ||
"mode": "Indexed", | ||
"displayName": "Deploy Diagnostic Settings for AVD Scaling Plans to Log Analytics workspace", | ||
"description": "Deploys the diagnostic settings for AVD Scaling Plans to stream to a Log Analytics workspace when any Scaling Plan which is missing this diagnostic settings is created or updated. The Policy will set the diagnostic with all and categorys enabled.", | ||
"metadata": { | ||
"version": "1.0.0", | ||
"category": "Monitoring" | ||
}, | ||
"parameters": { | ||
"logAnalytics": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Log Analytics workspace", | ||
"description": "Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.", | ||
"strongType": "omsWorkspace" | ||
} | ||
}, | ||
"effect": { | ||
"type": "String", | ||
"defaultValue": "DeployIfNotExists", | ||
"allowedValues": [ | ||
"DeployIfNotExists", | ||
"Disabled" | ||
], | ||
"metadata": { | ||
"displayName": "Effect", | ||
"description": "Enable or disable the execution of the policy" | ||
} | ||
}, | ||
"profileName": { | ||
"type": "String", | ||
"defaultValue": "setbypolicy", | ||
"metadata": { | ||
"displayName": "Profile name", | ||
"description": "The diagnostic settings profile name" | ||
} | ||
}, | ||
"logsEnabled": { | ||
"type": "String", | ||
"defaultValue": "True", | ||
"allowedValues": [ | ||
"True", | ||
"False" | ||
], | ||
"metadata": { | ||
"displayName": "Enable logs", | ||
"description": "Whether to enable logs stream to the Log Analytics workspace - True or False" | ||
} | ||
} | ||
}, | ||
"policyRule": { | ||
"if": { | ||
"field": "type", | ||
"equals": "Microsoft.DesktopVirtualization/scalingplans" | ||
}, | ||
"then": { | ||
"effect": "[parameters('effect')]", | ||
"details": { | ||
"type": "Microsoft.Insights/diagnosticSettings", | ||
"name": "setByPolicy", | ||
"existenceCondition": { | ||
"allOf": [ | ||
{ | ||
"field": "Microsoft.Insights/diagnosticSettings/logs.enabled", | ||
"equals": "true" | ||
}, | ||
{ | ||
"field": "Microsoft.Insights/diagnosticSettings/workspaceId", | ||
"equals": "[parameters('logAnalytics')]" | ||
} | ||
] | ||
}, | ||
"roleDefinitionIds": [ | ||
"/providers/microsoft.authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa", | ||
"/providers/microsoft.authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293" | ||
], | ||
"deployment": { | ||
"properties": { | ||
"mode": "Incremental", | ||
"template": { | ||
"$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", | ||
"contentVersion": "1.0.0.0", | ||
"parameters": { | ||
"resourceName": { | ||
"type": "String" | ||
}, | ||
"logAnalytics": { | ||
"type": "String" | ||
}, | ||
"location": { | ||
"type": "String" | ||
}, | ||
"profileName": { | ||
"type": "String" | ||
}, | ||
"logsEnabled": { | ||
"type": "String" | ||
} | ||
}, | ||
"variables": {}, | ||
"resources": [ | ||
{ | ||
"type": "Microsoft.DesktopVirtualization/scalingplans/providers/diagnosticSettings", | ||
"apiVersion": "2017-05-01-preview", | ||
"name": "[concat(parameters('resourceName'), '/', 'Microsoft.Insights/', parameters('profileName'))]", | ||
"location": "[parameters('location')]", | ||
"dependsOn": [], | ||
"properties": { | ||
"workspaceId": "[parameters('logAnalytics')]", | ||
"logs": [ | ||
{ | ||
"category": "Autoscale", | ||
"enabled": "[parameters('logsEnabled')]" | ||
} | ||
] | ||
} | ||
} | ||
], | ||
"outputs": {} | ||
}, | ||
"parameters": { | ||
"logAnalytics": { | ||
"value": "[parameters('logAnalytics')]" | ||
}, | ||
"location": { | ||
"value": "[field('location')]" | ||
}, | ||
"resourceName": { | ||
"value": "[field('name')]" | ||
}, | ||
"profileName": { | ||
"value": "[parameters('profileName')]" | ||
}, | ||
"logsEnabled": { | ||
"value": "[parameters('logsEnabled')]" | ||
} | ||
} | ||
} | ||
} | ||
} | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.