Skip to content

avm.ptn.aca-lza.hosting-environment #19

avm.ptn.aca-lza.hosting-environment

avm.ptn.aca-lza.hosting-environment #19

Manually triggered October 15, 2024 07:56
Status Success
Total duration 5m 1s
Artifacts
Initialize pipeline
14s
Initialize pipeline
Run  /  Static validation
1m 59s
Run / Static validation
Matrix: Run / job_psrule_test_waf_reliability
Matrix: Run / job_psrule_test
Matrix: Run / job_module_deploy_validation
Run  /  Publishing
0s
Run / Publishing
Fit to window
Zoom out
Zoom in

Annotations

20 errors
Run / PSRule [defaults]
AZR-000316: /home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/aca-lza/hosting-environment/tests/e2e/defaults/main.test.bicep failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
Run / PSRule [defaults]
AZR-000316: 864e505983a1f-test-acalzamin failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
Run / PSRule [defaults]
AZR-000137: nsg-agw-acalzamin-test-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
Run / PSRule [defaults]
AZR-000139: nsg-agw-acalzamin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [defaults]
AZR-000139: nsg-cae-acalzamin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [defaults]
AZR-000139: nsg-pep-acalzamin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [defaults]
AZR-000263: vnet-acalzamin-test-eus-spoke failed Azure.VNET.UseNSGs. Virtual network (VNET) subnets should have Network Security Groups (NSGs) assigned.
Run / PSRule [defaults]
AZR-000139: nsg-vm-acalzamin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [defaults]
AZR-000316: applicationGateway-864e505983a1f-test-acalzamin-deployment failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
Run / PSRule [defaults]
AZR-000304: agw-acalzamin-test-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
Run / PSRule [waf-aligned]
AZR-000316: /home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/aca-lza/hosting-environment/tests/e2e/waf-aligned/main.test.bicep failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
Run / PSRule [waf-aligned]
AZR-000316: 864e505983a1f-test-acawaf failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
Run / PSRule [waf-aligned]
AZR-000137: nsg-agw-acawaf-dev-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
Run / PSRule [waf-aligned]
AZR-000139: nsg-agw-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [waf-aligned]
AZR-000139: nsg-cae-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [waf-aligned]
AZR-000139: nsg-pep-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [waf-aligned]
AZR-000263: vnet-acawaf-dev-eus-spoke failed Azure.VNET.UseNSGs. Virtual network (VNET) subnets should have Network Security Groups (NSGs) assigned.
Run / PSRule [waf-aligned]
AZR-000139: nsg-vm-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [waf-aligned]
AZR-000316: applicationGateway-864e505983a1f-test-acawaf-deployment failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
Run / PSRule [waf-aligned]
AZR-000304: agw-acawaf-dev-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.