Initiatives usage
Records: 10 25 100 200 Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
< ,
<= ,
> ,
>= ,
= ,
* ,
! ,
{ ,
} ,
|| ,
&& ,
[empty] ,
[nonempty] ,
rgx: Learn more ? Page 1 of 1
Clear Monitoring Clear GA Clear BuiltIn
Initiative DisplayName
Initiative Id
Initiative Category
State
Type
polSet in AzUSGov
Enable allLogs category group resource logging for supported resources to Log Analytics
0884adba-2312-4468-abeb-5422caed1038
Monitoring
GA BuiltIn
unknown
Enable audit category group resource logging for supported resources to Log Analytics
f5b29bc4-feca-4cc6-a58a-772dd5e290a5
Monitoring
GA BuiltIn
unknown
No results
JSON
api-version=2021-06-01
Copy definition Copy definition 4 EPAC EPAC
{ 7 items displayName: "Enable logging by category group for microsoft.dbformysql/flexibleservers to Log Analytics" , policyType: "BuiltIn" , mode: "Indexed" , description: "Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.dbformysql/flexibleservers." , metadata: { 2 items category: "Monitoring" , version: "1.0.0" } , parameters: { 5 items effect: { 4 items type: "String" , metadata: { 2 items displayName: "Effect" , description: "Enable or disable the execution of the policy" } , allowedValues: [ 3 items "DeployIfNotExists" , "AuditIfNotExists" , "Disabled" ] , defaultValue: "DeployIfNotExists" } , diagnosticSettingName: { 3 items type: "String" , metadata: { 2 items displayName: "Diagnostic Setting Name" , description: "Diagnostic Setting Name" } , defaultValue: "setByPolicy-LogAnalytics" } , categoryGroup: { 4 items } , resourceLocationList: { 3 items type: "Array" , metadata: { 2 items displayName: "Resource Location List" , description: "Resource Location List to send logs to nearby Log Analytics. A single entry "*" selects all locations (default)." } , defaultValue: [ 1 item ] } , logAnalytics: { 2 items type: "String" , metadata: { 4 items displayName: "Log Analytics Workspace" , description: "Log Analytics Workspace" , strongType: "omsWorkspace" , assignPermissions: true } } } , policyRule: { 2 items if: { 1 item } , then: { 2 items effect: "[parameters('effect')]" , details: { 5 items type: "Microsoft.Insights/diagnosticSettings" , evaluationDelay: "AfterProvisioning" , existenceCondition: { 1 item allOf: [ 3 items { 2 items count: { 2 items field: "Microsoft.Insights/diagnosticSettings/logs[*]" , where: { 1 item allOf: [ 2 items { 2 items field: "Microsoft.Insights/diagnosticSettings/logs[*].enabled" , equals: 🔍 "[
equals(
parameters('categoryGroup'),
'audit'
)
]" } , { 2 items field: "microsoft.insights/diagnosticSettings/logs[*].categoryGroup" , equals: "audit" } ] } } , equals: 1 } , { 2 items count: { 2 items field: "Microsoft.Insights/diagnosticSettings/logs[*]" , where: { 1 item allOf: [ 2 items { 2 items field: "Microsoft.Insights/diagnosticSettings/logs[*].enabled" , equals: 🔍 "[
equals(
parameters('categoryGroup'),
'allLogs'
)
]" } , { 2 items field: "microsoft.insights/diagnosticSettings/logs[*].categoryGroup" , equals: "allLogs" } ] } } , equals: 1 } , { 2 items field: "Microsoft.Insights/diagnosticSettings/workspaceId" , equals: "[parameters('logAnalytics')]" } ] } , roleDefinitionIds: [ 1 item ] , deployment: { 1 item properties: { 3 items mode: "incremental" , template: { 6 items $schema: "http://schema.management.azure.com/schemas/2019-08-01/deploymentTemplate.json#" , contentVersion: "1.0.0.0" , parameters: { 4 items } , variables : {} , resources: [ 1 item { 4 items type: "microsoft.dbformysql/flexibleservers/providers/diagnosticSettings" , apiVersion: "2021-05-01-preview" , name: 🔍 "[
concat(
parameters('resourceName'),
'/',
'Microsoft.Insights/',
parameters('diagnosticSettingName')
)
]", properties: { 3 items workspaceId: "[parameters('logAnalytics')]" , logs: [ 2 items { 2 items categoryGroup: "audit" , enabled: 🔍 "[
equals(
parameters('categoryGroup'),
'audit'
)
]" } , { 2 items categoryGroup: "allLogs" , enabled: 🔍 "[
equals(
parameters('categoryGroup'),
'allLogs'
)
]" } ] , metrics : [] } } ] , outputs: { 1 item policy: { 2 items type: "string" , value: 🔍 "[
concat(
'Diagnostic setting',
parameters('diagnosticSettingName'),
'for type microsoft.dbformysql/flexibleservers,
resourceName',
parameters('resourceName'),
'to Log Analytics',
parameters('logAnalytics'),
'configured'
)
]" } } } , parameters: { 4 items } } } } } } }