我正在尝试从现有的AuditIfnotExists策略创建一个deployifnotexists策略。部署时不会出错,但是会出错,提示“没有相关资源与策略定义中的效果详细信息匹配”。评估政策时。当我将它部署到同一管理组时,AuditIfnotExists策略效果很好。我想知道我是否错过了什么。
此策略旨在为不存在的NSG组删除创建警报。 这是deployifnotexists政策-你们看到它有任何问题吗?任何输入表示赞赏。谢谢。
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"effect": {
"type": "string",
"metadata": {
"displayName": "Effect",
"description": "Enable or disable the execution of the policy"
},
"allowedValues": [
"AuditIfNotExists",
"deployIfNotExists",
"Disabled"
],
"defaultValue": "deployIfNotExists"
}
},
"variables": {
"actionGroupName": "dsactiongroup"
},
"resources": [
{
"name": "CIS5.2.3-EnsureAuditDeleteNSG",
"type": "Microsoft.Authorization/policyDefinitions",
"apiVersion": "2019-09-01",
"properties": {
"policyType": "Custom",
"displayName": "CIS 5.2.3 Ensure that Activity Log Alert exists for Delete Network Security Group (Scored)",
"description": "Monitor Activity Alerts exist for specific activities.",
"mode": "all",
"metadata": {
"category": "Audit"
},
"parameters": {
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Resources/subscriptions"
}
]
},
"then": {
"effect": "[parameters('effect')]",
"details": {
"type": "Microsoft.Insights/ActivityLogAlerts",
"existenceCondition": {
"allOf": [
{
"allOf": [
{
"not": {
"field": "Microsoft.Insights/ActivityLogAlerts/condition.allOf[*].field",
"notEquals": "category"
}
},
{
"not": {
"field": "Microsoft.Insights/ActivityLogAlerts/condition.allOf[*].equals",
"notEquals": "Administrative"
}
}
]
},
{
"allOf": [
{
"not": {
"field": "Microsoft.Insights/ActivityLogAlerts/condition.allOf[*].field",
"notEquals": "resourceType"
}
},
{
"not": {
"field": "Microsoft.Insights/ActivityLogAlerts/condition.allOf[*].equals",
"notEquals": "microsoft.network/networksecuritygroups"
}
}
]
},
{
"allOf": [
{
"not": {
"field": "Microsoft.Insights/ActivityLogAlerts/condition.allOf[*].field",
"notEquals": "operationName"
}
},
{
"not": {
"field": "Microsoft.Insights/ActivityLogAlerts/condition.allOf[*].equals",
"notEquals": "Microsoft.Network/networkSecurityGroups/delete"
}
}
]
}
]
},
"roleDefinitionIds": [
"/providers/microsoft.authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa"
],
"deployment": {
"properties": {
"mode": "incremental",
"template": {
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
},
"variables": {
"actionGroupName": "dactiongroup"
},
"resources": [
{
"name": "NSGRuleDeleted",
"type": "Microsoft.Insights/activityLogAlerts",
"location": "global",
"apiVersion": "2017-04-01",
"properties": {
"description": "NSG Rule Deleted",
"enabled": true,
"condition": {
"allOf": [
{
"field": "category",
"equals": "Administrative"
},
{
"field": "operationName",
"equals": "Microsoft.Network/networkSecurityGroups/securityRules/delete"
}
]
},
"actions": {
"actionGroups": [
{
"actionGroupId": "[resourceId('Microsoft.Insights/actionGroups', variables('actionGroupName'))]"
}
]
}
}
}
],
"outputs": {}
},
"parameters": {
}
}
}
}
}
}
}
}
]
}