P
praskuma
Managing Azure Policies through Python SDK
Azure Policy helps to enforce organizational standards and to assess compliance at-scale. It also helps to bring your resources to compliance through bulk remediation for existing resources and automatic remediation for added resources.
Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. Policy definitions for these common use cases are already available in your Azure environment as built-ins to help you get started.
Specifically, some useful governance actions you can enforce with Azure Policy include:
Requiring resources to send diagnostic logs to a Log Analytics workspace
References: Overview of Azure Policy - Azure Policy
Azure Policy glossary - Azure Policy
Use the Azure libraries (SDK) for Python - Python on Azure
We can manage Azure policies through portal, PowerShell, CLI, REST API, Bicep, ARM Templates, Terraform and SDKs.
This blog will cover the policy management through Python SDK and we can use any IDE that supports Python SDK for Azure. We are using Visual Studio Code here. (Visual Studio Code – Code Editor | Microsoft Azure)
Azure Python SDK Authentication Reference : Overview: Authenticate Python apps to Azure using the Azure SDK - Python on Azure
Import Libraries
import os
from azure.identity import ClientSecretCredential
from azure.identity import AzureCliCredential
from azure.mgmt.authorization import AuthorizationManagementClient
from azure.mgmt.resource import PolicyClient, ResourceManagementClient
from azure.mgmt.resource.subscriptions import SubscriptionClient
from azure.mgmt.policyinsights import PolicyInsightsClient
Define and Assign Variables
subscription_id = "exyx-exyx4e-4xyx9-axyz9c-45be63c6a8ad" # your subscription ID
tenant_id = "xyzxyz-abc-cd-avc-48ebcd07d17c" # Your tenant ID
client_id = "123abc-cdd-4f09-ad9f-abcdef" # Your Client ID
client_secret = "wiufhuiw24874946497fff" # Your Client Secret
POLICY_NAME = "KeyVaultDIAGDINEpolicy"
SUBSCRIPTION_ID = "exyx-exyx4e-4xyx9-axyz9c-45be63c6a8ad"
GROUP_NAME = "resourceGroupName"
MANAGEMENTGROUP_ID= "abcd-123-4e7b-a446-233cvd"
POLICY_ASSIGNMENT_NAME = "KVDiagDINEpolicy"
Creation of objects
resource_client = ResourceManagementClient(
credential=ClientSecretCredential(tenant_id=tenant_id, client_id=client_id, client_secret=client_secret),
subscription_id=subscription_id
)
policyinsights_client = PolicyInsightsClient(
credential=ClientSecretCredential(tenant_id=tenant_id, client_id=client_id, client_secret=client_secret),
subscription_id=subscription_id
)
policy_client = PolicyClient(
credential=ClientSecretCredential(tenant_id=tenant_id, client_id=client_id, client_secret=client_secret),
subscription_id=subscription_id
)
Creation of Policy Definition at the Subcription Scope
definitionatsubscription = policy_client.policy_definitions.create_or_update(policy_definition_name=POLICY_NAME,
parameters= {
"displayName": "KVDiag",
"policyType": "Custom",
"mode": "Indexed",
"parameters": {
"effect": {
"type": "String",
"metadata": {
"displayName": "Effect",
"description": "Enable or disable the execution of the policy"
},
"allowedValues": [
"DeployIfNotExists",
"Disabled"
],
"defaultValue": "DeployIfNotExists"
},
"profileName": {
"type": "String",
"metadata": {
"displayName": "Profile name",
"description": "The diagnostic settings profile name"
}
},
"logAnalytics": {
"type": "String",
"metadata": {
"displayName": "Log Analytics workspace",
"description": "Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.",
"strongType": "omsWorkspace",
"assignPermissions": "true"
}
},
"azureRegions": {
"type": "Array",
"metadata": {
"displayName": "Allowed Locations",
"description": "The list of locations that can be specified when deploying resources",
"strongType": "location"
}
},
"metricsEnabled": {
"type": "String",
"metadata": {
"displayName": "Enable metrics",
"description": "Whether to enable metrics stream to the Log Analytics workspace - True or False"
},
"allowedValues": [
"True",
"False"
],
"defaultValue": "True"
},
"logsEnabled": {
"type": "String",
"metadata": {
"displayName": "Enable logs",
"description": "Whether to enable logs stream to the Log Analytics workspace - True or False"
},
"allowedValues": [
"True",
"False"
],
"defaultValue": "True"
}
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.KeyVault/vaults"
},
{
"field": "location",
"in": "[parameters('azureRegions')]"
}
]
},
"then": {
"effect": "[parameters('effect')]",
"details": {
"type": "Microsoft.Insights/diagnosticSettings",
"existenceCondition": {
"allOf": [
{
"field": "Microsoft.Insights/diagnosticSettings/logs.enabled",
"equals": "[parameters('logsEnabled')]"
},
{
"field": "Microsoft.Insights/diagnosticSettings/metrics.enabled",
"equals": "[parameters('metricsEnabled')]"
},
{
"field": "Microsoft.Insights/diagnosticSettings/workspaceId",
"equals": "[parameters('logAnalytics')]"
}
]
},
"roleDefinitionIds": [
"/providers/microsoft.authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa",
"/providers/microsoft.authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293"
],
"deployment": {
"properties": {
"mode": "incremental",
"template": {
"$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"resourceName": {
"type": "string"
},
"location": {
"type": "string"
},
"logAnalytics": {
"type": "string"
},
"metricsEnabled": {
"type": "string"
},
"logsEnabled": {
"type": "string"
},
"profileName": {
"type": "string"
}
},
"variables": {},
"resources": [
{
"type": "Microsoft.KeyVault/vaults/providers/diagnosticSettings",
"apiVersion": "2017-05-01-preview",
"name": "[concat(parameters('resourceName'), '/', 'Microsoft.Insights/', parameters('profileName'))]",
"location": "[parameters('location')]",
"dependsOn": [],
"properties": {
"workspaceId": "[parameters('logAnalytics')]",
"metrics": [
{
"category": "AllMetrics",
"enabled": "[parameters('metricsEnabled')]",
"retentionPolicy": {
"enabled": "false",
"days": 0
}
}
],
"logs": [
{
"category": "AuditEvent",
"enabled": "[parameters('logsEnabled')]"
}
]
}
}
],
"outputs": {}
},
"parameters": {
"location": {
"value": "[field('location')]"
},
"resourceName": {
"value": "[field('name')]"
},
"logAnalytics": {
"value": "[parameters('logAnalytics')]"
},
"metricsEnabled": {
"value": "[parameters('metricsEnabled')]"
},
"logsEnabled": {
"value": "[parameters('logsEnabled')]"
},
"profileName": {
"value": "[parameters('profileName')]"
}
}
}
}
}
}
}})
print("Created policy definition ID : {}".format(definitionatsubscription.id))
print("Created policy definition Name : {} \n".format(definitionatsubscription.name))
print (" ********* ******** ******** ********** ******** ******* \n")
Creation of Policy Definition at Management Group Scope
definitionatmanagementgroup = policy_client.policy_definitions.create_or_update_at_management_group(policy_definition_name=POLICY_NAME,
parameters= {
"displayName": "KVDiag",
"policyType": "Custom",
"mode": "Indexed",
"parameters": {
"effect": {
"type": "String",
"metadata": {
"displayName": "Effect",
"description": "Enable or disable the execution of the policy"
},
"allowedValues": [
"DeployIfNotExists",
"Disabled"
],
"defaultValue": "DeployIfNotExists"
},
"profileName": {
"type": "String",
"metadata": {
"displayName": "Profile name",
"description": "The diagnostic settings profile name"
}
},
"logAnalytics": {
"type": "String",
"metadata": {
"displayName": "Log Analytics workspace",
"description": "Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.",
"strongType": "omsWorkspace",
"assignPermissions": "true"
}
},
"azureRegions": {
"type": "Array",
"metadata": {
"displayName": "Allowed Locations",
"description": "The list of locations that can be specified when deploying resources",
"strongType": "location"
}
},
"metricsEnabled": {
"type": "String",
"metadata": {
"displayName": "Enable metrics",
"description": "Whether to enable metrics stream to the Log Analytics workspace - True or False"
},
"allowedValues": [
"True",
"False"
],
"defaultValue": "True"
},
"logsEnabled": {
"type": "String",
"metadata": {
"displayName": "Enable logs",
"description": "Whether to enable logs stream to the Log Analytics workspace - True or False"
},
"allowedValues": [
"True",
"False"
],
"defaultValue": "True"
}
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.KeyVault/vaults"
},
{
"field": "location",
"in": "[parameters('azureRegions')]"
}
]
},
"then": {
"effect": "[parameters('effect')]",
"details": {
"type": "Microsoft.Insights/diagnosticSettings",
"existenceCondition": {
"allOf": [
{
"field": "Microsoft.Insights/diagnosticSettings/logs.enabled",
"equals": "[parameters('logsEnabled')]"
},
{
"field": "Microsoft.Insights/diagnosticSettings/metrics.enabled",
"equals": "[parameters('metricsEnabled')]"
},
{
"field": "Microsoft.Insights/diagnosticSettings/workspaceId",
"equals": "[parameters('logAnalytics')]"
}
]
},
"roleDefinitionIds": [
"/providers/microsoft.authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa",
"/providers/microsoft.authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293"
],
"deployment": {
"properties": {
"mode": "incremental",
"template": {
"$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"resourceName": {
"type": "string"
},
"location": {
"type": "string"
},
"logAnalytics": {
"type": "string"
},
"metricsEnabled": {
"type": "string"
},
"logsEnabled": {
"type": "string"
},
"profileName": {
"type": "string"
}
},
"variables": {},
"resources": [
{
"type": "Microsoft.KeyVault/vaults/providers/diagnosticSettings",
"apiVersion": "2017-05-01-preview",
"name": "[concat(parameters('resourceName'), '/', 'Microsoft.Insights/', parameters('profileName'))]",
"location": "[parameters('location')]",
"dependsOn": [],
"properties": {
"workspaceId": "[parameters('logAnalytics')]",
"metrics": [
{
"category": "AllMetrics",
"enabled": "[parameters('metricsEnabled')]",
"retentionPolicy": {
"enabled": "false",
"days": 0
}
}
],
"logs": [
{
"category": "AuditEvent",
"enabled": "[parameters('logsEnabled')]"
}
]
}
}
],
"outputs": {}
},
"parameters": {
"location": {
"value": "[field('location')]"
},
"resourceName": {
"value": "[field('name')]"
},
"logAnalytics": {
"value": "[parameters('logAnalytics')]"
},
"metricsEnabled": {
"value": "[parameters('metricsEnabled')]"
},
"logsEnabled": {
"value": "[parameters('logsEnabled')]"
},
"profileName": {
"value": "[parameters('profileName')]"
}
}
}
}
}
}
}},management_group_id= 'abcd-233df-4e7b-a446-2333xcvc'
)
print("Created policy definition ID : {}".format(definitionatmanagementgroup.id))
print("Created policy definition Name : {} \n".format(definitionatmanagementgroup.name))
print (" ********* ******** ******** ********** ******** ******* \n")
Defining Scopes for Policy Assignment
scopeRG = '/subscriptions/{}/resourceGroups/{}'.format(
SUBSCRIPTION_ID,
GROUP_NAME
)
scopeSubscription = '/subscriptions/{}'.format(
SUBSCRIPTION_ID
)
scopeMG = '/providers/Microsoft.Management/managementGroups/{}'.format(
MANAGEMENTGROUP_ID
)
Creating Policy Assignments at different Scope - Resource Group, Subscription and Management Group
assignmentatRG = policy_client.policy_assignments.create(
scopeRG,
POLICY_ASSIGNMENT_NAME + " at RG",
{
'policy_definition_id': definitionatmanagementgroup.id,
"identity": {"type": "SystemAssigned"},
"location" :"eastus",
'parameters' : {
"profileName": {
"value": "KV_DIAG_Settings1"
},
"logAnalytics": {
"value": "/subscriptions/e818bd2d-e44e-4a99-a89c-45be63c6a8ad/resourcegroups/psdonotdeletessimportant/providers/microsoft.operationalinsights/workspaces/lnos-demo-1-log-sb"
},
"azureRegions": {
"value": ["westus"]
}
},
}
)
print("Createed policy assignment: {}".format(assignmentatRG.id))
print("Created policy assignment: {}\n".format(assignmentatRG.name))
print (" ********* ******** ******** ********** ******** ******* \n")
assignmentatsubscription = policy_client.policy_assignments.create(
scopeSubscription,
POLICY_ASSIGNMENT_NAME + "at Subscription",
{
'policy_definition_id': definitionatsubscription.id,
"identity": {"type": "SystemAssigned"},
"location" :"eastus",
'parameters' : {
"profileName": {
"value": "KV_DIAG_Settings2"
},
"logAnalytics": {
"value": "/subscriptions/e818bd2d-e44e-4a99-a89c-45be63c6a8ad/resourcegroups/psdonotdeletessimportant/providers/microsoft.operationalinsights/workspaces/lnos-demo-1-log-sb"
},
"azureRegions": {
"value": ["westus"]
}
}
}
)
print("Created policy assignment: {}".format(assignmentatsubscription.id))
print("Created policy assignment: {} \n".format(assignmentatsubscription.name))
print (" ********* ******** ******** ********** ******** ******* \n")
assignmentatmanagementgroup = policy_client.policy_assignments.create(
scopeMG,
POLICY_ASSIGNMENT_NAME + "at MG",
{
'policy_definition_id': definitionatmanagementgroup.id,
"identity": {"type": "SystemAssigned"},
"location" :"eastus",
'parameters' : {
"profileName": {
"value": "KV_DIAG_Settings3"
},
"logAnalytics": {
"value": "/subscriptions/e818bd2d-e44e-4a99-a89c-45be63c6a8ad/resourcegroups/psdonotdeletessimportant/providers/microsoft.operationalinsights/workspaces/lnos-demo-1-log-sb"
},
"azureRegions": {
"value": ["westus"]
}
}
}
)
print("Created policy assignment: {}".format(assignmentatmanagementgroup.id))
print("Created policy assignment: {}\n".format(assignmentatmanagementgroup.name))
print (" ********* ******** ******** ********** ******** ******* \n")
Trigger manual policy evaluation and get the resource compliance/non-compliance count :
Refernce Article : Start-AzPolicyComplianceScan (Az.PolicyInsights)
triggerevaluation = policyinsights_client.policy_states.begin_trigger_subscription_evaluation(
subscription_id='abc1233-e44e-4a99-a89c-123dfg')
print("Manual policy evaluation triggered :\n{}".format(triggerevaluation.status))
policyevaluationresult = policyinsights_client.policy_states.list_query_results_for_subscription_level_policy_assignment(
subscription_id='abc123-e44e-4a99-a89c-12333df',
policy_states_resource="latest",
policy_assignment_name= '621dc2655dd74ed68a37286d'
)
for item in policyevaluationresult:
print(' Resource ID : '+ item.resource_id)
print(' Policy Assignment ID : '+item.policy_assignment_id)
print(' Policy Assignment Scope : '+item.policy_assignment_scope)
print(' Compliance State : '+item.compliance_state)
print('\n')
if item.compliance_state == 'Compliant':
Compliant= int(Compliant +1)
elif item.compliance_state == 'NonCompliant':
NonCompliant = int(NonCompliant +1)
else:
1==1
print('Number of Resources')
print('Compliant :' + str(Compliant))
print('NonCompliant :' + str(NonCompliant))
Creation of Remediation Task at different Scopes:
remediation = policyinsights_client.remediations.create_or_update_at_management_group("1233-dfdf-4e7b-a446-223233",
"mymgremediation" ,
{
"policy_assignment_id": "/providers/microsoft.management/managementgroups/6cf4d5f3-dfdf-4e7b-a446-48ebcd07d17c/providers/microsoft.authorization/policyassignments/logagents",
## "policy_definition_reference_id" : "4037797753452518688" ## (optional) Needed when we need to remediate the non-compliant resources of policy initiative assignment
})
print("Create remediation:\n{}".format(remediation))
remediationRG = policyinsights_client.remediations.create_or_update_at_resource_group(
"myremediationatRG", "aro-rererer",
{
"policy_assignment_id": "/providers/microsoft.management/managementgroups/12345-dfdf-4e7b-a446-48ebcd07d17c/providers/microsoft.authorization/policyassignments/logagents",
"resource_discovery_mode" : 'ExistingNonCompliant' ## ReEvaluateCompliance - Re-evaluate the compliance state of resources and then remediate the resources found to be non-compliant.
##ExistingNonCompliant - Remediate resources that are already known to be non-compliant.
})
print("Create remediation:\n{}".format(remediationRG))
remediationsubscription = policyinsights_client.remediations.create_or_update_at_subscription(
"mymgremediationatsubsc" ,
{
"policy_assignment_id": "/providers/microsoft.management/managementgroups/12333-dfdf-4e7b-a446-48ebcd07d17c/providers/microsoft.authorization/policyassignments/logagents",
"resource_discovery_mode" : 'ReEvaluateCompliance' ## ReEvaluateCompliance - Re-evaluate the compliance state of resources and then remediate the resources found to be non-compliant.
##ExistingNonCompliant - Remediate resources that are already known to be non-compliant.
## "policy_definition_reference_id" : "4037797753452518688"
})
print("Create remediation:\n{}".format(remediationsubscription))
Note - resource_discovery_mode is only for the policy assignments at the subscription and the resource group scope.
Continue reading...
Azure Policy helps to enforce organizational standards and to assess compliance at-scale. It also helps to bring your resources to compliance through bulk remediation for existing resources and automatic remediation for added resources.
Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. Policy definitions for these common use cases are already available in your Azure environment as built-ins to help you get started.
Specifically, some useful governance actions you can enforce with Azure Policy include:
- Ensuring your team deploys Azure resources only to allowed regions.
- Enforcing the consistent application of taxonomic tags
Requiring resources to send diagnostic logs to a Log Analytics workspace
References: Overview of Azure Policy - Azure Policy
Azure Policy glossary - Azure Policy
Use the Azure libraries (SDK) for Python - Python on Azure
We can manage Azure policies through portal, PowerShell, CLI, REST API, Bicep, ARM Templates, Terraform and SDKs.
This blog will cover the policy management through Python SDK and we can use any IDE that supports Python SDK for Azure. We are using Visual Studio Code here. (Visual Studio Code – Code Editor | Microsoft Azure)
Azure Python SDK Authentication Reference : Overview: Authenticate Python apps to Azure using the Azure SDK - Python on Azure
Import Libraries
import os
from azure.identity import ClientSecretCredential
from azure.identity import AzureCliCredential
from azure.mgmt.authorization import AuthorizationManagementClient
from azure.mgmt.resource import PolicyClient, ResourceManagementClient
from azure.mgmt.resource.subscriptions import SubscriptionClient
from azure.mgmt.policyinsights import PolicyInsightsClient
Define and Assign Variables
subscription_id = "exyx-exyx4e-4xyx9-axyz9c-45be63c6a8ad" # your subscription ID
tenant_id = "xyzxyz-abc-cd-avc-48ebcd07d17c" # Your tenant ID
client_id = "123abc-cdd-4f09-ad9f-abcdef" # Your Client ID
client_secret = "wiufhuiw24874946497fff" # Your Client Secret
POLICY_NAME = "KeyVaultDIAGDINEpolicy"
SUBSCRIPTION_ID = "exyx-exyx4e-4xyx9-axyz9c-45be63c6a8ad"
GROUP_NAME = "resourceGroupName"
MANAGEMENTGROUP_ID= "abcd-123-4e7b-a446-233cvd"
POLICY_ASSIGNMENT_NAME = "KVDiagDINEpolicy"
Creation of objects
resource_client = ResourceManagementClient(
credential=ClientSecretCredential(tenant_id=tenant_id, client_id=client_id, client_secret=client_secret),
subscription_id=subscription_id
)
policyinsights_client = PolicyInsightsClient(
credential=ClientSecretCredential(tenant_id=tenant_id, client_id=client_id, client_secret=client_secret),
subscription_id=subscription_id
)
policy_client = PolicyClient(
credential=ClientSecretCredential(tenant_id=tenant_id, client_id=client_id, client_secret=client_secret),
subscription_id=subscription_id
)
Creation of Policy Definition at the Subcription Scope
definitionatsubscription = policy_client.policy_definitions.create_or_update(policy_definition_name=POLICY_NAME,
parameters= {
"displayName": "KVDiag",
"policyType": "Custom",
"mode": "Indexed",
"parameters": {
"effect": {
"type": "String",
"metadata": {
"displayName": "Effect",
"description": "Enable or disable the execution of the policy"
},
"allowedValues": [
"DeployIfNotExists",
"Disabled"
],
"defaultValue": "DeployIfNotExists"
},
"profileName": {
"type": "String",
"metadata": {
"displayName": "Profile name",
"description": "The diagnostic settings profile name"
}
},
"logAnalytics": {
"type": "String",
"metadata": {
"displayName": "Log Analytics workspace",
"description": "Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.",
"strongType": "omsWorkspace",
"assignPermissions": "true"
}
},
"azureRegions": {
"type": "Array",
"metadata": {
"displayName": "Allowed Locations",
"description": "The list of locations that can be specified when deploying resources",
"strongType": "location"
}
},
"metricsEnabled": {
"type": "String",
"metadata": {
"displayName": "Enable metrics",
"description": "Whether to enable metrics stream to the Log Analytics workspace - True or False"
},
"allowedValues": [
"True",
"False"
],
"defaultValue": "True"
},
"logsEnabled": {
"type": "String",
"metadata": {
"displayName": "Enable logs",
"description": "Whether to enable logs stream to the Log Analytics workspace - True or False"
},
"allowedValues": [
"True",
"False"
],
"defaultValue": "True"
}
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.KeyVault/vaults"
},
{
"field": "location",
"in": "[parameters('azureRegions')]"
}
]
},
"then": {
"effect": "[parameters('effect')]",
"details": {
"type": "Microsoft.Insights/diagnosticSettings",
"existenceCondition": {
"allOf": [
{
"field": "Microsoft.Insights/diagnosticSettings/logs.enabled",
"equals": "[parameters('logsEnabled')]"
},
{
"field": "Microsoft.Insights/diagnosticSettings/metrics.enabled",
"equals": "[parameters('metricsEnabled')]"
},
{
"field": "Microsoft.Insights/diagnosticSettings/workspaceId",
"equals": "[parameters('logAnalytics')]"
}
]
},
"roleDefinitionIds": [
"/providers/microsoft.authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa",
"/providers/microsoft.authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293"
],
"deployment": {
"properties": {
"mode": "incremental",
"template": {
"$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"resourceName": {
"type": "string"
},
"location": {
"type": "string"
},
"logAnalytics": {
"type": "string"
},
"metricsEnabled": {
"type": "string"
},
"logsEnabled": {
"type": "string"
},
"profileName": {
"type": "string"
}
},
"variables": {},
"resources": [
{
"type": "Microsoft.KeyVault/vaults/providers/diagnosticSettings",
"apiVersion": "2017-05-01-preview",
"name": "[concat(parameters('resourceName'), '/', 'Microsoft.Insights/', parameters('profileName'))]",
"location": "[parameters('location')]",
"dependsOn": [],
"properties": {
"workspaceId": "[parameters('logAnalytics')]",
"metrics": [
{
"category": "AllMetrics",
"enabled": "[parameters('metricsEnabled')]",
"retentionPolicy": {
"enabled": "false",
"days": 0
}
}
],
"logs": [
{
"category": "AuditEvent",
"enabled": "[parameters('logsEnabled')]"
}
]
}
}
],
"outputs": {}
},
"parameters": {
"location": {
"value": "[field('location')]"
},
"resourceName": {
"value": "[field('name')]"
},
"logAnalytics": {
"value": "[parameters('logAnalytics')]"
},
"metricsEnabled": {
"value": "[parameters('metricsEnabled')]"
},
"logsEnabled": {
"value": "[parameters('logsEnabled')]"
},
"profileName": {
"value": "[parameters('profileName')]"
}
}
}
}
}
}
}})
print("Created policy definition ID : {}".format(definitionatsubscription.id))
print("Created policy definition Name : {} \n".format(definitionatsubscription.name))
print (" ********* ******** ******** ********** ******** ******* \n")
Creation of Policy Definition at Management Group Scope
definitionatmanagementgroup = policy_client.policy_definitions.create_or_update_at_management_group(policy_definition_name=POLICY_NAME,
parameters= {
"displayName": "KVDiag",
"policyType": "Custom",
"mode": "Indexed",
"parameters": {
"effect": {
"type": "String",
"metadata": {
"displayName": "Effect",
"description": "Enable or disable the execution of the policy"
},
"allowedValues": [
"DeployIfNotExists",
"Disabled"
],
"defaultValue": "DeployIfNotExists"
},
"profileName": {
"type": "String",
"metadata": {
"displayName": "Profile name",
"description": "The diagnostic settings profile name"
}
},
"logAnalytics": {
"type": "String",
"metadata": {
"displayName": "Log Analytics workspace",
"description": "Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.",
"strongType": "omsWorkspace",
"assignPermissions": "true"
}
},
"azureRegions": {
"type": "Array",
"metadata": {
"displayName": "Allowed Locations",
"description": "The list of locations that can be specified when deploying resources",
"strongType": "location"
}
},
"metricsEnabled": {
"type": "String",
"metadata": {
"displayName": "Enable metrics",
"description": "Whether to enable metrics stream to the Log Analytics workspace - True or False"
},
"allowedValues": [
"True",
"False"
],
"defaultValue": "True"
},
"logsEnabled": {
"type": "String",
"metadata": {
"displayName": "Enable logs",
"description": "Whether to enable logs stream to the Log Analytics workspace - True or False"
},
"allowedValues": [
"True",
"False"
],
"defaultValue": "True"
}
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.KeyVault/vaults"
},
{
"field": "location",
"in": "[parameters('azureRegions')]"
}
]
},
"then": {
"effect": "[parameters('effect')]",
"details": {
"type": "Microsoft.Insights/diagnosticSettings",
"existenceCondition": {
"allOf": [
{
"field": "Microsoft.Insights/diagnosticSettings/logs.enabled",
"equals": "[parameters('logsEnabled')]"
},
{
"field": "Microsoft.Insights/diagnosticSettings/metrics.enabled",
"equals": "[parameters('metricsEnabled')]"
},
{
"field": "Microsoft.Insights/diagnosticSettings/workspaceId",
"equals": "[parameters('logAnalytics')]"
}
]
},
"roleDefinitionIds": [
"/providers/microsoft.authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa",
"/providers/microsoft.authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293"
],
"deployment": {
"properties": {
"mode": "incremental",
"template": {
"$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"resourceName": {
"type": "string"
},
"location": {
"type": "string"
},
"logAnalytics": {
"type": "string"
},
"metricsEnabled": {
"type": "string"
},
"logsEnabled": {
"type": "string"
},
"profileName": {
"type": "string"
}
},
"variables": {},
"resources": [
{
"type": "Microsoft.KeyVault/vaults/providers/diagnosticSettings",
"apiVersion": "2017-05-01-preview",
"name": "[concat(parameters('resourceName'), '/', 'Microsoft.Insights/', parameters('profileName'))]",
"location": "[parameters('location')]",
"dependsOn": [],
"properties": {
"workspaceId": "[parameters('logAnalytics')]",
"metrics": [
{
"category": "AllMetrics",
"enabled": "[parameters('metricsEnabled')]",
"retentionPolicy": {
"enabled": "false",
"days": 0
}
}
],
"logs": [
{
"category": "AuditEvent",
"enabled": "[parameters('logsEnabled')]"
}
]
}
}
],
"outputs": {}
},
"parameters": {
"location": {
"value": "[field('location')]"
},
"resourceName": {
"value": "[field('name')]"
},
"logAnalytics": {
"value": "[parameters('logAnalytics')]"
},
"metricsEnabled": {
"value": "[parameters('metricsEnabled')]"
},
"logsEnabled": {
"value": "[parameters('logsEnabled')]"
},
"profileName": {
"value": "[parameters('profileName')]"
}
}
}
}
}
}
}},management_group_id= 'abcd-233df-4e7b-a446-2333xcvc'
)
print("Created policy definition ID : {}".format(definitionatmanagementgroup.id))
print("Created policy definition Name : {} \n".format(definitionatmanagementgroup.name))
print (" ********* ******** ******** ********** ******** ******* \n")
Defining Scopes for Policy Assignment
scopeRG = '/subscriptions/{}/resourceGroups/{}'.format(
SUBSCRIPTION_ID,
GROUP_NAME
)
scopeSubscription = '/subscriptions/{}'.format(
SUBSCRIPTION_ID
)
scopeMG = '/providers/Microsoft.Management/managementGroups/{}'.format(
MANAGEMENTGROUP_ID
)
Creating Policy Assignments at different Scope - Resource Group, Subscription and Management Group
assignmentatRG = policy_client.policy_assignments.create(
scopeRG,
POLICY_ASSIGNMENT_NAME + " at RG",
{
'policy_definition_id': definitionatmanagementgroup.id,
"identity": {"type": "SystemAssigned"},
"location" :"eastus",
'parameters' : {
"profileName": {
"value": "KV_DIAG_Settings1"
},
"logAnalytics": {
"value": "/subscriptions/e818bd2d-e44e-4a99-a89c-45be63c6a8ad/resourcegroups/psdonotdeletessimportant/providers/microsoft.operationalinsights/workspaces/lnos-demo-1-log-sb"
},
"azureRegions": {
"value": ["westus"]
}
},
}
)
print("Createed policy assignment: {}".format(assignmentatRG.id))
print("Created policy assignment: {}\n".format(assignmentatRG.name))
print (" ********* ******** ******** ********** ******** ******* \n")
assignmentatsubscription = policy_client.policy_assignments.create(
scopeSubscription,
POLICY_ASSIGNMENT_NAME + "at Subscription",
{
'policy_definition_id': definitionatsubscription.id,
"identity": {"type": "SystemAssigned"},
"location" :"eastus",
'parameters' : {
"profileName": {
"value": "KV_DIAG_Settings2"
},
"logAnalytics": {
"value": "/subscriptions/e818bd2d-e44e-4a99-a89c-45be63c6a8ad/resourcegroups/psdonotdeletessimportant/providers/microsoft.operationalinsights/workspaces/lnos-demo-1-log-sb"
},
"azureRegions": {
"value": ["westus"]
}
}
}
)
print("Created policy assignment: {}".format(assignmentatsubscription.id))
print("Created policy assignment: {} \n".format(assignmentatsubscription.name))
print (" ********* ******** ******** ********** ******** ******* \n")
assignmentatmanagementgroup = policy_client.policy_assignments.create(
scopeMG,
POLICY_ASSIGNMENT_NAME + "at MG",
{
'policy_definition_id': definitionatmanagementgroup.id,
"identity": {"type": "SystemAssigned"},
"location" :"eastus",
'parameters' : {
"profileName": {
"value": "KV_DIAG_Settings3"
},
"logAnalytics": {
"value": "/subscriptions/e818bd2d-e44e-4a99-a89c-45be63c6a8ad/resourcegroups/psdonotdeletessimportant/providers/microsoft.operationalinsights/workspaces/lnos-demo-1-log-sb"
},
"azureRegions": {
"value": ["westus"]
}
}
}
)
print("Created policy assignment: {}".format(assignmentatmanagementgroup.id))
print("Created policy assignment: {}\n".format(assignmentatmanagementgroup.name))
print (" ********* ******** ******** ********** ******** ******* \n")
Trigger manual policy evaluation and get the resource compliance/non-compliance count :
Refernce Article : Start-AzPolicyComplianceScan (Az.PolicyInsights)
triggerevaluation = policyinsights_client.policy_states.begin_trigger_subscription_evaluation(
subscription_id='abc1233-e44e-4a99-a89c-123dfg')
print("Manual policy evaluation triggered :\n{}".format(triggerevaluation.status))
policyevaluationresult = policyinsights_client.policy_states.list_query_results_for_subscription_level_policy_assignment(
subscription_id='abc123-e44e-4a99-a89c-12333df',
policy_states_resource="latest",
policy_assignment_name= '621dc2655dd74ed68a37286d'
)
for item in policyevaluationresult:
print(' Resource ID : '+ item.resource_id)
print(' Policy Assignment ID : '+item.policy_assignment_id)
print(' Policy Assignment Scope : '+item.policy_assignment_scope)
print(' Compliance State : '+item.compliance_state)
print('\n')
if item.compliance_state == 'Compliant':
Compliant= int(Compliant +1)
elif item.compliance_state == 'NonCompliant':
NonCompliant = int(NonCompliant +1)
else:
1==1
print('Number of Resources')
print('Compliant :' + str(Compliant))
print('NonCompliant :' + str(NonCompliant))
Creation of Remediation Task at different Scopes:
remediation = policyinsights_client.remediations.create_or_update_at_management_group("1233-dfdf-4e7b-a446-223233",
"mymgremediation" ,
{
"policy_assignment_id": "/providers/microsoft.management/managementgroups/6cf4d5f3-dfdf-4e7b-a446-48ebcd07d17c/providers/microsoft.authorization/policyassignments/logagents",
## "policy_definition_reference_id" : "4037797753452518688" ## (optional) Needed when we need to remediate the non-compliant resources of policy initiative assignment
})
print("Create remediation:\n{}".format(remediation))
remediationRG = policyinsights_client.remediations.create_or_update_at_resource_group(
"myremediationatRG", "aro-rererer",
{
"policy_assignment_id": "/providers/microsoft.management/managementgroups/12345-dfdf-4e7b-a446-48ebcd07d17c/providers/microsoft.authorization/policyassignments/logagents",
"resource_discovery_mode" : 'ExistingNonCompliant' ## ReEvaluateCompliance - Re-evaluate the compliance state of resources and then remediate the resources found to be non-compliant.
##ExistingNonCompliant - Remediate resources that are already known to be non-compliant.
})
print("Create remediation:\n{}".format(remediationRG))
remediationsubscription = policyinsights_client.remediations.create_or_update_at_subscription(
"mymgremediationatsubsc" ,
{
"policy_assignment_id": "/providers/microsoft.management/managementgroups/12333-dfdf-4e7b-a446-48ebcd07d17c/providers/microsoft.authorization/policyassignments/logagents",
"resource_discovery_mode" : 'ReEvaluateCompliance' ## ReEvaluateCompliance - Re-evaluate the compliance state of resources and then remediate the resources found to be non-compliant.
##ExistingNonCompliant - Remediate resources that are already known to be non-compliant.
## "policy_definition_reference_id" : "4037797753452518688"
})
print("Create remediation:\n{}".format(remediationsubscription))
Note - resource_discovery_mode is only for the policy assignments at the subscription and the resource group scope.
Continue reading...