Skip to content

Commit d12406a

Browse files
committed
adding terraform v0.15 support
1 parent a571c1d commit d12406a

File tree

10 files changed

+32
-32
lines changed

10 files changed

+32
-32
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,12 @@ module "mssql-server" {
4949
# To turn off set enable_sql_server_extended_auditing_policy to `false`
5050
# DB extended auditing policy defaults to `false`.
5151
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
52-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
52+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
5353
enable_threat_detection_policy = true
5454
log_retention_days = 30
5555
5656
# schedule scan notifications to the subscription administrators
57-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
57+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
5858
enable_vulnerability_assessment = false
5959
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
6060

examples/README.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -30,12 +30,12 @@ module "mssql-server" {
3030
# To turn off set enable_sql_server_extended_auditing_policy to `false`
3131
# DB extended auditing policy defaults to `false`.
3232
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
33-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
33+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
3434
enable_threat_detection_policy = true
3535
log_retention_days = 30
3636
3737
# schedule scan notifications to the subscription administrators
38-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
38+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
3939
enable_vulnerability_assessment = false
4040
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
4141
@@ -105,13 +105,13 @@ module "mssql-server" {
105105
# To turn off set enable_sql_server_extended_auditing_policy to `false`
106106
# DB extended auditing policy defaults to `false`.
107107
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
108-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
108+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
109109
enable_threat_detection_policy = true
110110
log_retention_days = 30
111111
112112
# schedule scan notifications to the subscription administrators
113-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
114-
enable_vulnerability_assessment = true
113+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
114+
enable_vulnerability_assessment = false
115115
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
116116
117117
# enabling the Private Endpoints for Sql servers
@@ -181,12 +181,12 @@ module "mssql-server" {
181181
# To turn off set enable_sql_server_extended_auditing_policy to `false`
182182
# DB extended auditing policy defaults to `false`.
183183
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
184-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
184+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
185185
enable_threat_detection_policy = true
186186
log_retention_days = 30
187187
188188
# schedule scan notifications to the subscription administrators
189-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
189+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
190190
enable_vulnerability_assessment = false
191191
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
192192
@@ -260,13 +260,13 @@ module "mssql-server" {
260260
# To turn off set enable_sql_server_extended_auditing_policy to `false`
261261
# DB extended auditing policy defaults to `false`.
262262
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
263-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
263+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
264264
enable_threat_detection_policy = true
265265
log_retention_days = 30
266266
267267
# schedule scan notifications to the subscription administrators
268-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
269-
enable_vulnerability_assessment = true
268+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
269+
enable_vulnerability_assessment = false
270270
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
271271
272272
# Sql failover group creation. required secondary locaiton input.

examples/SQL_DB_Using_Geo-replication_with_Auto-Failover_Groups/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,12 @@ module "mssql-server" {
2727
# To turn off set enable_sql_server_extended_auditing_policy to `false`
2828
# DB extended auditing policy defaults to `false`.
2929
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
30-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
30+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
3131
enable_threat_detection_policy = true
3232
log_retention_days = 30
3333
3434
# schedule scan notifications to the subscription administrators
35-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
35+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
3636
enable_vulnerability_assessment = false
3737
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
3838

examples/SQL_DB_Using_Geo-replication_with_Auto-Failover_Groups/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,12 @@ module "mssql-server" {
2020
# To turn off set enable_sql_server_extended_auditing_policy to `false`
2121
# DB extended auditing policy defaults to `false`.
2222
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
23-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
23+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
2424
enable_threat_detection_policy = true
2525
log_retention_days = 30
2626

2727
# schedule scan notifications to the subscription administrators
28-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
28+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
2929
enable_vulnerability_assessment = false
3030
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
3131

examples/SQL_DB_Using_Geo-replication_with_Auto-Failover_Groups_and_Private_Endpoints/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,13 @@ module "mssql-server" {
2929
# To turn off set enable_sql_server_extended_auditing_policy to `false`
3030
# DB extended auditing policy defaults to `false`.
3131
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
32-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
32+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
3333
enable_threat_detection_policy = true
3434
log_retention_days = 30
3535
3636
# schedule scan notifications to the subscription administrators
37-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
38-
enable_vulnerability_assessment = true
37+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
38+
enable_vulnerability_assessment = false
3939
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
4040
4141
# Sql failover group creation. required secondary locaiton input.

examples/SQL_DB_Using_Geo-replication_with_Auto-Failover_Groups_and_Private_Endpoints/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,13 @@ module "mssql-server" {
2222
# To turn off set enable_sql_server_extended_auditing_policy to `false`
2323
# DB extended auditing policy defaults to `false`.
2424
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
25-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
25+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
2626
enable_threat_detection_policy = true
2727
log_retention_days = 30
2828

2929
# schedule scan notifications to the subscription administrators
30-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
31-
enable_vulnerability_assessment = true
30+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
31+
enable_vulnerability_assessment = false
3232
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
3333

3434
# Sql failover group creation. required secondary locaiton input.

examples/Simple_SQL_Single_Database_Using_Private_Endpoint/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,13 @@ module "mssql-server" {
2929
# To turn off set enable_sql_server_extended_auditing_policy to `false`
3030
# DB extended auditing policy defaults to `false`.
3131
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
32-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
32+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
3333
enable_threat_detection_policy = true
3434
log_retention_days = 30
3535
3636
# schedule scan notifications to the subscription administrators
37-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
38-
enable_vulnerability_assessment = true
37+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
38+
enable_vulnerability_assessment = false
3939
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
4040
4141
# enabling the Private Endpoints for Sql servers

examples/Simple_SQL_Single_Database_Using_Private_Endpoint/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,13 @@ module "mssql-server" {
2222
# To turn off set enable_sql_server_extended_auditing_policy to `false`
2323
# DB extended auditing policy defaults to `false`.
2424
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
25-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
25+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
2626
enable_threat_detection_policy = true
2727
log_retention_days = 30
2828

2929
# schedule scan notifications to the subscription administrators
30-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
31-
enable_vulnerability_assessment = true
30+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
31+
enable_vulnerability_assessment = false
3232
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
3333

3434
# enabling the Private Endpoints for Sql servers

examples/Simple_SQL_Single_Database_creation/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,12 @@ module "mssql-server" {
2828
# To turn off set enable_sql_server_extended_auditing_policy to `false`
2929
# DB extended auditing policy defaults to `false`.
3030
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
31-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
31+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
3232
enable_threat_detection_policy = true
3333
log_retention_days = 30
3434
3535
# schedule scan notifications to the subscription administrators
36-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
36+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
3737
enable_vulnerability_assessment = false
3838
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
3939

examples/Simple_SQL_Single_Database_creation/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,12 @@ module "mssql-server" {
2020
# To turn off set enable_sql_server_extended_auditing_policy to `false`
2121
# DB extended auditing policy defaults to `false`.
2222
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
23-
# To enable Azure Defender for Azure SQL database servers set `enable_threat_detection_policy` to true
23+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
2424
enable_threat_detection_policy = true
2525
log_retention_days = 30
2626

2727
# schedule scan notifications to the subscription administrators
28-
# Manages the Vulnerability Assessment for a MS SQL Server set `enable_vulnerability_assessment` to `true`
28+
# Manage Vulnerability Assessment set `enable_vulnerability_assessment` to `true`
2929
enable_vulnerability_assessment = false
3030
sql_admin_email_addresses = ["[email protected]", "[email protected]"]
3131

0 commit comments

Comments
 (0)