azure-mssql-send-alerts¶
Ensure that 'Send Alerts To' is enabled for MSSQL servers
Doing so will ensure that alerts are sent when Advanced Threat Protection detects any anomalous activities, enabling early mitigation of any potential risk detected.
Examples¶
Insecure Example
resource "azurerm_mssql_server_security_alert_policy" "example" {
resource_group_name = azurerm_resource_group.example.name
server_name = azurerm_sql_server.example.name
state = "Enabled"
storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint
storage_account_access_key = azurerm_storage_account.example.primary_access_key
disabled_alerts = [
"Sql_Injection",
"Data_Exfiltration"
]
email_addresses = [] # (default is empty)
email_account_admins = false
retention_days = 20
}
Secure Example
resource "azurerm_mssql_server_security_alert_policy" "example" {
resource_group_name = azurerm_resource_group.example.name
server_name = azurerm_sql_server.example.name
state = "Enabled"
storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint
storage_account_access_key = azurerm_storage_account.example.primary_access_key
disabled_alerts = []
email_addresses = var.mssql_alert_emails
email_account_admins = true
retention_days = 20
}