From 533765439f98250eccbbccc194f82309ff4be9ec Mon Sep 17 00:00:00 2001 From: Barrington Willis <51492255+tredell@users.noreply.github.com> Date: Fri, 24 Feb 2023 12:57:36 -0800 Subject: [PATCH] Fixed Linter warnings & build errors (#354) * Fixed BCP321 Linter warning in networking files * Fixed Role Definition Id References to use the ResourceId function * changed the pOlicyScopedId var to be set by using the MGResourceID Function * fixed BCP321 warning * fixed the remaining linter warnings * fixed the remaining linter errors in the policy definitions * updated the linter rules * Fixed Bug on policy defnition * Fixed the AKS policy deployment * Commit 95556ddd: changed the extensionResourceId function to tenantResourceId for all built-in polify definitions * fixed linter warnings in policy files * changed the invalid dummy service alert phone number to a valid phone number * changed the servcie health number prefix to 604 * updated AKS version in the Data Archetypes * Changed hte AKS version to only have the Major.Minor * Added the patch version to the AKS versions in the Data Archetypes --- azresources/containers/aks/main.bicep | 2 +- azresources/data/sqldb/sqldb-with-cmk.bicep | 4 +- .../data/sqldb/sqldb-without-cmk.bicep | 4 +- azresources/data/sqlmi/sqlmi-with-cmk.bicep | 4 +- .../data/sqlmi/sqlmi-without-cmk.bicep | 4 +- .../security/key-vault-key-rsa2048.bicep | 2 +- .../service-health-caller-params.json | 4 +- bicepconfig.json | 120 +++++++++++++----- .../CanadaESLZ-main/logging.parameters.json | 6 +- .../hub-azfw/hub-network.parameters.json | 6 +- .../hub-nva/hub-network.parameters.json | 6 +- ...c0_generic-subscription_canadacentral.json | 6 +- ...cbed91ab29a7_healthcare_canadacentral.json | 6 +- ...04f2c98_machinelearning_canadacentral.json | 8 +- ...1dd0e27_machinelearning_canadacentral.json | 8 +- ...5b60c30_machinelearning_canadacentral.json | 8 +- ...8a144aa_machinelearning_canadacentral.json | 8 +- docs/archetypes/authoring-guide.md | 6 +- docs/archetypes/generic-subscription.md | 6 +- docs/archetypes/healthcare.md | 6 +- docs/archetypes/hubnetwork-azfw.md | 6 +- docs/archetypes/hubnetwork-nva-fortigate.md | 6 +- docs/archetypes/logging.md | 6 +- docs/archetypes/machinelearning.md | 6 +- docs/onboarding/azure-devops-pipelines.md | 18 +-- .../lz-generic-subscription/networking.bicep | 2 +- landingzones/lz-healthcare/networking.bicep | 2 +- .../lz-machinelearning/networking.bicep | 2 +- .../main.bicep | 4 +- .../main.bicep | 4 +- landingzones/lz-platform-logging/main.bicep | 4 +- landingzones/scaffold-subscription.bicep | 4 +- .../assignments/fedramp-moderate.bicep | 2 +- .../builtin/assignments/hitrust-hipaa.bicep | 10 +- policy/builtin/assignments/location.bicep | 4 +- policy/builtin/assignments/nist80053r4.bicep | 2 +- policy/builtin/assignments/nist80053r5.bicep | 2 +- policy/builtin/assignments/pbmm.bicep | 2 +- policy/custom/assignments/AKS.bicep | 13 +- policy/custom/assignments/DDoS.bicep | 6 +- .../assignments/DNSPrivateEndpoints.bicep | 6 +- .../custom/assignments/DefenderForCloud.bicep | 7 +- policy/custom/assignments/LogAnalytics.bicep | 10 +- policy/custom/assignments/Network.bicep | 4 +- policy/custom/assignments/Tags.bicep | 14 +- policy/custom/definitions/policyset/AKS.bicep | 6 +- .../definitions/policyset/AKS.parameters.json | 4 +- .../policyset/DefenderForCloud.bicep | 38 +++--- .../DefenderForCloud.parameters.json | 4 +- .../definitions/policyset/LogAnalytics.bicep | 46 +++---- .../definitions/policyset/Network.bicep | 2 +- schemas/latest/readme.md | 12 +- schemas/v0.5.0/readme.md | 12 +- schemas/v0.6.0/readme.md | 12 +- .../BackupRecoveryVaultIsFalse.json | 6 +- .../BackupRecoveryVaultIsTrue.json | 6 +- .../BudgetIsFalse.json | 6 +- .../lz-generic-subscription/BudgetIsTrue.json | 6 +- .../EmptyResourceTags.json | 6 +- .../EmptySubscriptionTags.json | 6 +- .../FullDeployment-With-Hub.json | 6 +- .../FullDeployment-With-Location.json | 6 +- .../FullDeployment-Without-Hub.json | 6 +- .../WithoutCustomDNS.json | 6 +- .../WithoutSubnets.json | 6 +- .../schemas/lz-healthcare/BudgetIsFalse.json | 6 +- tests/schemas/lz-healthcare/BudgetIsTrue.json | 6 +- .../lz-healthcare/EmptyResourceTags.json | 6 +- .../lz-healthcare/EmptySubscriptionTags.json | 6 +- .../FullDeployment-With-Hub.json | 6 +- .../FullDeployment-With-Location.json | 6 +- .../FullDeployment-With-OptionalSubnets.json | 6 +- .../FullDeployment-Without-Hub.json | 6 +- .../lz-healthcare/SQLDB-aadAuthOnly.json | 6 +- .../lz-healthcare/SQLDB-mixedAuth.json | 6 +- .../schemas/lz-healthcare/SQLDB-sqlAuth.json | 6 +- tests/schemas/lz-healthcare/SQLDBIsFalse.json | 6 +- .../lz-healthcare/Synapse-aadAuthOnly.json | 6 +- .../lz-healthcare/Synapse-mixedAuth.json | 6 +- .../lz-healthcare/Synapse-sqlAuth.json | 6 +- tests/schemas/lz-healthcare/WithoutCMK.json | 6 +- .../AKS-AzureCNI-AzureNP.json | 6 +- .../AKS-AzureCNI-Calico.json | 6 +- .../AKS-Kubenet-Calico.json | 6 +- .../lz-machinelearning/AKSIsFalse.json | 6 +- .../AppServiceLinuxContainerIsFalse.json | 6 +- ...eLinuxContainerPrivateEndpointIsFalse.json | 6 +- .../lz-machinelearning/BudgetIsFalse.json | 6 +- .../lz-machinelearning/BudgetIsTrue.json | 6 +- .../lz-machinelearning/EmptyResourceTags.json | 6 +- .../EmptySubscriptionTags.json | 6 +- .../FullDeployment-With-Hub.json | 6 +- .../FullDeployment-With-Location.json | 6 +- .../FullDeployment-With-OptionalSubnets.json | 6 +- .../FullDeployment-Without-Hub.json | 6 +- .../lz-machinelearning/SQLDB-aadAuthOnly.json | 6 +- .../lz-machinelearning/SQLDB-mixedAuth.json | 6 +- .../lz-machinelearning/SQLDB-sqlAuth.json | 6 +- .../lz-machinelearning/SQLDBIsFalse.json | 6 +- .../lz-machinelearning/SQLMIIsFalse.json | 6 +- .../lz-machinelearning/WithoutCMK.json | 6 +- .../BudgetIsFalse.json | 6 +- ...ullDeployment-With-OptionalHubSubnets.json | 6 +- ...ullDeployment-WithAzureFirewallPolicy.json | 6 +- ...lDeployment-WithLogAnalyticsWorkspace.json | 6 +- ...ment-Without-ManagementRestrictedZone.json | 6 +- .../FullDeployment.json | 6 +- .../BudgetIsFalse.json | 6 +- .../FullDeployment-With-FortigateBYOL.json | 6 +- ...ullDeployment-With-OptionalHubSubnets.json | 6 +- .../FullDeployment-With-Ubuntu.json | 6 +- ...lDeployment-WithLogAnalyticsWorkspace.json | 6 +- .../lz-platform-logging/BudgetIsFalse.json | 6 +- .../EmptyResourceTags.json | 6 +- .../EmptySubscriptionTags.json | 6 +- .../FullDeployment-With-Location.json | 6 +- .../lz-platform-logging/FullDeployment.json | 6 +- .../WithoutSubscriptionRoleAssignments.json | 6 +- 118 files changed, 482 insertions(+), 408 deletions(-) diff --git a/azresources/containers/aks/main.bicep b/azresources/containers/aks/main.bicep index 0c26cd8c..c4c98bf1 100644 --- a/azresources/containers/aks/main.bicep +++ b/azresources/containers/aks/main.bicep @@ -108,7 +108,7 @@ var virtualNetworkName = subnetIdSplit[8] var privateDnsZoneIdSplit = split(privateDNSZoneId, '/') var privateDnsZoneSubscriptionId = privateDnsZoneIdSplit[2] var privateZoneDnsResourceGroupName = privateDnsZoneIdSplit[4] -var privateZoneResourceName = last(privateDnsZoneIdSplit) +var privateZoneResourceName = last(privateDnsZoneIdSplit)! module identity '../../iam/user-assigned-identity.bicep' = { name: 'deploy-aks-identity' diff --git a/azresources/data/sqldb/sqldb-with-cmk.bicep b/azresources/data/sqldb/sqldb-with-cmk.bicep index 21d3af1b..4e85c2a9 100644 --- a/azresources/data/sqldb/sqldb-with-cmk.bicep +++ b/azresources/data/sqldb/sqldb-with-cmk.bicep @@ -107,9 +107,9 @@ resource sqlserver 'Microsoft.Sql/servers@2021-02-01-preview' = { } resource sqlserver_va 'Microsoft.Sql/servers/vulnerabilityAssessments@2020-11-01-preview' = { - name: '${sqlServerName}/default' + parent: sqlserver + name: 'default' dependsOn: [ - sqlserver roleAssignSQLToSALogging ] properties: { diff --git a/azresources/data/sqldb/sqldb-without-cmk.bicep b/azresources/data/sqldb/sqldb-without-cmk.bicep index 285716c9..487fa169 100644 --- a/azresources/data/sqldb/sqldb-without-cmk.bicep +++ b/azresources/data/sqldb/sqldb-without-cmk.bicep @@ -86,9 +86,9 @@ resource sqlserver 'Microsoft.Sql/servers@2021-02-01-preview' = { } resource sqlserver_va 'Microsoft.Sql/servers/vulnerabilityAssessments@2020-11-01-preview' = { - name: '${sqlServerName}/default' + parent: sqlserver + name: 'default' dependsOn: [ - sqlserver roleAssignSQLToSALogging ] properties: { diff --git a/azresources/data/sqlmi/sqlmi-with-cmk.bicep b/azresources/data/sqlmi/sqlmi-with-cmk.bicep index c164b89b..1cca1600 100644 --- a/azresources/data/sqlmi/sqlmi-with-cmk.bicep +++ b/azresources/data/sqlmi/sqlmi-with-cmk.bicep @@ -98,9 +98,9 @@ resource sqlmi 'Microsoft.Sql/managedInstances@2020-11-01-preview' = { } resource sqlmi_va 'Microsoft.Sql/managedInstances/vulnerabilityAssessments@2020-11-01-preview' = { - name: '${name}/default' + parent: sqlmi + name: 'default' dependsOn: [ - sqlmi roleAssignSQLMIToSALogging ] properties: { diff --git a/azresources/data/sqlmi/sqlmi-without-cmk.bicep b/azresources/data/sqlmi/sqlmi-without-cmk.bicep index 704f9e4e..f89d4c84 100644 --- a/azresources/data/sqlmi/sqlmi-without-cmk.bicep +++ b/azresources/data/sqlmi/sqlmi-without-cmk.bicep @@ -77,9 +77,9 @@ resource sqlmi 'Microsoft.Sql/managedInstances@2020-11-01-preview' = { } resource sqlmi_va 'Microsoft.Sql/managedInstances/vulnerabilityAssessments@2020-11-01-preview' = { - name: '${name}/default' + parent: sqlmi + name: 'default' dependsOn: [ - sqlmi roleAssignSQLMIToSALogging ] properties: { diff --git a/azresources/security/key-vault-key-rsa2048.bicep b/azresources/security/key-vault-key-rsa2048.bicep index 26b02986..a4c9aeec 100644 --- a/azresources/security/key-vault-key-rsa2048.bicep +++ b/azresources/security/key-vault-key-rsa2048.bicep @@ -27,6 +27,6 @@ resource akvKey 'Microsoft.KeyVault/vaults/keys@2020-04-01-preview' = { // Outputs output keyName string = keyName output keyId string = akvKey.id -output keyVersion string = last(split(akvKey.properties.keyUriWithVersion, '/')) +output keyVersion string = last(split(akvKey.properties.keyUriWithVersion, '/'))! output keyUri string = akvKey.properties.keyUri output keyUriWithVersion string = akvKey.properties.keyUriWithVersion diff --git a/azresources/service-health/service-health-caller-params.json b/azresources/service-health/service-health-caller-params.json index 110b1144..119becf4 100644 --- a/azresources/service-health/service-health-caller-params.json +++ b/azresources/service-health/service-health-caller-params.json @@ -11,8 +11,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "ALZ action group", "actionGroupShortName": "alz-alert", diff --git a/bicepconfig.json b/bicepconfig.json index efe52787..15771807 100644 --- a/bicepconfig.json +++ b/bicepconfig.json @@ -1,40 +1,94 @@ { "analyzers": { "core": { - "verbose": false, - "enabled": true, - "rules": { - "adminusername-should-not-be-literal": { - "level": "error" - }, - "no-hardcoded-env-urls": { - "level": "error" - }, - "no-unnecessary-dependson": { - "level": "error" - }, - "no-unused-params": { - "level": "error" - }, - "no-unused-vars": { - "level": "error" - }, - "prefer-interpolation": { - "level": "error" - }, - "secure-parameter-default": { - "level": "error" - }, - "simplify-interpolation": { - "level": "error" - }, - "no-loc-expr-outside-params": { - "level": "error" - }, - "explicit-values-for-loc-params": { - "level": "error" - } + "verbose": false, + "enabled": true, + "rules": { + "adminusername-should-not-be-literal": { + "level": "error" + }, + "artifacts-parameters": { + "level": "warning" + }, + "decompiler-cleanup": { + "level": "warning" + }, + "explicit-values-for-loc-params": { + "level": "error" + }, + "max-outputs": { + "level": "warning" + }, + "max-params": { + "level": "warning" + }, + "max-resources": { + "level": "warning" + }, + "max-variables": { + "level": "warning" + }, + "no-hardcoded-env-urls": { + "level": "warning" + }, + "no-hardcoded-location": { + "level": "error" + }, + "no-loc-expr-outside-params": { + "level": "error" + }, + "no-unnecessary-dependson": { + "level": "error" + }, + "no-unused-existing-resources": { + "level": "warning" + }, + "no-unused-params": { + "level": "error" + }, + "no-unused-vars": { + "level": "error" + }, + "outputs-should-not-contain-secrets": { + "level": "warning" + }, + "prefer-interpolation": { + "level": "error" + }, + "prefer-unquoted-property-names": { + "level": "warning" + }, + "protect-commandtoexecute-secrets": { + "level": "warning" + }, + "secure-parameter-default": { + "level": "error" + }, + "secure-params-in-nested-deploy": { + "level": "warning" + }, + "secure-secrets-in-params": { + "level": "warning" + }, + "simplify-interpolation": { + "level": "error" + }, + "use-parent-property": { + "level": "warning" + }, + "use-recent-api-versions": { + "level": "off" + }, + "use-resource-id-functions": { + "level": "warning" + }, + "use-stable-resource-identifiers": { + "level": "warning" + }, + "use-stable-vm-image": { + "level": "warning" } } + } } } \ No newline at end of file diff --git a/config/logging/CanadaESLZ-main/logging.parameters.json b/config/logging/CanadaESLZ-main/logging.parameters.json index 50703263..6fdddda9 100644 --- a/config/logging/CanadaESLZ-main/logging.parameters.json +++ b/config/logging/CanadaESLZ-main/logging.parameters.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/config/networking/CanadaESLZ-main/hub-azfw/hub-network.parameters.json b/config/networking/CanadaESLZ-main/hub-azfw/hub-network.parameters.json index a6b2c67e..c74a8ffa 100644 --- a/config/networking/CanadaESLZ-main/hub-azfw/hub-network.parameters.json +++ b/config/networking/CanadaESLZ-main/hub-azfw/hub-network.parameters.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/config/networking/CanadaESLZ-main/hub-nva/hub-network.parameters.json b/config/networking/CanadaESLZ-main/hub-nva/hub-network.parameters.json index e0ff13da..964a8f9d 100644 --- a/config/networking/CanadaESLZ-main/hub-nva/hub-network.parameters.json +++ b/config/networking/CanadaESLZ-main/hub-nva/hub-network.parameters.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/4f9f8765-911a-4a6d-af60-4bc0473268c0_generic-subscription_canadacentral.json b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/4f9f8765-911a-4a6d-af60-4bc0473268c0_generic-subscription_canadacentral.json index 23a1d3b3..28484d8f 100644 --- a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/4f9f8765-911a-4a6d-af60-4bc0473268c0_generic-subscription_canadacentral.json +++ b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/4f9f8765-911a-4a6d-af60-4bc0473268c0_generic-subscription_canadacentral.json @@ -13,8 +13,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -25,7 +25,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/82f7705e-3386-427b-95b7-cbed91ab29a7_healthcare_canadacentral.json b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/82f7705e-3386-427b-95b7-cbed91ab29a7_healthcare_canadacentral.json index 1ca15b00..c2f72de0 100644 --- a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/82f7705e-3386-427b-95b7-cbed91ab29a7_healthcare_canadacentral.json +++ b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/82f7705e-3386-427b-95b7-cbed91ab29a7_healthcare_canadacentral.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/8c6e48a4-4c73-4a1f-9f95-9447804f2c98_machinelearning_canadacentral.json b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/8c6e48a4-4c73-4a1f-9f95-9447804f2c98_machinelearning_canadacentral.json index a8a71422..d86daddb 100644 --- a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/8c6e48a4-4c73-4a1f-9f95-9447804f2c98_machinelearning_canadacentral.json +++ b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/8c6e48a4-4c73-4a1f-9f95-9447804f2c98_machinelearning_canadacentral.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -82,7 +82,7 @@ }, "aks": { "value": { - "version": "1.22.6", + "version": "1.25.5", "enabled": true, "networkPlugin": "kubenet", "networkPolicy": "calico", diff --git a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/ec6c5689-db04-4f1e-b76d-834a51dd0e27_machinelearning_canadacentral.json b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/ec6c5689-db04-4f1e-b76d-834a51dd0e27_machinelearning_canadacentral.json index 911b818a..7860236e 100644 --- a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/ec6c5689-db04-4f1e-b76d-834a51dd0e27_machinelearning_canadacentral.json +++ b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/ec6c5689-db04-4f1e-b76d-834a51dd0e27_machinelearning_canadacentral.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -89,7 +89,7 @@ }, "aks": { "value": { - "version": "1.22.6", + "version": "1.25.5", "enabled": true, "networkPlugin": "kubenet", "networkPolicy": "calico", diff --git a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/f08c3057-1713-4a6f-b7e6-0df355b60c30_machinelearning_canadacentral.json b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/f08c3057-1713-4a6f-b7e6-0df355b60c30_machinelearning_canadacentral.json index 9a92e4dc..f1d4ffd8 100644 --- a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/f08c3057-1713-4a6f-b7e6-0df355b60c30_machinelearning_canadacentral.json +++ b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/f08c3057-1713-4a6f-b7e6-0df355b60c30_machinelearning_canadacentral.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -89,7 +89,7 @@ }, "aks": { "value": { - "version": "1.22.6", + "version": "1.25.5", "enabled": true, "networkPlugin": "kubenet", "networkPolicy": "calico", diff --git a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/f459218a-e8bb-49c9-b768-ee6828a144aa_machinelearning_canadacentral.json b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/f459218a-e8bb-49c9-b768-ee6828a144aa_machinelearning_canadacentral.json index 0a9a0903..dfc39874 100644 --- a/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/f459218a-e8bb-49c9-b768-ee6828a144aa_machinelearning_canadacentral.json +++ b/config/subscriptions/CanadaESLZ-main/pubsec/LandingZones/DevTest/f459218a-e8bb-49c9-b768-ee6828a144aa_machinelearning_canadacentral.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -89,7 +89,7 @@ }, "aks": { "value": { - "version": "1.22.6", + "version": "1.25.5", "enabled": true, "networkPlugin": "kubenet", "networkPolicy": "calico", diff --git a/docs/archetypes/authoring-guide.md b/docs/archetypes/authoring-guide.md index 4873ad80..8a01d27a 100644 --- a/docs/archetypes/authoring-guide.md +++ b/docs/archetypes/authoring-guide.md @@ -243,7 +243,7 @@ A simple object parameter used for configuring Microsoft Defender for Cloud: "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } } ``` @@ -259,8 +259,8 @@ A complex object parameter used for configuring Service Health alerts: "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Sub5 ALZ action group", "actionGroupShortName": "sub5-alert", diff --git a/docs/archetypes/generic-subscription.md b/docs/archetypes/generic-subscription.md index 25f51bb9..7260d264 100644 --- a/docs/archetypes/generic-subscription.md +++ b/docs/archetypes/generic-subscription.md @@ -154,8 +154,8 @@ This example configures: "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -166,7 +166,7 @@ This example configures: "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/docs/archetypes/healthcare.md b/docs/archetypes/healthcare.md index 13cff51b..fe903568 100644 --- a/docs/archetypes/healthcare.md +++ b/docs/archetypes/healthcare.md @@ -318,8 +318,8 @@ This example configures: "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -330,7 +330,7 @@ This example configures: "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/docs/archetypes/hubnetwork-azfw.md b/docs/archetypes/hubnetwork-azfw.md index a0d05a92..5b97bbb1 100644 --- a/docs/archetypes/hubnetwork-azfw.md +++ b/docs/archetypes/hubnetwork-azfw.md @@ -347,8 +347,8 @@ This example configures: "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -359,7 +359,7 @@ This example configures: "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/docs/archetypes/hubnetwork-nva-fortigate.md b/docs/archetypes/hubnetwork-nva-fortigate.md index b83b0d6c..9404f74a 100644 --- a/docs/archetypes/hubnetwork-nva-fortigate.md +++ b/docs/archetypes/hubnetwork-nva-fortigate.md @@ -327,8 +327,8 @@ This example configures: "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -339,7 +339,7 @@ This example configures: "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/docs/archetypes/logging.md b/docs/archetypes/logging.md index 7f40cb54..ffb8be23 100644 --- a/docs/archetypes/logging.md +++ b/docs/archetypes/logging.md @@ -110,8 +110,8 @@ This example configures: "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -122,7 +122,7 @@ This example configures: "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/docs/archetypes/machinelearning.md b/docs/archetypes/machinelearning.md index d6a4b7e3..7d3da3ee 100644 --- a/docs/archetypes/machinelearning.md +++ b/docs/archetypes/machinelearning.md @@ -323,8 +323,8 @@ This example configures: "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -335,7 +335,7 @@ This example configures: "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/docs/onboarding/azure-devops-pipelines.md b/docs/onboarding/azure-devops-pipelines.md index 77b694da..1deed16f 100644 --- a/docs/onboarding/azure-devops-pipelines.md +++ b/docs/onboarding/azure-devops-pipelines.md @@ -502,8 +502,8 @@ This role assignment is used to grant users access to the logging subscription b "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -514,7 +514,7 @@ This role assignment is used to grant users access to the logging subscription b "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -837,8 +837,8 @@ In order to configure audit stream for Azure Monitor, identify the following inf "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -849,7 +849,7 @@ In order to configure audit stream for Azure Monitor, identify the following inf "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -1075,8 +1075,8 @@ In order to configure audit stream for Azure Monitor, identify the following inf "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -1087,7 +1087,7 @@ In order to configure audit stream for Azure Monitor, identify the following inf "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/landingzones/lz-generic-subscription/networking.bicep b/landingzones/lz-generic-subscription/networking.bicep index 4023c99d..0e9fb694 100644 --- a/landingzones/lz-generic-subscription/networking.bicep +++ b/landingzones/lz-generic-subscription/networking.bicep @@ -297,7 +297,7 @@ module vnetPeeringHubToSpoke '../../azresources/network/vnet-peering.bicep' = if peeringName: 'Spoke-${last(hubVnetIdSplit)}-to-${vnet.name}-${uniqueString(vnet.id)}' allowForwardedTraffic: true allowVirtualNetworkAccess: true - sourceVnetName: last(hubVnetIdSplit) + sourceVnetName: last(hubVnetIdSplit)! targetVnetId: vnet.id useRemoteGateways: false } diff --git a/landingzones/lz-healthcare/networking.bicep b/landingzones/lz-healthcare/networking.bicep index 88013fe7..215c1d31 100644 --- a/landingzones/lz-healthcare/networking.bicep +++ b/landingzones/lz-healthcare/networking.bicep @@ -413,7 +413,7 @@ module vnetPeeringHubToSpoke '../../azresources/network/vnet-peering.bicep' = if peeringName: 'Spoke-${last(hubVnetIdSplit)}-to-${vnet.name}-${uniqueString(vnet.id)}' allowForwardedTraffic: true allowVirtualNetworkAccess: true - sourceVnetName: last(hubVnetIdSplit) + sourceVnetName: last(hubVnetIdSplit)! targetVnetId: vnet.id useRemoteGateways: false } diff --git a/landingzones/lz-machinelearning/networking.bicep b/landingzones/lz-machinelearning/networking.bicep index 0c7ffc89..e33c850c 100644 --- a/landingzones/lz-machinelearning/networking.bicep +++ b/landingzones/lz-machinelearning/networking.bicep @@ -480,7 +480,7 @@ module vnetPeeringHubToSpoke '../../azresources/network/vnet-peering.bicep' = if peeringName: 'Spoke-${last(hubVnetIdSplit)}-to-${vnet.name}-${uniqueString(vnet.id)}' allowForwardedTraffic: true allowVirtualNetworkAccess: true - sourceVnetName: last(hubVnetIdSplit) + sourceVnetName: last(hubVnetIdSplit)! targetVnetId: vnet.id useRemoteGateways: false } diff --git a/landingzones/lz-platform-connectivity-hub-azfw/main.bicep b/landingzones/lz-platform-connectivity-hub-azfw/main.bicep index 22936563..9ba9ecb0 100644 --- a/landingzones/lz-platform-connectivity-hub-azfw/main.bicep +++ b/landingzones/lz-platform-connectivity-hub-azfw/main.bicep @@ -44,7 +44,7 @@ param logAnalyticsWorkspaceResourceId string // "securityCenter": { // "value": { // "email": "alzcanadapubsec@microsoft.com", -// "phone": "5555555555" +// "phone": "6045555555" // } // } @@ -52,7 +52,7 @@ param logAnalyticsWorkspaceResourceId string // ----------------------------- // { // email: 'alzcanadapubsec@microsoft.com' -// phone: '5555555555' +// phone: '6045555555' // } @description('Microsoft Defender for Cloud configuration. It includes email and phone.') param securityCenter object diff --git a/landingzones/lz-platform-connectivity-hub-nva/main.bicep b/landingzones/lz-platform-connectivity-hub-nva/main.bicep index 2c77697e..c77002c6 100644 --- a/landingzones/lz-platform-connectivity-hub-nva/main.bicep +++ b/landingzones/lz-platform-connectivity-hub-nva/main.bicep @@ -60,7 +60,7 @@ param logAnalyticsWorkspaceResourceId string // "securityCenter": { // "value": { // "email": "alzcanadapubsec@microsoft.com", -// "phone": "5555555555" +// "phone": "6045555555" // } // } @@ -68,7 +68,7 @@ param logAnalyticsWorkspaceResourceId string // ----------------------------- // { // email: 'alzcanadapubsec@microsoft.com' -// phone: '5555555555' +// phone: '6045555555' // } @description('Microsoft Defender for Cloud configuration. It includes email and phone.') param securityCenter object diff --git a/landingzones/lz-platform-logging/main.bicep b/landingzones/lz-platform-logging/main.bicep index f1b2d885..b1ecb2fa 100644 --- a/landingzones/lz-platform-logging/main.bicep +++ b/landingzones/lz-platform-logging/main.bicep @@ -66,7 +66,7 @@ param serviceHealthAlerts object = {} // "securityCenter": { // "value": { // "email": "alzcanadapubsec@microsoft.com", -// "phone": "5555555555" +// "phone": "6045555555" // } // } @@ -74,7 +74,7 @@ param serviceHealthAlerts object = {} // ----------------------------- // { // email: 'alzcanadapubsec@microsoft.com' -// phone: '5555555555' +// phone: '6045555555' // } @description('Microsoft Defender for Cloud. It includes email and phone.') param securityCenter object diff --git a/landingzones/scaffold-subscription.bicep b/landingzones/scaffold-subscription.bicep index f62406a6..cd90ef54 100644 --- a/landingzones/scaffold-subscription.bicep +++ b/landingzones/scaffold-subscription.bicep @@ -44,7 +44,7 @@ param logAnalyticsWorkspaceResourceId string // "securityCenter": { // "value": { // "email": "alzcanadapubsec@microsoft.com", -// "phone": "5555555555" +// "phone": "6045555555" // } // } @@ -52,7 +52,7 @@ param logAnalyticsWorkspaceResourceId string // ----------------------------- // { // 'email': 'alzcanadapubsec@microsoft.com' -// 'phone': '5555555555' +// 'phone': '6045555555' // } @description('Microsoft Defender for Cloud configuration. It includes email and phone.') param securityCenter object diff --git a/policy/builtin/assignments/fedramp-moderate.bicep b/policy/builtin/assignments/fedramp-moderate.bicep index 818fc249..537efe56 100644 --- a/policy/builtin/assignments/fedramp-moderate.bicep +++ b/policy/builtin/assignments/fedramp-moderate.bicep @@ -64,7 +64,7 @@ resource policySetRoleAssignmentContributor 'Microsoft.Authorization/roleAssignm name: guid(policyAssignmentManagementGroupId, 'fedramp-moderate-Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','b24988ac-6180-42a0-ab88-20f7382dd24c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/builtin/assignments/hitrust-hipaa.bicep b/policy/builtin/assignments/hitrust-hipaa.bicep index 9bb3d7b7..08c0bba5 100644 --- a/policy/builtin/assignments/hitrust-hipaa.bicep +++ b/policy/builtin/assignments/hitrust-hipaa.bicep @@ -157,7 +157,7 @@ resource policySetRoleAssignmentContributor 'Microsoft.Authorization/roleAssignm name: guid(policyAssignmentManagementGroupId, 'hitrust-hipaa-contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','b24988ac-6180-42a0-ab88-20f7382dd24c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -167,7 +167,7 @@ resource policySetRoleAssignmentVMContributor 'Microsoft.Authorization/roleAssig name: guid(policyAssignmentManagementGroupId, 'hitrust-hipaa-virtual-machine-contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','9980e02c-c2be-4d73-94e8-173b1dc7cf3c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -177,7 +177,7 @@ resource policySetRoleAssignmentNetworkContributor 'Microsoft.Authorization/role name: guid(policyAssignmentManagementGroupId, 'hitrust-hipaa-network-contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','4d97b98b-1d4f-4787-a291-c67834d212e7') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -187,7 +187,7 @@ resource policySetRoleAssignmentMonitoringContributor 'Microsoft.Authorization/r name: guid(policyAssignmentManagementGroupId, 'hitrust-hipaa-monitoring-contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','749f88d5-cbae-40b8-bcfc-e573ddc772fa') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -197,7 +197,7 @@ resource policySetRoleAssignmentStorageAccountContributor 'Microsoft.Authorizati name: guid(policyAssignmentManagementGroupId, 'hitrust-hipaa-storage-account-contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/17d1049b-9a84-46fb-8f53-869881c3d3ab' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','17d1049b-9a84-46fb-8f53-869881c3d3ab') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/builtin/assignments/location.bicep b/policy/builtin/assignments/location.bicep index d2b1db52..bdd5d2ba 100644 --- a/policy/builtin/assignments/location.bicep +++ b/policy/builtin/assignments/location.bicep @@ -38,7 +38,7 @@ resource rgLocationAssignment 'Microsoft.Authorization/policyAssignments@2020-03 name: 'locrg-${uniqueString('rg-location-', policyAssignmentManagementGroupId)}' properties: { displayName: 'Restrict to Canada Central and Canada East regions for Resource Groups' - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/e765b5de-1225-4ba3-bd56-1ac6695af988' + policyDefinitionId: resourceId('Microsoft.Authorization/policyDefinitions','e765b5de-1225-4ba3-bd56-1ac6695af988') scope: scope notScopes: [] parameters: { @@ -55,7 +55,7 @@ resource resourceLocationAssignment 'Microsoft.Authorization/policyAssignments@2 name: 'locr-${uniqueString('resource-location-', policyAssignmentManagementGroupId)}' properties: { displayName: 'Restrict to Canada Central and Canada East regions for Resources' - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/e56962a6-4747-49cd-b67b-bf8b01975c4c' + policyDefinitionId: resourceId('Microsoft.Authorization/policyDefinitions','e56962a6-4747-49cd-b67b-bf8b01975c4c') scope: scope notScopes: [] parameters: { diff --git a/policy/builtin/assignments/nist80053r4.bicep b/policy/builtin/assignments/nist80053r4.bicep index f236908f..80cd7c30 100644 --- a/policy/builtin/assignments/nist80053r4.bicep +++ b/policy/builtin/assignments/nist80053r4.bicep @@ -76,7 +76,7 @@ resource policySetRoleAssignmentContributor 'Microsoft.Authorization/roleAssignm name: guid(policyAssignmentManagementGroupId, 'nist-sp-800-53-r4-contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','b24988ac-6180-42a0-ab88-20f7382dd24c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/builtin/assignments/nist80053r5.bicep b/policy/builtin/assignments/nist80053r5.bicep index 98ceafc0..0cfab389 100644 --- a/policy/builtin/assignments/nist80053r5.bicep +++ b/policy/builtin/assignments/nist80053r5.bicep @@ -64,7 +64,7 @@ resource policySetRoleAssignmentContributor 'Microsoft.Authorization/roleAssignm name: guid(policyAssignmentManagementGroupId, 'nist-sp-800-53-r5-contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','b24988ac-6180-42a0-ab88-20f7382dd24c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/builtin/assignments/pbmm.bicep b/policy/builtin/assignments/pbmm.bicep index 3980f1d4..1086f5e9 100644 --- a/policy/builtin/assignments/pbmm.bicep +++ b/policy/builtin/assignments/pbmm.bicep @@ -132,7 +132,7 @@ resource policySetRoleAssignmentContributor 'Microsoft.Authorization/roleAssignm name: guid(policyAssignmentManagementGroupId, 'pbmm-Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','b24988ac-6180-42a0-ab88-20f7382dd24c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/custom/assignments/AKS.bicep b/policy/custom/assignments/AKS.bicep index 97acf94c..3988f05d 100644 --- a/policy/custom/assignments/AKS.bicep +++ b/policy/custom/assignments/AKS.bicep @@ -12,7 +12,7 @@ targetScope = 'managementGroup' @description('Location for the deployment.') param location string = deployment().location -@description('Management Group scope for the policy definition.') +//@description('Management Group scope for the policy definition.') param policyDefinitionManagementGroupId string @description('Management Group scope for the policy assignment.') @@ -29,7 +29,10 @@ var policyId = 'custom-aks' var assignmentName = 'Custom - Azure Kubernetes Service' var scope = tenantResourceId('Microsoft.Management/managementGroups', policyAssignmentManagementGroupId) -var policyScopedId = '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${policyId}' +var policyDefinitionScope = resourceId('Microsoft.Management/managementGroups', policyDefinitionManagementGroupId) +var policyScopedId = extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', policyId) + +output PolicyDefinitionId string = policyScopedId // Telemetry - Azure customer usage attribution // Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution @@ -58,7 +61,7 @@ resource podSecurityRestrictedStandardsPolicySetAssignment 'Microsoft.Authorizat name: 'aks-res-${uniqueString(policyAssignmentManagementGroupId)}' properties: { displayName: 'Kubernetes cluster pod security restricted standards for Linux-based workloads' - policyDefinitionId: '/providers/Microsoft.Authorization/policySetDefinitions/42b8ef37-b724-4e24-bbc8-7a7708edfe00' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policySetDefinitions','42b8ef37-b724-4e24-bbc8-7a7708edfe00') scope: scope notScopes: [] parameters: {} @@ -74,7 +77,7 @@ resource podSecurityBaselineStandardsPolicySetAssignment 'Microsoft.Authorizatio name: 'aks-std-${uniqueString(policyAssignmentManagementGroupId)}' properties: { displayName: 'Kubernetes cluster pod security baseline standards for Linux-based workloads' - policyDefinitionId: '/providers/Microsoft.Authorization/policySetDefinitions/a8640138-9b0a-4a28-b8cb-1666c838647d' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policySetDefinitions','a8640138-9b0a-4a28-b8cb-1666c838647d') scope: scope notScopes: [] parameters: {} @@ -93,7 +96,7 @@ resource policySetRoleAssignmentContributor 'Microsoft.Authorization/roleAssignm name: guid(policyAssignmentManagementGroupId, 'aks', 'Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c' + roleDefinitionId: tenantResourceId('Microsoft.Authorization/roleDefinitions','b24988ac-6180-42a0-ab88-20f7382dd24c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/custom/assignments/DDoS.bicep b/policy/custom/assignments/DDoS.bicep index 32a9bfc8..450d0213 100644 --- a/policy/custom/assignments/DDoS.bicep +++ b/policy/custom/assignments/DDoS.bicep @@ -32,7 +32,9 @@ var policyId = 'Network-Deploy-DDoS-Standard' var assignmentName = 'Custom - Enable DDoS Standard on Virtual Networks' var scope = tenantResourceId('Microsoft.Management/managementGroups', policyAssignmentManagementGroupId) -var policyScopedId = '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policyDefinitions/${policyId}' +var policyDefinitionScope = tenantResourceId('Microsoft.Management/managementGroups', policyDefinitionManagementGroupId) +var policyScopedId = extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', policyId) + // Telemetry - Azure customer usage attribution // Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution @@ -66,7 +68,7 @@ resource policySetRoleAssignmentNetworkContributor 'Microsoft.Authorization/role name: guid(policyAssignmentManagementGroupId, 'ddos-standard', 'Network Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7' + roleDefinitionId: tenantResourceId('Microsoft.Authorization/roleDefinitions','4d97b98b-1d4f-4787-a291-c67834d212e7') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/custom/assignments/DNSPrivateEndpoints.bicep b/policy/custom/assignments/DNSPrivateEndpoints.bicep index 9c79d7aa..8cce678c 100644 --- a/policy/custom/assignments/DNSPrivateEndpoints.bicep +++ b/policy/custom/assignments/DNSPrivateEndpoints.bicep @@ -35,7 +35,9 @@ var policyId = 'custom-central-dns-private-endpoints' var assignmentName = 'Custom - Central DNS for Private Endpoints' var scope = tenantResourceId('Microsoft.Management/managementGroups', policyAssignmentManagementGroupId) -var policyScopedId = '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${policyId}' +var policyDefinitionScope = tenantResourceId('Microsoft.Management/managementGroups', policyDefinitionManagementGroupId) +var policyScopedId = extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', policyId) + // Telemetry - Azure customer usage attribution // Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution @@ -76,7 +78,7 @@ resource policySetRoleAssignmentNetworkContributor 'Microsoft.Authorization/role name: guid(policyAssignmentManagementGroupId, 'dns-private-endpoint', 'Network Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7' + roleDefinitionId: tenantResourceId('Microsoft.Authorization/roleDefinitions','4d97b98b-1d4f-4787-a291-c67834d212e7') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/custom/assignments/DefenderForCloud.bicep b/policy/custom/assignments/DefenderForCloud.bicep index 16e9878a..bf8664fc 100644 --- a/policy/custom/assignments/DefenderForCloud.bicep +++ b/policy/custom/assignments/DefenderForCloud.bicep @@ -29,7 +29,8 @@ var policyId = 'custom-enable-azure-defender' var assignmentName = 'Custom - Microsoft Defender for Cloud' var scope = tenantResourceId('Microsoft.Management/managementGroups', policyAssignmentManagementGroupId) -var policyScopedId = '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${policyId}' +var policyDefinitionScope = tenantResourceId('Microsoft.Management/managementGroups', policyDefinitionManagementGroupId) +var policyScopedId = extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', policyId) // Telemetry - Azure customer usage attribution // Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution @@ -61,7 +62,7 @@ resource policySetRoleAssignmentSecurityAdmin 'Microsoft.Authorization/roleAssig name: guid(policyAssignmentManagementGroupId, 'asc', 'Security Admin') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/fb1c8493-542b-48eb-b624-b4c8fea62acd' + roleDefinitionId: tenantResourceId('Microsoft.Authorization/roleDefinitions','fb1c8493-542b-48eb-b624-b4c8fea62acd') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -71,7 +72,7 @@ resource policySetRoleAssignmentVirtualMachineContributor 'Microsoft.Authorizati name: guid(policyAssignmentManagementGroupId, 'asc', 'Virtual Machine Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c' + roleDefinitionId: tenantResourceId('Microsoft.Authorization/roleDefinitions','9980e02c-c2be-4d73-94e8-173b1dc7cf3c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/custom/assignments/LogAnalytics.bicep b/policy/custom/assignments/LogAnalytics.bicep index afe85cc7..7c6c8b1f 100644 --- a/policy/custom/assignments/LogAnalytics.bicep +++ b/policy/custom/assignments/LogAnalytics.bicep @@ -35,7 +35,9 @@ var policyId = 'custom-enable-logging-to-loganalytics' var assignmentName = 'Custom - Log Analytics for Azure Services' var scope = tenantResourceId('Microsoft.Management/managementGroups', policyAssignmentManagementGroupId) -var policyScopedId = '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${policyId}' +var policyDefinitionScope = tenantResourceId('Microsoft.Management/managementGroups', policyDefinitionManagementGroupId) +var policyScopedId = extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', policyId) + // Telemetry - Azure customer usage attribution // Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution @@ -73,7 +75,7 @@ resource policySetRoleAssignmentLogAnalyticsContributor 'Microsoft.Authorization name: guid(policyAssignmentManagementGroupId, 'loganalytics', 'Log Analytics Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293' + roleDefinitionId: tenantResourceId('Microsoft.Authorization/roleDefinitions','92aaf0da-9dab-42b6-94a3-d43ce8d16293') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -83,7 +85,7 @@ resource policySetRoleAssignmentVirtualMachineContributor 'Microsoft.Authorizati name: guid(policyAssignmentManagementGroupId, 'loganalytics', 'Virtual Machine Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c' + roleDefinitionId: tenantResourceId('Microsoft.Authorization/roleDefinitions','9980e02c-c2be-4d73-94e8-173b1dc7cf3c') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -93,7 +95,7 @@ resource policySetRoleAssignmentMonitoringContributor 'Microsoft.Authorization/r name: guid(policyAssignmentManagementGroupId, 'loganalytics', 'Monitoring Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa' + roleDefinitionId: tenantResourceId('Microsoft.Authorization/roleDefinitions','749f88d5-cbae-40b8-bcfc-e573ddc772fa') principalId: policySetAssignment.identity.principalId principalType: 'ServicePrincipal' } diff --git a/policy/custom/assignments/Network.bicep b/policy/custom/assignments/Network.bicep index 74b0fa13..ea937730 100644 --- a/policy/custom/assignments/Network.bicep +++ b/policy/custom/assignments/Network.bicep @@ -29,7 +29,9 @@ var policyId = 'custom-network' var assignmentName = 'Custom - Network' var scope = tenantResourceId('Microsoft.Management/managementGroups', policyAssignmentManagementGroupId) -var policyScopedId = '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${policyId}' +var policyDefinitionScope = tenantResourceId('Microsoft.Management/managementGroups', policyDefinitionManagementGroupId) +var policyScopedId = extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', policyId) + // Telemetry - Azure customer usage attribution // Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution diff --git a/policy/custom/assignments/Tags.bicep b/policy/custom/assignments/Tags.bicep index 0bdd3a2e..709eba09 100644 --- a/policy/custom/assignments/Tags.bicep +++ b/policy/custom/assignments/Tags.bicep @@ -26,6 +26,8 @@ param policyAssignmentManagementGroupId string param enforcementMode string = 'Default' var scope = tenantResourceId('Microsoft.Management/managementGroups', policyAssignmentManagementGroupId) +var policyDefinitionScope = tenantResourceId('Microsoft.Management/managementGroups', policyDefinitionManagementGroupId) + // Telemetry - Azure customer usage attribution // Reference: https://learn.microsoft.com/azure/marketplace/azure-partner-customer-usage-attribution @@ -42,7 +44,7 @@ resource rgInheritedPolicySetFromSubscriptionToResourceGroupAssignment 'Microsof name: 'tags-torg-${uniqueString('tags-torg-', policyAssignmentManagementGroupId)}' properties: { displayName: rgInheritedAssignmentFromSubscriptionToResourceGroupName - policyDefinitionId: '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${rgInheritedPolicyFromSubscriptionToResourceGroupId}' + policyDefinitionId: extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', rgInheritedPolicyFromSubscriptionToResourceGroupId) scope: scope notScopes: [] parameters: {} @@ -58,7 +60,7 @@ resource rgPolicySetRoleAssignmentFromSubscriptionToResourceGroupContributor 'Mi name: guid(rgInheritedPolicyFromSubscriptionToResourceGroupId, 'RgRemediation', 'Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','b24988ac-6180-42a0-ab88-20f7382dd24c') principalId: rgInheritedPolicySetFromSubscriptionToResourceGroupAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -72,7 +74,7 @@ resource rgInheritedPolicySetAssignment 'Microsoft.Authorization/policyAssignmen name: 'tags-rg-${uniqueString('tags-from-rg-', policyAssignmentManagementGroupId)}' properties: { displayName: rgInheritedAssignmentName - policyDefinitionId: '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${rgInheritedPolicyId}' + policyDefinitionId: extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', rgInheritedPolicyId) scope: scope notScopes: [] parameters: {} @@ -88,7 +90,7 @@ resource rgPolicySetRoleAssignmentContributor 'Microsoft.Authorization/roleAssig name: guid(policyAssignmentManagementGroupId, 'RgRemediation', 'Contributor') scope: managementGroup() properties: { - roleDefinitionId: '/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c' + roleDefinitionId: resourceId('Microsoft.Authorization/roleDefinitions','b24988ac-6180-42a0-ab88-20f7382dd24c') principalId: rgInheritedPolicySetAssignment.identity.principalId principalType: 'ServicePrincipal' } @@ -102,7 +104,7 @@ resource rgRequiredPolicySetAssignment 'Microsoft.Authorization/policyAssignment name: 'tags-rg-${uniqueString('tags-required-', policyAssignmentManagementGroupId)}' properties: { displayName: rgRequiredAssignmentName - policyDefinitionId: '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${rgRequiredPolicyId}' + policyDefinitionId: extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', rgRequiredPolicyId) scope: scope notScopes: [] parameters: {} @@ -122,7 +124,7 @@ resource resourcesAuditPolicySetAssignment 'Microsoft.Authorization/policyAssign name: 'tags-r-${uniqueString('tags-missing-', policyAssignmentManagementGroupId)}' properties: { displayName: resourcesAssignmentName - policyDefinitionId: '/providers/Microsoft.Management/managementGroups/${policyDefinitionManagementGroupId}/providers/Microsoft.Authorization/policySetDefinitions/${resourcesPolicyId}' + policyDefinitionId: extensionResourceId(policyDefinitionScope, 'Microsoft.Authorization/policySetDefinitions', resourcesPolicyId) scope: scope notScopes: [] parameters: {} diff --git a/policy/custom/definitions/policyset/AKS.bicep b/policy/custom/definitions/policyset/AKS.bicep index 55e74372..087ca498 100644 --- a/policy/custom/definitions/policyset/AKS.bicep +++ b/policy/custom/definitions/policyset/AKS.bicep @@ -9,6 +9,8 @@ targetScope = 'managementGroup' +@description('Management Group scope for the policy definition.') + resource aksPolicySet 'Microsoft.Authorization/policySetDefinitions@2020-03-01' = { name: 'custom-aks' properties: { @@ -24,7 +26,7 @@ resource aksPolicySet 'Microsoft.Authorization/policySetDefinitions@2020-03-01' groupNames: [ 'AKS' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'a8eff44f-8c92-45c3-a3fb-9880802d67a7') policyDefinitionReferenceId: toLower(replace('Deploy Azure Policy Add-on to Azure Kubernetes Service clusters', ' ', '-')) parameters: {} } @@ -32,7 +34,7 @@ resource aksPolicySet 'Microsoft.Authorization/policySetDefinitions@2020-03-01' groupNames: [ 'AKS' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/3fc4dc25-5baf-40d8-9b05-7fe74c1bc64e' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '3fc4dc25-5baf-40d8-9b05-7fe74c1bc64e') policyDefinitionReferenceId: toLower(replace('Kubernetes clusters should use internal load balancers', ' ', '-')) parameters: {} } diff --git a/policy/custom/definitions/policyset/AKS.parameters.json b/policy/custom/definitions/policyset/AKS.parameters.json index 1be78a2d..14a94b2a 100644 --- a/policy/custom/definitions/policyset/AKS.parameters.json +++ b/policy/custom/definitions/policyset/AKS.parameters.json @@ -1,5 +1,7 @@ { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#", "contentVersion": "1.0.0.0", - "parameters": {} + "parameters": { + + } } \ No newline at end of file diff --git a/policy/custom/definitions/policyset/DefenderForCloud.bicep b/policy/custom/definitions/policyset/DefenderForCloud.bicep index 853dbee4..e20984df 100644 --- a/policy/custom/definitions/policyset/DefenderForCloud.bicep +++ b/policy/custom/definitions/policyset/DefenderForCloud.bicep @@ -24,7 +24,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/361c2074-3595-4e5d-8cab-4f21dffc835c' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '361c2074-3595-4e5d-8cab-4f21dffc835c') policyDefinitionReferenceId: toLower(replace('Deploy Advanced Threat Protection on Storage Accounts', ' ', '-')) parameters: {} } @@ -32,7 +32,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/36d49e87-48c4-4f2e-beed-ba4ed02b71f5' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '36d49e87-48c4-4f2e-beed-ba4ed02b71f5') policyDefinitionReferenceId: toLower(replace('Deploy Threat Detection on SQL servers', ' ', '-')) parameters: {} } @@ -40,7 +40,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/feedbf84-6b99-488c-acc2-71c829aa5ffc' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'feedbf84-6b99-488c-acc2-71c829aa5ffc') policyDefinitionReferenceId: toLower(replace('Vulnerabilities on your SQL databases should be remediated', ' ', '-')) parameters: {} } @@ -48,7 +48,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/6134c3db-786f-471e-87bc-8f479dc890f6' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '6134c3db-786f-471e-87bc-8f479dc890f6') policyDefinitionReferenceId: toLower(replace('Deploy Advanced Data Security on SQL servers', ' ', '-')) parameters: {} } @@ -56,7 +56,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4') policyDefinitionReferenceId: toLower(replace('Vulnerabilities in security configuration on your virtual machine scale sets should be remediated', ' ', '-')) parameters: {} } @@ -64,7 +64,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15') policyDefinitionReferenceId: toLower(replace('Vulnerabilities in security configuration on your machines should be remediated', ' ', '-')) parameters: {} } @@ -72,7 +72,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/501541f7-f7e7-4cd6-868c-4190fdad3ac9' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '501541f7-f7e7-4cd6-868c-4190fdad3ac9') policyDefinitionReferenceId: toLower(replace('vulnerability assessment solution should be enabled on your virtual machines', ' ', '-')) parameters: {} } @@ -80,7 +80,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/13ce0167-8ca6-4048-8e6b-f996402e3c1b' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '13ce0167-8ca6-4048-8e6b-f996402e3c1b') policyDefinitionReferenceId: toLower(replace('Configure machines to receive the Qualys vulnerability assessment agent', ' ', '-')) parameters: {} } @@ -88,7 +88,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/1f725891-01c0-420a-9059-4fa46cb770b7' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '1f725891-01c0-420a-9059-4fa46cb770b7') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for Key Vaults to be enabled', ' ', '-')) parameters: {} } @@ -96,7 +96,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/b40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7d' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'b40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7d') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for App Service to be enabled', ' ', '-')) parameters: {} } @@ -104,7 +104,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/b7021b2b-08fd-4dc0-9de7-3c6ece09faf9' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'b7021b2b-08fd-4dc0-9de7-3c6ece09faf9') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for Resource Manager to be enabled', ' ', '-')) parameters: {} } @@ -112,7 +112,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/2370a3c1-4a25-4283-a91a-c9c1a145fb2f' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '2370a3c1-4a25-4283-a91a-c9c1a145fb2f') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for DNS to be enabled', ' ', '-')) parameters: {} } @@ -120,7 +120,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/44433aa3-7ec2-4002-93ea-65c65ff0310a' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '44433aa3-7ec2-4002-93ea-65c65ff0310a') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for open-source relational databases to be enabled', ' ', '-')) parameters: {} } @@ -128,7 +128,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/b99b73e7-074b-4089-9395-b7236f094491' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'b99b73e7-074b-4089-9395-b7236f094491') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for Azure SQL database to be enabled', ' ', '-')) parameters: {} } @@ -136,7 +136,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/50ea7265-7d8c-429e-9a7d-ca1f410191c3' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '50ea7265-7d8c-429e-9a7d-ca1f410191c3') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for SQL servers on machines to be enabled', ' ', '-')) parameters: {} } @@ -144,7 +144,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/74c30959-af11-47b3-9ed2-a26e03f427a3' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '74c30959-af11-47b3-9ed2-a26e03f427a3') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for Storage to be enabled', ' ', '-')) parameters: {} } @@ -152,7 +152,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/8e86a5b6-b9bd-49d1-8e21-4bb8a0862222' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '8e86a5b6-b9bd-49d1-8e21-4bb8a0862222') policyDefinitionReferenceId: toLower(replace('Configure Azure Defender for servers to be enabled', ' ', '-')) parameters: {} } @@ -160,7 +160,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/c9ddb292-b203-4738-aead-18e2716e858f' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'c9ddb292-b203-4738-aead-18e2716e858f') policyDefinitionReferenceId: toLower(replace('Configure Microsoft Defender for Containers to be enabled', ' ', '-')) parameters: {} } @@ -168,7 +168,7 @@ resource ascAzureDefender 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'EXTRA' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/82bf5b87-728b-4a74-ba4d-6123845cf542' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '82bf5b87-728b-4a74-ba4d-6123845cf542') policyDefinitionReferenceId: toLower(replace('Configure Microsoft Defender for Azure Cosmos DB to be enabled', ' ', '-')) parameters: {} } diff --git a/policy/custom/definitions/policyset/DefenderForCloud.parameters.json b/policy/custom/definitions/policyset/DefenderForCloud.parameters.json index 1be78a2d..14a94b2a 100644 --- a/policy/custom/definitions/policyset/DefenderForCloud.parameters.json +++ b/policy/custom/definitions/policyset/DefenderForCloud.parameters.json @@ -1,5 +1,7 @@ { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#", "contentVersion": "1.0.0.0", - "parameters": {} + "parameters": { + + } } \ No newline at end of file diff --git a/policy/custom/definitions/policyset/LogAnalytics.bicep b/policy/custom/definitions/policyset/LogAnalytics.bicep index d0e45764..86391d2a 100644 --- a/policy/custom/definitions/policyset/LogAnalytics.bicep +++ b/policy/custom/definitions/policyset/LogAnalytics.bicep @@ -111,7 +111,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/5ee9e9ed-0b42-41b7-8c9c-3cfb2fbe2069' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '5ee9e9ed-0b42-41b7-8c9c-3cfb2fbe2069') policyDefinitionReferenceId: toLower(replace('Deploy Log Analytics agent for Linux virtual machine scale sets', ' ', '-')) parameters: { logAnalytics: { @@ -123,7 +123,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/3c1b3629-c8f8-4bf6-862c-037cb9094038' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '3c1b3629-c8f8-4bf6-862c-037cb9094038') policyDefinitionReferenceId: toLower(replace('Deploy Log Analytics agent for Windows virtual machine scale sets', ' ', '-')) parameters: { logAnalytics: { @@ -135,7 +135,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/4da21710-ce6f-4e06-8cdb-5cc4c93ffbee' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '4da21710-ce6f-4e06-8cdb-5cc4c93ffbee') policyDefinitionReferenceId: toLower(replace('Deploy Dependency agent for Linux virtual machines', ' ', '-')) parameters: {} } @@ -143,7 +143,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/1c210e94-a481-4beb-95fa-1571b434fb04' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '1c210e94-a481-4beb-95fa-1571b434fb04') policyDefinitionReferenceId: toLower(replace('Deploy Dependency agent for Windows virtual machines', ' ', '-')) parameters: {} } @@ -151,7 +151,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/765266ab-e40e-4c61-bcb2-5a5275d0b7c0' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '765266ab-e40e-4c61-bcb2-5a5275d0b7c0') policyDefinitionReferenceId: toLower(replace('Deploy Dependency agent for Linux virtual machine scale sets', ' ', '-')) parameters: {} } @@ -159,7 +159,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/3be22e3b-d919-47aa-805e-8985dbeb0ad9' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '3be22e3b-d919-47aa-805e-8985dbeb0ad9') policyDefinitionReferenceId: toLower(replace('Deploy Dependency agent for Windows virtual machine scale sets', ' ', '-')) parameters: {} } @@ -167,7 +167,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/6f8f98a4-f108-47cb-8e98-91a0d85cd474' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '6f8f98a4-f108-47cb-8e98-91a0d85cd474') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic settings for storage accounts to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -191,7 +191,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/c84e5349-db6d-4769-805e-e14037dab9b5' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'c84e5349-db6d-4769-805e-e14037dab9b5') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Batch Account to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -203,7 +203,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/d56a5a7c-72d7-42bc-8ceb-3baf4c0eae03' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'd56a5a7c-72d7-42bc-8ceb-3baf4c0eae03') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -215,7 +215,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/25763a0a-5783-4f14-969e-79d4933eb74b' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '25763a0a-5783-4f14-969e-79d4933eb74b') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Data Lake Storage Gen1 to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -227,7 +227,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/bef3f64c-5290-43b7-85b0-9b254eef4c47' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'bef3f64c-5290-43b7-85b0-9b254eef4c47') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Key Vault to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -239,7 +239,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/b889a06c-ec72-4b03-910a-cb169ee18721' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'b889a06c-ec72-4b03-910a-cb169ee18721') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Logic Apps to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -251,7 +251,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/08ba64b8-738f-4918-9686-730d2ed79c7d' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '08ba64b8-738f-4918-9686-730d2ed79c7d') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Search Services to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -263,7 +263,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/04d53d87-841c-4f23-8a5b-21564380b55e' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '04d53d87-841c-4f23-8a5b-21564380b55e') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Service Bus to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -275,7 +275,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/237e0f7e-b0e8-4ec4-ad46-8c12cb66d673' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '237e0f7e-b0e8-4ec4-ad46-8c12cb66d673') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Stream Analytics to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -287,7 +287,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/6c66c325-74c8-42fd-a286-a74b0e2939d8' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '6c66c325-74c8-42fd-a286-a74b0e2939d8') policyDefinitionReferenceId: toLower(replace('Deploy Diagnostic Settings for Azure Kubernetes Service to Log Analytics workspace', ' ', '-')) parameters: { logAnalytics: { @@ -302,7 +302,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/053d3325-282c-4e5c-b944-24faffd30d77' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '053d3325-282c-4e5c-b944-24faffd30d77') policyDefinitionReferenceId: toLower(replace('Deploy Log Analytics agent for Linux VMs', ' ', '-')) parameters: { logAnalytics: { @@ -314,7 +314,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/0868462e-646c-4fe3-9ced-a733534b6a2c' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '0868462e-646c-4fe3-9ced-a733534b6a2c') policyDefinitionReferenceId: toLower(replace('Deploy Log Analytics agent for Windows VMs', ' ', '-')) parameters: { logAnalytics: { @@ -326,7 +326,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/32133ab0-ee4b-4b44-98d6-042180979d50' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '32133ab0-ee4b-4b44-98d6-042180979d50') policyDefinitionReferenceId: toLower(replace('Audit Log Analytics Agent Deployment - VM Image (OS) unlisted', ' ', '-')) parameters: {} } @@ -334,7 +334,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138') policyDefinitionReferenceId: toLower(replace('Audit Log Analytics agent deployment in virtual machine scale sets - VM Image (OS) unlisted', ' ', '-')) parameters: {} } @@ -342,7 +342,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/f47b5582-33ec-4c5c-87c0-b010a6b2e917' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', 'f47b5582-33ec-4c5c-87c0-b010a6b2e917') policyDefinitionReferenceId: toLower(replace('Audit Log Analytics Workspace for VM - Report Mismatch', ' ', '-')) parameters: { logAnalyticsWorkspaceId: { @@ -354,7 +354,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/752154a7-1e0f-45c6-a880-ac75a7e4f648' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '752154a7-1e0f-45c6-a880-ac75a7e4f648') policyDefinitionReferenceId: toLower(replace('Public IP addresses should have resource logs enabled for Azure DDoS Protection Standard', ' ', '-')) parameters: { effect: { @@ -372,7 +372,7 @@ resource policyset_name 'Microsoft.Authorization/policySetDefinitions@2020-03-01 groupNames: [ 'BUILTIN' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/7f89b1eb-583c-429a-8828-af049802c1d9' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '7f89b1eb-583c-429a-8828-af049802c1d9') policyDefinitionReferenceId: toLower(replace('Audit diagnostic setting', ' ', '-')) parameters: { listOfResourceTypes: { diff --git a/policy/custom/definitions/policyset/Network.bicep b/policy/custom/definitions/policyset/Network.bicep index a65db6d2..8d8471a9 100644 --- a/policy/custom/definitions/policyset/Network.bicep +++ b/policy/custom/definitions/policyset/Network.bicep @@ -29,7 +29,7 @@ resource networkPolicySet 'Microsoft.Authorization/policySetDefinitions@2020-03- groupNames: [ 'NETWORK' ] - policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/83a86a26-fd1f-447c-b59d-e51f44264114' + policyDefinitionId: tenantResourceId('Microsoft.Authorization/policyDefinitions', '83a86a26-fd1f-447c-b59d-e51f44264114') policyDefinitionReferenceId: toLower(replace('Network interfaces should not have public IPs', ' ', '-')) parameters: {} } diff --git a/schemas/latest/readme.md b/schemas/latest/readme.md index f7e9315f..ca8fa578 100644 --- a/schemas/latest/readme.md +++ b/schemas/latest/readme.md @@ -105,13 +105,13 @@ "sms": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ], "voice": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ] }, @@ -124,7 +124,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -340,13 +340,13 @@ "sms": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ], "voice": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ] }, @@ -359,7 +359,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/schemas/v0.5.0/readme.md b/schemas/v0.5.0/readme.md index e3dd01b5..a2fb1b14 100644 --- a/schemas/v0.5.0/readme.md +++ b/schemas/v0.5.0/readme.md @@ -36,13 +36,13 @@ "sms": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ], "voice": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ] }, @@ -55,7 +55,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -271,13 +271,13 @@ "sms": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ], "voice": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ] }, @@ -290,7 +290,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/schemas/v0.6.0/readme.md b/schemas/v0.6.0/readme.md index f7e9315f..ca8fa578 100644 --- a/schemas/v0.6.0/readme.md +++ b/schemas/v0.6.0/readme.md @@ -105,13 +105,13 @@ "sms": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ], "voice": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ] }, @@ -124,7 +124,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { @@ -340,13 +340,13 @@ "sms": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ], "voice": [ { "countryCode": "1", - "phoneNumber": "5555555555" + "phoneNumber": "6045555555" } ] }, @@ -359,7 +359,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/BackupRecoveryVaultIsFalse.json b/tests/schemas/lz-generic-subscription/BackupRecoveryVaultIsFalse.json index e052092f..f8ee4222 100644 --- a/tests/schemas/lz-generic-subscription/BackupRecoveryVaultIsFalse.json +++ b/tests/schemas/lz-generic-subscription/BackupRecoveryVaultIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/BackupRecoveryVaultIsTrue.json b/tests/schemas/lz-generic-subscription/BackupRecoveryVaultIsTrue.json index 318a9d6d..08cbae3b 100644 --- a/tests/schemas/lz-generic-subscription/BackupRecoveryVaultIsTrue.json +++ b/tests/schemas/lz-generic-subscription/BackupRecoveryVaultIsTrue.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/BudgetIsFalse.json b/tests/schemas/lz-generic-subscription/BudgetIsFalse.json index 318a9d6d..08cbae3b 100644 --- a/tests/schemas/lz-generic-subscription/BudgetIsFalse.json +++ b/tests/schemas/lz-generic-subscription/BudgetIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/BudgetIsTrue.json b/tests/schemas/lz-generic-subscription/BudgetIsTrue.json index 93bba825..6d6f27fc 100644 --- a/tests/schemas/lz-generic-subscription/BudgetIsTrue.json +++ b/tests/schemas/lz-generic-subscription/BudgetIsTrue.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/EmptyResourceTags.json b/tests/schemas/lz-generic-subscription/EmptyResourceTags.json index a34b1a56..5250dd37 100644 --- a/tests/schemas/lz-generic-subscription/EmptyResourceTags.json +++ b/tests/schemas/lz-generic-subscription/EmptyResourceTags.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/EmptySubscriptionTags.json b/tests/schemas/lz-generic-subscription/EmptySubscriptionTags.json index 0b85bbfa..5369ff95 100644 --- a/tests/schemas/lz-generic-subscription/EmptySubscriptionTags.json +++ b/tests/schemas/lz-generic-subscription/EmptySubscriptionTags.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/FullDeployment-With-Hub.json b/tests/schemas/lz-generic-subscription/FullDeployment-With-Hub.json index 97dc1822..281f6254 100644 --- a/tests/schemas/lz-generic-subscription/FullDeployment-With-Hub.json +++ b/tests/schemas/lz-generic-subscription/FullDeployment-With-Hub.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/FullDeployment-With-Location.json b/tests/schemas/lz-generic-subscription/FullDeployment-With-Location.json index c26010e0..390aa0cb 100644 --- a/tests/schemas/lz-generic-subscription/FullDeployment-With-Location.json +++ b/tests/schemas/lz-generic-subscription/FullDeployment-With-Location.json @@ -13,8 +13,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -25,7 +25,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/FullDeployment-Without-Hub.json b/tests/schemas/lz-generic-subscription/FullDeployment-Without-Hub.json index fe8c145f..69cf8430 100644 --- a/tests/schemas/lz-generic-subscription/FullDeployment-Without-Hub.json +++ b/tests/schemas/lz-generic-subscription/FullDeployment-Without-Hub.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/WithoutCustomDNS.json b/tests/schemas/lz-generic-subscription/WithoutCustomDNS.json index 5a0dc008..7b27241c 100644 --- a/tests/schemas/lz-generic-subscription/WithoutCustomDNS.json +++ b/tests/schemas/lz-generic-subscription/WithoutCustomDNS.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-generic-subscription/WithoutSubnets.json b/tests/schemas/lz-generic-subscription/WithoutSubnets.json index 7d7ca67f..85e31378 100644 --- a/tests/schemas/lz-generic-subscription/WithoutSubnets.json +++ b/tests/schemas/lz-generic-subscription/WithoutSubnets.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/BudgetIsFalse.json b/tests/schemas/lz-healthcare/BudgetIsFalse.json index 87755136..1c87c2dc 100644 --- a/tests/schemas/lz-healthcare/BudgetIsFalse.json +++ b/tests/schemas/lz-healthcare/BudgetIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/BudgetIsTrue.json b/tests/schemas/lz-healthcare/BudgetIsTrue.json index 58fe56ca..cb8627cb 100644 --- a/tests/schemas/lz-healthcare/BudgetIsTrue.json +++ b/tests/schemas/lz-healthcare/BudgetIsTrue.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/EmptyResourceTags.json b/tests/schemas/lz-healthcare/EmptyResourceTags.json index d380b507..cccb7c5e 100644 --- a/tests/schemas/lz-healthcare/EmptyResourceTags.json +++ b/tests/schemas/lz-healthcare/EmptyResourceTags.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/EmptySubscriptionTags.json b/tests/schemas/lz-healthcare/EmptySubscriptionTags.json index 803311a4..b63e963c 100644 --- a/tests/schemas/lz-healthcare/EmptySubscriptionTags.json +++ b/tests/schemas/lz-healthcare/EmptySubscriptionTags.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/FullDeployment-With-Hub.json b/tests/schemas/lz-healthcare/FullDeployment-With-Hub.json index ce2a3613..03dd5dee 100644 --- a/tests/schemas/lz-healthcare/FullDeployment-With-Hub.json +++ b/tests/schemas/lz-healthcare/FullDeployment-With-Hub.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/FullDeployment-With-Location.json b/tests/schemas/lz-healthcare/FullDeployment-With-Location.json index 6257136b..143d3dbb 100644 --- a/tests/schemas/lz-healthcare/FullDeployment-With-Location.json +++ b/tests/schemas/lz-healthcare/FullDeployment-With-Location.json @@ -13,8 +13,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -25,7 +25,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/FullDeployment-With-OptionalSubnets.json b/tests/schemas/lz-healthcare/FullDeployment-With-OptionalSubnets.json index 435c7fa3..d382ecaf 100644 --- a/tests/schemas/lz-healthcare/FullDeployment-With-OptionalSubnets.json +++ b/tests/schemas/lz-healthcare/FullDeployment-With-OptionalSubnets.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/FullDeployment-Without-Hub.json b/tests/schemas/lz-healthcare/FullDeployment-Without-Hub.json index 7f6d24b0..318691e9 100644 --- a/tests/schemas/lz-healthcare/FullDeployment-Without-Hub.json +++ b/tests/schemas/lz-healthcare/FullDeployment-Without-Hub.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/SQLDB-aadAuthOnly.json b/tests/schemas/lz-healthcare/SQLDB-aadAuthOnly.json index 6c8a5d24..df3f119f 100644 --- a/tests/schemas/lz-healthcare/SQLDB-aadAuthOnly.json +++ b/tests/schemas/lz-healthcare/SQLDB-aadAuthOnly.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/SQLDB-mixedAuth.json b/tests/schemas/lz-healthcare/SQLDB-mixedAuth.json index b764a41d..67990eb4 100644 --- a/tests/schemas/lz-healthcare/SQLDB-mixedAuth.json +++ b/tests/schemas/lz-healthcare/SQLDB-mixedAuth.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/SQLDB-sqlAuth.json b/tests/schemas/lz-healthcare/SQLDB-sqlAuth.json index d0b31d47..76a33f6b 100644 --- a/tests/schemas/lz-healthcare/SQLDB-sqlAuth.json +++ b/tests/schemas/lz-healthcare/SQLDB-sqlAuth.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/SQLDBIsFalse.json b/tests/schemas/lz-healthcare/SQLDBIsFalse.json index a614a2af..cc556997 100644 --- a/tests/schemas/lz-healthcare/SQLDBIsFalse.json +++ b/tests/schemas/lz-healthcare/SQLDBIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/Synapse-aadAuthOnly.json b/tests/schemas/lz-healthcare/Synapse-aadAuthOnly.json index 0565d3a7..2d0c3ad8 100644 --- a/tests/schemas/lz-healthcare/Synapse-aadAuthOnly.json +++ b/tests/schemas/lz-healthcare/Synapse-aadAuthOnly.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/Synapse-mixedAuth.json b/tests/schemas/lz-healthcare/Synapse-mixedAuth.json index 55f8bb9f..21c5bdf5 100644 --- a/tests/schemas/lz-healthcare/Synapse-mixedAuth.json +++ b/tests/schemas/lz-healthcare/Synapse-mixedAuth.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/Synapse-sqlAuth.json b/tests/schemas/lz-healthcare/Synapse-sqlAuth.json index cbe13567..169a3e08 100644 --- a/tests/schemas/lz-healthcare/Synapse-sqlAuth.json +++ b/tests/schemas/lz-healthcare/Synapse-sqlAuth.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-healthcare/WithoutCMK.json b/tests/schemas/lz-healthcare/WithoutCMK.json index 6e937885..3933da07 100644 --- a/tests/schemas/lz-healthcare/WithoutCMK.json +++ b/tests/schemas/lz-healthcare/WithoutCMK.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/AKS-AzureCNI-AzureNP.json b/tests/schemas/lz-machinelearning/AKS-AzureCNI-AzureNP.json index 350b28ea..63478c44 100644 --- a/tests/schemas/lz-machinelearning/AKS-AzureCNI-AzureNP.json +++ b/tests/schemas/lz-machinelearning/AKS-AzureCNI-AzureNP.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/AKS-AzureCNI-Calico.json b/tests/schemas/lz-machinelearning/AKS-AzureCNI-Calico.json index 300bcc21..02c9258d 100644 --- a/tests/schemas/lz-machinelearning/AKS-AzureCNI-Calico.json +++ b/tests/schemas/lz-machinelearning/AKS-AzureCNI-Calico.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/AKS-Kubenet-Calico.json b/tests/schemas/lz-machinelearning/AKS-Kubenet-Calico.json index 2477fdb5..2e5be586 100644 --- a/tests/schemas/lz-machinelearning/AKS-Kubenet-Calico.json +++ b/tests/schemas/lz-machinelearning/AKS-Kubenet-Calico.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/AKSIsFalse.json b/tests/schemas/lz-machinelearning/AKSIsFalse.json index b12d62a2..440c127e 100644 --- a/tests/schemas/lz-machinelearning/AKSIsFalse.json +++ b/tests/schemas/lz-machinelearning/AKSIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/AppServiceLinuxContainerIsFalse.json b/tests/schemas/lz-machinelearning/AppServiceLinuxContainerIsFalse.json index fd62aad1..210a0005 100644 --- a/tests/schemas/lz-machinelearning/AppServiceLinuxContainerIsFalse.json +++ b/tests/schemas/lz-machinelearning/AppServiceLinuxContainerIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/AppServiceLinuxContainerPrivateEndpointIsFalse.json b/tests/schemas/lz-machinelearning/AppServiceLinuxContainerPrivateEndpointIsFalse.json index 7d973272..87821253 100644 --- a/tests/schemas/lz-machinelearning/AppServiceLinuxContainerPrivateEndpointIsFalse.json +++ b/tests/schemas/lz-machinelearning/AppServiceLinuxContainerPrivateEndpointIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/BudgetIsFalse.json b/tests/schemas/lz-machinelearning/BudgetIsFalse.json index a73d2981..243a6bef 100644 --- a/tests/schemas/lz-machinelearning/BudgetIsFalse.json +++ b/tests/schemas/lz-machinelearning/BudgetIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/BudgetIsTrue.json b/tests/schemas/lz-machinelearning/BudgetIsTrue.json index a53aaab2..95f8b32b 100644 --- a/tests/schemas/lz-machinelearning/BudgetIsTrue.json +++ b/tests/schemas/lz-machinelearning/BudgetIsTrue.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/EmptyResourceTags.json b/tests/schemas/lz-machinelearning/EmptyResourceTags.json index 92358a1e..c1efecfe 100644 --- a/tests/schemas/lz-machinelearning/EmptyResourceTags.json +++ b/tests/schemas/lz-machinelearning/EmptyResourceTags.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/EmptySubscriptionTags.json b/tests/schemas/lz-machinelearning/EmptySubscriptionTags.json index d0fe2367..14811918 100644 --- a/tests/schemas/lz-machinelearning/EmptySubscriptionTags.json +++ b/tests/schemas/lz-machinelearning/EmptySubscriptionTags.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/FullDeployment-With-Hub.json b/tests/schemas/lz-machinelearning/FullDeployment-With-Hub.json index f0aeb9e8..614aa1d2 100644 --- a/tests/schemas/lz-machinelearning/FullDeployment-With-Hub.json +++ b/tests/schemas/lz-machinelearning/FullDeployment-With-Hub.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/FullDeployment-With-Location.json b/tests/schemas/lz-machinelearning/FullDeployment-With-Location.json index 3b6e2524..6b80cb92 100644 --- a/tests/schemas/lz-machinelearning/FullDeployment-With-Location.json +++ b/tests/schemas/lz-machinelearning/FullDeployment-With-Location.json @@ -13,8 +13,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -25,7 +25,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/FullDeployment-With-OptionalSubnets.json b/tests/schemas/lz-machinelearning/FullDeployment-With-OptionalSubnets.json index 12b84573..a550f31a 100644 --- a/tests/schemas/lz-machinelearning/FullDeployment-With-OptionalSubnets.json +++ b/tests/schemas/lz-machinelearning/FullDeployment-With-OptionalSubnets.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/FullDeployment-Without-Hub.json b/tests/schemas/lz-machinelearning/FullDeployment-Without-Hub.json index 93ce56d2..716edbe0 100644 --- a/tests/schemas/lz-machinelearning/FullDeployment-Without-Hub.json +++ b/tests/schemas/lz-machinelearning/FullDeployment-Without-Hub.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/SQLDB-aadAuthOnly.json b/tests/schemas/lz-machinelearning/SQLDB-aadAuthOnly.json index d4576ec1..28ca865e 100644 --- a/tests/schemas/lz-machinelearning/SQLDB-aadAuthOnly.json +++ b/tests/schemas/lz-machinelearning/SQLDB-aadAuthOnly.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/SQLDB-mixedAuth.json b/tests/schemas/lz-machinelearning/SQLDB-mixedAuth.json index 2477fdb5..2e5be586 100644 --- a/tests/schemas/lz-machinelearning/SQLDB-mixedAuth.json +++ b/tests/schemas/lz-machinelearning/SQLDB-mixedAuth.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/SQLDB-sqlAuth.json b/tests/schemas/lz-machinelearning/SQLDB-sqlAuth.json index a53aaab2..95f8b32b 100644 --- a/tests/schemas/lz-machinelearning/SQLDB-sqlAuth.json +++ b/tests/schemas/lz-machinelearning/SQLDB-sqlAuth.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/SQLDBIsFalse.json b/tests/schemas/lz-machinelearning/SQLDBIsFalse.json index a0959ea4..fd17f887 100644 --- a/tests/schemas/lz-machinelearning/SQLDBIsFalse.json +++ b/tests/schemas/lz-machinelearning/SQLDBIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/SQLMIIsFalse.json b/tests/schemas/lz-machinelearning/SQLMIIsFalse.json index 5566dc1e..374e6992 100644 --- a/tests/schemas/lz-machinelearning/SQLMIIsFalse.json +++ b/tests/schemas/lz-machinelearning/SQLMIIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-machinelearning/WithoutCMK.json b/tests/schemas/lz-machinelearning/WithoutCMK.json index 80baa0f0..4b3a7fa8 100644 --- a/tests/schemas/lz-machinelearning/WithoutCMK.json +++ b/tests/schemas/lz-machinelearning/WithoutCMK.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-azfw/BudgetIsFalse.json b/tests/schemas/lz-platform-connectivity-hub-azfw/BudgetIsFalse.json index 35564622..e5770f64 100644 --- a/tests/schemas/lz-platform-connectivity-hub-azfw/BudgetIsFalse.json +++ b/tests/schemas/lz-platform-connectivity-hub-azfw/BudgetIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-With-OptionalHubSubnets.json b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-With-OptionalHubSubnets.json index add1c27c..64a42969 100644 --- a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-With-OptionalHubSubnets.json +++ b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-With-OptionalHubSubnets.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithAzureFirewallPolicy.json b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithAzureFirewallPolicy.json index 9119fc03..5a129b89 100644 --- a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithAzureFirewallPolicy.json +++ b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithAzureFirewallPolicy.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithLogAnalyticsWorkspace.json b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithLogAnalyticsWorkspace.json index 18b0e388..a2e04667 100644 --- a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithLogAnalyticsWorkspace.json +++ b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-WithLogAnalyticsWorkspace.json @@ -13,8 +13,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -25,7 +25,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-Without-ManagementRestrictedZone.json b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-Without-ManagementRestrictedZone.json index 39aac970..b528d8c6 100644 --- a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-Without-ManagementRestrictedZone.json +++ b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment-Without-ManagementRestrictedZone.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment.json b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment.json index c925a539..19374297 100644 --- a/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment.json +++ b/tests/schemas/lz-platform-connectivity-hub-azfw/FullDeployment.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-nva/BudgetIsFalse.json b/tests/schemas/lz-platform-connectivity-hub-nva/BudgetIsFalse.json index 2c582b88..b359843f 100644 --- a/tests/schemas/lz-platform-connectivity-hub-nva/BudgetIsFalse.json +++ b/tests/schemas/lz-platform-connectivity-hub-nva/BudgetIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-FortigateBYOL.json b/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-FortigateBYOL.json index 8539a30c..e1fdd4a5 100644 --- a/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-FortigateBYOL.json +++ b/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-FortigateBYOL.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-OptionalHubSubnets.json b/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-OptionalHubSubnets.json index 8152f034..7dc68bfa 100644 --- a/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-OptionalHubSubnets.json +++ b/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-OptionalHubSubnets.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-Ubuntu.json b/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-Ubuntu.json index cf12b48b..5e2aacca 100644 --- a/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-Ubuntu.json +++ b/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-With-Ubuntu.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-WithLogAnalyticsWorkspace.json b/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-WithLogAnalyticsWorkspace.json index f3a61229..43d767f4 100644 --- a/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-WithLogAnalyticsWorkspace.json +++ b/tests/schemas/lz-platform-connectivity-hub-nva/FullDeployment-WithLogAnalyticsWorkspace.json @@ -13,8 +13,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -25,7 +25,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-logging/BudgetIsFalse.json b/tests/schemas/lz-platform-logging/BudgetIsFalse.json index b262eb62..79e941ad 100644 --- a/tests/schemas/lz-platform-logging/BudgetIsFalse.json +++ b/tests/schemas/lz-platform-logging/BudgetIsFalse.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-logging/EmptyResourceTags.json b/tests/schemas/lz-platform-logging/EmptyResourceTags.json index 14d84d2e..3ad883ca 100644 --- a/tests/schemas/lz-platform-logging/EmptyResourceTags.json +++ b/tests/schemas/lz-platform-logging/EmptyResourceTags.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-logging/EmptySubscriptionTags.json b/tests/schemas/lz-platform-logging/EmptySubscriptionTags.json index 79f3e512..45ad91e6 100644 --- a/tests/schemas/lz-platform-logging/EmptySubscriptionTags.json +++ b/tests/schemas/lz-platform-logging/EmptySubscriptionTags.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-logging/FullDeployment-With-Location.json b/tests/schemas/lz-platform-logging/FullDeployment-With-Location.json index 0b2e21e1..f647f207 100644 --- a/tests/schemas/lz-platform-logging/FullDeployment-With-Location.json +++ b/tests/schemas/lz-platform-logging/FullDeployment-With-Location.json @@ -13,8 +13,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -25,7 +25,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-logging/FullDeployment.json b/tests/schemas/lz-platform-logging/FullDeployment.json index 03d8690c..c593d00e 100644 --- a/tests/schemas/lz-platform-logging/FullDeployment.json +++ b/tests/schemas/lz-platform-logging/FullDeployment.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": { diff --git a/tests/schemas/lz-platform-logging/WithoutSubscriptionRoleAssignments.json b/tests/schemas/lz-platform-logging/WithoutSubscriptionRoleAssignments.json index f134ded8..aa86fc91 100644 --- a/tests/schemas/lz-platform-logging/WithoutSubscriptionRoleAssignments.json +++ b/tests/schemas/lz-platform-logging/WithoutSubscriptionRoleAssignments.json @@ -10,8 +10,8 @@ "receivers": { "app": [ "alzcanadapubsec@microsoft.com" ], "email": [ "alzcanadapubsec@microsoft.com" ], - "sms": [ { "countryCode": "1", "phoneNumber": "5555555555" } ], - "voice": [ { "countryCode": "1", "phoneNumber": "5555555555" } ] + "sms": [ { "countryCode": "1", "phoneNumber": "6045555555" } ], + "voice": [ { "countryCode": "1", "phoneNumber": "6045555555" } ] }, "actionGroupName": "Service health action group", "actionGroupShortName": "health-alert", @@ -22,7 +22,7 @@ "securityCenter": { "value": { "email": "alzcanadapubsec@microsoft.com", - "phone": "5555555555" + "phone": "6045555555" } }, "subscriptionRoleAssignments": {