* correcting mode

* Delete mgmtGroupDiagnostics.json

* Delete 60-move-subscription-under-managementgroup.parameters.json

* Delete notepad
This commit is contained in:
Kristian Nese 2021-03-17 07:36:24 +01:00 коммит произвёл GitHub
Родитель d975952b9f
Коммит aab560b08d
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23
5 изменённых файлов: 849 добавлений и 258 удалений

Просмотреть файл

@ -557,7 +557,7 @@
"properties": {
"Description": "Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled.",
"DisplayName": "Deploy Diagnostic Settings for Activity Log to Log Analytics workspace",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"logAnalytics": {
"type": "String",
@ -2225,7 +2225,7 @@
"properties": {
"Description": "Deploys the Azure Defender settings in Azure Security Center for the specific services.",
"DisplayName": "Deploy Azure Defender settings in Azure Security Center.",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"pricingTierVMs": {
"type": "String",
@ -6207,7 +6207,7 @@
"properties": {
"Description": "Deploys Azure Firewall Manager policy in subscription where the policy is assigned.",
"DisplayName": "Deploy Azure Firewall Manager policy in the subscription",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"fwpolicy": {
"type": "Object",
@ -7971,7 +7971,7 @@
"properties": {
"Description": "Deploys Log Analytics and Automation account to the subscription where the policy is assigned.",
"DisplayName": "Deploy the Log Analytics in the subscription",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"workspaceName": {
"type": "String",
@ -9192,7 +9192,7 @@
"properties": {
"Description": "Deploys an Azure DDoS Protection Standard plan",
"DisplayName": "Deploy an Azure DDoS Protection Standard plan",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"ddosName": {
"type": "String",
@ -13683,7 +13683,7 @@
"properties": {
"Description": "Deploys Virtual Network to be used as hub virtual network in desired region in the subscription where this policy is assigned.",
"DisplayName": "Deploy Virtual Network to be used as hub virtual network in desired region",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"hubName": {
"type": "String",
@ -14102,7 +14102,7 @@
"properties": {
"Description": "Deploy spoke network with configuration to hub network based on ipam configuration object",
"DisplayName": "Deploy spoke network with configuration to hub network based on ipam configuration object",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"ipam": {
"type": "Array",
@ -14472,7 +14472,7 @@
"properties": {
"Description": "Deploy the Virtual WAN in the specific region.",
"DisplayName": "Deploy the Virtual WAN in the specific region",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"vwanname": {
"type": "String",
@ -14619,7 +14619,7 @@
"properties": {
"Description": "Deploy Virtual Hub network with Virtual Wan and Gateway and Firewall configured in the desired region. ",
"DisplayName": "Deploy Virtual Hub network with Virtual Wan and Gateway and Firewall configured.",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"vwanname": {
"type": "String",

Просмотреть файл

@ -557,7 +557,7 @@
"properties": {
"Description": "Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled.",
"DisplayName": "Deploy Diagnostic Settings for Activity Log to Log Analytics workspace",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"logAnalytics": {
"type": "String",
@ -2225,7 +2225,7 @@
"properties": {
"Description": "Deploys the Azure Defender settings in Azure Security Center for the specific services.",
"DisplayName": "Deploy Azure Defender settings in Azure Security Center.",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"pricingTierVMs": {
"type": "String",
@ -6207,7 +6207,7 @@
"properties": {
"Description": "Deploys Azure Firewall Manager policy in subscription where the policy is assigned.",
"DisplayName": "Deploy Azure Firewall Manager policy in the subscription",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"fwpolicy": {
"type": "Object",
@ -7971,7 +7971,7 @@
"properties": {
"Description": "Deploys Log Analytics and Automation account to the subscription where the policy is assigned.",
"DisplayName": "Deploy the Log Analytics in the subscription",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"workspaceName": {
"type": "String",
@ -9192,7 +9192,7 @@
"properties": {
"Description": "Deploys an Azure DDoS Protection Standard plan",
"DisplayName": "Deploy an Azure DDoS Protection Standard plan",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"ddosName": {
"type": "String",
@ -13683,7 +13683,7 @@
"properties": {
"Description": "Deploys Virtual Network to be used as hub virtual network in desired region in the subscription where this policy is assigned.",
"DisplayName": "Deploy Virtual Network to be used as hub virtual network in desired region",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"hubName": {
"type": "String",
@ -14102,7 +14102,7 @@
"properties": {
"Description": "Deploy spoke network with configuration to hub network based on ipam configuration object",
"DisplayName": "Deploy spoke network with configuration to hub network based on ipam configuration object",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"ipam": {
"type": "Array",
@ -14472,7 +14472,7 @@
"properties": {
"Description": "Deploy the Virtual WAN in the specific region.",
"DisplayName": "Deploy the Virtual WAN in the specific region",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"vwanname": {
"type": "String",
@ -14619,7 +14619,7 @@
"properties": {
"Description": "Deploy Virtual Hub network with Virtual Wan and Gateway and Firewall configured in the desired region. ",
"DisplayName": "Deploy Virtual Hub network with Virtual Wan and Gateway and Firewall configured.",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"vwanname": {
"type": "String",

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Просмотреть файл

@ -557,7 +557,7 @@
"properties": {
"Description": "Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled.",
"DisplayName": "Deploy Diagnostic Settings for Activity Log to Log Analytics workspace",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"logAnalytics": {
"type": "String",
@ -2225,7 +2225,7 @@
"properties": {
"Description": "Deploys the Azure Defender settings in Azure Security Center for the specific services.",
"DisplayName": "Deploy Azure Defender settings in Azure Security Center.",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"pricingTierVMs": {
"type": "String",
@ -6207,7 +6207,7 @@
"properties": {
"Description": "Deploys Azure Firewall Manager policy in subscription where the policy is assigned.",
"DisplayName": "Deploy Azure Firewall Manager policy in the subscription",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"fwpolicy": {
"type": "Object",
@ -7971,7 +7971,7 @@
"properties": {
"Description": "Deploys Log Analytics and Automation account to the subscription where the policy is assigned.",
"DisplayName": "Deploy the Log Analytics in the subscription",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"workspaceName": {
"type": "String",
@ -9192,7 +9192,7 @@
"properties": {
"Description": "Deploys an Azure DDoS Protection Standard plan",
"DisplayName": "Deploy an Azure DDoS Protection Standard plan",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"ddosName": {
"type": "String",
@ -13683,7 +13683,7 @@
"properties": {
"Description": "Deploys Virtual Network to be used as hub virtual network in desired region in the subscription where this policy is assigned.",
"DisplayName": "Deploy Virtual Network to be used as hub virtual network in desired region",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"hubName": {
"type": "String",
@ -14102,7 +14102,7 @@
"properties": {
"Description": "Deploy spoke network with configuration to hub network based on ipam configuration object",
"DisplayName": "Deploy spoke network with configuration to hub network based on ipam configuration object",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"ipam": {
"type": "Array",
@ -14472,7 +14472,7 @@
"properties": {
"Description": "Deploy the Virtual WAN in the specific region.",
"DisplayName": "Deploy the Virtual WAN in the specific region",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"vwanname": {
"type": "String",
@ -14619,7 +14619,7 @@
"properties": {
"Description": "Deploy Virtual Hub network with Virtual Wan and Gateway and Firewall configured in the desired region. ",
"DisplayName": "Deploy Virtual Hub network with Virtual Wan and Gateway and Firewall configured.",
"Mode": "Indexed",
"Mode": "All",
"Parameters": {
"vwanname": {
"type": "String",

Просмотреть файл

@ -1,119 +0,0 @@
{
"$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"input": {
"value": {
"Name": "Tailspin",
"DisplayName": "Tailspin",
"ParentId": "/providers/Microsoft.Management/managementGroups/3fc1081d-6105-4e19-b60c-1ec1252cf560",
"Type": "/providers/Microsoft.Management/managementGroups",
"Children": [
{
"Id": "/providers/Microsoft.Management/managementGroups/Tailspin-bu1",
"Name": "Tailspin-bu1",
"DisplayName": "Tailspin-bu1",
"Type": "/providers/Microsoft.Management/managementGroups",
},
{
"Type": "/subscriptions",
"Id": "/subscriptions/a480e5aa-d8c1-4610-a4d8-7e23d7a6ac10",
"Name": "a480e5aa-d8c1-4610-a4d8-7e23d7a6ac10",
"DisplayName": "udpandya",
"Children": null,
"properties": {
"policyDefinitions": [],
"roleDefinitions": [],
"policyAssignments": []
}
}
],
"properties": {
"policyDefinitions": [
{
"Name": "DINE-KeyVault",
"ExtensionResourceType": "Microsoft.Authorization/policyDefinitions",
"Properties": {
"displayName": "KeyVault",
"policyType": "Custom",
"mode": "All",
"description": "Ensures that management RG has Key Vault Deployed to manage platform secrets",
"parameters": {},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Resources/subscriptions"
}
]
},
"then": {
"effect": "deployIfNotExists",
"details": {
"type": "Microsoft.KeyVault/vaults",
"deploymentScope": "Subscription",
"existenceScope": "Subscription",
"roleDefinitionIds": [
"/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635"
],
"existenceCondition": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.KeyVault/vaults"
},
{
"field": "name",
"like": "[concat(subscription().displayName, '-keyvault')]"
}
]
},
"deployment": {
"location": "northeurope",
"properties": {
"mode": "incremental",
"parameters": {},
"template": {
"$schema": "http://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentTemplate.json",
"contentVersion": "1.0.0.0",
"parameters": {},
"variables": {},
"resources": [
{
"type": "Microsoft.Resources/resourceGroups",
"apiVersion": "2018-05-01",
"name": "[concat(subscription().displayName, '-keyvault')]",
"location": "[deployment().location]",
"properties": {}
}
],
"outputs": {}
}
}
}
}
}
}
}
}
],
"policyAssignments": [
{
"Name": "ADINE-KeyVault",
"Type": "Microsoft.Authorization/policyAssignments",
"ResourceType": "Microsoft.Authorization/policyAssignments",
"Properties": {
"displayName": "ADINE-KeyVault",
"policyDefinitionId": "/providers/Microsoft.Management/managementGroups/Tailspin/providers/Microsoft.Authorization/policyDefinitions/DINE-KeyVault",
"scope": "/providers/Microsoft.Management/managementGroups/Tailspin",
"notScopes": [],
"parameters": {}
}
}
]
}
}
}
}
}