Skip to content

Commit fca7381

Browse files
committed
Update Help Files
1 parent 24bd7f3 commit fca7381

File tree

4 files changed

+34
-34
lines changed

4 files changed

+34
-34
lines changed

src/Sql/Sql/help/Get-AzSqlDatabaseAuditing.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -78,16 +78,16 @@ PredicateExpression : statement <> 'select 1'
7878
### Example 3: Get the event hub auditing settings of an Azure SQL database
7979
```
8080
PS C:\>Get-AzSqlDatabaseAuditing -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -EventHub
81-
DatabaseName : database01
82-
AuditAction : {}
83-
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
84-
BATCH_COMPLETED_GROUP, ...}
85-
ResourceGroupName : resourcegroup01
86-
ServerName : server01
87-
AuditState : Enabled
88-
EventHubName : eventHubName
89-
EventHubAuthorizationRuleId : eventHubAuthorizationRuleId
90-
PredicateExpression : statement <> 'select 1'
81+
DatabaseName : database01
82+
AuditAction : {}
83+
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
84+
BATCH_COMPLETED_GROUP, ...}
85+
ResourceGroupName : resourcegroup01
86+
ServerName : server01
87+
AuditState : Enabled
88+
EventHubName : eventHubName
89+
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
90+
PredicateExpression : statement <> 'select 1'
9191
```
9292

9393
### Example 4: Get the log analytics auditing settings of an Azure SQL database
@@ -101,7 +101,7 @@ ResourceGroupName : resourcegroup01
101101
ServerName : server01
102102
AuditState : Enabled
103103
PredicateExpression : statement <> 'select 1'
104-
WorkspaceId : workSpaceId
104+
WorkspaceResourceId : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
105105
```
106106

107107
## PARAMETERS

src/Sql/Sql/help/Get-AzSqlServerAuditing.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -71,14 +71,14 @@ PredicateExpression : statement <> 'select 1'
7171
### Example 3: Get the event hub auditing settings of an Azure SQL server
7272
```
7373
PS C:\>Get-AzSqlServerAuditing -ResourceGroupName "resourcegroup01" -ServerName "server01" -EventHub
74-
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
75-
BATCH_COMPLETED_GROUP, ...}
76-
ResourceGroupName : resourcegroup01
77-
ServerName : server01
78-
AuditState : Enabled
79-
PredicateExpression : statement <> 'select 1'
80-
EventHubName : eventHubName
81-
EventHubAuthorizationRuleId : eventHubAuthorizationRuleId
74+
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
75+
BATCH_COMPLETED_GROUP, ...}
76+
ResourceGroupName : resourcegroup01
77+
ServerName : server01
78+
AuditState : Enabled
79+
PredicateExpression : statement <> 'select 1'
80+
EventHubName : eventHubName
81+
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
8282
```
8383

8484
### Example 4: Get the log analytics auditing settings of an Azure SQL server
@@ -90,7 +90,7 @@ ResourceGroupName : resourcegroup01
9090
ServerName : server01
9191
AuditState : Enabled
9292
PredicateExpression : statement <> 'select 1'
93-
WorkspaceId : workSpaceId
93+
WorkspaceResourceId : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
9494
```
9595

9696
## PARAMETERS

src/Sql/Sql/help/Set-AzSqlDatabaseAuditing.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,15 @@ Set-AzSqlDatabaseAuditing -State <String> [-PassThru] [-AuditActionGroup <AuditA
3535
```
3636
Set-AzSqlDatabaseAuditing -State <String> [-PassThru] [-AuditActionGroup <AuditActionGroups[]>]
3737
[-AuditAction <String[]>] [-PredicateExpression <String>] [-EventHubName <String>]
38-
[-EventHubAuthorizationRuleId <String>] [-AsJob] [-EventHub] [-ServerName] <String> [-DatabaseName] <String>
38+
[-EventHubAuthorizationRuleResourceId <String>] [-AsJob] [-EventHub] [-ServerName] <String> [-DatabaseName] <String>
3939
[-ResourceGroupName] <String> [-DefaultProfile <IAzureContextContainer>] [-WhatIf] [-Confirm]
4040
[<CommonParameters>]
4141
```
4242

4343
### LogAnalyticsSet
4444
```
4545
Set-AzSqlDatabaseAuditing -State <String> [-PassThru] [-AuditActionGroup <AuditActionGroups[]>]
46-
[-AuditAction <String[]>] [-PredicateExpression <String>] [-WorkspaceId <String>] [-AsJob] [-LogAnalytics]
46+
[-AuditAction <String[]>] [-PredicateExpression <String>] [-WorkspaceResourceId <String>] [-AsJob] [-LogAnalytics]
4747
[-ServerName] <String> [-DatabaseName] <String> [-ResourceGroupName] <String>
4848
[-DefaultProfile <IAzureContextContainer>] [-WhatIf] [-Confirm] [<CommonParameters>]
4949
```
@@ -86,7 +86,7 @@ PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGrou
8686

8787
### Example 6: Enable the event hub auditing policy of an Azure SQL database
8888
```
89-
PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -EventHub -EventHubName "EventHubName" -EventHubAuthorizationRuleId "EventHubAuthorizationRuleId"
89+
PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -EventHub -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId"
9090
```
9191

9292
### Example 7: Disable the event hub auditing policy of an Azure SQL database
@@ -96,7 +96,7 @@ PS C:\>Set-AzSqlDatabaseAuditing -State Disabled -ResourceGroupName "ResourceGro
9696

9797
### Example 8: Enable the log analytics auditing policy of an Azure SQL database
9898
```
99-
PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalytics -WorkspaceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
99+
PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalytics -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
100100
```
101101

102102
### Example 9: Disable the log analytics auditing policy of an Azure SQL database
@@ -240,7 +240,7 @@ Accept pipeline input: True (ByPropertyName)
240240
Accept wildcard characters: False
241241
```
242242
243-
### -EventHubAuthorizationRuleId
243+
### -EventHubAuthorizationRuleResourceId
244244
The resource Id for the event hub authorization rule
245245
246246
```yaml
@@ -256,7 +256,7 @@ Accept wildcard characters: False
256256
```
257257
258258
### -EventHubName
259-
The name of the event hub. If none is specified when providing EventHubAuthorizationRuleId, the default event hub will be selected.
259+
The name of the event hub. If none is specified when providing EventHubAuthorizationRuleResourceId, the default event hub will be selected.
260260
261261
```yaml
262262
Type: System.String
@@ -436,7 +436,7 @@ Accept pipeline input: True (ByPropertyName)
436436
Accept wildcard characters: False
437437
```
438438
439-
### -WorkspaceId
439+
### -WorkspaceResourceId
440440
The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2
441441
442442
```yaml

src/Sql/Sql/help/Set-AzSqlServerAuditing.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -33,15 +33,15 @@ Set-AzSqlServerAuditing -State <String> [-AuditActionGroup <AuditActionGroups[]>
3333
### EventHubSet
3434
```
3535
Set-AzSqlServerAuditing -State <String> [-AuditActionGroup <AuditActionGroups[]>] [-PassThru]
36-
[-PredicateExpression <String>] [-AsJob] [-EventHubName <String>] [-EventHubAuthorizationRuleId <String>]
36+
[-PredicateExpression <String>] [-AsJob] [-EventHubName <String>] [-EventHubAuthorizationRuleResourceId <String>]
3737
[-ServerName] <String> [-EventHub] [-ResourceGroupName] <String> [-DefaultProfile <IAzureContextContainer>]
3838
[-WhatIf] [-Confirm] [<CommonParameters>]
3939
```
4040

4141
### LogAnalyticsSet
4242
```
4343
Set-AzSqlServerAuditing -State <String> [-AuditActionGroup <AuditActionGroups[]>] [-PassThru]
44-
[-PredicateExpression <String>] [-AsJob] [-WorkspaceId <String>] [-ServerName] <String> [-LogAnalytics]
44+
[-PredicateExpression <String>] [-AsJob] [-WorkspaceResourceId <String>] [-ServerName] <String> [-LogAnalytics]
4545
[-ResourceGroupName] <String> [-DefaultProfile <IAzureContextContainer>] [-WhatIf] [-Confirm]
4646
[<CommonParameters>]
4747
```
@@ -84,7 +84,7 @@ PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGrou
8484

8585
### Example 6: Enable the event hub auditing policy of an Azure SQL server
8686
```
87-
PS C:\>Set-AzSqlServerAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -EventHubName "EventHubName" -EventHubAuthorizationRuleId "EventHubAuthorizationRuleId"
87+
PS C:\>Set-AzSqlServerAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId"
8888
```
8989

9090
### Example 7: Disable the event hub auditing policy of an Azure SQL server
@@ -94,7 +94,7 @@ PS C:\>Set-AzSqlServerAuditing -State Disabled -ResourceGroupName "ResourceGroup
9494

9595
### Example 8: Enable the log analytics auditing policy of an Azure SQL server
9696
```
97-
PS C:\>Set-AzSqlServerAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalytics -WorkspaceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
97+
PS C:\>Set-AzSqlServerAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalytics -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
9898
```
9999

100100
### Example 9: Disable the log analytics auditing policy of an Azure SQL server
@@ -187,7 +187,7 @@ Accept pipeline input: True (ByPropertyName)
187187
Accept wildcard characters: False
188188
```
189189
190-
### -EventHubAuthorizationRuleId
190+
### -EventHubAuthorizationRuleResourceId
191191
The resource Id for the event hub authorization rule
192192
193193
```yaml
@@ -203,7 +203,7 @@ Accept wildcard characters: False
203203
```
204204
205205
### -EventHubName
206-
The name of the event hub. If none is specified when providing EventHubAuthorizationRuleId, the default event hub will be selected.
206+
The name of the event hub. If none is specified when providing EventHubAuthorizationRuleResourceId, the default event hub will be selected.
207207
208208
```yaml
209209
Type: System.String
@@ -383,7 +383,7 @@ Accept pipeline input: True (ByPropertyName)
383383
Accept wildcard characters: False
384384
```
385385
386-
### -WorkspaceId
386+
### -WorkspaceResourceId
387387
The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2
388388
389389
```yaml

0 commit comments

Comments
 (0)