vw_sql_vulnerability_assessment_scans
Creates, updates, deletes, gets or lists a vw_sql_vulnerability_assessment_scans
resource.
Overview
Name | vw_sql_vulnerability_assessment_scans |
Type | View |
Id | azure.security.vw_sql_vulnerability_assessment_scans |
Fields
See the SQL Definition (view DDL) for fields returned by this view.
SQL Definition
- Sqlite3
- Postgres
SELECT
id as id,
name as name,
type as type,
systemData as system_data,
JSON_EXTRACT(properties, '$.triggerType') as "trigger_type",
JSON_EXTRACT(properties, '$.state') as "state",
JSON_EXTRACT(properties, '$.server') as "server",
JSON_EXTRACT(properties, '$.database') as "database",
JSON_EXTRACT(properties, '$.sqlVersion') as "sql_version",
JSON_EXTRACT(properties, '$.startTime') as "start_time",
JSON_EXTRACT(properties, '$.endTime') as "end_time",
JSON_EXTRACT(properties, '$.highSeverityFailedRulesCount') as "high_severity_failed_rules_count",
JSON_EXTRACT(properties, '$.mediumSeverityFailedRulesCount') as "medium_severity_failed_rules_count",
JSON_EXTRACT(properties, '$.lowSeverityFailedRulesCount') as "low_severity_failed_rules_count",
JSON_EXTRACT(properties, '$.totalPassedRulesCount') as "total_passed_rules_count",
JSON_EXTRACT(properties, '$.totalFailedRulesCount') as "total_failed_rules_count",
JSON_EXTRACT(properties, '$.totalRulesCount') as "total_rules_count",
JSON_EXTRACT(properties, '$.isBaselineApplied') as "is_baseline_applied",
JSON_EXTRACT(properties, '$.lastScanTime') as "last_scan_time",
resourceId,
scanId,
workspaceId
FROM azure.security.sql_vulnerability_assessment_scans
WHERE resourceId = 'replace-me' AND workspaceId = 'replace-me';
SELECT
id as id,
name as name,
type as type,
systemData as system_data,
json_extract_path_text(properties, '$.triggerType') as "trigger_type",
json_extract_path_text(properties, '$.state') as "state",
json_extract_path_text(properties, '$.server') as "server",
json_extract_path_text(properties, '$.database') as "database",
json_extract_path_text(properties, '$.sqlVersion') as "sql_version",
json_extract_path_text(properties, '$.startTime') as "start_time",
json_extract_path_text(properties, '$.endTime') as "end_time",
json_extract_path_text(properties, '$.highSeverityFailedRulesCount') as "high_severity_failed_rules_count",
json_extract_path_text(properties, '$.mediumSeverityFailedRulesCount') as "medium_severity_failed_rules_count",
json_extract_path_text(properties, '$.lowSeverityFailedRulesCount') as "low_severity_failed_rules_count",
json_extract_path_text(properties, '$.totalPassedRulesCount') as "total_passed_rules_count",
json_extract_path_text(properties, '$.totalFailedRulesCount') as "total_failed_rules_count",
json_extract_path_text(properties, '$.totalRulesCount') as "total_rules_count",
json_extract_path_text(properties, '$.isBaselineApplied') as "is_baseline_applied",
json_extract_path_text(properties, '$.lastScanTime') as "last_scan_time",
resourceId,
scanId,
workspaceId
FROM azure.security.sql_vulnerability_assessment_scans
WHERE resourceId = 'replace-me' AND workspaceId = 'replace-me';