action-rules
This Bicep AVM module deploys an Alert Processing Rule.
ipm add --package avm-bicep/action-rules --version 0.2.2
Action Rules [Microsoft.AlertsManagement/actionRules]
This module deploys an Alert Processing Rule.
Navigation
Resource Types
Resource Type | API Version |
---|---|
Microsoft.AlertsManagement/actionRules |
2021-08-08 |
Microsoft.Authorization/locks |
2020-05-01 |
Microsoft.Authorization/roleAssignments |
2022-04-01 |
Usage examples
The following section provides usage examples for the module, which were used to validate and deploy the module successfully. For a full reference, please review the module's test folder in its repository.
Note: Each example lists all the required parameters first, followed by the rest - each in alphabetical order.
Note: To reference the module, please use the following syntax
./packages/action-rules/main.bicep
.
Example 1: Using small parameter set
This instance deploys the module with min features enabled.
via Bicep module
module actionRule './packages/action-rules/main.bicep' = {
name: 'actionRuleDeployment'
params: {
// Required parameters
name: 'aprmin001'
// Non-required parameters
location: '<location>'
}
}
via JSON parameters file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
"contentVersion": "1.0.0.0",
"parameters": {
// Required parameters
"name": {
"value": "aprmin001"
},
// Non-required parameters
"location": {
"value": "<location>"
}
}
}
via Bicep parameters file
using './packages/action-rules/main.bicep'
// Required parameters
param name = 'aprmin001'
// Non-required parameters
param location = '<location>'
Example 2: Using large parameter set
This instance deploys the module with most of its features enabled.
via Bicep module
module actionRule './packages/action-rules/main.bicep' = {
name: 'actionRuleDeployment'
params: {
// Required parameters
name: 'aprmax001'
// Non-required parameters
actions: [
{
actionGroupIds: [
'<actionGroupResourceId>'
]
actionType: 'AddActionGroups'
}
]
aprDescription: 'Test deployment of the module with the max set of parameters.'
conditions: [
{
field: 'AlertContext'
operator: 'NotEquals'
values: [
'myAlertContext'
]
}
{
field: 'AlertRuleId'
operator: 'Equals'
values: [
'<activityLogAlertResourceId>'
]
}
{
field: 'AlertRuleName'
operator: 'Equals'
values: [
'<activityLogAlertResourceName>'
]
}
{
field: 'Description'
operator: 'Contains'
values: [
'myAlertRuleDescription'
]
}
{
field: 'MonitorService'
operator: 'Equals'
values: [
'ActivityLog Administrative'
]
}
{
field: 'MonitorCondition'
operator: 'Equals'
values: [
'Fired'
]
}
{
field: 'TargetResourceType'
operator: 'DoesNotContain'
values: [
'myAlertResourceType'
]
}
{
field: 'TargetResource'
operator: 'Equals'
values: [
'myAlertResource1'
'myAlertResource2'
]
}
{
field: 'TargetResourceGroup'
operator: 'Equals'
values: [
'<id>'
]
}
{
field: 'Severity'
operator: 'Equals'
values: [
'Sev0'
'Sev1'
'Sev2'
'Sev3'
'Sev4'
]
}
{
field: 'SignalType'
operator: 'Equals'
values: [
'Health'
'Log'
'Metric'
'Unknown'
]
}
]
enabled: true
location: '<location>'
lock: {
kind: 'CanNotDelete'
name: 'myCustomLockName'
}
roleAssignments: [
{
name: 'a66da6bc-b3ee-484e-9bdb-9294938bb327'
principalId: '<principalId>'
principalType: 'ServicePrincipal'
roleDefinitionIdOrName: 'Owner'
}
{
name: '<name>'
principalId: '<principalId>'
principalType: 'ServicePrincipal'
roleDefinitionIdOrName: 'b24988ac-6180-42a0-ab88-20f7382dd24c'
}
{
principalId: '<principalId>'
principalType: 'ServicePrincipal'
roleDefinitionIdOrName: '<roleDefinitionIdOrName>'
}
]
scopes: [
'<id>'
]
tags: {
Environment: 'Non-Prod'
'hidden-title': 'This is visible in the resource name'
Role: 'DeploymentValidation'
}
}
}
via JSON parameters file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
"contentVersion": "1.0.0.0",
"parameters": {
// Required parameters
"name": {
"value": "aprmax001"
},
// Non-required parameters
"actions": {
"value": [
{
"actionGroupIds": [
"<actionGroupResourceId>"
],
"actionType": "AddActionGroups"
}
]
},
"aprDescription": {
"value": "Test deployment of the module with the max set of parameters."
},
"conditions": {
"value": [
{
"field": "AlertContext",
"operator": "NotEquals",
"values": [
"myAlertContext"
]
},
{
"field": "AlertRuleId",
"operator": "Equals",
"values": [
"<activityLogAlertResourceId>"
]
},
{
"field": "AlertRuleName",
"operator": "Equals",
"values": [
"<activityLogAlertResourceName>"
]
},
{
"field": "Description",
"operator": "Contains",
"values": [
"myAlertRuleDescription"
]
},
{
"field": "MonitorService",
"operator": "Equals",
"values": [
"ActivityLog Administrative"
]
},
{
"field": "MonitorCondition",
"operator": "Equals",
"values": [
"Fired"
]
},
{
"field": "TargetResourceType",
"operator": "DoesNotContain",
"values": [
"myAlertResourceType"
]
},
{
"field": "TargetResource",
"operator": "Equals",
"values": [
"myAlertResource1",
"myAlertResource2"
]
},
{
"field": "TargetResourceGroup",
"operator": "Equals",
"values": [
"<id>"
]
},
{
"field": "Severity",
"operator": "Equals",
"values": [
"Sev0",
"Sev1",
"Sev2",
"Sev3",
"Sev4"
]
},
{
"field": "SignalType",
"operator": "Equals",
"values": [
"Health",
"Log",
"Metric",
"Unknown"
]
}
]
},
"enabled": {
"value": true
},
"location": {
"value": "<location>"
},
"lock": {
"value": {
"kind": "CanNotDelete",
"name": "myCustomLockName"
}
},
"roleAssignments": {
"value": [
{
"name": "a66da6bc-b3ee-484e-9bdb-9294938bb327",
"principalId": "<principalId>",
"principalType": "ServicePrincipal",
"roleDefinitionIdOrName": "Owner"
},
{
"name": "<name>",
"principalId": "<principalId>",
"principalType": "ServicePrincipal",
"roleDefinitionIdOrName": "b24988ac-6180-42a0-ab88-20f7382dd24c"
},
{
"principalId": "<principalId>",
"principalType": "ServicePrincipal",
"roleDefinitionIdOrName": "<roleDefinitionIdOrName>"
}
]
},
"scopes": {
"value": [
"<id>"
]
},
"tags": {
"value": {
"Environment": "Non-Prod",
"hidden-title": "This is visible in the resource name",
"Role": "DeploymentValidation"
}
}
}
}
via Bicep parameters file
using './packages/action-rules/main.bicep'
// Required parameters
param name = 'aprmax001'
// Non-required parameters
param actions = [
{
actionGroupIds: [
'<actionGroupResourceId>'
]
actionType: 'AddActionGroups'
}
]
param aprDescription = 'Test deployment of the module with the max set of parameters.'
param conditions = [
{
field: 'AlertContext'
operator: 'NotEquals'
values: [
'myAlertContext'
]
}
{
field: 'AlertRuleId'
operator: 'Equals'
values: [
'<activityLogAlertResourceId>'
]
}
{
field: 'AlertRuleName'
operator: 'Equals'
values: [
'<activityLogAlertResourceName>'
]
}
{
field: 'Description'
operator: 'Contains'
values: [
'myAlertRuleDescription'
]
}
{
field: 'MonitorService'
operator: 'Equals'
values: [
'ActivityLog Administrative'
]
}
{
field: 'MonitorCondition'
operator: 'Equals'
values: [
'Fired'
]
}
{
field: 'TargetResourceType'
operator: 'DoesNotContain'
values: [
'myAlertResourceType'
]
}
{
field: 'TargetResource'
operator: 'Equals'
values: [
'myAlertResource1'
'myAlertResource2'
]
}
{
field: 'TargetResourceGroup'
operator: 'Equals'
values: [
'<id>'
]
}
{
field: 'Severity'
operator: 'Equals'
values: [
'Sev0'
'Sev1'
'Sev2'
'Sev3'
'Sev4'
]
}
{
field: 'SignalType'
operator: 'Equals'
values: [
'Health'
'Log'
'Metric'
'Unknown'
]
}
]
param enabled = true
param location = '<location>'
param lock = {
kind: 'CanNotDelete'
name: 'myCustomLockName'
}
param roleAssignments = [
{
name: 'a66da6bc-b3ee-484e-9bdb-9294938bb327'
principalId: '<principalId>'
principalType: 'ServicePrincipal'
roleDefinitionIdOrName: 'Owner'
}
{
name: '<name>'
principalId: '<principalId>'
principalType: 'ServicePrincipal'
roleDefinitionIdOrName: 'b24988ac-6180-42a0-ab88-20f7382dd24c'
}
{
principalId: '<principalId>'
principalType: 'ServicePrincipal'
roleDefinitionIdOrName: '<roleDefinitionIdOrName>'
}
]
param scopes = [
'<id>'
]
param tags = {
Environment: 'Non-Prod'
'hidden-title': 'This is visible in the resource name'
Role: 'DeploymentValidation'
}
Example 3: WAF-aligned
This instance deploys the module in alignment with the best-practices of the Azure Well-Architected Framework.
via Bicep module
module actionRule './packages/action-rules/main.bicep' = {
name: 'actionRuleDeployment'
params: {
// Required parameters
name: 'aprwaf001'
// Non-required parameters
actions: [
{
actionGroupIds: [
'<actionGroupResourceId>'
]
actionType: 'AddActionGroups'
}
]
aprDescription: 'Test deployment of the module with the waf aligned set of parameters.'
location: '<location>'
scopes: [
'<id>'
]
}
}
via JSON parameters file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
"contentVersion": "1.0.0.0",
"parameters": {
// Required parameters
"name": {
"value": "aprwaf001"
},
// Non-required parameters
"actions": {
"value": [
{
"actionGroupIds": [
"<actionGroupResourceId>"
],
"actionType": "AddActionGroups"
}
]
},
"aprDescription": {
"value": "Test deployment of the module with the waf aligned set of parameters."
},
"location": {
"value": "<location>"
},
"scopes": {
"value": [
"<id>"
]
}
}
}
via Bicep parameters file
using './packages/action-rules/main.bicep'
// Required parameters
param name = 'aprwaf001'
// Non-required parameters
param actions = [
{
actionGroupIds: [
'<actionGroupResourceId>'
]
actionType: 'AddActionGroups'
}
]
param aprDescription = 'Test deployment of the module with the waf aligned set of parameters.'
param location = '<location>'
param scopes = [
'<id>'
]
Parameters
Required parameters
Parameter | Type | Description |
---|---|---|
name |
string | Name of the alert processing rule. |
Optional parameters
Parameter | Type | Description |
---|---|---|
actions |
array | Actions to be applied. |
aprDescription |
string | Description of the alert processing rule. |
conditions |
array | Conditions on which alerts will be filtered. |
enabled |
bool | Indicates if the given alert processing rule is enabled or disabled. |
enableTelemetry |
bool | Enable/Disable usage telemetry for module. |
location |
string | Location for all resources. |
lock |
object | The lock settings of the service. |
roleAssignments |
array | Array of role assignments to create. |
schedule |
object | Scheduling for alert processing rule. |
scopes |
array | Scopes on which alert processing rule will apply. |
tags |
object | Resource tags. |
Parameter: name
Name of the alert processing rule.
- Required: Yes
- Type: string
Parameter: actions
Actions to be applied.
- Required: No
- Type: array
- Default:
[ { actionType: 'RemoveAllActionGroups' } ]
Parameter: aprDescription
Description of the alert processing rule.
- Required: No
- Type: string
- Default:
''
Parameter: conditions
Conditions on which alerts will be filtered.
- Required: No
- Type: array
Parameter: enabled
Indicates if the given alert processing rule is enabled or disabled.
- Required: No
- Type: bool
- Default:
True
Parameter: enableTelemetry
Enable/Disable usage telemetry for module.
- Required: No
- Type: bool
- Default:
True
Parameter: location
Location for all resources.
- Required: No
- Type: string
- Default:
'global'
Parameter: lock
The lock settings of the service.
- Required: No
- Type: object
Optional parameters
Parameter | Type | Description |
---|---|---|
kind |
string | Specify the type of lock. |
name |
string | Specify the name of lock. |
Parameter: lock.kind
Specify the type of lock.
- Required: No
- Type: string
- Allowed:
[ 'CanNotDelete' 'None' 'ReadOnly' ]
Parameter: lock.name
Specify the name of lock.
- Required: No
- Type: string
Parameter: roleAssignments
Array of role assignments to create.
- Required: No
- Type: array
- Roles configurable by name:
'Contributor'
'Owner'
'Reader'
'Role Based Access Control Administrator'
'User Access Administrator'
Required parameters
Parameter | Type | Description |
---|---|---|
principalId |
string | The principal ID of the principal (user/group/identity) to assign the role to. |
roleDefinitionIdOrName |
string | The role to assign. You can provide either the display name of the role definition, the role definition GUID, or its fully qualified ID in the following format: '/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11'. |
Optional parameters
Parameter | Type | Description |
---|---|---|
condition |
string | The conditions on the role assignment. This limits the resources it can be assigned to. e.g.: @Resource[Microsoft.Storage/storageAccounts/blobServices/containers:ContainerName] StringEqualsIgnoreCase "foo_storage_container". |
conditionVersion |
string | Version of the condition. |
delegatedManagedIdentityResourceId |
string | The Resource Id of the delegated managed identity resource. |
description |
string | The description of the role assignment. |
name |
string | The name (as GUID) of the role assignment. If not provided, a GUID will be generated. |
principalType |
string | The principal type of the assigned principal ID. |
Parameter: roleAssignments.principalId
The principal ID of the principal (user/group/identity) to assign the role to.
- Required: Yes
- Type: string
Parameter: roleAssignments.roleDefinitionIdOrName
The role to assign. You can provide either the display name of the role definition, the role definition GUID, or its fully qualified ID in the following format: '/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11'.
- Required: Yes
- Type: string
Parameter: roleAssignments.condition
The conditions on the role assignment. This limits the resources it can be assigned to. e.g.: @Resource[Microsoft.Storage/storageAccounts/blobServices/containers:ContainerName] StringEqualsIgnoreCase "foo_storage_container".
- Required: No
- Type: string
Parameter: roleAssignments.conditionVersion
Version of the condition.
- Required: No
- Type: string
- Allowed:
[ '2.0' ]
Parameter: roleAssignments.delegatedManagedIdentityResourceId
The Resource Id of the delegated managed identity resource.
- Required: No
- Type: string
Parameter: roleAssignments.description
The description of the role assignment.
- Required: No
- Type: string
Parameter: roleAssignments.name
The name (as GUID) of the role assignment. If not provided, a GUID will be generated.
- Required: No
- Type: string
Parameter: roleAssignments.principalType
The principal type of the assigned principal ID.
- Required: No
- Type: string
- Allowed:
[ 'Device' 'ForeignGroup' 'Group' 'ServicePrincipal' 'User' ]
Parameter: schedule
Scheduling for alert processing rule.
- Required: No
- Type: object
Parameter: scopes
Scopes on which alert processing rule will apply.
- Required: No
- Type: array
- Default:
[ '[subscription().id]' ]
Parameter: tags
Resource tags.
- Required: No
- Type: object
Outputs
Output | Type | Description |
---|---|---|
location |
string | The location the resource was deployed into. |
name |
string | The name of the Alert Processing Rule. |
resourceGroupName |
string | The resource group the action group was deployed into. |
resourceId |
string | The resource ID of the Alert Processing Rule. |
Cross-referenced modules
This section gives you an overview of all local-referenced module files (i.e., other modules that are referenced in this module) and all remote-referenced files (i.e., Bicep modules that are referenced from a Bicep Registry or Template Specs).
Reference | Type |
---|---|
./packages/utl-common-types/main.bicep |
Local Reference |
Data Collection
The software may collect information about you and your use of the software and send it to Microsoft. Microsoft may use this information to provide services and improve our products and services. You may turn off the telemetry as described in the repository. There are also some features in the software that may enable you and Microsoft to collect data from users of your applications. If you use these features, you must comply with applicable law, including providing appropriate notices to users of your applications together with a copy of Microsoft’s privacy statement. Our privacy statement is located at https://go.microsoft.com/fwlink/?LinkID=824704. You can learn more about data collection and use in the help documentation and our privacy statement. Your use of the software operates as your consent to these practices.
No release notes uploaded for this version
{
"workingFolder": "packages",
"packages": [
// packages defined earlier
{
"name": "avm-bicep/action-rules",
"version": "0.2.2"
}
]
}
Stats
Selected version:
0.2.2
Downloads this version:
3
Downloads all versions:
4
Latest version:
0.2.2
Latest update:
10-04-2025