Skip to content

azurermSentinelDataConnectorMicrosoftCloudAppSecurity

Manages a Microsoft Cloud App Security Data Connector.

!> NOTE: This resource requires that Enterprise Mobility + Security E5 is enabled on the tenant being connected to.

Example Usage

/*Provider bindings are generated by running cdktf get.
See https://cdk.tf/provider-generation for more details.*/
import * as azurerm from "./.gen/providers/azurerm";
/*The following providers are missing schema information and might need manual adjustments to synthesize correctly: azurerm.
For a more precise conversion please use the --provider flag in convert.*/
const azurermResourceGroupExample = new azurerm.resourceGroup.ResourceGroup(
  this,
  "example",
  {
    location: "west europe",
    name: "example-rg",
  }
);
const azurermLogAnalyticsWorkspaceExample =
  new azurerm.logAnalyticsWorkspace.LogAnalyticsWorkspace(this, "example_1", {
    location: azurermResourceGroupExample.location,
    name: "example-workspace",
    resource_group_name: azurermResourceGroupExample.name,
    sku: "PerGB2018",
  });
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermLogAnalyticsWorkspaceExample.overrideLogicalId("example");
const azurermSentinelLogAnalyticsWorkspaceOnboardingExample =
  new azurerm.sentinelLogAnalyticsWorkspaceOnboarding.SentinelLogAnalyticsWorkspaceOnboarding(
    this,
    "example_2",
    {
      workspace_id: azurermLogAnalyticsWorkspaceExample.id,
    }
  );
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermSentinelLogAnalyticsWorkspaceOnboardingExample.overrideLogicalId(
  "example"
);
const azurermSentinelDataConnectorMicrosoftCloudAppSecurityExample =
  new azurerm.sentinelDataConnectorMicrosoftCloudAppSecurity.SentinelDataConnectorMicrosoftCloudAppSecurity(
    this,
    "example_3",
    {
      log_analytics_workspace_id:
        azurermSentinelLogAnalyticsWorkspaceOnboardingExample.workspaceId,
      name: "example",
    }
  );
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermSentinelDataConnectorMicrosoftCloudAppSecurityExample.overrideLogicalId(
  "example"
);

Arguments Reference

The following arguments are supported:

  • logAnalyticsWorkspaceId - (Required) The ID of the Log Analytics Workspace that this Microsoft Cloud App Security Data Connector resides in. Changing this forces a new Microsoft Cloud App Security Data Connector to be created.

  • name - (Required) The name which should be used for this Microsoft Cloud App Security Data Connector. Changing this forces a new Microsoft Cloud App Security Data Connector to be created.


  • alertsEnabled - (Optional) Should the alerts be enabled? Defaults to true.

  • discoveryLogsEnabled - (Optional) Should the Discovery Logs be enabled? Defaults to true.

-> NOTE: One of either alertsEnabled or discoveryLogsEnabled has to be specified.

  • tenantId - (Optional) The ID of the Tenant that this Microsoft Cloud App Security Data Connector connects to.

-> NOTE Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.

Attributes Reference

In addition to the Arguments listed above - the following Attributes are exported:

  • id - The ID of the Microsoft Cloud App Security Data Connector.

Timeouts

The timeouts block allows you to specify timeouts for certain actions:

  • create - (Defaults to 30 minutes) Used when creating the Microsoft Cloud App Security Data Connector.
  • read - (Defaults to 5 minutes) Used when retrieving the Microsoft Cloud App Security Data Connector.
  • update - (Defaults to 30 minutes) Used when updating the Microsoft Cloud App Security Data Connector.
  • delete - (Defaults to 30 minutes) Used when deleting the Microsoft Cloud App Security Data Connector.

Import

Microsoft Cloud App Security Data Connectors can be imported using the resourceId, e.g.

terraform import azurerm_sentinel_data_connector_microsoft_cloud_app_security.example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.OperationalInsights/workspaces/workspace1/providers/Microsoft.SecurityInsights/dataConnectors/dc1