Skip to content

Commit

Permalink
Insights on Firewall Policy (#12509)
Browse files Browse the repository at this point in the history
* Adds base for updating Microsoft.Network from version stable/2020-07-01 to version 2020-08-01

* Updates readme

* Updates API version in new specs and examples

* add patch operation for express route gateway (#11553)

* add patch

* fix example

* Added new cloud service NIC and PIP APIs (#11650)

Co-authored-by: Richa Jain <[email protected]>

* Adding support for Vpn Link Connection Mode (#11574)

Co-authored-by: Abhishek Shah <[email protected]>

* Reverting the changes made for address space update as the changes in service code are not in yet (#11754)

Co-authored-by: Hari Prasad Perabattula <[email protected]>

* VPN NAT for Virtual WAN feature changes (#11815)

* VPN NAT for Virtual WAN feature changes

* PrettierCheck fixes

* Incorporate review comments and update examples

* Add edge zone parameters for networking resources and add extendedLocation property to customIpPrefix (#11933)

* Add extendedLocation property to customIpPrefix

* Fix the directory

* Address linting errors

* Fix another linting error

* Add edge zone parameter for network interfaces

* Looks like edgeZone parameter is working when creating network interfaces

* EdgeZone parameter for load balancer

* Add edge zone parameter for public IP address

* Add edge zone parameter for public IP prefix

* Add edgeZone parameter for virtual networks

* Add edge zone parameter for custom IP prefix

Co-authored-by: Will Ehrich <[email protected]>

* Add location parameter to Loadbalancer Backend Address Pool Properties Format (#11919)

* adding location parameter to backendaddresspoolpropertiesformat

* ran prettier

* Support for Listing IKE Security Associations for Virtual Network Gateway Connections (#11572)

* Support to List IKE SAs on VNG Connection

* Updating GetIkeSas

* Update virtualNetworkGateway.json

* Added location headers

* Update virtualNetworkGateway.json

* Prettier fix

* Update custom-words.txt

* Update virtualNetworkGateway.json

* Update custom-words.txt

* Update virtualNetworkGateway.json

* Update virtualNetworkGateway.json

* Update virtualNetworkGateway.json

Co-authored-by: Abhishek Shah <[email protected]>

* [Fix] GetIkeSas returns result as string (#12225)

* Removing IkeSaParameters

* Update custom-words.txt

* Update virtualNetworkGateway.json

* Update virtualNetworkGateway.json

* Update VirtualNetworkGatewayConnectionGetIkeSas.json

* Update virtualNetworkGateway.json

* Update VirtualNetworkGatewayConnectionGetIkeSas.json

Co-authored-by: Abhishek Shah <[email protected]>

* Add extended location properties for private link service and private endpoints and remove edge zone properties (#12039)

* Remove edge zone parameter

* Add extended location for private endpoint and private link service

* Add examples

* Capitalization

* Prettier

Co-authored-by: Will Ehrich <[email protected]>

* Add missing properties of SecurityRule, Route and RouteTable (#12215)

* Add missing properties of SecurityRule Route and RouteTable

* Set resourceGuid field to be read only

Co-authored-by: Xu Wang <[email protected]>

* Added placeholder instead of password (#12299)

* resolving conflicts

* resolving conflicts

* new api version

* resolving conflicts

* fixing network validation

* running prettier

* fixing network valdiation

* fixing network valdiation

Co-authored-by: Mikhail <[email protected]>
Co-authored-by: nimaller <[email protected]>
Co-authored-by: Richa Jain <[email protected]>
Co-authored-by: Richa Jain <[email protected]>
Co-authored-by: Abhishek Shah <[email protected]>
Co-authored-by: Abhishek Shah <[email protected]>
Co-authored-by: Hari Prasad Perabattula <[email protected]>
Co-authored-by: Hari Prasad Perabattula <[email protected]>
Co-authored-by: Nilambari <[email protected]>
Co-authored-by: William Ehrich <[email protected]>
Co-authored-by: Will Ehrich <[email protected]>
Co-authored-by: Kayden Wilkinson <[email protected]>
Co-authored-by: Xu Wang <[email protected]>
Co-authored-by: Xu Wang <[email protected]>
  • Loading branch information
15 people authored Jan 26, 2021
1 parent 7bcd5c9 commit 17dc295
Show file tree
Hide file tree
Showing 3 changed files with 108 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,23 @@
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/firewallPolicies/firewallPolicy/ruleCollectionGroups/ruleCollectionGroup1"
}
],
"insights": {
"isEnabled": true,
"retentionDays": 100,
"logAnalyticsResources": {
"workspaceIds": [
{
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1"
},
{
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2"
}
],
"defaultWorkspaceId": {
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace"
}
}
},
"firewalls": [],
"snat": {
"privateRanges": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,23 @@
"*.microsoft.com"
]
},
"insights": {
"isEnabled": true,
"retentionDays": 100,
"logAnalyticsResources": {
"workspaceIds": [
{
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1"
},
{
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2"
}
],
"defaultWorkspaceId": {
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace"
}
}
},
"snat": {
"privateRanges": [
"IANAPrivateRanges"
Expand Down Expand Up @@ -100,6 +117,23 @@
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/firewallPolicies/firewallPolicy/ruleCollectionGroups/ruleCollectionGroup2"
}
],
"insights": {
"isEnabled": true,
"retentionDays": 100,
"logAnalyticsResources": {
"workspaceIds": [
{
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1"
},
{
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2"
}
],
"defaultWorkspaceId": {
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace"
}
}
},
"firewalls": [],
"snat": {
"privateRanges": [
Expand Down Expand Up @@ -181,6 +215,23 @@
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/firewallPolicies/firewallPolicy/ruleCollectionGroups/ruleCollectionGroup2"
}
],
"insights": {
"isEnabled": true,
"retentionDays": 100,
"logAnalyticsResources": {
"workspaceIds": [
{
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace1"
},
{
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/workspace2"
}
],
"defaultWorkspaceId": {
"id": "/subscriptions/subid/resourcegroups/rg1/providers/microsoft.operationalinsights/workspaces/defaultWorkspace"
}
}
},
"firewalls": [],
"snat": {
"privateRanges": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -638,6 +638,10 @@
"description": "ThreatIntel Whitelist for Firewall Policy.",
"$ref": "#/definitions/FirewallPolicyThreatIntelWhitelist"
},
"insights": {
"description": "Insights on Firewall Policy.",
"$ref": "#/definitions/FirewallPolicyInsights"
},
"snat": {
"description": "The private IP addresses/IP ranges to which traffic will not be SNAT.",
"$ref": "#/definitions/FirewallPolicySNAT"
Expand Down Expand Up @@ -1150,6 +1154,25 @@
}
}
},
"FirewallPolicyInsights": {
"description": "Firewall Policy Insights.",
"x-ms-discriminator-value": "FirewallPolicyInsights",
"properties": {
"isEnabled": {
"type": "boolean",
"description": "A flag to indicate if the insights are enabled on the policy."
},
"retentionDays": {
"type": "integer",
"format": "int32",
"description": "Number of days the insights should be enabled on the policy."
},
"logAnalyticsResources": {
"description": "Workspaces needed to configure the Firewall Policy Insights.",
"$ref": "#/definitions/FirewallPolicyLogAnalyticsResources"
}
}
},
"FirewallPolicySNAT": {
"description": "The private IP addresses/IP ranges to which traffic will not be SNAT.",
"x-ms-discriminator-value": "FirewallPolicySNAT",
Expand Down Expand Up @@ -1348,6 +1371,23 @@
}
},
"description": "SKU of Firewall policy."
},
"FirewallPolicyLogAnalyticsResources": {
"description": "Log Analytics Resources for Firewall Policy Insights.",
"x-ms-discriminator-value": "FirewallPolicyLogAnalyticsResources",
"properties": {
"workspaceIds": {
"type": "array",
"description": "List of workspace Ids for Firewall Policy Insights.",
"items": {
"$ref": "./network.json#/definitions/SubResource"
}
},
"defaultWorkspaceId": {
"$ref": "./network.json#/definitions/SubResource",
"description": "The default workspace Id for Firewall Policy Insights."
}
}
}
}
}

0 comments on commit 17dc295

Please sign in to comment.