Skip to content

Commit b471a74

Browse files
authored
Extract more resources to their own files (#15091)
* extract more resources to their own files * fix comments * add aggregations to readme * fixes * fixes * aggregations * . * userInfo * aggregations
1 parent fa3ba1a commit b471a74

File tree

10 files changed

+10457
-10362
lines changed

10 files changed

+10457
-10362
lines changed
Lines changed: 97 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
{
2+
"swagger": "2.0",
3+
"info": {
4+
"title": "Security Insights",
5+
"description": "API spec for Microsoft.SecurityInsights (Azure Security Insights) resource provider",
6+
"version": "2019-01-01-preview"
7+
},
8+
"host": "management.azure.com",
9+
"schemes": [
10+
"https"
11+
],
12+
"consumes": [
13+
"application/json"
14+
],
15+
"produces": [
16+
"application/json"
17+
],
18+
"security": [
19+
{
20+
"azure_auth": [
21+
"user_impersonation"
22+
]
23+
}
24+
],
25+
"securityDefinitions": {
26+
"azure_auth": {
27+
"type": "oauth2",
28+
"authorizationUrl": "https://login.microsoftonline.com/common/oauth2/authorize",
29+
"flow": "implicit",
30+
"description": "Azure Active Directory OAuth2 Flow",
31+
"scopes": {
32+
"user_impersonation": "impersonate your user account"
33+
}
34+
}
35+
},
36+
"paths": {
37+
"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{operationalInsightsResourceProvider}/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/aggregations/{aggregationsName}": {
38+
"get": {
39+
"x-ms-examples": {
40+
"Get aggregative data for all cases under the defined workspace, between the time range if specified.": {
41+
"$ref": "./examples/aggregations/GetCasesAggregations.json"
42+
}
43+
},
44+
"tags": [
45+
"Aggregations"
46+
],
47+
"description": "Get aggregative result for the given resources under the defined workspace",
48+
"operationId": "CasesAggregations_Get",
49+
"parameters": [
50+
{
51+
"$ref": "SecurityInsights.json#/parameters/ApiVersion"
52+
},
53+
{
54+
"$ref": "SecurityInsights.json#/parameters/SubscriptionId"
55+
},
56+
{
57+
"$ref": "SecurityInsights.json#/parameters/ResourceGroupName"
58+
},
59+
{
60+
"$ref": "SecurityInsights.json#/parameters/OperationalInsightsResourceProvider"
61+
},
62+
{
63+
"$ref": "SecurityInsights.json#/parameters/WorkspaceName"
64+
},
65+
{
66+
"$ref": "#/parameters/AggregationsName"
67+
}
68+
],
69+
"responses": {
70+
"200": {
71+
"description": "OK",
72+
"schema": {
73+
"$ref": "SecurityInsights.json#/definitions/Aggregations"
74+
}
75+
},
76+
"default": {
77+
"description": "Error response describing why the operation failed.",
78+
"schema": {
79+
"$ref": "SecurityInsights.json#/definitions/CloudError"
80+
}
81+
}
82+
}
83+
}
84+
}
85+
},
86+
"parameters": {
87+
"AggregationsName": {
88+
"description": "The aggregation name. Supports - Cases",
89+
"in": "path",
90+
"name": "aggregationsName",
91+
"required": true,
92+
"type": "string",
93+
"x-ms-parameter-location": "method"
94+
}
95+
},
96+
"definitions": {}
97+
}

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2019-01-01-preview/AutomationRules.json

Lines changed: 8 additions & 213 deletions
Original file line numberDiff line numberDiff line change
@@ -371,13 +371,13 @@
371371
"type": "string"
372372
},
373373
"createdBy": {
374-
"$ref": "#/definitions/ClientInfo",
374+
"$ref": "SecurityInsights.json#/definitions/ClientInfo",
375375
"description": "Describes the client that created the automation rule",
376376
"readOnly": true,
377377
"type": "object"
378378
},
379379
"lastModifiedBy": {
380-
"$ref": "#/definitions/ClientInfo",
380+
"$ref": "SecurityInsights.json#/definitions/ClientInfo",
381381
"description": "Describes the client that last updated the automation rule",
382382
"readOnly": true,
383383
"type": "object"
@@ -453,35 +453,35 @@
453453
"description": "The configuration of the modify properties automation rule action",
454454
"properties": {
455455
"classification": {
456-
"$ref": "#/definitions/IncidentClassification",
456+
"$ref": "SecurityInsights.json#/definitions/IncidentClassification",
457457
"description": "The reason the incident was closed"
458458
},
459459
"classificationComment": {
460460
"description": "Describes the reason the incident was closed",
461461
"type": "string"
462462
},
463463
"classificationReason": {
464-
"$ref": "#/definitions/IncidentClassificationReason",
464+
"$ref": "SecurityInsights.json#/definitions/IncidentClassificationReason",
465465
"description": "The classification reason to close the incident with"
466466
},
467467
"labels": {
468468
"description": "List of labels to add to the incident",
469469
"items": {
470-
"$ref": "#/definitions/IncidentLabel"
470+
"$ref": "SecurityInsights.json#/definitions/IncidentLabel"
471471
},
472472
"type": "array"
473473
},
474474
"owner": {
475-
"$ref": "#/definitions/IncidentOwnerInfo",
475+
"$ref": "SecurityInsights.json#/definitions/IncidentOwnerInfo",
476476
"description": "Describes a user that the incident is assigned to",
477477
"type": "object"
478478
},
479479
"severity": {
480-
"$ref": "#/definitions/IncidentSeverity",
480+
"$ref": "SecurityInsights.json#/definitions/IncidentSeverity",
481481
"description": "The severity of the incident"
482482
},
483483
"status": {
484-
"$ref": "#/definitions/IncidentStatus",
484+
"$ref": "SecurityInsights.json#/definitions/IncidentStatus",
485485
"description": "The status of the incident"
486486
}
487487
},
@@ -913,211 +913,6 @@
913913
"triggersWhen"
914914
],
915915
"type": "object"
916-
},
917-
"ClientInfo": {
918-
"description": "Information on the client (user or application) that made some action",
919-
"properties": {
920-
"email": {
921-
"description": "The email of the client.",
922-
"type": "string"
923-
},
924-
"name": {
925-
"description": "The name of the client.",
926-
"type": "string"
927-
},
928-
"objectId": {
929-
"description": "The object id of the client.",
930-
"format": "uuid",
931-
"type": "string"
932-
},
933-
"userPrincipalName": {
934-
"description": "The user principal name of the client.",
935-
"type": "string"
936-
}
937-
},
938-
"type": "object"
939-
},
940-
"IncidentClassification": {
941-
"description": "The reason the incident was closed",
942-
"enum": [
943-
"Undetermined",
944-
"TruePositive",
945-
"BenignPositive",
946-
"FalsePositive"
947-
],
948-
"type": "string",
949-
"x-ms-enum": {
950-
"modelAsString": true,
951-
"name": "IncidentClassification",
952-
"values": [
953-
{
954-
"description": "Incident classification was undetermined",
955-
"value": "Undetermined"
956-
},
957-
{
958-
"description": "Incident was true positive",
959-
"value": "TruePositive"
960-
},
961-
{
962-
"description": "Incident was benign positive",
963-
"value": "BenignPositive"
964-
},
965-
{
966-
"description": "Incident was false positive",
967-
"value": "FalsePositive"
968-
}
969-
]
970-
}
971-
},
972-
"IncidentClassificationReason": {
973-
"description": "The classification reason the incident was closed with",
974-
"enum": [
975-
"SuspiciousActivity",
976-
"SuspiciousButExpected",
977-
"IncorrectAlertLogic",
978-
"InaccurateData"
979-
],
980-
"type": "string",
981-
"x-ms-enum": {
982-
"modelAsString": true,
983-
"name": "IncidentClassificationReason",
984-
"values": [
985-
{
986-
"description": "Classification reason was suspicious activity",
987-
"value": "SuspiciousActivity"
988-
},
989-
{
990-
"description": "Classification reason was suspicious but expected",
991-
"value": "SuspiciousButExpected"
992-
},
993-
{
994-
"description": "Classification reason was incorrect alert logic",
995-
"value": "IncorrectAlertLogic"
996-
},
997-
{
998-
"description": "Classification reason was inaccurate data",
999-
"value": "InaccurateData"
1000-
}
1001-
]
1002-
}
1003-
},
1004-
"IncidentLabel": {
1005-
"description": "Represents an incident label",
1006-
"properties": {
1007-
"labelName": {
1008-
"description": "The name of the label",
1009-
"type": "string"
1010-
},
1011-
"labelType": {
1012-
"description": "The type of the label",
1013-
"enum": [
1014-
"User",
1015-
"System"
1016-
],
1017-
"type": "string",
1018-
"readOnly": true,
1019-
"x-ms-enum": {
1020-
"modelAsString": true,
1021-
"name": "IncidentLabelType",
1022-
"values": [
1023-
{
1024-
"description": "Label manually created by a user",
1025-
"value": "User"
1026-
},
1027-
{
1028-
"description": "Label automatically created by the system",
1029-
"value": "System"
1030-
}
1031-
]
1032-
}
1033-
}
1034-
},
1035-
"required": [
1036-
"labelName"
1037-
],
1038-
"type": "object"
1039-
},
1040-
"IncidentOwnerInfo": {
1041-
"description": "Information on the user an incident is assigned to",
1042-
"properties": {
1043-
"email": {
1044-
"description": "The email of the user the incident is assigned to.",
1045-
"type": "string"
1046-
},
1047-
"assignedTo": {
1048-
"description": "The name of the user the incident is assigned to.",
1049-
"type": "string"
1050-
},
1051-
"objectId": {
1052-
"description": "The object id of the user the incident is assigned to.",
1053-
"format": "uuid",
1054-
"type": "string"
1055-
},
1056-
"userPrincipalName": {
1057-
"description": "The user principal name of the user the incident is assigned to.",
1058-
"type": "string"
1059-
}
1060-
},
1061-
"type": "object"
1062-
},
1063-
"IncidentSeverity": {
1064-
"description": "The severity of the incident",
1065-
"enum": [
1066-
"High",
1067-
"Medium",
1068-
"Low",
1069-
"Informational"
1070-
],
1071-
"type": "string",
1072-
"x-ms-enum": {
1073-
"modelAsString": true,
1074-
"name": "IncidentSeverity",
1075-
"values": [
1076-
{
1077-
"description": "High severity",
1078-
"value": "High"
1079-
},
1080-
{
1081-
"description": "Medium severity",
1082-
"value": "Medium"
1083-
},
1084-
{
1085-
"description": "Low severity",
1086-
"value": "Low"
1087-
},
1088-
{
1089-
"description": "Informational severity",
1090-
"value": "Informational"
1091-
}
1092-
]
1093-
}
1094-
},
1095-
"IncidentStatus": {
1096-
"description": "The status of the incident",
1097-
"enum": [
1098-
"New",
1099-
"Active",
1100-
"Closed"
1101-
],
1102-
"type": "string",
1103-
"x-ms-enum": {
1104-
"modelAsString": true,
1105-
"name": "IncidentStatus",
1106-
"values": [
1107-
{
1108-
"description": "An active incident which isn't being handled currently",
1109-
"value": "New"
1110-
},
1111-
{
1112-
"description": "An active incident which is being handled",
1113-
"value": "Active"
1114-
},
1115-
{
1116-
"description": "A non-active incident",
1117-
"value": "Closed"
1118-
}
1119-
]
1120-
}
1121916
}
1122917
}
1123918
}

0 commit comments

Comments
 (0)