-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Ability to filter on resource type for az group export #31315
Copy link
Copy link
Open
Labels
ARMaz resource/group/lock/tag/deployment/policy/managementapp/account management-groupaz resource/group/lock/tag/deployment/policy/managementapp/account management-groupAuto-AssignAuto assign by botAuto assign by botAzure Deploymentsaz deployment/bicep/stack/deployment-scripts/ts/group exportaz deployment/bicep/stack/deployment-scripts/ts/group exportService AttentionThis issue is responsible by Azure service team.This issue is responsible by Azure service team.act-codegen-extensibility-squadact-identity-squadcustomer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.feature-request
Milestone
Metadata
Metadata
Assignees
Labels
ARMaz resource/group/lock/tag/deployment/policy/managementapp/account management-groupaz resource/group/lock/tag/deployment/policy/managementapp/account management-groupAuto-AssignAuto assign by botAuto assign by botAzure Deploymentsaz deployment/bicep/stack/deployment-scripts/ts/group exportaz deployment/bicep/stack/deployment-scripts/ts/group exportService AttentionThis issue is responsible by Azure service team.This issue is responsible by Azure service team.act-codegen-extensibility-squadact-identity-squadcustomer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.feature-request
Type
Fields
Give feedbackNo fields configured for issues without a type.
Related command
az group exportIs your feature request related to a problem? Please describe.
I am considering use of PSRule to test against the Well-Architected Framework. When calling
az group exportto get a template to run PSRule against, I got an error about the export not able to be performed because there are more than 200 resources. I know that the reason in this case is that each hosted API has multiple alert rules. The alert rules would not matter to me as much for running PSRule.Describe the solution you'd like
If I could filter to exclude alert rules (and maybe other resource types), I would be able to extract this particular template (and maybe others) and run PSRule against it. Perhaps there is a better approach to what I am doing, but being able to filter on a resource group this large may come in handy in other scenarios.
Describe alternatives you've considered
For my specific experimentation, I was able to get templates for the resources that I needed separately. This is not a scalable solution, though.
Additional context
I am an application security architect. I am using the aforementioned approach because I would not necessarily know fine-grained details about each resource but could certainly filter on which types I am most concerned about.