@@ -501,9 +501,6 @@ function Test-BlobAuditPolicyOnDatabase
501
501
$params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix
502
502
$dbName = $params.databaseName
503
503
504
- # NEEDS TO BE FILLED OUT WITH A PRECREATED STORAGE ACCOUNT IN A DIFFERENT SUBSCRIPTION
505
- $storageAccountResourceId = " /subscriptions/a8c9a924-06c0-4bde-9788-e7b1370969e1/resourceGroups/Default-Storage-EastUS/providers/Microsoft.Storage/storageAccounts/auditcmdletssa"
506
-
507
504
try
508
505
{
509
506
# Test - Tests that when setting blob auditing policy on database without StorageKeyType parameter, it gets the default value - "Primary".
@@ -519,20 +516,6 @@ function Test-BlobAuditPolicyOnDatabase
519
516
Assert-AreEqual $policy.RetentionInDays 8
520
517
Assert-True { $policy.StorageKeyType -eq " Primary" }
521
518
522
- # Test - Tests setting blob auditing policy on a database with a storage account in a subscription which is different than the database's subscription
523
- Set-AzSqlDatabaseAuditPolicy - BlobStorageTargetState Enabled - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountResourceId $storageAccountResourceId - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8
524
- $policy = Get-AzSqlDatabaseAuditPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
525
-
526
- # Assert
527
- Assert-AreEqual $policy.BlobStorageTargetState " Enabled"
528
- Assert-AreEqual $policy.AuditActionGroup.Length 2
529
- Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)}
530
- Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
531
- Assert-AreEqual $policy.AuditAction.Length 0
532
- Assert-AreEqual $policy.RetentionInDays 8
533
- Assert-True { $policy.StorageKeyType -eq " Primary" }
534
- Assert-AreEqual $policy.StorageAccountResourceId $storageAccountResourceId
535
-
536
519
# Test
537
520
Set-AzSqlDatabaseAuditPolicy - BlobStorageTargetState Enabled - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountResourceId $params.storageAccountResourceId - StorageKeyType " Secondary" - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8 - AuditAction " UPDATE ON database::[$ ( $params.databaseName ) ] BY [public]"
538
521
$policy = Get-AzSqlDatabaseAuditPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
@@ -582,9 +565,6 @@ function Test-BlobAuditPolicyOnServer
582
565
Create- BlobAuditingTestEnvironment $testSuffix
583
566
$params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix
584
567
585
- # NEEDS TO BE FILLED OUT WITH A PRECREATED STORAGE ACCOUNT IN A DIFFERENT SUBSCRIPTION
586
- $storageAccountResourceId = " /subscriptions/a8c9a924-06c0-4bde-9788-e7b1370969e1/resourceGroups/Default-Storage-EastUS/providers/Microsoft.Storage/storageAccounts/auditcmdletssa"
587
-
588
568
try
589
569
{
590
570
# Test - Tests that when setting blob auditing policy on server without StorageKeyType parameter, it gets the default value - "Primary".
@@ -599,19 +579,6 @@ function Test-BlobAuditPolicyOnServer
599
579
Assert-AreEqual $policy.RetentionInDays 8
600
580
Assert-AreEqual $policy.StorageKeyType " Primary"
601
581
602
- # Test - Tests setting blob auditing policy on a server with a storage account in a subscription which is different than the server's subscription
603
- Set-AzSqlServerAuditPolicy - BlobStorageTargetState Enabled - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountResourceId $storageAccountResourceId - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8
604
- $policy = Get-AzSqlServerAuditPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
605
-
606
- # Assert
607
- Assert-AreEqual $policy.BlobStorageTargetState " Enabled"
608
- Assert-AreEqual $policy.AuditActionGroup.Length 2
609
- Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)}
610
- Assert-True {$policy.AuditActionGroup.Contains ([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups ]::FAILED_DATABASE_AUTHENTICATION_GROUP)}
611
- Assert-AreEqual $policy.RetentionInDays 8
612
- Assert-AreEqual $policy.StorageKeyType " Primary"
613
- Assert-AreEqual $policy.StorageAccountResourceId $storageAccountResourceId
614
-
615
582
# Test
616
583
Set-AzSqlServerAuditPolicy - BlobStorageTargetState Enabled - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountResourceId $params.storageAccountResourceId - StorageKeyType " Secondary" - AuditActionGroup " SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP" , " FAILED_DATABASE_AUTHENTICATION_GROUP" - RetentionInDays 8
617
584
$policy = Get-AzSqlServerAuditPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
0 commit comments