구독 scope 수정을 만들거나 업데이트합니다.
PUT https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/remediations/{remediationName}?api-version=2021-10-01
URI 매개 변수
Name |
In(다음 안에) |
필수 |
형식 |
Description |
remediationName
|
path |
True
|
string
|
수정의 이름입니다.
|
subscriptionId
|
path |
True
|
string
|
Microsoft Azure 구독 ID입니다.
|
api-version
|
query |
True
|
string
|
클라이언트 API 버전.
|
요청 본문
Name |
형식 |
Description |
properties.failureThreshold
|
FailureThreshold
|
수정 실패 임계값 설정
|
properties.filters
|
RemediationFilters
|
수정할 리소스를 결정하기 위해 적용할 필터입니다.
|
properties.parallelDeployments
|
integer
|
지정된 시간에 수정할 리소스 수를 결정합니다. 수정 속도를 늘리거나 줄이는 데 사용할 수 있습니다. 제공되지 않으면 기본 병렬 배포 값이 사용됩니다.
|
properties.policyAssignmentId
|
string
|
수정해야 하는 정책 할당의 리소스 ID입니다.
|
properties.policyDefinitionReferenceId
|
string
|
수정해야 하는 개별 정의의 정책 정의 참조 ID입니다. 수정 중인 정책 할당이 정책 집합 정의를 할당할 때 필요합니다.
|
properties.resourceCount
|
integer
|
수정 작업으로 수정할 수 있는 최대 리소스 수를 결정합니다. 제공되지 않으면 기본 리소스 수가 사용됩니다.
|
properties.resourceDiscoveryMode
|
ResourceDiscoveryMode
|
수정할 리소스를 검색하는 방법입니다. 지정하지 않으면 기본값은 ExistingNonCompliant입니다.
|
응답
보안
azure_auth
Azure Active Directory OAuth2 Flow
형식:
oauth2
Flow:
implicit
권한 부여 URL:
https://login.microsoftonline.com/common/oauth2/authorize
범위
Name |
Description |
user_impersonation
|
사용자 계정 가장
|
예제
샘플 요청
PUT https://management.azure.com/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/Microsoft.PolicyInsights/remediations/storageRemediation?api-version=2021-10-01
{
"properties": {
"policyAssignmentId": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5"
}
}
import com.azure.core.util.Context;
import com.azure.resourcemanager.policyinsights.fluent.models.RemediationInner;
/** Samples for Remediations CreateOrUpdateAtSubscription. */
public final class Main {
/*
* x-ms-original-file: specification/policyinsights/resource-manager/Microsoft.PolicyInsights/stable/2021-10-01/examples/Remediations_CreateSubscriptionScope.json
*/
/**
* Sample code: Create remediation at subscription scope.
*
* @param manager Entry point to PolicyInsightsManager.
*/
public static void createRemediationAtSubscriptionScope(
com.azure.resourcemanager.policyinsights.PolicyInsightsManager manager) {
manager
.remediations()
.createOrUpdateAtSubscriptionWithResponse(
"storageRemediation",
new RemediationInner()
.withPolicyAssignmentId(
"/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5"),
Context.NONE);
}
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
from azure.identity import DefaultAzureCredential
from azure.mgmt.policyinsights import PolicyInsightsClient
"""
# PREREQUISITES
pip install azure-identity
pip install azure-mgmt-policyinsights
# USAGE
python remediations_create_subscription_scope.py
Before run the sample, please set the values of the client ID, tenant ID and client secret
of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID,
AZURE_CLIENT_SECRET. For more info about how to get the value, please see:
https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal
"""
def main():
client = PolicyInsightsClient(
credential=DefaultAzureCredential(),
subscription_id="35ee058e-5fa0-414c-8145-3ebb8d09b6e2",
)
response = client.remediations.create_or_update_at_subscription(
remediation_name="storageRemediation",
parameters={
"properties": {
"policyAssignmentId": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5"
}
},
)
print(response)
# x-ms-original-file: specification/policyinsights/resource-manager/Microsoft.PolicyInsights/stable/2021-10-01/examples/Remediations_CreateSubscriptionScope.json
if __name__ == "__main__":
main()
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
package armpolicyinsights_test
import (
"context"
"log"
"github.com/Azure/azure-sdk-for-go/sdk/azcore/to"
"github.com/Azure/azure-sdk-for-go/sdk/azidentity"
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/policyinsights/armpolicyinsights"
)
// Generated from example definition: https://github.com/Azure/azure-rest-api-specs/blob/05a9cdab363b8ec824094ee73950c04594325172/specification/policyinsights/resource-manager/Microsoft.PolicyInsights/stable/2021-10-01/examples/Remediations_CreateSubscriptionScope.json
func ExampleRemediationsClient_CreateOrUpdateAtSubscription_createRemediationAtSubscriptionScope() {
cred, err := azidentity.NewDefaultAzureCredential(nil)
if err != nil {
log.Fatalf("failed to obtain a credential: %v", err)
}
ctx := context.Background()
clientFactory, err := armpolicyinsights.NewClientFactory("<subscription-id>", cred, nil)
if err != nil {
log.Fatalf("failed to create client: %v", err)
}
res, err := clientFactory.NewRemediationsClient().CreateOrUpdateAtSubscription(ctx, "storageRemediation", armpolicyinsights.Remediation{
Properties: &armpolicyinsights.RemediationProperties{
PolicyAssignmentID: to.Ptr("/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5"),
},
}, nil)
if err != nil {
log.Fatalf("failed to finish the request: %v", err)
}
// You could use response here. We use blank identifier for just demo purposes.
_ = res
// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.
// res.Remediation = armpolicyinsights.Remediation{
// Name: to.Ptr("storageRemediation"),
// Type: to.Ptr("Microsoft.PolicyInsights/remediations"),
// ID: to.Ptr("/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.policyinsights/remediations/storageRemediation"),
// Properties: &armpolicyinsights.RemediationProperties{
// CorrelationID: to.Ptr("a14e1d60-dae9-4771-b4be-a556d69e77a6"),
// CreatedOn: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, "2018-09-12T20:58:58.753Z"); return t}()),
// DeploymentStatus: &armpolicyinsights.RemediationDeploymentSummary{
// FailedDeployments: to.Ptr[int32](0),
// SuccessfulDeployments: to.Ptr[int32](0),
// TotalDeployments: to.Ptr[int32](2),
// },
// LastUpdatedOn: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, "2018-09-12T20:58:58.753Z"); return t}()),
// PolicyAssignmentID: to.Ptr("/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5"),
// ProvisioningState: to.Ptr("Succeeded"),
// ResourceDiscoveryMode: to.Ptr(armpolicyinsights.ResourceDiscoveryModeExistingNonCompliant),
// StatusMessage: to.Ptr("Remediation extended status"),
// },
// SystemData: &armpolicyinsights.SystemData{
// CreatedAt: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, "2018-09-12T20:58:58.753Z"); return t}()),
// CreatedBy: to.Ptr("b69a9388-9488-4534-b470-7ec6d41beef6"),
// CreatedByType: to.Ptr(armpolicyinsights.CreatedByTypeUser),
// LastModifiedAt: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, "2018-09-12T20:58:58.753Z"); return t}()),
// LastModifiedBy: to.Ptr("b69a9388-9488-4534-b470-7ec6d41beef6"),
// LastModifiedByType: to.Ptr(armpolicyinsights.CreatedByTypeUser),
// },
// }
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
const { PolicyInsightsClient } = require("@azure/arm-policyinsights");
const { DefaultAzureCredential } = require("@azure/identity");
/**
* This sample demonstrates how to Creates or updates a remediation at subscription scope.
*
* @summary Creates or updates a remediation at subscription scope.
* x-ms-original-file: specification/policyinsights/resource-manager/Microsoft.PolicyInsights/stable/2021-10-01/examples/Remediations_CreateSubscriptionScope.json
*/
async function createRemediationAtSubscriptionScope() {
const subscriptionId =
process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] || "35ee058e-5fa0-414c-8145-3ebb8d09b6e2";
const remediationName = "storageRemediation";
const parameters = {
policyAssignmentId:
"/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
};
const credential = new DefaultAzureCredential();
const client = new PolicyInsightsClient(credential, subscriptionId);
const result = await client.remediations.createOrUpdateAtSubscription(
remediationName,
parameters
);
console.log(result);
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
샘플 응답
{
"properties": {
"policyAssignmentId": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
"provisioningState": "Accepted",
"createdOn": "2018-09-12T20:58:58.7531298Z",
"lastUpdatedOn": "2018-09-12T20:58:58.7531298Z",
"resourceDiscoveryMode": "ExistingNonCompliant",
"deploymentStatus": {
"totalDeployments": 2,
"successfulDeployments": 0,
"failedDeployments": 0
},
"statusMessage": "Remediation extended status",
"correlationId": "a14e1d60-dae9-4771-b4be-a556d69e77a6"
},
"id": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.policyinsights/remediations/storageRemediation",
"name": "storageRemediation",
"type": "Microsoft.PolicyInsights/remediations",
"systemData": {
"createdBy": "b69a9388-9488-4534-b470-7ec6d41beef6",
"createdByType": "User",
"createdAt": "2018-09-12T20:58:58.7531298Z",
"lastModifiedBy": "b69a9388-9488-4534-b470-7ec6d41beef6",
"lastModifiedByType": "User",
"lastModifiedAt": "2018-09-12T20:58:58.7531298Z"
}
}
{
"properties": {
"policyAssignmentId": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
"provisioningState": "Accepted",
"createdOn": "2018-09-12T20:58:58.7531298Z",
"lastUpdatedOn": "2018-09-12T20:58:58.7531298Z",
"resourceDiscoveryMode": "ExistingNonCompliant",
"deploymentStatus": {
"totalDeployments": 2,
"successfulDeployments": 0,
"failedDeployments": 0
},
"statusMessage": "Remediation extended status",
"correlationId": "a14e1d60-dae9-4771-b4be-a556d69e77a6"
},
"id": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.policyinsights/remediations/storageRemediation",
"name": "storageRemediation",
"type": "Microsoft.PolicyInsights/remediations",
"systemData": {
"createdBy": "b69a9388-9488-4534-b470-7ec6d41beef6",
"createdByType": "User",
"createdAt": "2018-09-12T20:58:58.7531298Z",
"lastModifiedBy": "b69a9388-9488-4534-b470-7ec6d41beef6",
"lastModifiedByType": "User",
"lastModifiedAt": "2018-09-12T20:58:58.7531298Z"
}
}
샘플 요청
PUT https://management.azure.com/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/Microsoft.PolicyInsights/remediations/storageRemediation?api-version=2021-10-01
{
"properties": {
"policyAssignmentId": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
"policyDefinitionReferenceId": "8c8fa9e4",
"resourceDiscoveryMode": "ReEvaluateCompliance",
"filters": {
"locations": [
"eastus",
"westus"
]
},
"resourceCount": 42,
"parallelDeployments": 6,
"failureThreshold": {
"percentage": 0.1
}
}
}
import com.azure.core.util.Context;
import com.azure.resourcemanager.policyinsights.fluent.models.RemediationInner;
import com.azure.resourcemanager.policyinsights.models.RemediationFilters;
import com.azure.resourcemanager.policyinsights.models.RemediationPropertiesFailureThreshold;
import com.azure.resourcemanager.policyinsights.models.ResourceDiscoveryMode;
import java.util.Arrays;
/** Samples for Remediations CreateOrUpdateAtSubscription. */
public final class Main {
/*
* x-ms-original-file: specification/policyinsights/resource-manager/Microsoft.PolicyInsights/stable/2021-10-01/examples/Remediations_CreateSubscriptionScope_AllProperties.json
*/
/**
* Sample code: Create remediation at subscription scope with all properties.
*
* @param manager Entry point to PolicyInsightsManager.
*/
public static void createRemediationAtSubscriptionScopeWithAllProperties(
com.azure.resourcemanager.policyinsights.PolicyInsightsManager manager) {
manager
.remediations()
.createOrUpdateAtSubscriptionWithResponse(
"storageRemediation",
new RemediationInner()
.withPolicyAssignmentId(
"/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5")
.withPolicyDefinitionReferenceId("8c8fa9e4")
.withResourceDiscoveryMode(ResourceDiscoveryMode.RE_EVALUATE_COMPLIANCE)
.withFilters(new RemediationFilters().withLocations(Arrays.asList("eastus", "westus")))
.withResourceCount(42)
.withParallelDeployments(6)
.withFailureThreshold(new RemediationPropertiesFailureThreshold().withPercentage(0.1F)),
Context.NONE);
}
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
from azure.identity import DefaultAzureCredential
from azure.mgmt.policyinsights import PolicyInsightsClient
"""
# PREREQUISITES
pip install azure-identity
pip install azure-mgmt-policyinsights
# USAGE
python remediations_create_subscription_scope_all_properties.py
Before run the sample, please set the values of the client ID, tenant ID and client secret
of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID,
AZURE_CLIENT_SECRET. For more info about how to get the value, please see:
https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal
"""
def main():
client = PolicyInsightsClient(
credential=DefaultAzureCredential(),
subscription_id="35ee058e-5fa0-414c-8145-3ebb8d09b6e2",
)
response = client.remediations.create_or_update_at_subscription(
remediation_name="storageRemediation",
parameters={
"properties": {
"failureThreshold": {"percentage": 0.1},
"filters": {"locations": ["eastus", "westus"]},
"parallelDeployments": 6,
"policyAssignmentId": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
"policyDefinitionReferenceId": "8c8fa9e4",
"resourceCount": 42,
"resourceDiscoveryMode": "ReEvaluateCompliance",
}
},
)
print(response)
# x-ms-original-file: specification/policyinsights/resource-manager/Microsoft.PolicyInsights/stable/2021-10-01/examples/Remediations_CreateSubscriptionScope_AllProperties.json
if __name__ == "__main__":
main()
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
package armpolicyinsights_test
import (
"context"
"log"
"github.com/Azure/azure-sdk-for-go/sdk/azcore/to"
"github.com/Azure/azure-sdk-for-go/sdk/azidentity"
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/policyinsights/armpolicyinsights"
)
// Generated from example definition: https://github.com/Azure/azure-rest-api-specs/blob/05a9cdab363b8ec824094ee73950c04594325172/specification/policyinsights/resource-manager/Microsoft.PolicyInsights/stable/2021-10-01/examples/Remediations_CreateSubscriptionScope_AllProperties.json
func ExampleRemediationsClient_CreateOrUpdateAtSubscription_createRemediationAtSubscriptionScopeWithAllProperties() {
cred, err := azidentity.NewDefaultAzureCredential(nil)
if err != nil {
log.Fatalf("failed to obtain a credential: %v", err)
}
ctx := context.Background()
clientFactory, err := armpolicyinsights.NewClientFactory("<subscription-id>", cred, nil)
if err != nil {
log.Fatalf("failed to create client: %v", err)
}
res, err := clientFactory.NewRemediationsClient().CreateOrUpdateAtSubscription(ctx, "storageRemediation", armpolicyinsights.Remediation{
Properties: &armpolicyinsights.RemediationProperties{
FailureThreshold: &armpolicyinsights.RemediationPropertiesFailureThreshold{
Percentage: to.Ptr[float32](0.1),
},
Filters: &armpolicyinsights.RemediationFilters{
Locations: []*string{
to.Ptr("eastus"),
to.Ptr("westus")},
},
ParallelDeployments: to.Ptr[int32](6),
PolicyAssignmentID: to.Ptr("/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5"),
PolicyDefinitionReferenceID: to.Ptr("8c8fa9e4"),
ResourceCount: to.Ptr[int32](42),
ResourceDiscoveryMode: to.Ptr(armpolicyinsights.ResourceDiscoveryModeReEvaluateCompliance),
},
}, nil)
if err != nil {
log.Fatalf("failed to finish the request: %v", err)
}
// You could use response here. We use blank identifier for just demo purposes.
_ = res
// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.
// res.Remediation = armpolicyinsights.Remediation{
// Name: to.Ptr("storageRemediation"),
// Type: to.Ptr("Microsoft.PolicyInsights/remediations"),
// ID: to.Ptr("/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.policyinsights/remediations/storageRemediation"),
// Properties: &armpolicyinsights.RemediationProperties{
// CorrelationID: to.Ptr("a14e1d60-dae9-4771-b4be-a556d69e77a6"),
// CreatedOn: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, "2018-09-12T20:58:58.753Z"); return t}()),
// DeploymentStatus: &armpolicyinsights.RemediationDeploymentSummary{
// FailedDeployments: to.Ptr[int32](0),
// SuccessfulDeployments: to.Ptr[int32](0),
// TotalDeployments: to.Ptr[int32](2),
// },
// FailureThreshold: &armpolicyinsights.RemediationPropertiesFailureThreshold{
// Percentage: to.Ptr[float32](0.1),
// },
// LastUpdatedOn: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, "2018-09-12T20:58:58.753Z"); return t}()),
// ParallelDeployments: to.Ptr[int32](6),
// PolicyAssignmentID: to.Ptr("/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5"),
// PolicyDefinitionReferenceID: to.Ptr("8c8fa9e4"),
// ProvisioningState: to.Ptr("Succeeded"),
// ResourceCount: to.Ptr[int32](42),
// ResourceDiscoveryMode: to.Ptr(armpolicyinsights.ResourceDiscoveryModeReEvaluateCompliance),
// StatusMessage: to.Ptr("Remediation extended status"),
// },
// SystemData: &armpolicyinsights.SystemData{
// CreatedAt: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, "2018-09-12T20:58:58.753Z"); return t}()),
// CreatedBy: to.Ptr("b69a9388-9488-4534-b470-7ec6d41beef6"),
// CreatedByType: to.Ptr(armpolicyinsights.CreatedByTypeUser),
// LastModifiedAt: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, "2018-09-12T20:58:58.753Z"); return t}()),
// LastModifiedBy: to.Ptr("b69a9388-9488-4534-b470-7ec6d41beef6"),
// LastModifiedByType: to.Ptr(armpolicyinsights.CreatedByTypeUser),
// },
// }
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
const { PolicyInsightsClient } = require("@azure/arm-policyinsights");
const { DefaultAzureCredential } = require("@azure/identity");
/**
* This sample demonstrates how to Creates or updates a remediation at subscription scope.
*
* @summary Creates or updates a remediation at subscription scope.
* x-ms-original-file: specification/policyinsights/resource-manager/Microsoft.PolicyInsights/stable/2021-10-01/examples/Remediations_CreateSubscriptionScope_AllProperties.json
*/
async function createRemediationAtSubscriptionScopeWithAllProperties() {
const subscriptionId =
process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] || "35ee058e-5fa0-414c-8145-3ebb8d09b6e2";
const remediationName = "storageRemediation";
const parameters = {
failureThreshold: { percentage: 0.1 },
filters: { locations: ["eastus", "westus"] },
parallelDeployments: 6,
policyAssignmentId:
"/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
policyDefinitionReferenceId: "8c8fa9e4",
resourceCount: 42,
resourceDiscoveryMode: "ReEvaluateCompliance",
};
const credential = new DefaultAzureCredential();
const client = new PolicyInsightsClient(credential, subscriptionId);
const result = await client.remediations.createOrUpdateAtSubscription(
remediationName,
parameters
);
console.log(result);
}
To use the Azure SDK library in your project, see this documentation. To provide feedback on this code sample, open a GitHub issue
샘플 응답
{
"properties": {
"policyAssignmentId": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
"policyDefinitionReferenceId": "8c8fa9e4",
"resourceDiscoveryMode": "ReEvaluateCompliance",
"provisioningState": "Accepted",
"createdOn": "2018-09-12T20:58:58.7531298Z",
"lastUpdatedOn": "2018-09-12T20:58:58.7531298Z",
"deploymentStatus": {
"totalDeployments": 2,
"successfulDeployments": 0,
"failedDeployments": 0
},
"statusMessage": "Remediation extended status",
"correlationId": "a14e1d60-dae9-4771-b4be-a556d69e77a6",
"resourceCount": 42,
"parallelDeployments": 6,
"failureThreshold": {
"percentage": 0.1
}
},
"id": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.policyinsights/remediations/storageRemediation",
"name": "storageRemediation",
"type": "Microsoft.PolicyInsights/remediations",
"systemData": {
"createdBy": "b69a9388-9488-4534-b470-7ec6d41beef6",
"createdByType": "User",
"createdAt": "2018-09-12T20:58:58.7531298Z",
"lastModifiedBy": "b69a9388-9488-4534-b470-7ec6d41beef6",
"lastModifiedByType": "User",
"lastModifiedAt": "2018-09-12T20:58:58.7531298Z"
}
}
{
"properties": {
"policyAssignmentId": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
"policyDefinitionReferenceId": "8c8fa9e4",
"resourceDiscoveryMode": "ReEvaluateCompliance",
"provisioningState": "Accepted",
"createdOn": "2018-09-12T20:58:58.7531298Z",
"lastUpdatedOn": "2018-09-12T20:58:58.7531298Z",
"deploymentStatus": {
"totalDeployments": 2,
"successfulDeployments": 0,
"failedDeployments": 0
},
"statusMessage": "Remediation extended status",
"correlationId": "a14e1d60-dae9-4771-b4be-a556d69e77a6",
"resourceCount": 42,
"parallelDeployments": 6,
"failureThreshold": {
"percentage": 0.1
}
},
"id": "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.policyinsights/remediations/storageRemediation",
"name": "storageRemediation",
"type": "Microsoft.PolicyInsights/remediations",
"systemData": {
"createdBy": "b69a9388-9488-4534-b470-7ec6d41beef6",
"createdByType": "User",
"createdAt": "2018-09-12T20:58:58.7531298Z",
"lastModifiedBy": "b69a9388-9488-4534-b470-7ec6d41beef6",
"lastModifiedByType": "User",
"lastModifiedAt": "2018-09-12T20:58:58.7531298Z"
}
}
정의
createdByType
리소스를 만든 ID의 형식입니다.
Name |
형식 |
Description |
Application
|
string
|
|
Key
|
string
|
|
ManagedIdentity
|
string
|
|
User
|
string
|
|
ErrorDefinition
오류 정의.
Name |
형식 |
Description |
additionalInfo
|
TypedErrorInfo[]
|
추가 시나리오 관련 오류 세부 정보입니다.
|
code
|
string
|
HTTP 오류 코드의 하위 상태 역할을 하는 서비스별 오류 코드입니다.
|
details
|
ErrorDefinition[]
|
내부 오류 세부 정보입니다.
|
message
|
string
|
오류 설명입니다.
|
target
|
string
|
오류의 대상입니다.
|
ErrorResponse
오류 응답입니다.
FailureThreshold
수정 실패 임계값 설정
Name |
형식 |
Description |
percentage
|
number
|
백분율 실패 임계값을 나타내는 0.0에서 1.0 사이의 숫자입니다. 실패한 수정 작업(예: 실패한 배포)의 백분율이 이 임계값을 초과하면 수정이 실패합니다.
|
수정 정의입니다.
Name |
형식 |
Description |
id
|
string
|
수정의 ID입니다.
|
name
|
string
|
수정의 이름입니다.
|
properties.correlationId
|
string
|
수정 상관 관계 ID입니다. 활동 로그에서 수정과 관련된 이벤트를 찾는 데 사용할 수 있습니다.
|
properties.createdOn
|
string
|
수정이 만들어진 시간입니다.
|
properties.deploymentStatus
|
RemediationDeploymentSummary
|
배포 상태 수정에서 만든 모든 배포에 대한 요약입니다.
|
properties.failureThreshold
|
FailureThreshold
|
수정 실패 임계값 설정
|
properties.filters
|
RemediationFilters
|
수정할 리소스를 결정하기 위해 적용할 필터입니다.
|
properties.lastUpdatedOn
|
string
|
수정이 마지막으로 업데이트된 시간입니다.
|
properties.parallelDeployments
|
integer
|
지정된 시간에 수정할 리소스 수를 결정합니다. 수정 속도를 늘리거나 줄이는 데 사용할 수 있습니다. 제공되지 않으면 기본 병렬 배포 값이 사용됩니다.
|
properties.policyAssignmentId
|
string
|
수정해야 하는 정책 할당의 리소스 ID입니다.
|
properties.policyDefinitionReferenceId
|
string
|
수정해야 하는 개별 정의의 정책 정의 참조 ID입니다. 수정 중인 정책 할당이 정책 집합 정의를 할당할 때 필요합니다.
|
properties.provisioningState
|
string
|
수정의 상태. 이는 개별 배포가 아닌 전체 수정 작업을 나타냅니다. 허용되는 값은 평가, 취소됨, 취소됨, 실패, 완료 또는 성공입니다.
|
properties.resourceCount
|
integer
|
수정 작업으로 수정할 수 있는 최대 리소스 수를 결정합니다. 제공되지 않으면 기본 리소스 수가 사용됩니다.
|
properties.resourceDiscoveryMode
|
ResourceDiscoveryMode
|
수정할 리소스를 검색하는 방법입니다. 지정하지 않으면 기본값은 ExistingNonCompliant입니다.
|
properties.statusMessage
|
string
|
수정 상태 메시지입니다. 수정 상태에 대한 추가 세부 정보를 제공합니다.
|
systemData
|
systemData
|
createdBy 및 modifiedBy 정보가 포함된 Azure Resource Manager 메타데이터입니다.
|
type
|
string
|
수정의 형식입니다.
|
배포 상태 수정에서 만든 모든 배포에 대한 요약입니다.
Name |
형식 |
Description |
failedDeployments
|
integer
|
실패한 수정에 필요한 배포 수입니다.
|
successfulDeployments
|
integer
|
성공한 수정에 필요한 배포 수입니다.
|
totalDeployments
|
integer
|
수정에 필요한 배포 수입니다.
|
수정할 리소스를 결정하기 위해 적용할 필터입니다.
Name |
형식 |
Description |
locations
|
string[]
|
수정할 리소스 위치입니다.
|
ResourceDiscoveryMode
수정할 리소스를 검색하는 방법입니다. 지정하지 않으면 기본값은 ExistingNonCompliant입니다.
Name |
형식 |
Description |
ExistingNonCompliant
|
string
|
이미 비준수로 알려진 리소스를 수정합니다.
|
ReEvaluateCompliance
|
string
|
리소스의 준수 상태를 다시 평가한 다음 비준수로 확인된 리소스를 수정합니다.
|
systemData
리소스 만들기 및 마지막 수정과 관련된 메타데이터입니다.
Name |
형식 |
Description |
createdAt
|
string
|
UTC(리소스 만들기)의 타임스탬프입니다.
|
createdBy
|
string
|
리소스를 만든 ID입니다.
|
createdByType
|
createdByType
|
리소스를 만든 ID의 형식입니다.
|
lastModifiedAt
|
string
|
리소스 마지막 수정의 타임스탬프(UTC)
|
lastModifiedBy
|
string
|
리소스를 마지막으로 수정한 ID입니다.
|
lastModifiedByType
|
createdByType
|
리소스를 마지막으로 수정한 ID 유형입니다.
|
TypedErrorInfo
시나리오별 오류 세부 정보입니다.
Name |
형식 |
Description |
info
|
|
시나리오별 오류 세부 정보입니다.
|
type
|
string
|
포함된 오류 세부 정보의 유형입니다.
|