azure_resource_health_emerging_issues Resource
Use the azure_resource_health_emerging_issues
InSpec audit resource to test properties related to all Azure Resource Health Emerging Issues.
Azure REST API Version, Endpoint, and HTTP Client Parameters
This resource interacts with API versions supported by the resource provider.
The api_version
can be defined as a resource parameter.
If not provided, this resource uses the latest version.
For more information, refer to the azure_generic_resource document.
Unless defined, this resource uses the azure_cloud
global endpoint and default values for the HTTP client.
For more information, refer to the resource pack README.
Installation
This resource is available in the Chef InSpec Azure resource pack.
See the Chef InSpec documentation on cloud platforms for information on configuring your Azure environment for InSpec and creating an InSpec profile that uses the InSpec Azure resource pack.
Syntax
An azure_resource_health_emerging_issues
resource block returns all Azure Resource Health Emerging Issues.
describe azure_resource_health_emerging_issues do
#...
end
Parameters
This resource does not require any parameters.
Properties
ids
- A list of the unique resource IDs.
Field:
id
names
- A list of names for all the resources.
Field:
name
types
- A list of types for all the resources.
Field:
type
properties
- A list of Properties all the resources.
Field:
properties
Note
See the documentation on FilterTable for information on using filter criteria on plural resources.
See Azure’s documentation for other available properties.
Examples
Test that there are emerging health issues that are of lower severity.
describe azure_resource_health_emerging_issues.where{ properties.select{|prop| prop.statusActiveEvents.select{ |event| event.severity == 'Warning' } } } do
it { should exist }
end
Matchers
This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our Universal Matchers page.
exists
# Should not exist if no service health emerging issues are present
describe azure_resource_health_emerging_issues do
it { should_not exist }
end
# Should exist if the filter returns at least one service health emerging issues
describe azure_resource_health_emerging_issues do
it { should exist }
end
Azure Permissions
Your Service Principal must be set up with at least a contributor
role on the subscription you wish to test.
Was this page helpful?