Azure SQL Management
Azure SQL Management Pack.#
This Integration is part of theMicrosoft Azure SQL Management Integration manages the Auditing and Threat Policies for Azure SQL. This integration was integrated and tested with version 2021-11-01 of Azure SQL Management
In order to connect to the AzureKubernetesServices using either Cortex XSOAR Azure App or the Self-Deployed Azure App, use one of the following methods:
- Authorization Code Flow (Recommended).
- Device Code Flow.
- Azure Managed Identities
- Client Credentials Flow.
#
Self-Deployed ApplicationTo use a self-configured Azure application, you need to add a new Azure App Registration in the Azure Portal.
The application must have user_impersonation permission and must allow public client flows (found under the Authentication section of the app). And must allow public client flows (found under the Authentication section of the app) for Device-code based authentications.
#
Authentication Using the User-Authentication Flow (recommended)Follow these steps for a self-deployed configuration:
- To use a self-configured Azure application, you need to add a new Azure App Registration in the Azure Portal. To add the registration, refer to the following Microsoft article steps 1-8.
- choose the 'User Auth' option in the Authentication Type parameter.
- Enter your Client/Application ID in the Application ID parameter.
- Enter your Client Secret in the Client Secret parameter.
- Enter your Tenant ID in the Tenant ID parameter.
- Enter your Application redirect URI in the Application redirect URI parameter.
- Save the instance.
- Run the
!azure-sql-generate-login-url
command in the War Room and follow the instruction. - Run the !azure-sql-auth-test command - a 'Success' message should be printed to the War Room.
#
Authentication Using the Device Code FlowUse the device code flow to link Azure SQL Management with Cortex XSOAR.
Follow these steps for a self-deployed configuration:
- Fill in the required parameters.
- choose the 'Device' option in the user_auth_flow parameter.
- Run the !azure-sql-auth-start command.
- Follow the instructions that appear.
- Run the !azure-sql-auth-complete command.
#
Cortex XSOAR Azure AppIn order to use the Cortex XSOAR Azure application, use the default application ID (8f9010bb-4efe-4cfa-a197-98a2694b7e0c).
You only need to fill in your subscription ID and resource group name. You can find your resource group and subscription ID in the Azure Portal. For a more detailed explanation, visit this page.
#
Client Credentials Flow AuthenticationAssign Azure roles using the Azure portal Microsoft article Note: In the Select members section, assign the application you created earlier. To configure a Microsoft integration that uses this authorization flow with a self-deployed Azure application:
- In the Authentication Type field, select the Client Credentials option.
- In the Application ID field, enter your Client/Application ID.
- In the Tenant ID field, enter your Tenant ID .
- In the Client Secret field, enter your Client Secret.
- Click Test to validate the URLs, token, and connection
- Save the instance.
#
Testing authentication and connectivityIf you are using Device Code Flow or Authorization Code Flow, for testing your authentication and connectivity to the Azure SQL Management service run the !azure-sql-auth-test command. If you are using Client Credentials Flow, click Test when you are configuring the instance.
#
Configure Azure SQL Management on Cortex XSOARIn both options below, the device authorization grant flow is used.
In order to connect to the Azure SQL Management using either Cortex XSOAR Azure App or the Self-Deployed Azure App:
Fill in the required parameters.
Parameter Description Required Application ID False Default Subscription ID Test button won’t work if not populated. This value can be overridden on a command basis. False Default Resource Group Name Test button won’t work if not populated. This value can be overridden on a command basis. False Authentication Type Type of authentication - can be Authorization Code Flow (recommended), Device Code Flow, Azure Managed Identities or Client Credentials Flow. True Tenant ID For authorization code mode or client credentials. False Client Secret For authorization code mode or client credentials. False Client Secret For authorization code mode or client credentials. False Application redirect URI For authorization code mode. False Authorization code for user-auth mode - received from the authorization step. False Azure Managed Identities Client ID The Managed Identities client ID for authentication - relevant only if the integration is running on Azure VM. False Azure AD endpoint Azure AD endpoint associated with a national cloud. False Trust any certificate (not secure) False Use system proxy settings False
At the end of the process you'll see a message that you've logged in successfully.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
azure-sql-auth-startRun this command to start the authorization process and follow the instructions in the command results.
#
Base Commandazure-sql-auth-start
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
Command example!azure-sql-auth-start
#
Human Readable Output#
Authorization instructions
- To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the code CODECODE to authenticate.
- Run the !azure-sql-auth-complete command in the War Room.
#
azure-sql-auth-completeRun this command to complete the authorization process. Should be used after running the azure-sql-auth-start command.
#
Base Commandazure-sql-auth-complete
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
Command Example!azure-nsg-auth-complete
#
Human Readable Outputâś… Authorization completed successfully.
#
azure-sql-auth-resetRun this command if for some reason you need to rerun the authentication process.
#
Base Commandazure-sql-auth-reset
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
Command example!azure-sql-auth-reset
#
Human Readable OutputAuthorization was reset successfully. You can now run !azure-sql-auth-start and !azure-sql-auth-complete.
#
azure-sql-auth-testTests the connectivity to the Azure SQL Management.
#
Base Commandazure-sql-auth-test
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
Command Example!azure-sql-auth-test
#
Human Readable Outputâś… Success!
#
azure-sql-servers-listLists all the servers.
#
Base Commandazure-sql-servers-list
#
InputArgument Name | Description | Required |
---|---|---|
limit | (Int) The maximum number of servers returned to the War Room. Default is 50. | Optional |
offset | Offset in the data set. Default is 0. | Optional |
subscription_id | Subscription ID. This value will override the instance param 'subscription_id'. | Optional |
resource_group_name | A comma-separated list of resource group names. This value will override the instance param 'resource_group_name'. | Optional |
list_by_resource_group | If true, returns the server lists that matches the given resource groups. Else, returns a list of all the servers. Possible values are: true, false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AzureSQL.Server | Unknown | Server list. |
AzureSQL.Server.kind | String | Kind of server. |
AzureSQL.Server.location | String | Server location. |
AzureSQL.Server.tags | Unknown | Server tags. |
AzureSQL.Server.id | String | Server ID. |
AzureSQL.Server.name | String | Server name. |
AzureSQL.Server.type | String | Server type. |
AzureSQL.Server.administratorLogin | String | Username of the server administrator. |
AzureSQL.Server.version | String | Server version. |
AzureSQL.Server.state | String | Server state. |
AzureSQL.Server.fullyQualifiedDomainName | Unknown | Fully qualified domain name of the server. |
AzureSQL.Server.privateEndpointConnections | Unknown | List of private endpoint connections of the server. |
AzureSQL.Server.publicNetworkAccess | Boolean | Whether the public endpoint access of the server is enabled. |
AzureSQL.Server.restrictOutboundNetworkAccess | Unknown | Whether or not to restrict outbound network access for this server. Value is optional but if passed in, must be 'Enabled' or 'Disabled'. |
#
Command example!azure-sql-servers-list
#
Context Example#
Human Readable Output#
Servers List
Administrator Login Fully Qualified Domain Name Id Kind Location Name Public Network Access State Type Version xsoaradmin sqlintegration.database.windows.net /subscriptions/0123456789/resourceGroups/sql-integration/providers/Microsoft.Sql/servers/sqlintegration v12.0 eastus sqlintegration Enabled Ready Microsoft.Sql/servers 12.0
#
azure-sql-db-listLists all of the databases for the server.
#
Base Commandazure-sql-db-list
#
InputArgument Name | Description | Required |
---|---|---|
server_name | Server name. | Required |
limit | The maximum number of databases returned to the War Room. Default is 50. | Optional |
offset | Offset in the data set. Default is 0. | Optional |
subscription_id | Subscription ID. This value will override the instance param 'subscription_id'. | Optional |
resource_group_name | Resource group name. This value will override the instance param 'resource_group_name'. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AzureSQL.DB | Unknown | All databases related to the server. |
AzureSQL.DB.kind | String | Kind of database. |
AzureSQL.DB.location | String | Database location. |
AzureSQL.DB.id | String | Database ID. |
AzureSQL.DB.name | String | Database name. |
AzureSQL.DB.type | String | Database type. |
AzureSQL.DB.managedBy | String | Resource that manages the database. |
AzureSQL.DB.sku | Unknown | Database SKU. |
AzureSQL.DB.catalogCollation | String | Collation of the catalog for the database. |
AzureSQL.DB.collation | String | Database collation. |
AzureSQL.DB.creationDate | String | Creation date of the database in ISO format. |
AzureSQL.DB.currentServiceObjectiveName | String | Current service level objective name of the database. |
AzureSQL.DB.currentSku | Unknown | Name, tier, and capacity of the SKU. |
AzureSQL.DB.databaseID | String | Database ID. |
AzureSQL.DB.defaultSecondaryLocation | String | Default secondary location of the database. |
AzureSQL.DB.maxSizeBytes | Number | The maximum size of the database in bytes. |
AzureSQL.DB.readReplicaCount | Number | The number of read-only secondary replicas of the database. |
AzureSQL.DB.readScale | String | The read-only routing state. "Enabled" or "Disabled". |
AzureSQL.DB.requestedServiceObjectiveName | String | The requested service objective name of the database. |
AzureSQL.DB.status | String | Database status. |
AzureSQL.DB.storageAccountType | String | Database storage account type. |
AzureSQL.DB.zoneRedundant | Boolean | Whether the database zone is redundant. |
AzureSQL.DB.currentBackupStorageRedundancy | Unknown | The storage account type used to store backups for this database. |
AzureSQL.DB.requestedBackupStorageRedundancy | Unknown | The storage account type to be used to store backups for this database. |
AzureSQL.DB.maintenanceConfigurationId | String | Maintenance configuration ID assigned to the database. This configuration defines the period when the maintenance updates will occur. |
AzureSQL.DB.isLedgerOn | Boolean | Whether or not this database is a ledger database, which means all tables in the database are ledger tables. The value of this property cannot be changed after the database has been created. |
AzureSQL.DB.isInfraEncryptionEnabled | Boolean | Whether infra encryption is enabled for this database. |
#
Command Example!azure-sql-db-list server_name=sqlintegration
#
Context Example#
Human Readable Output#
Database List
Name Location Status Managed By sql-integration-db eastus Online
#
azure-sql-db-audit-policy-listGets the audit settings of the specified database.
#
Base Commandazure-sql-db-audit-policy-list
#
InputArgument Name | Description | Required |
---|---|---|
server_name | Server name. | Required |
db_name | Database name. | Required |
limit | The maximum number of database audit policies returned to the War Room. Default is 50. | Optional |
offset | Offset in the data set. Default is 0. | Optional |
subscription_id | Subscription ID. This value will override the instance param 'subscription_id'. | Optional |
resource_group_name | A comma-separated list of resource group names. This value will override the instance param 'resource_group_name'. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AzureSQL.DBAuditPolicy | Unknown | List of all database audit settings. |
AzureSQL.DBAuditPolicy.kind | String | Kind of audit policy. |
AzureSQL.DBAuditPolicy.id | String | Audit policy ID. |
AzureSQL.DBAuditPolicy.name | String | Audit policy name. |
AzureSQL.DBAuditPolicy.type | String | Resource type. |
AzureSQL.DBAuditPolicy.isAzureMonitorTargetEnabled | Boolean | Whether audit events are sent to Azure Monitor. Possible values: "True" (Enabled) or "False" (Disabled). |
AzureSQL.DBAuditPolicy.retentionDays | Number | Number of days to keep in the audit logs in the storage account. |
AzureSQL.DBAuditPolicy.state | String | Policy state. |
AzureSQL.DBAuditPolicy.storageAccountSubscriptionId | String | Storage subscription ID. |
AzureSQL.DBAuditPolicy.databaseName | String | The name of the database that the audit policy is related to. |
AzureSQL.DBAuditPolicy.serverName | String | The name of the server that the audit policy is related to. |
AzureSQL.DBAuditPolicy.isManagedIdentityInUse | Boolean | Specifies whether Managed Identity is used to access blob storage. |
#
Command Example!azure-sql-db-audit-policy-list server_name=sqlintegration db_name=sql-integration-db
#
Context Example#
Human Readable Output#
Database Audit Settings for resource_group_name='sql-integration'
Audit Actions And Groups Database Name Id Is Azure Monitor Target Enabled Is Managed Identity In Use Name Retention Days Server Name State Storage Account Subscription Id Type SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP,
FAILED_DATABASE_AUTHENTICATION_GROUP,
BATCH_COMPLETED_GROUPsql-integration-db /subscriptions/0123456789/resourceGroups/sql-integration/providers/Microsoft.Sql/servers/sqlintegration/databases/sql-integration-db/auditingSettings/Default true false Default 3 sqlintegration Enabled 00000000-0000-0000-0000-000000000000 Microsoft.Sql/servers/databases/auditingSettings
#
azure-sql-db-threat-policy-getGets the threat detection policy of the specified database.
#
Base Commandazure-sql-db-threat-policy-get
#
InputArgument Name | Description | Required |
---|---|---|
server_name | Server name. | Required |
db_name | Database name. | Required |
subscription_id | Subscription ID. This value will override the instance param 'subscription_id'. | Optional |
resource_group_name | Resource group name. This value will override the instance param 'resource_group_name'. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AzureSQL.DBThreatPolicy | Unknown | All threat policies related to the database. |
AzureSQL.DBThreatPolicy.kind | String | Kind of threat policy. |
AzureSQL.DBThreatPolicy.location | String | Threat policy location. |
AzureSQL.DBThreatPolicy.id | String | Threat policy ID. |
AzureSQL.DBThreatPolicy.name | String | Threat policy name. |
AzureSQL.DBThreatPolicy.type | String | Threat policy type. |
AzureSQL.DBThreatPolicy.state | String | Threat policy state. |
AzureSQL.DBThreatPolicy.creationTime | String | Threat policy creation time. |
AzureSQL.DBThreatPolicy.retentionDays | Number | Number of days to keep in the Threat Detection audit logs. |
AzureSQL.DBThreatPolicy.storageAccountAccessKey | String | The identifier key of the Threat Detection audit storage account. |
AzureSQL.DBThreatPolicy.storageEndpoint | String | Threat Detection audit storage account. |
AzureSQL.DBThreatPolicy.emailAccountAdmins | Boolean | Email account administrators who the alert is sent to. |
AzureSQL.DBThreatPolicy.emailAddresses | String | List of email addresses to which the alert is sent. |
AzureSQL.DBThreatPolicy.disabledAlerts | String | List of alerts that are disabled, or an empty string if no alerts are disabled. |
AzureSQL.DBThreatPolicy.useServerDefault | Unknown | Whether to use the default server policy. |
AzureSQL.DBThreatPolicy.databaseName | String | The name of the database that the threat policy is related to. |
AzureSQL.DBThreatPolicy.serverName | String | The name of server that the threat policy is related to. |
#
Command example!azure-sql-db-threat-policy-get server_name=sqlintegration db_name=sql-integration-db
#
Context Example#
Human Readable Output#
Database Threat Detection Policies
Creation Time Database Name Disabled Alerts Email Account Admins Email Addresses Id Name Retention Days Server Name State Type 2021-01-04T08:05:32.05Z sql-db false /subscriptions/0123456789/resourceGroups/sql/providers/Microsoft.Sql/servers/sqlintegration/databases/sql-integration-db/securityAlertPolicies/Default Default 0 sqlintegration Enabled Microsoft.Sql/servers/databases/securityAlertPolicies
#
azure-sql-db-audit-policy-create-updateCreates or updates the database's auditing policy.
#
Base Commandazure-sql-db-audit-policy-create-update
#
InputArgument Name | Description | Required |
---|---|---|
server_name | Server name. | Required |
db_name | Database name. | Required |
state | Set the state of the policy. Possible values: "Enable" or "Disable". When state is enabled, storage_endpoint or is_azure_monitor_target_enabled are required. | Required |
audit_actions_groups | Comma-separated list of actions groups and actions to audit. For all possible values, see the integration documentation at https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/sql-server-audit-action-groups-and-actions?view=sql-server-ver15. | Optional |
is_azure_monitor_target_enabled | Whether audit events are sent to the Azure Monitor. Possible values: "true" and "false". | Optional |
is_storage_secondary_key_in_use | Whether the storage Account Access Key value is the storage's secondary key. Possible values: "true" and "false". | Optional |
queue_delay_ms | Time in milliseconds that can elapse before audit actions are forced to be processed. The default minimum value is 1000 (1 second). | Optional |
retention_days | Number of days to keep the policy in the audit logs. | Optional |
storage_account_access_key | Identifier key of the auditing storage account. | Optional |
storage_account_subscription_id | Storage subscription ID. | Optional |
storage_endpoint | Storage endpoint. If the value for the state argument is enabled, the value for the storage_endpoint or is_azure_monitor_target_enabled argument is required. | Optional |
subscription_id | Subscription ID. This value will override the instance param 'subscription_id'. | Optional |
resource_group_name | A comma-separated list of resource group names. This value will override the instance param 'resource_group_name'. | Optional |
is_managed_identity_in_use | Specifies whether Managed Identity is used to access blob storage. Possible values are: true, false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AzureSQL.DBAuditPolicy.kind | String | Kind of audit policy. |
AzureSQL.DBAuditPolicy.id | String | Audit policy ID. |
AzureSQL.DBAuditPolicy.name | String | Audit policy name. |
AzureSQL.DBAuditPolicy.type | String | Resource type. |
AzureSQL.DBAuditPolicy.isAzureMonitorTargetEnabled | Boolean | Whether audit events are sent to the Azure Monitor. The value is "True" (Enabled) or "False" (Disabled). |
AzureSQL.DBAuditPolicy.retentionDays | Number | Number of days to keep in the audit logs in the storage account. |
AzureSQL.DBAuditPolicy.state | String | Policy state. |
AzureSQL.DBAuditPolicy.storageAccountSubscriptionId | String | Storage subscription ID. |
AzureSQL.DBAuditPolicy.auditActionsAndGroups | Unknown | Audit actions and groups to audit. |
AzureSQL.DBAuditPolicy.isStorageSecondaryKeyInUse | Boolean | Whether the storage_account_access_key value is the storage's secondary key. |
AzureSQL.DBAuditPolicy.queueDelayMs | String | Time in milliseconds that can elapse before audit actions are forced to be processed. |
AzureSQL.DBAuditPolicy.storageAccountAccessKey | String | Identifier key of the auditing storage account. |
AzureSQL.DBAuditPolicy.storageEndpoint | String | Storage endpoint. |
AzureSQL.DBAuditPolicy.databaseName | String | The name of the database that the audit policy is related to. |
AzureSQL.DBAuditPolicy.serverName | String | The name of server that the audit policy is related to. |
AzureSQL.DBAuditPolicy.isManagedIdentityInUse | Boolean | Specifies whether Managed Identity is used to access blob storage. |
#
Command example!azure-sql-db-audit-policy-create-update server_name=sqlintegration db_name=sql-integration-db state=Enabled is_azure_monitor_target_enabled=true retention_days=3 queue_delay_ms=123
#
Context Example#
Human Readable Output#
Create Or Update Database Auditing Settings for resource_group_name='sql-integration'
Audit Actions And Groups Database Name Id Is Azure Monitor Target Enabled Is Managed Identity In Use Name Queue Delay Ms Retention Days Server Name State Storage Account Subscription Id Type SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP,
FAILED_DATABASE_AUTHENTICATION_GROUP,
BATCH_COMPLETED_GROUPsql-db /subscriptions/0123456789/resourceGroups/sql/providers/Microsoft.Sql/servers/sqlintegration/databases/sql-integration-db/auditingSettings/Default true false Default 123 3 sqlintegration Enabled 00000000-0000-0000-0000-000000000000 Microsoft.Sql/servers/databases/auditingSettings
#
azure-sql-db-threat-policy-create-updateCreates or updates the database's threat detection policy.
#
Base Commandazure-sql-db-threat-policy-create-update
#
InputArgument Name | Description | Required |
---|---|---|
server_name | Server name. | Required |
db_name | Database name. | Required |
state | The state of the policy. Possible values: "Enabled" and "Disabled". | Required |
retention_days | Number of days to keep the policy in the audit logs. | Optional |
storage_account_access_key | The identifier key of the threat detection audit storage account. | Optional |
storage_endpoint | The blob storage endpoint. This blob storage will hold all Threat Detection audit logs. | Optional |
disabled_alerts | Comma-separated list of alerts that are disabled. Possible values: "None", "Sql_Injection", "Sql_Injection_Vulnerability", "Access_Anomaly", "Data_Exfiltration", and "Unsafe_Action". | Optional |
email_addresses | Comma-separated list of email addresses to which the alert is sent. | Optional |
email_account_admins | Whether the alert is sent to the account administrators. Possible values: "true" and "false". | Optional |
use_server_default | Whether to use the default server policy. Possible values: "Enabled" and "Disabled". | Optional |
subscription_id | Subscription ID. This value will override the instance param 'subscription_id'. | Optional |
resource_group_name | A comma-separated list of resource group names. This value will override the instance param 'resource_group_name'. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AzureSQL.DBThreatPolicy.kind | String | Kind of threat policy. |
AzureSQL.DBThreatPolicy.location | String | Threat policy location. |
AzureSQL.DBThreatPolicy.id | String | Threat policy ID. |
AzureSQL.DBThreatPolicy.name | String | Threat policy name. |
AzureSQL.DBThreatPolicy.type | String | Threat policy type. |
AzureSQL.DBThreatPolicy.state | String | Threat policy state. |
AzureSQL.DBThreatPolicy.creationTime | String | Threat policy creation time. |
AzureSQL.DBThreatPolicy.retentionDays | Number | Number of days to keep in the Threat Detection audit logs. |
AzureSQL.DBThreatPolicy.storageAccountAccessKey | String | The identifier key of the Threat Detection audit storage account. |
AzureSQL.DBThreatPolicy.storageEndpoint | String | Threat Detection audit storage account. |
AzureSQL.DBThreatPolicy.emailAccountAdmins | Boolean | Email accounts administrators who the alert is sent to. |
AzureSQL.DBThreatPolicy.emailAddresses | String | List of email addresses to which the alert is sent. |
AzureSQL.DBThreatPolicy.disabledAlerts | String | List of alerts that are disabled, or an empty string if no alerts are disabled. |
AzureSQL.DBThreatPolicy.useServerDefault | Unknown | Whether to use the default server policy. |
AzureSQL.DBThreatPolicy.databaseName | String | The name of the database that the threat policy is related to. |
AzureSQL.DBThreatPolicy.serverName | String | The name of the server that the threat policy is related to. |
#
Command example!azure-sql-db-threat-policy-create-update server_name=sqlintegration db_name=sql-integration-db state=Enabled disabled_alerts="Sql_Injection,Sql_Injection_Vulnerability" retention_days=5
#
Context Example#
Human Readable Output#
Create Or Update Database Threat Detection Policies for resource_group_name='sql-integration'
Creation Time Database Name Disabled Alerts Email Account Admins Id Name Retention Days Server Name State Type 0001-01-01T00:00:00Z sql-integration-db Sql_Injection,
Sql_Injection_Vulnerabilityfalse /subscriptions/0123456789/resourceGroups/sql-integration/providers/Microsoft.Sql/servers/sqlintegration/databases/sql-integration-db/securityAlertPolicies/Default Default 5 sqlintegration Enabled Microsoft.Sql/servers/databases/securityAlertPolicies
#
azure-sql-generate-login-urlGenerate the login url used for Authorization code flow.
#
Base Commandazure-sql-generate-login-url
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
Command Exampleazure-sql-generate-login-url
#
Human Readable Output#
Authorization instructions
- Click on the login URL to sign in and grant Cortex XSOAR permissions for your Azure Service Management. You will be automatically redirected to a link with the following structure:
REDIRECT_URI?code=AUTH_CODE&session_state=SESSION_STATE
- Copy the
AUTH_CODE
(without thecode=
prefix, and thesession_state
parameter) and paste it in your instance configuration under the Authorization code parameter.
#
azure-sql-subscriptions-listGets all subscriptions for a tenant.
#
Base Commandazure-sql-subscriptions-list
#
InputThere are no input arguments for this command.
#
Context OutputPath | Type | Description |
---|---|---|
AzureSQL.Subscription.id | String | The fully qualified ID for the subscription. |
AzureSQL.Subscription.authorizationSource | String | The authorization source of the request. Valid values are one or more combinations of Legacy, RoleBased, Bypassed, Direct and Management. For example, 'Legacy, RoleBased'. |
AzureSQL.Subscription.managedByTenants | Unknown | An array containing the tenants managing the subscription. |
AzureSQL.Subscription.subscriptionId | String | The subscription ID. |
AzureSQL.Subscription.tenantId | String | The subscription tenant ID. |
AzureSQL.Subscription.displayName | String | The subscription display name. |
AzureSQL.Subscription.state | String | The subscription state. Possible values are Enabled, Warned, PastDue, Disabled, and Deleted. |
AzureSQL.Subscription.subscriptionPolicies.locationPlacementId | String | The subscription location placement ID. The ID indicates which regions are visible for a subscription. For example, a subscription with a location placement ID of Public_2014-09-01 has access to Azure public regions. |
AzureSQL.Subscription.subscriptionPolicies.quotaId | String | The subscription quota ID. |
AzureSQL.Subscription.subscriptionPolicies.spendingLimit | String | The subscription spending limit. |
#
Command Exampleazure-sql-subscriptions-list
#
Context Example#
Human Readable Output#
Subscription List
Subscription Id Name Tenant Id State subscriptionId displayName tenantId Enabled
#
azure-sql-resource-group-listGets all the resource groups for a subscription.
#
Base Commandazure-sql-resource-group-list
#
InputArgument Name | Description | Required |
---|---|---|
subscription_id | A comma-separated list of subscription IDs. This value will override the instance param 'subscription_id'. | Optional |
tag | The tag and value that is attached to the resource group. Input should be “Tag Name:Tag Value”. | Optional |
limit | The number of results to return. Default value is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AzureSQL.ResourceGroup.id | String | The ID of the resource group. |
AzureSQL.ResourceGroup.name | String | The name of the resource group. |
AzureSQL.ResourceGroup.type | String | The type of the resource group. |
AzureSQL.ResourceGroup.location | String | The location of the resource group. It cannot be changed after the resource group has been created. It must be one of the supported Azure locations. |
AzureSQL.ResourceGroup.properties | String | The resource group properties. |
AzureSQL.ResourceGroup.tags | String | The tags attached to the resource group. |
#
Command Exampleazure-sql-resource-group-list tag="Name:name"
#
Context Example#
Human Readable Output#
Resource Group List for subscriptionID
Name Location Tags Provisioning State name location Name: name Succeeded