@@ -207,6 +207,16 @@ function Test-AuditingDatabaseUpdatePolicyWithEventTypes
207
207
Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::ParameterizedSQL_Success)}
208
208
Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::ParameterizedSQL_Failure)}
209
209
210
+ # Test - when updating table auditing policy for existing one without event type, the audit event types won't change.
211
+ Set-AzureRmSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount
212
+ $policy = Get-AzureRmSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
213
+
214
+ # Assert
215
+ Assert-AreEqual $policy.EventType.Length 3
216
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::PlainSQL_Success)}
217
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::ParameterizedSQL_Success)}
218
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::ParameterizedSQL_Failure)}
219
+
210
220
# Test
211
221
Set-AzureRmSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " None"
212
222
$policy = Get-AzureRmSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
@@ -251,6 +261,15 @@ function Test-AuditingServerUpdatePolicyWithEventTypes
251
261
Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::ParameterizedSQL_Success)}
252
262
Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::ParameterizedSQL_Failure)}
253
263
264
+ # Test - when updating table auditing policy for existing one without event type, the audit event types won't change.
265
+ Set-AzureRmSqlServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount
266
+ $policy = Get-AzureRmSqlServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
267
+
268
+ # Assert
269
+ Assert-AreEqual $policy.EventType.Length 3
270
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::PlainSQL_Success)}
271
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::ParameterizedSQL_Success)}
272
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditEventType ]::ParameterizedSQL_Failure)}
254
273
255
274
# Test
256
275
Set-AzureRmSqlServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " None"
@@ -887,8 +906,8 @@ function Test-BlobAuditingOnDatabase
887
906
888
907
try
889
908
{
890
- # Test
891
- Set-AzureRmSqlDatabaseAuditingPolicy - AuditType Blob - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - StorageKeyType " Primary " - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8
909
+ # Test - Tests that when setting blob auditing policy on database without StorageKeyType parameter, it gets the default value - "Primary".
910
+ Set-AzureRmSqlDatabaseAuditingPolicy - AuditType Blob - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8
892
911
$policy = Get-AzureRmSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
893
912
894
913
# Assert
@@ -899,6 +918,19 @@ function Test-BlobAuditingOnDatabase
899
918
Assert-AreEqual $policy.AuditAction.Length 0
900
919
Assert-AreEqual $policy.RetentionInDays 8
901
920
Assert-True { $policy.StorageKeyType -eq " Primary" }
921
+
922
+ # Test
923
+ Set-AzureRmSqlDatabaseAuditingPolicy - AuditType Blob - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - StorageKeyType " Secondary" - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8
924
+ $policy = Get-AzureRmSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
925
+
926
+ # Assert
927
+ Assert-AreEqual $policy.AuditState " Enabled"
928
+ Assert-AreEqual $policy.AuditActionGroup.Length 2
929
+ Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)}
930
+ Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
931
+ Assert-AreEqual $policy.AuditAction.Length 0
932
+ Assert-AreEqual $policy.RetentionInDays 8
933
+ Assert-True { $policy.StorageKeyType -eq " Secondary" }
902
934
903
935
904
936
# Test
@@ -929,6 +961,19 @@ function Test-BlobAuditingOnServer
929
961
930
962
try
931
963
{
964
+ # Test - Tests that when setting blob auditing policy on server without StorageKeyType parameter, it gets the default value - "Primary".
965
+ Set-AzureRmSqlServerAuditingPolicy - AuditType Blob - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8
966
+ $policy = Get-AzureRmSqlServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
967
+
968
+ # Assert
969
+ Assert-AreEqual $policy.AuditState " Enabled"
970
+ Assert-AreEqual $policy.AuditActionGroup.Length 2
971
+ Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)}
972
+ Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
973
+ Assert-AreEqual $policy.AuditAction.Length 0
974
+ Assert-AreEqual $policy.RetentionInDays 8
975
+ Assert-AreEqual $policy.StorageKeyType " Primary"
976
+
932
977
# Test
933
978
Set-AzureRmSqlServerAuditingPolicy - AuditType Blob - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - StorageKeyType " Secondary" - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8
934
979
$policy = Get-AzureRmSqlServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
@@ -1035,7 +1080,7 @@ function Test-DatatabaseAuditingTypeMigration
1035
1080
# Assert
1036
1081
Assert-AreEqual $policy.AuditType ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditType ]::Table)
1037
1082
1038
- # Test
1083
+ # Test
1039
1084
Remove-AzureRmSqlDatabaseAuditing - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
1040
1085
$policy = Get-AzureRmSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
1041
1086
@@ -1183,7 +1228,7 @@ function Test-BlobAuditingWithAuditActionGroups
1183
1228
Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
1184
1229
Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::BATCH_COMPLETED_GROUP)}
1185
1230
1186
- # Test
1231
+ # Test - when setting blob auditing policy for database with audit action groups, the default audit action groups is being replaced by the new audit action groups.
1187
1232
Set-AzureRmSqlDatabaseAuditingPolicy - AuditType Blob - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - AuditActionGroup " APPLICATION_ROLE_CHANGE_PASSWORD_GROUP" , " DATABASE_OBJECT_PERMISSION_CHANGE_GROUP"
1188
1233
$policy = Get-AzureRmSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
1189
1234
@@ -1210,7 +1255,7 @@ function Test-BlobAuditingWithAuditActionGroups
1210
1255
Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::DATABASE_OPERATION_GROUP)}
1211
1256
Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::DATABASE_LOGOUT_GROUP)}
1212
1257
1213
- # Test - when setting new blob auditing policy for server without audit action groups, the default audit action groups is set.
1258
+ # Test - when setting new blob auditing policy for server without audit action groups, the default audit action groups is set.
1214
1259
Set-AzureRmSqlServerAuditingPolicy - AuditType Blob - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount
1215
1260
$policy = Get-AzureRmSqlServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
1216
1261
@@ -1258,7 +1303,7 @@ function Test-BlobAuditingWithAuditActionGroups
1258
1303
. SYNOPSIS
1259
1304
Tests that trying to configure table auditing with audit actions or action groups fails.
1260
1305
#>
1261
- function Test-AuditingWithAuditActionsAndAuditActionGroups
1306
+ function Test-TableAuditingWithAuditActionsAndAuditActionGroups
1262
1307
{
1263
1308
$testSuffix = 50199
1264
1309
Create- AuditingTestEnvironment $testSuffix
0 commit comments