Skip to content

Commit 03c8125

Browse files
author
Aris van Ommeren
committed
azurerm_(ms)sql_server - removal of doc for deprecated extended_auditing_policy
1 parent 605af2e commit 03c8125

File tree

2 files changed

+0
-46
lines changed

2 files changed

+0
-46
lines changed

website/docs/r/mssql_server.html.markdown

-23
Original file line numberDiff line numberDiff line change
@@ -44,13 +44,6 @@ resource "azurerm_mssql_server" "example" {
4444
object_id = "00000000-0000-0000-0000-000000000000"
4545
}
4646
47-
extended_auditing_policy {
48-
storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint
49-
storage_account_access_key = azurerm_storage_account.example.primary_access_key
50-
storage_account_access_key_is_secondary = true
51-
retention_in_days = 6
52-
}
53-
5447
tags = {
5548
environment = "production"
5649
}
@@ -74,8 +67,6 @@ The following arguments are supported:
7467

7568
* `azuread_administrator` - (Optional) An `azuread_administrator` block as defined below.
7669

77-
* `extended_auditing_policy` - (Optional) A `extended_auditing_policy` block as defined below.
78-
7970
* `connection_policy` - (Optional) The connection policy the server will use. Possible values are `Default`, `Proxy`, and `Redirect`. Defaults to `Default`.
8071

8172
* `identity` - (Optional) An `identity` block as defined below.
@@ -132,20 +123,6 @@ An `azuread_administrator` block supports the following:
132123

133124
* `azuread_authentication_only` - (Optional) Specifies whether only AD Users and administrators (like `azuread_administrator.0.login_username`) can be used to login or also local database users (like `administrator_login`).
134125

135-
---
136-
137-
An `extended_auditing_policy` block supports the following:
138-
139-
* `storage_account_access_key` - (Optional) Specifies the access key to use for the auditing storage account.
140-
141-
* `storage_endpoint` - (Optional) Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net).
142-
143-
* `storage_account_access_key_is_secondary` - (Optional) Specifies whether `storage_account_access_key` value is the storage's secondary key.
144-
145-
* `retention_in_days` - (Optional) Specifies the number of days to retain logs for in the storage account.
146-
147-
* `log_monitoring_enabled` - (Optional) Enable audit events to Azure Monitor? To enable server audit events to Azure Monitor, please enable its main database audit events to Azure Monitor.
148-
149126
### Timeouts
150127

151128
The `timeouts` block allows you to specify [timeouts](https://www.terraform.io/docs/configuration/resources.html#timeouts) for certain actions:

website/docs/r/sql_server.html.markdown

-23
Original file line numberDiff line numberDiff line change
@@ -40,13 +40,6 @@ resource "azurerm_sql_server" "example" {
4040
administrator_login = "mradministrator"
4141
administrator_login_password = "thisIsDog11"
4242
43-
extended_auditing_policy {
44-
storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint
45-
storage_account_access_key = azurerm_storage_account.example.primary_access_key
46-
storage_account_access_key_is_secondary = true
47-
retention_in_days = 6
48-
}
49-
5043
tags = {
5144
environment = "production"
5245
}
@@ -73,8 +66,6 @@ The following arguments are supported:
7366

7467
* `identity` - (Optional) An `identity` block as defined below.
7568

76-
* `extended_auditing_policy` - (Optional) A `extended_auditing_policy` block as defined below.
77-
7869
* `threat_detection_policy` - (Optional) Threat detection policy configuration. The `threat_detection_policy` block supports fields documented below.
7970

8071
* `tags` - (Optional) A mapping of tags to assign to the resource.
@@ -114,20 +105,6 @@ The following attributes are exported:
114105

115106
-> You can access the Principal ID via `${azurerm_mssql_server.example.identity.0.principal_id}` and the Tenant ID via `${azurerm_mssql_server.example.identity.0.tenant_id}`
116107

117-
---
118-
119-
A `extended_auditing_policy` block supports the following:
120-
121-
* `storage_account_access_key` - (Optional) Specifies the access key to use for the auditing storage account.
122-
123-
* `storage_endpoint` - (Optional) Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net).
124-
125-
* `storage_account_access_key_is_secondary` - (Optional) Specifies whether `storage_account_access_key` value is the storage's secondary key.
126-
127-
* `retention_in_days` - (Optional) Specifies the number of days to retain logs for in the storage account.
128-
129-
* `log_monitoring_enabled` - (Optional) Enable audit events to Azure Monitor? To enable server audit events to Azure Monitor, please enable its primary database audit events to Azure Monitor.
130-
131108
### Timeouts
132109

133110
The `timeouts` block allows you to specify [timeouts](https://www.terraform.io/docs/configuration/resources.html#timeouts) for certain actions:

0 commit comments

Comments
 (0)