@@ -35,15 +35,15 @@ Set-AzSqlDatabaseAuditing -State <String> [-PassThru] [-AuditActionGroup <AuditA
35
35
```
36
36
Set-AzSqlDatabaseAuditing -State <String> [-PassThru] [-AuditActionGroup <AuditActionGroups[]>]
37
37
[-AuditAction <String[]>] [-PredicateExpression <String>] [-EventHubName <String>]
38
- [-EventHubAuthorizationRuleId <String>] [-AsJob] [-EventHub] [-ServerName] <String> [-DatabaseName] <String>
38
+ [-EventHubAuthorizationRuleResourceId <String>] [-AsJob] [-EventHub] [-ServerName] <String> [-DatabaseName] <String>
39
39
[-ResourceGroupName] <String> [-DefaultProfile <IAzureContextContainer>] [-WhatIf] [-Confirm]
40
40
[<CommonParameters>]
41
41
```
42
42
43
43
### LogAnalyticsSet
44
44
```
45
45
Set-AzSqlDatabaseAuditing -State <String> [-PassThru] [-AuditActionGroup <AuditActionGroups[]>]
46
- [-AuditAction <String[]>] [-PredicateExpression <String>] [-WorkspaceId <String>] [-AsJob] [-LogAnalytics]
46
+ [-AuditAction <String[]>] [-PredicateExpression <String>] [-WorkspaceResourceId <String>] [-AsJob] [-LogAnalytics]
47
47
[-ServerName] <String> [-DatabaseName] <String> [-ResourceGroupName] <String>
48
48
[-DefaultProfile <IAzureContextContainer>] [-WhatIf] [-Confirm] [<CommonParameters>]
49
49
```
@@ -86,7 +86,7 @@ PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGrou
86
86
87
87
### Example 6: Enable the event hub auditing policy of an Azure SQL database
88
88
```
89
- PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -EventHub -EventHubName "EventHubName" -EventHubAuthorizationRuleId "EventHubAuthorizationRuleId "
89
+ PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -EventHub -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId "
90
90
```
91
91
92
92
### Example 7: Disable the event hub auditing policy of an Azure SQL database
@@ -96,7 +96,7 @@ PS C:\>Set-AzSqlDatabaseAuditing -State Disabled -ResourceGroupName "ResourceGro
96
96
97
97
### Example 8: Enable the log analytics auditing policy of an Azure SQL database
98
98
```
99
- PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalytics -WorkspaceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
99
+ PS C:\>Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalytics -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
100
100
```
101
101
102
102
### Example 9: Disable the log analytics auditing policy of an Azure SQL database
@@ -240,7 +240,7 @@ Accept pipeline input: True (ByPropertyName)
240
240
Accept wildcard characters : False
241
241
` ` `
242
242
243
- ### -EventHubAuthorizationRuleId
243
+ ### -EventHubAuthorizationRuleResourceId
244
244
The resource Id for the event hub authorization rule
245
245
246
246
` ` ` yaml
@@ -256,7 +256,7 @@ Accept wildcard characters: False
256
256
` ` `
257
257
258
258
### -EventHubName
259
- The name of the event hub. If none is specified when providing EventHubAuthorizationRuleId , the default event hub will be selected.
259
+ The name of the event hub. If none is specified when providing EventHubAuthorizationRuleResourceId , the default event hub will be selected.
260
260
261
261
` ` ` yaml
262
262
Type : System.String
@@ -436,7 +436,7 @@ Accept pipeline input: True (ByPropertyName)
436
436
Accept wildcard characters : False
437
437
` ` `
438
438
439
- ### -WorkspaceId
439
+ ### -WorkspaceResourceId
440
440
The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2
441
441
442
442
` ` ` yaml
0 commit comments