From 6ae2518f8e993d60312ae2fff16c38974c9cf658 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Fri, 7 Jul 2023 09:46:49 +0000 Subject: [PATCH] BICEP to ARM automatic conversion by Github Actions - update-2023-07-07 --- .../deploy-aa_totaljob_alert.json | 13 ++++++++----- .../deploy-activitylog-AzureFirewall-Del.json | 13 ++++++++----- .../deploy-activitylog-KeyVault-Del.json | 13 ++++++++----- .../deploy-activitylog-LAWorkspace-Del.json | 13 ++++++++----- .../deploy-activitylog-LAWorkspace-ReGen.json | 13 ++++++++----- .../deploy-activitylog-NSG-Del.json | 13 ++++++++----- ...tivitylog-ResourceHealth-UnHealthly-alert.json | 13 ++++++++----- .../deploy-activitylog-RouteTable-Update.json | 13 ++++++++----- .../deploy-activitylog-ServiceHealth-Health.json | 13 ++++++++----- ...deploy-activitylog-ServiceHealth-Incident.json | 13 ++++++++----- ...loy-activitylog-ServiceHealth-Maintenance.json | 13 ++++++++----- ...deploy-activitylog-ServiceHealth-Security.json | 13 ++++++++----- .../deploy-activitylog-VPNGate-Del.json | 13 ++++++++----- .../deploy-afw_firewallhealth_alert.json | 13 ++++++++----- .../deploy-afw_snatportutilization_alert.json | 13 ++++++++----- .../deploy-alertprocessingrule-deploy.json | 13 ++++++++----- .../deploy-ercir_arpavailability_alert.json | 13 ++++++++----- .../deploy-ercir_bgpavailability_alert.json | 13 ++++++++----- .../deploy-ercir_qosdropsbitsin_alert.json | 13 ++++++++----- .../deploy-ercir_qosdropsbitsout_alert.json | 13 ++++++++----- .../deploy-erg_bitsinpersecond_alert.json | 13 ++++++++----- .../deploy-erg_bitsoutpersecond_alert.json | 13 ++++++++----- ...ploy-erg_expressroutecpuutilization_alert.json | 13 ++++++++----- .../deploy-kv_availability_alert.json | 13 ++++++++----- .../deploy-kv_capacity_alert.json | 13 ++++++++----- .../deploy-kv_latency_alert.json | 13 ++++++++----- .../deploy-kv_requests_alert.json | 13 ++++++++----- .../deploy-pdnsz_capacityutilization_alert.json | 13 ++++++++----- .../deploy-pdnsz_queryvolume_alert.json | 13 ++++++++----- .../deploy-pdnsz_recordsetcapacity_alert.json | 13 ++++++++----- ...nsz_registrationcapacityutilization_alert.json | 13 ++++++++----- .../deploy-pip_bytesinddosattack_alert.json | 13 ++++++++----- .../deploy-pip_ddosattack_alert.json | 13 ++++++++----- .../deploy-pip_packetsinddos_alert.json | 13 ++++++++----- .../deploy-pip_vipavailability_alert.json | 13 ++++++++----- .../deploy-rv_backuphealth_monitor.json | 11 +++++++---- .../deploy-sa_availability_alert.json | 13 ++++++++----- .../deploy-vm-HeartBeatAlertRG.json | 15 +++++++++------ .../deploy-vm-HeartBeat_alert.json | 13 ++++++++----- .../deploy-vm-NetworkIn_alert.json | 13 ++++++++----- .../deploy-vm-NetworkOut_alert.json | 13 ++++++++----- .../deploy-vm-OSDiskSpace_alert.json | 13 ++++++++----- .../deploy-vm-OSDiskreadLatency_alert.json | 13 ++++++++----- .../deploy-vm-OSDiskwriteLatency_alert.json | 13 ++++++++----- .../deploy-vm-PercentCPU_alert.json | 13 ++++++++----- .../deploy-vm-PercentMemory_alert.json | 13 ++++++++----- .../deploy-vm-dataDiskSpace_alert.json | 13 ++++++++----- .../deploy-vm-dataDiskreadLatency_alert.json | 13 ++++++++----- .../deploy-vm-dataDiskwriteLatency_alert.json | 13 ++++++++----- .../deploy-vm_availablememory_alert.json | 13 ++++++++----- .../deploy-vnet_ddosattack_alert.json | 13 ++++++++----- .../deploy-vnetg_bandwidthutilization_alert.json | 13 ++++++++----- .../deploy-vnetg_egress_alert.json | 13 ++++++++----- .../deploy-vnetg_egresspacketdropcount_alert.json | 13 ++++++++----- ...ploy-vnetg_egresspacketdropmismatch_alert.json | 13 ++++++++----- ...loy-vnetg_expressroutebitspersecond_alert.json | 13 ++++++++----- ...oy-vnetg_expressroutecpuutilization_alert.json | 13 ++++++++----- .../deploy-vnetg_ingress_alert.json | 13 ++++++++----- ...deploy-vnetg_ingresspacketdropcount_alert.json | 13 ++++++++----- ...loy-vnetg_ingresspacketdropmismatch_alert.json | 13 ++++++++----- .../deploy-vpng_bandwidthutilization_alert.json | 13 ++++++++----- .../deploy-vpng_bgppeerstatus_alert.json | 13 ++++++++----- .../deploy-vpng_egress_alert.json | 13 ++++++++----- .../deploy-vpng_egresspacketdropcount_alert.json | 13 ++++++++----- ...eploy-vpng_egresspacketdropmismatch_alert.json | 13 ++++++++----- .../deploy-vpng_ingress_alert.json | 13 ++++++++----- .../deploy-vpng_ingresspacketdropcount_alert.json | 13 ++++++++----- ...ploy-vpng_ingresspacketdropmismatch_alert.json | 13 ++++++++----- 68 files changed, 544 insertions(+), 340 deletions(-) diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-aa_totaljob_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-aa_totaljob_alert.json index 1db097e4..d887923b 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-aa_totaljob_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-aa_totaljob_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "10930207263383103614" + "templateHash": "7939561613238414176" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_AA_TotalJob_Alert" }, "displayName": { - "value": "[DINE] Deploy Automation Account TotalJob Alert" + "value": "Deploy Automation Account TotalJob Alert" }, "description": { - "value": "DINE policy to audit/deploy Automation Account TotalJob Alert" + "value": "Policy to audit/deploy Automation Account TotalJob Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Automation", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-AzureFirewall-Del.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-AzureFirewall-Del.json index d602d074..84d69788 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-AzureFirewall-Del.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-AzureFirewall-Del.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "13015734610960104634" + "templateHash": "11488062483870583344" } }, "parameters": { @@ -59,10 +59,10 @@ "value": "Deploy_activitylog_Firewall_Delete" }, "displayName": { - "value": "[DINE] Deploy Activity Log Azure FireWall Delete Alert" + "value": "Deploy Activity Log Azure FireWall Delete Alert" }, "description": { - "value": "DINE policy to Deploy Activity Log Azure Firewall Delete Alert" + "value": "Policy to Deploy Activity Log Azure Firewall Delete Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -70,8 +70,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "ActivityLog", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-KeyVault-Del.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-KeyVault-Del.json index c59f773b..e88efccc 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-KeyVault-Del.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-KeyVault-Del.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "15333833620504453534" + "templateHash": "2754115634628134251" } }, "parameters": { @@ -59,10 +59,10 @@ "value": "Deploy_activitylog_KeyVault_Delete" }, "displayName": { - "value": "[DINE] Deploy Activity Log Key Vault Delete Alert" + "value": "Deploy Activity Log Key Vault Delete Alert" }, "description": { - "value": "DINE policy to Deploy Activity Log Key Vault Delete Alert" + "value": "Policy to Deploy Activity Log Key Vault Delete Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -70,8 +70,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "ActivityLog", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Key Vault", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-LAWorkspace-Del.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-LAWorkspace-Del.json index 001fc06b..345ceffc 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-LAWorkspace-Del.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-LAWorkspace-Del.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "3880372668855559745" + "templateHash": "800363243312425032" } }, "parameters": { @@ -59,10 +59,10 @@ "value": "Deploy_activitylog_LAWorkspace_Delete" }, "displayName": { - "value": "[DINE] Deploy Activity Log LA Workspace Delete Alert" + "value": "Deploy Activity Log LA Workspace Delete Alert" }, "description": { - "value": "DINE policy to Deploy Activity Log LA Workspace Delete Alert" + "value": "Policy to Deploy Activity Log LA Workspace Delete Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -70,8 +70,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "ActivityLog", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Monitoring", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-LAWorkspace-ReGen.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-LAWorkspace-ReGen.json index e511489e..33db9d7e 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-LAWorkspace-ReGen.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-LAWorkspace-ReGen.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "5683091315786902635" + "templateHash": "8213035751193842802" } }, "parameters": { @@ -59,10 +59,10 @@ "value": "Deploy_activitylog_LAWorkspace_KeyRegen" }, "displayName": { - "value": "[DINE] Deploy Activity Log LA Workspace Regenerate Key Alert" + "value": "Deploy Activity Log LA Workspace Regenerate Key Alert" }, "description": { - "value": "DINE policy to Deploy Activity Log LA Workspace Regenerate Key Alert" + "value": "Policy to Deploy Activity Log LA Workspace Regenerate Key Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -70,8 +70,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "ActivityLog", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Monitoring", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-NSG-Del.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-NSG-Del.json index c1b53076..0e2bbbb6 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-NSG-Del.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-NSG-Del.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "10940368228485342132" + "templateHash": "11360507622901998174" } }, "parameters": { @@ -59,10 +59,10 @@ "value": "Deploy_activitylog_NSG_Delete" }, "displayName": { - "value": "[DINE] Deploy Activity Log NSG Delete Alert" + "value": "Deploy Activity Log NSG Delete Alert" }, "description": { - "value": "DINE policy to Deploy Activity Log NSG Delete Alert" + "value": "Policy to Deploy Activity Log NSG Delete Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -70,8 +70,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "ActivityLog", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ResourceHealth-UnHealthly-alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ResourceHealth-UnHealthly-alert.json index 4acd230f..bd01fd1f 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ResourceHealth-UnHealthly-alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ResourceHealth-UnHealthly-alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "15670852757897835689" + "templateHash": "18259471376022006632" } }, "parameters": { @@ -59,10 +59,10 @@ "value": "Deploy_activitylog_ResourceHealth_Unhealthy_Alert" }, "displayName": { - "value": "[DINE] Deploy Resource Health Unhealthy Alert" + "value": "Deploy Resource Health Unhealthy Alert" }, "description": { - "value": "DINE policy to Deploy Resource Health Unhealthy Alert" + "value": "Policy to Deploy Resource Health Unhealthy Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -70,8 +70,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "ServiceHealth", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Monitoring", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-RouteTable-Update.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-RouteTable-Update.json index b383f92e..d3a655dc 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-RouteTable-Update.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-RouteTable-Update.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "16362240433763182057" + "templateHash": "7513642052406485436" } }, "parameters": { @@ -59,10 +59,10 @@ "value": "Deploy_activitylog_RouteTable_Update" }, "displayName": { - "value": "[DINE] Deploy Activity Log Route Table Update Alert" + "value": "Deploy Activity Log Route Table Update Alert" }, "description": { - "value": "DINE policy to Deploy Activity Log Route Table Update Alert" + "value": "Policy to Deploy Activity Log Route Table Update Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -70,8 +70,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "ActivityLog", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Health.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Health.json index 855e8f5e..ce684d0d 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Health.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Health.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "11684176888132541038" + "templateHash": "3344189175288293027" } }, "parameters": { @@ -63,10 +63,10 @@ "value": "Deploy_activitylog_ServiceHealth_HealthAdvisory" }, "displayName": { - "value": "[DINE] Deploy Service Health Advisory Alert" + "value": "Deploy Service Health Advisory Alert" }, "description": { - "value": "DINE policy to Deploy Service Health Advisory Alert" + "value": "Policy to Deploy Service Health Advisory Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -74,8 +74,11 @@ "metadata": { "value": { "version": "1.1.0", - "Category": "ServiceHealth", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Monitoring", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Incident.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Incident.json index 33874c07..cbadd306 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Incident.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Incident.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "14611683723110854868" + "templateHash": "16559310708248188309" } }, "parameters": { @@ -63,10 +63,10 @@ "value": "Deploy_activitylog_ServiceHealth_Incident" }, "displayName": { - "value": "[DINE] Deploy Service Health Incident Alert" + "value": "Deploy Service Health Incident Alert" }, "description": { - "value": "DINE policy to Deploy Service Health Incident Alert" + "value": "Policy to Deploy Service Health Incident Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -74,8 +74,11 @@ "metadata": { "value": { "version": "1.1.0", - "Category": "ServiceHealth", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Monitoring", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Maintenance.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Maintenance.json index b3e5338c..1f154685 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Maintenance.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Maintenance.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "14923385052952862470" + "templateHash": "6883439045796674858" } }, "parameters": { @@ -63,10 +63,10 @@ "value": "Deploy_activitylog_ServiceHealth_Maintenance" }, "displayName": { - "value": "[DINE] Deploy Service Health Maintenance Alert" + "value": "Deploy Service Health Maintenance Alert" }, "description": { - "value": "DINE policy to Deploy Service Health Maintenance Alert" + "value": "Policy to Deploy Service Health Maintenance Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -74,8 +74,11 @@ "metadata": { "value": { "version": "1.1.0", - "Category": "ServiceHealth", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Monitoring", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Security.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Security.json index 24dba674..a83c8b03 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Security.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-ServiceHealth-Security.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "3619012435889055028" + "templateHash": "5164401344326076512" } }, "parameters": { @@ -63,10 +63,10 @@ "value": "Deploy_activitylog_ServiceHealth_SecurityAdvisory" }, "displayName": { - "value": "[DINE] Deploy Service Health Security Advisory Alert" + "value": "Deploy Service Health Security Advisory Alert" }, "description": { - "value": "DINE policy to Deploy Service Health Security Advisory Alert" + "value": "Policy to Deploy Service Health Security Advisory Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -74,8 +74,11 @@ "metadata": { "value": { "version": "1.1.0", - "Category": "ServiceHealth", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Monitoring", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-VPNGate-Del.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-VPNGate-Del.json index 37c6115a..8cf17982 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-VPNGate-Del.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-activitylog-VPNGate-Del.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "4117767070565028320" + "templateHash": "1202096420576363072" } }, "parameters": { @@ -59,10 +59,10 @@ "value": "Deploy_activitylog_VPNGateway_Delete" }, "displayName": { - "value": "[DINE] Deploy Activity Log VPN Gateway Delete Alert" + "value": "Deploy Activity Log VPN Gateway Delete Alert" }, "description": { - "value": "DINE policy to Deploy Activity Log VPN Gateway Delete Alert" + "value": "Policy to Deploy Activity Log VPN Gateway Delete Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -70,8 +70,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "ActivityLog", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-afw_firewallhealth_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-afw_firewallhealth_alert.json index 63553ef3..8d46034d 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-afw_firewallhealth_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-afw_firewallhealth_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "5375341642669589174" + "templateHash": "11575196466349696494" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_AFW_FirewallHealth_Alert" }, "displayName": { - "value": "[DINE] Deploy AFW FirewallHealth Alert" + "value": "Deploy AFW FirewallHealth Alert" }, "description": { - "value": "DINE policy to audit/deploy Azure Firewall FirewallHealth Alert" + "value": "Policy to audit/deploy Azure Firewall FirewallHealth Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-afw_snatportutilization_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-afw_snatportutilization_alert.json index c6ce2fb8..5c28c68f 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-afw_snatportutilization_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-afw_snatportutilization_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "12575628167575959399" + "templateHash": "16128968506991399796" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_AFW_SNATPortUtilization_Alert" }, "displayName": { - "value": "[DINE] Deploy AFW SNATPortUtilization Alert" + "value": "Deploy AFW SNATPortUtilization Alert" }, "description": { - "value": "DINE policy to audit/deploy Azure Firewall SNATPortUtilization Alert" + "value": "Policy to audit/deploy Azure Firewall SNATPortUtilization Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-alertprocessingrule-deploy.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-alertprocessingrule-deploy.json index 7931a1b6..96770fd9 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-alertprocessingrule-deploy.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-alertprocessingrule-deploy.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "18204728848498636672" + "templateHash": "17623310073268351807" } }, "parameters": { @@ -58,10 +58,10 @@ "value": "Deploy_AlertProcessing_Rule" }, "displayName": { - "value": "[DINE] Deploy Alert Processing Rule" + "value": "Deploy Alert Processing Rule" }, "description": { - "value": "DINE policy to Deploy Deploy Alert Processing Rule with Action Group" + "value": "Policy to Deploy Deploy Alert Processing Rule with Action Group" }, "location": { "value": "[parameters('policyLocation')]" @@ -69,8 +69,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Action Groups", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Monitoring", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_arpavailability_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_arpavailability_alert.json index 477431f0..2dc1728c 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_arpavailability_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_arpavailability_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "653825738987723913" + "templateHash": "5510605477654375903" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_ERCIR_ArpAvailability_Alert" }, "displayName": { - "value": "[DINE] Deploy ExpressRoute Circuits Arp Availability Alert" + "value": "Deploy ExpressRoute Circuits Arp Availability Alert" }, "description": { - "value": "DINE policy to audit/deploy ExpressRoute Circuits Arp Availability Alert" + "value": "Policy to audit/deploy ExpressRoute Circuits Arp Availability Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_bgpavailability_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_bgpavailability_alert.json index 37b383b4..c70d44dd 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_bgpavailability_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_bgpavailability_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "7668515258198171179" + "templateHash": "1336989902388020192" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_ERCIR_BgpAvailability_Alert" }, "displayName": { - "value": "[DINE] Deploy ExpressRoute Circuits Bgp Availability Alert" + "value": "Deploy ExpressRoute Circuits Bgp Availability Alert" }, "description": { - "value": "DINE policy to audit/deploy ExpressRoute Circuits Bgp Availability Alert" + "value": "Policy to audit/deploy ExpressRoute Circuits Bgp Availability Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_qosdropsbitsin_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_qosdropsbitsin_alert.json index fbc4e24b..425dd4b2 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_qosdropsbitsin_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_qosdropsbitsin_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "10419407489737946657" + "templateHash": "13497982035508453981" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_ERCIR_QosDropBitsInPerSecond_Alert" }, "displayName": { - "value": "[DINE] Deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert" + "value": "Deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert" }, "description": { - "value": "DINE policy to audit/deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert" + "value": "Policy to audit/deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_qosdropsbitsout_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_qosdropsbitsout_alert.json index 619a12c5..5413075b 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_qosdropsbitsout_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-ercir_qosdropsbitsout_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "7511479963758449473" + "templateHash": "17864868284562832070" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_ERCIR_QosDropBitsOutPerSecond_Alert" }, "displayName": { - "value": "[DINE] Deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert" + "value": "Deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert" }, "description": { - "value": "DINE policy to audit/deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert" + "value": "Policy to audit/deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_bitsinpersecond_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_bitsinpersecond_alert.json index 8e1b6bc5..6d6013db 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_bitsinpersecond_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_bitsinpersecond_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "8803221053084275476" + "templateHash": "16404599810031970366" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_ERGw_ExpressRouteBitsIn_Alert" }, "displayName": { - "value": "[DINE] Deploy ERG ExpressRoute Bits In Alert" + "value": "Deploy ERG ExpressRoute Bits In Alert" }, "description": { - "value": "DINE policy to audit/deploy ER Gateway Connection BitsInPerSecond Alert" + "value": "Policy to audit/deploy ER Gateway Connection BitsInPerSecond Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_bitsoutpersecond_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_bitsoutpersecond_alert.json index 725c981a..fde37eff 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_bitsoutpersecond_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_bitsoutpersecond_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "4125203915542515415" + "templateHash": "870622983800445366" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_ERGw_ExpressRouteBitsOut_Alert" }, "displayName": { - "value": "[DINE] Deploy ERG ExpressRoute Bits Out Alert" + "value": "Deploy ERG ExpressRoute Bits Out Alert" }, "description": { - "value": "DINE policy to audit/deploy ER Gateway Connection BitsOutPerSecond Alert" + "value": "Policy to audit/deploy ER Gateway Connection BitsOutPerSecond Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_expressroutecpuutilization_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_expressroutecpuutilization_alert.json index 412b1f63..5fab9172 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_expressroutecpuutilization_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-erg_expressroutecpuutilization_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "14128625548810679599" + "templateHash": "3212641091874345993" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_ERGw_ExpressRouteCpuUtil_Alert" }, "displayName": { - "value": "[DINE] Deploy ERG ExpressRoute CPU Utilization Alert" + "value": "Deploy ERG ExpressRoute CPU Utilization Alert" }, "description": { - "value": "DINE policy to audit/deploy ER Gateway Express Route CPU Utilization Alert" + "value": "Policy to audit/deploy ER Gateway Express Route CPU Utilization Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_availability_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_availability_alert.json index c6ae9fc4..0576a94c 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_availability_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_availability_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "15705320624834049430" + "templateHash": "6841664363586918485" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_KeyVault_Availability_Alert" }, "displayName": { - "value": "[DINE] Deploy KeyVault Availability Alert" + "value": "Deploy KeyVault Availability Alert" }, "description": { - "value": "DINE policy to audit/deploy KeyVault Availability Alert" + "value": "Policy to audit/deploy KeyVault Availability Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Key Vault", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Key Vault", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_capacity_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_capacity_alert.json index 6c3cc5e3..4b86e61e 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_capacity_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_capacity_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "7787317325161025467" + "templateHash": "5670644219169443024" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_KeyVault_Capacity_Alert" }, "displayName": { - "value": "[DINE] Deploy KeyVault Capacity Alert" + "value": "Deploy KeyVault Capacity Alert" }, "description": { - "value": "DINE policy to audit/deploy KeyVault Capacity Alert" + "value": "Policy to audit/deploy KeyVault Capacity Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Key Vault", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Key Vault", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_latency_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_latency_alert.json index 95fc17b3..0aa96c09 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_latency_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_latency_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "10537895535619620183" + "templateHash": "11091972873672210659" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_KeyVault_Latency_Alert" }, "displayName": { - "value": "[DINE] Deploy KeyVault Latency Alert" + "value": "Deploy KeyVault Latency Alert" }, "description": { - "value": "DINE policy to audit/deploy KeyVault Latency Alert" + "value": "Policy to audit/deploy KeyVault Latency Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Key Vault", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Key Vault", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_requests_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_requests_alert.json index bcc7b047..8dd9d343 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_requests_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-kv_requests_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "17247014419077749333" + "templateHash": "14081609055849567124" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_KeyVault_Requests_Alert" }, "displayName": { - "value": "[DINE] Deploy KeyVault Requests Alert" + "value": "Deploy KeyVault Requests Alert" }, "description": { - "value": "DINE policy to audit/deploy KeyVault Requests Alert" + "value": "Policy to audit/deploy KeyVault Requests Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Key Vault", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Key Vault", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_capacityutilization_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_capacityutilization_alert.json index 2e0fc5f1..2f492aaa 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_capacityutilization_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_capacityutilization_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "8842860062771844317" + "templateHash": "3797372558986694082" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_PDNSZ_CapacityUtil_Alert" }, "displayName": { - "value": "[DINE] Deploy PDNSZ Capacity Utilization Alert" + "value": "Deploy PDNSZ Capacity Utilization Alert" }, "description": { - "value": "DINE policy to audit/deploy Private DNS Zone Capacity Utilization Alert" + "value": "Policy to audit/deploy Private DNS Zone Capacity Utilization Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_queryvolume_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_queryvolume_alert.json index d31de9e9..7e98d2fa 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_queryvolume_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_queryvolume_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "3993037211742844897" + "templateHash": "6071380703303926740" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_PDNSZ_QueryVolume_Alert" }, "displayName": { - "value": "[DINE] Deploy PDNSZ Query Volume Alert" + "value": "Deploy PDNSZ Query Volume Alert" }, "description": { - "value": "DINE policy to audit/deploy Private DNS Zone Query Volume Alert" + "value": "Policy to audit/deploy Private DNS Zone Query Volume Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_recordsetcapacity_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_recordsetcapacity_alert.json index d6b79236..deb02628 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_recordsetcapacity_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_recordsetcapacity_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "5271402545725696957" + "templateHash": "12440660544177209622" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_PDNSZ_RecordSetCapacity_Alert" }, "displayName": { - "value": "[DINE] Deploy PDNSZ Record Set Capacity Alert" + "value": "Deploy PDNSZ Record Set Capacity Alert" }, "description": { - "value": "DINE policy to audit/deploy Private DNS Zone Record Set Capacity Alert" + "value": "Policy to audit/deploy Private DNS Zone Record Set Capacity Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_registrationcapacityutilization_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_registrationcapacityutilization_alert.json index cea42e68..001d50e8 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_registrationcapacityutilization_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pdnsz_registrationcapacityutilization_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "8955853636180083361" + "templateHash": "16618483809757690580" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_DNSZ_RegistrationCapacityUtil_Alert" }, "displayName": { - "value": "[DINE] Deploy PDNSZ Registration Capacity Utilization Alert" + "value": "Deploy PDNSZ Registration Capacity Utilization Alert" }, "description": { - "value": "DINE policy to audit/deploy Private DNS Zone Registration Capacity Utilization Alert" + "value": "Policy to audit/deploy Private DNS Zone Registration Capacity Utilization Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_bytesinddosattack_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_bytesinddosattack_alert.json index 89f61d00..c0efb754 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_bytesinddosattack_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_bytesinddosattack_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "11674369398138113559" + "templateHash": "14742351668612996090" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_PublicIp_BytesInDDoSAttack_Alert" }, "displayName": { - "value": "[DINE] Deploy PIP Bytes in DDoS Attack Alert" + "value": "Deploy PIP Bytes in DDoS Attack Alert" }, "description": { - "value": "DINE policy to audit/deploy PIP Bytes in DDoS Attack Alert" + "value": "Policy to audit/deploy PIP Bytes in DDoS Attack Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_ddosattack_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_ddosattack_alert.json index cc6c692a..76e798c4 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_ddosattack_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_ddosattack_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "12303474435987643202" + "templateHash": "9931765289546790055" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_PublicIp_DDoSAttack_Alert" }, "displayName": { - "value": "[DINE] Deploy PIP DDoS Attack Alert" + "value": "Deploy PIP DDoS Attack Alert" }, "description": { - "value": "DINE policy to audit/deploy PIP DDoS Attack Alert" + "value": "Policy to audit/deploy PIP DDoS Attack Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_packetsinddos_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_packetsinddos_alert.json index 603baff0..94d070a2 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_packetsinddos_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_packetsinddos_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "12771264887664020431" + "templateHash": "16567608975537833346" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_PublicIp_PacketsInDDoSAttack_Alert" }, "displayName": { - "value": "[DINE] Deploy PIP Packets in DDoS Attack Alert" + "value": "Deploy PIP Packets in DDoS Attack Alert" }, "description": { - "value": "DINE policy to audit/deploy PIP Packets in DDoS Attack Alert" + "value": "Policy to audit/deploy PIP Packets in DDoS Attack Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_vipavailability_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_vipavailability_alert.json index c203703d..547d2a3e 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_vipavailability_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-pip_vipavailability_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "4686930427581364846" + "templateHash": "15325967208635178828" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_PublicIp_VIPAvailability_Alert" }, "displayName": { - "value": "[DINE] Deploy PIP VIP Availability Alert" + "value": "Deploy PIP VIP Availability Alert" }, "description": { - "value": "DINE policy to audit/deploy PIP VIP Availability Alert" + "value": "Policy to audit/deploy PIP VIP Availability Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-rv_backuphealth_monitor.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-rv_backuphealth_monitor.json index df20cc2e..ffc12f8b 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-rv_backuphealth_monitor.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-rv_backuphealth_monitor.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "17553517153453977468" + "templateHash": "1605909313855208461" } }, "parameters": { @@ -49,10 +49,10 @@ "value": "Deploy_RecoveryVault_BackupHealthMonitor_Alert" }, "displayName": { - "value": "[Modify] Deploy RV Backup Health Monitoring Alerts" + "value": "Deploy RV Backup Health Monitoring Alerts" }, "description": { - "value": "Modify policy to audit/update Recovery Vault Backup Health Alerting to Azure monitor alerts" + "value": "Policy to audit/update Recovery Vault Backup Health Alerting to Azure monitor alerts" }, "location": { "value": "[parameters('policyLocation')]" @@ -61,7 +61,10 @@ "value": { "version": "1.0.0", "category": "Site Recovery", - "source": "https://github.com/Azure/ALZ-Monitor/", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-sa_availability_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-sa_availability_alert.json index 58adc71a..c0d0a784 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-sa_availability_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-sa_availability_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "15917042919613111234" + "templateHash": "12127479696510949243" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_StorageAccount_Availability_Alert" }, "displayName": { - "value": "[DINE] Deploy SA Availability Alert" + "value": "Deploy SA Availability Alert" }, "description": { - "value": "DINE policy to audit/deploy SA Availability Alert" + "value": "Policy to audit/deploy SA Availability Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Storage", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Storage", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-HeartBeatAlertRG.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-HeartBeatAlertRG.json index b60385dd..092c6b26 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-HeartBeatAlertRG.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-HeartBeatAlertRG.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "1643848077140468208" + "templateHash": "9123433148498622414" } }, "parameters": { @@ -122,13 +122,13 @@ "mode": "Incremental", "parameters": { "name": { - "value": "Deploy_VM_HeartBeat_Alert" + "value": "Deploy_VM_HeartBeat_Alert_RG" }, "displayName": { - "value": "[DINE] Deploy VM HeartBeat Alert" + "value": "Deploy VM HeartBeat Alert" }, "description": { - "value": "DINE policy to audit/deploy VM HeartBeat Alert" + "value": "Policy to audit/deploy VM HeartBeat Alert for VMs in the resource group" }, "location": { "value": "[parameters('policyLocation')]" @@ -136,8 +136,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-HeartBeat_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-HeartBeat_alert.json index 71e23f7f..c32b1038 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-HeartBeat_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-HeartBeat_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "5534685381430040589" + "templateHash": "16342328880925321625" } }, "parameters": { @@ -143,10 +143,10 @@ "value": "Deploy_VM_HeartBeat_Alert" }, "displayName": { - "value": "[DINE] Deploy VM HeartBeat Alert" + "value": "Deploy VM HeartBeat Alert" }, "description": { - "value": "DINE policy to audit/deploy VM HeartBeat Alert" + "value": "Policy to audit/deploy VM HeartBeat Alert for all VMs in the subscription" }, "location": { "value": "[parameters('policyLocation')]" @@ -154,8 +154,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-NetworkIn_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-NetworkIn_alert.json index 32d86ff4..888e7261 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-NetworkIn_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-NetworkIn_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "7172994298274618614" + "templateHash": "1326376935729573273" } }, "parameters": { @@ -155,10 +155,10 @@ "value": "Deploy_VM_NetworkIn_Alert" }, "displayName": { - "value": "[DINE] Deploy VM Network Read Alert" + "value": "Deploy VM Network Read Alert" }, "description": { - "value": "DINE policy to audit/deploy VM Nework Read Alert" + "value": "Policy to audit/deploy VM Nework Read Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -166,8 +166,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-NetworkOut_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-NetworkOut_alert.json index 40e58133..3bfaaf98 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-NetworkOut_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-NetworkOut_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "12870504941924926407" + "templateHash": "5976337806276189108" } }, "parameters": { @@ -155,10 +155,10 @@ "value": "Deploy_VM_NetworkOut_Alert" }, "displayName": { - "value": "[DINE] Deploy VM Network Write Alert" + "value": "Deploy VM Network Write Alert" }, "description": { - "value": "DINE policy to audit/deploy VM Network Out Alert" + "value": "Policy to audit/deploy VM Network Out Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -166,8 +166,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskSpace_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskSpace_alert.json index 589ee5fe..7f848e47 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskSpace_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskSpace_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "7935337383156400612" + "templateHash": "17700957092328120282" } }, "parameters": { @@ -156,10 +156,10 @@ "value": "Deploy_VM_OSDiskSpace_Alert" }, "displayName": { - "value": "[DINE] Deploy VM OS Disk Space Alert" + "value": "Deploy VM OS Disk Space Alert" }, "description": { - "value": "DINE policy to audit/deploy VM OSDiskSpace Alert" + "value": "Policy to audit/deploy VM OSDiskSpace Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -167,8 +167,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskreadLatency_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskreadLatency_alert.json index 66ca4214..b7003cf6 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskreadLatency_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskreadLatency_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "6485517053533813338" + "templateHash": "6435004879848379786" } }, "parameters": { @@ -156,10 +156,10 @@ "value": "Deploy_VM_OSDiskreadLatency_Alert" }, "displayName": { - "value": "[DINE] Deploy VM OS Disk Read Latency Alert" + "value": "Deploy VM OS Disk Read Latency Alert" }, "description": { - "value": "DINE policy to audit/deploy VM OSDiskreadLatency Alert" + "value": "Policy to audit/deploy VM OSDiskreadLatency Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -167,8 +167,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskwriteLatency_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskwriteLatency_alert.json index fd1f2e97..c538975d 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskwriteLatency_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-OSDiskwriteLatency_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "13490118861353492395" + "templateHash": "11928419035581420544" } }, "parameters": { @@ -156,10 +156,10 @@ "value": "Deploy_VM_OSDiskwriteLatency_Alert" }, "displayName": { - "value": "[DINE] Deploy VM OS Disk Write Latency Alert" + "value": "Deploy VM OS Disk Write Latency Alert" }, "description": { - "value": "DINE policy to audit/deploy VM OSDiskwriteLatency Alert" + "value": "Policy to audit/deploy VM OSDiskwriteLatency Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -167,8 +167,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-PercentCPU_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-PercentCPU_alert.json index 46acc347..b1aea29f 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-PercentCPU_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-PercentCPU_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "12141543710223715197" + "templateHash": "16337137189320378886" } }, "parameters": { @@ -139,10 +139,10 @@ "value": "Deploy_VM_CPU_Alert" }, "displayName": { - "value": "[DINE] Deploy VM CPU Alert" + "value": "Deploy VM CPU Alert" }, "description": { - "value": "DINE policy to audit/deploy VM CPU Alert" + "value": "Policy to audit/deploy VM CPU Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -150,8 +150,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-PercentMemory_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-PercentMemory_alert.json index 42f35816..b2118514 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-PercentMemory_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-PercentMemory_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "5186162708937463257" + "templateHash": "12143457885854465624" } }, "parameters": { @@ -143,10 +143,10 @@ "value": "Deploy_VM_Memory_Alert" }, "displayName": { - "value": "[DINE] Deploy VM Memory Alert" + "value": "Deploy VM Memory Alert" }, "description": { - "value": "DINE policy to audit/deploy VM Memory Alert" + "value": "Policy to audit/deploy VM Memory Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -154,8 +154,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskSpace_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskSpace_alert.json index e5f4edef..fa68a964 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskSpace_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskSpace_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "9112272635020271807" + "templateHash": "16874968637233084625" } }, "parameters": { @@ -149,10 +149,10 @@ "value": "Deploy_VM_dataDiskSpace_Alert" }, "displayName": { - "value": "[DINE] Deploy VM Data Disk Space Alert" + "value": "Deploy VM Data Disk Space Alert" }, "description": { - "value": "DINE policy to audit/deploy VM data Disk Space Alert" + "value": "Policy to audit/deploy VM data Disk Space Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -160,8 +160,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskreadLatency_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskreadLatency_alert.json index 7dfffc47..be4b6896 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskreadLatency_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskreadLatency_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "13483516898255167838" + "templateHash": "13130507035808878065" } }, "parameters": { @@ -155,10 +155,10 @@ "value": "Deploy_VM_dataDiskReadLatency_Alert" }, "displayName": { - "value": "[DINE] Deploy VM Data Disk Read Latency Alert" + "value": "Deploy VM Data Disk Read Latency Alert" }, "description": { - "value": "DINE policy to audit/deploy VM dataDiskReadLatency Alert" + "value": "Policy to audit/deploy VM dataDiskReadLatency Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -166,8 +166,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskwriteLatency_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskwriteLatency_alert.json index 84605c94..2734a742 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskwriteLatency_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm-dataDiskwriteLatency_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "16957036650420035757" + "templateHash": "16342623791016902781" } }, "parameters": { @@ -155,10 +155,10 @@ "value": "Deploy_VM_dataDiskWriteLatency_Alert" }, "displayName": { - "value": "[DINE] Deploy VM Data Disk Write Latency Alert" + "value": "Deploy VM Data Disk Write Latency Alert" }, "description": { - "value": "DINE policy to audit/deploy VM dataDiskWriteLatency Alert" + "value": "Policy to audit/deploy VM dataDiskWriteLatency Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -166,8 +166,11 @@ "metadata": { "value": { "version": "1.0.0", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/" + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ] } }, "parameters": { diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm_availablememory_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm_availablememory_alert.json index 2313738f..74fe959c 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm_availablememory_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vm_availablememory_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "803717915349124162" + "templateHash": "6654224273798570933" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VM_AvailableMemory_Alert" }, "displayName": { - "value": "[DINE] Deploy VM Available Memory Alert" + "value": "Deploy VM Available Memory Alert" }, "description": { - "value": "DINE policy to audit/deploy VM Available Memory Alert" + "value": "Policy to audit/deploy VM Available Memory Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Compute", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Compute", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnet_ddosattack_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnet_ddosattack_alert.json index a1873002..8ac3e2a6 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnet_ddosattack_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnet_ddosattack_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "4556220846987138597" + "templateHash": "854313296266658718" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VNET_DDoSAttack_Alert" }, "displayName": { - "value": "[DINE] Deploy VNet DDoS Attack Alert" + "value": "Deploy VNet DDoS Attack Alert" }, "description": { - "value": "DINE policy to audit/deploy Virtual Network DDoS Attack Alert" + "value": "Policy to audit/deploy Virtual Network DDoS Attack Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_bandwidthutilization_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_bandwidthutilization_alert.json index a6d36691..2d0aeee9 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_bandwidthutilization_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_bandwidthutilization_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "9113389710213874982" + "templateHash": "15750527108575097887" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VnetGw_TunnelBandwidth_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG Tunnel Bandwidth Alert" + "value": "Deploy VNetG Tunnel Bandwidth Alert" }, "description": { - "value": "DINE policy to audit/deploy Virtual Network Gateway Tunnel Bandwidth Alert" + "value": "Policy to audit/deploy Virtual Network Gateway Tunnel Bandwidth Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egress_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egress_alert.json index 66963a0d..bcc8bf8a 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egress_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egress_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "39175021553566766" + "templateHash": "5828698848062202574" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VnetGw_TunnelEgress_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG Tunnel Egress Alert" + "value": "Deploy VNetG Tunnel Egress Alert" }, "description": { - "value": "DINE policy to audit/deploy Virtual Network Gateway Tunnel Egress Alert" + "value": "Policy to audit/deploy Virtual Network Gateway Tunnel Egress Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egresspacketdropcount_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egresspacketdropcount_alert.json index c0ff4f04..c9e8ecbb 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egresspacketdropcount_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egresspacketdropcount_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "1354005495857300108" + "templateHash": "6209419574587881408" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_VnetGw_TunnelEgressPacketDropCount_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG Egress Packet Drop Count Alert" + "value": "Deploy VNetG Egress Packet Drop Count Alert" }, "description": { - "value": "DINE policy to audit/deploy Vnet Gateway Egress Packet Drop Count Alert" + "value": "Policy to audit/deploy Vnet Gateway Egress Packet Drop Count Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egresspacketdropmismatch_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egresspacketdropmismatch_alert.json index 69a5e846..f6118531 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egresspacketdropmismatch_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_egresspacketdropmismatch_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "2428355330992173755" + "templateHash": "9753328092873089870" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_VnetGw_TunnelEgressPacketDropMismatch_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG Egress Packet Drop Mismatch Alert" + "value": "Deploy VNetG Egress Packet Drop Mismatch Alert" }, "description": { - "value": "DINE policy to audit/deploy Vnet Gateway Egress Packet Drop Mismatch Alert" + "value": "Policy to audit/deploy Vnet Gateway Egress Packet Drop Mismatch Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_expressroutebitspersecond_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_expressroutebitspersecond_alert.json index 64b51870..c464f1cd 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_expressroutebitspersecond_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_expressroutebitspersecond_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "3752725591591996590" + "templateHash": "15267159029513091568" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VnetGw_ExpressRouteBitsPerSecond_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG ExpressRoute Bits Per Second Alert" + "value": "Deploy VNetG ExpressRoute Bits Per Second Alert" }, "description": { - "value": "DINE policy to audit/deploy Virtual Network Gateway Express Route Bits Per Second Alert" + "value": "Policy to audit/deploy Virtual Network Gateway Express Route Bits Per Second Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_expressroutecpuutilization_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_expressroutecpuutilization_alert.json index fdc56aaa..825e775f 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_expressroutecpuutilization_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_expressroutecpuutilization_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "10520586559859884867" + "templateHash": "17568484010798329655" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VnetGw_ExpressRouteCpuUtil_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG ExpressRoute CPU Utilization Alert" + "value": "Deploy VNetG ExpressRoute CPU Utilization Alert" }, "description": { - "value": "DINE policy to audit/deploy Virtual Network Gateway Express Route CPU Utilization Alert" + "value": "Policy to audit/deploy Virtual Network Gateway Express Route CPU Utilization Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingress_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingress_alert.json index 7557a9f2..e02d8beb 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingress_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingress_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "487310692824811179" + "templateHash": "2531365957748107656" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VnetGw_TunnelIngress_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG Tunnel Ingress Alert" + "value": "Deploy VNetG Tunnel Ingress Alert" }, "description": { - "value": "DINE policy to audit/deploy Virtual Network Gateway Tunnel Ingress Alert" + "value": "Policy to audit/deploy Virtual Network Gateway Tunnel Ingress Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingresspacketdropcount_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingresspacketdropcount_alert.json index 54d90f56..ee0ee661 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingresspacketdropcount_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingresspacketdropcount_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "10650039684071971978" + "templateHash": "13832085397929424049" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_VnetGw_TunnelIngressPacketDropCount_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG Ingress Packet Drop Count Alert" + "value": "Deploy VNetG Ingress Packet Drop Count Alert" }, "description": { - "value": "DINE policy to audit/deploy Vnet Gateway Ingress Packet Drop Count Alert" + "value": "Policy to audit/deploy Vnet Gateway Ingress Packet Drop Count Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingresspacketdropmismatch_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingresspacketdropmismatch_alert.json index f3cc02fc..eeec78a8 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingresspacketdropmismatch_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vnetg_ingresspacketdropmismatch_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "1301625475642041789" + "templateHash": "12455891204072683697" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_VnetGw_TunnelIngressPacketDropMismatch_Alert" }, "displayName": { - "value": "[DINE] Deploy VNetG Ingress Packet Drop Mismatch Alert" + "value": "Deploy VNetG Ingress Packet Drop Mismatch Alert" }, "description": { - "value": "DINE policy to audit/deploy Vnet Gateway Ingress Packet Drop Mismatch Alert" + "value": "Policy to audit/deploy Vnet Gateway Ingress Packet Drop Mismatch Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_bandwidthutilization_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_bandwidthutilization_alert.json index 85c1cff9..5115f1be 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_bandwidthutilization_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_bandwidthutilization_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "5841695221562930337" + "templateHash": "795287145027682976" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VPNGw_BandwidthUtil_Alert" }, "displayName": { - "value": "[DINE] Deploy VPNG Bandwidth Utilization Alert" + "value": "Deploy VPNG Bandwidth Utilization Alert" }, "description": { - "value": "DINE policy to audit/deploy VPN Gateway Bandwidth Utilization Alert" + "value": "Policy to audit/deploy VPN Gateway Bandwidth Utilization Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_bgppeerstatus_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_bgppeerstatus_alert.json index d141c86e..2f7a8e45 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_bgppeerstatus_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_bgppeerstatus_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "13986025773137764049" + "templateHash": "1683508049019411966" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VPNGw_BGPPeerStatus_Alert" }, "displayName": { - "value": "[DINE] Deploy VPNG BGP Peer Status Alert" + "value": "Deploy VPNG BGP Peer Status Alert" }, "description": { - "value": "DINE policy to audit/deploy VPN Gateway BGP Peer Status Alert" + "value": "Policy to audit/deploy VPN Gateway BGP Peer Status Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egress_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egress_alert.json index 04da1f64..84266691 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egress_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egress_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "13020497596852273781" + "templateHash": "8275850919251760091" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VPNGw_Egress_Alert" }, "displayName": { - "value": "[DINE] Deploy VPNG Egress Alert" + "value": "Deploy VPNG Egress Alert" }, "description": { - "value": "DINE policy to audit/deploy VPN Gateway Egress Alert" + "value": "Policy to audit/deploy VPN Gateway Egress Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egresspacketdropcount_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egresspacketdropcount_alert.json index 5f8862b9..ad45bf5e 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egresspacketdropcount_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egresspacketdropcount_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "7489343147021481236" + "templateHash": "15776080224895651966" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_VPNGw_TunnelEgressPacketDropCount_Alert" }, "displayName": { - "value": "[DINE] Deploy VPNG Egress Packet Drop Count Alert" + "value": "Deploy VPNG Egress Packet Drop Count Alert" }, "description": { - "value": "DINE policy to audit/deploy VPN Gateway Egress Packet Drop Count Alert" + "value": "Policy to audit/deploy VPN Gateway Egress Packet Drop Count Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egresspacketdropmismatch_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egresspacketdropmismatch_alert.json index ba6f85d6..28ca2f4e 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egresspacketdropmismatch_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_egresspacketdropmismatch_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "746150770472322408" + "templateHash": "2957571033106700606" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_VPNGw_TunnelEgressPacketDropMismatch_Alert" }, "displayName": { - "value": "[DINE] Deploy VPNG Egress Packet Drop Mismatch Alert" + "value": "Deploy VPNG Egress Packet Drop Mismatch Alert" }, "description": { - "value": "DINE policy to audit/deploy VPN Gateway Egress Packet Drop Mismatch Alert" + "value": "Policy to audit/deploy VPN Gateway Egress Packet Drop Mismatch Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingress_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingress_alert.json index 2c9974bf..18fdc4fe 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingress_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingress_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "1547297284221681984" + "templateHash": "9028697440196258798" } }, "parameters": { @@ -96,10 +96,10 @@ "value": "Deploy_VPNGw_Ingress_Alert" }, "displayName": { - "value": "[DINE] Deploy VPNG Ingress Alert" + "value": "Deploy VPNG Ingress Alert" }, "description": { - "value": "DINE policy to audit/deploy VPN Gateway Ingress Alert" + "value": "Policy to audit/deploy VPN Gateway Ingress Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -107,8 +107,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingresspacketdropcount_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingresspacketdropcount_alert.json index 5b06e96d..9c8f40aa 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingresspacketdropcount_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingresspacketdropcount_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "16583725853676428856" + "templateHash": "48929959439271964" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_VPNGw_TunnelIngressPacketDropCount_Alert" }, "displayName": { - "value": "[DINE] Deploy VPNG Ingress Packet Drop Count Alert" + "value": "Deploy VPNG Ingress Packet Drop Count Alert" }, "description": { - "value": "DINE policy to audit/deploy VPN Gateway Ingress Packet Drop Count Alert" + "value": "Policy to audit/deploy VPN Gateway Ingress Packet Drop Count Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } }, diff --git a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingresspacketdropmismatch_alert.json b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingresspacketdropmismatch_alert.json index ee2b3e0e..5d486fbc 100644 --- a/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingresspacketdropmismatch_alert.json +++ b/src/resources/Microsoft.Authorization/policyDefinitions/deploy-vpng_ingresspacketdropmismatch_alert.json @@ -5,7 +5,7 @@ "_generator": { "name": "bicep", "version": "0.18.4.5664", - "templateHash": "16095832015266920982" + "templateHash": "8866428421186164437" } }, "parameters": { @@ -92,10 +92,10 @@ "value": "Deploy_VPNGw_TunnelIngressPacketDropMismatch_Alert" }, "displayName": { - "value": "[DINE] Deploy VPNG Ingress Packet Drop Mismatch Alert" + "value": "Deploy VPNG Ingress Packet Drop Mismatch Alert" }, "description": { - "value": "DINE policy to audit/deploy VPN Gateway Ingress Packet Drop Mismatch Alert" + "value": "Policy to audit/deploy VPN Gateway Ingress Packet Drop Mismatch Alert" }, "location": { "value": "[parameters('policyLocation')]" @@ -103,8 +103,11 @@ "metadata": { "value": { "version": "1.0.1", - "Category": "Networking", - "source": "https://github.com/Azure/ALZ-Monitor/", + "category": "Network", + "source": "https://github.com/Azure/Enterprise-Scale/", + "alzCloudEnvironments": [ + "AzureCloud" + ], "_deployed_by_alz_monitor": "True" } },