-
Notifications
You must be signed in to change notification settings - Fork 119
/
Azure Monitor - List available Diagnostic Log and Metric Categories for all Resource Types.ps1
113 lines (78 loc) · 4.04 KB
/
Azure Monitor - List available Diagnostic Log and Metric Categories for all Resource Types.ps1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
#-------------------------------------------------------------------------
# Copyright (c) Microsoft. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#--------------------------------------------------------------------------
# PowerShell Snippet for calling Azure Provider REST API to list diagnostic categories for all supported resource types for all resource providers
# Authenticate to Azure - can automate with Azure AD Service Principal credentials
Connect-AzAccount
# Get list of all Azure resource providers
$providerNames =
(Get-AzResourceProvider).ProviderNamespace
# Get token and create authorization header
$azContext = Get-AzContext
$azProfile = [Microsoft.Azure.Commands.Common.Authentication.Abstractions.AzureRmProfileProvider]::Instance.Profile
$profileClient = New-Object -TypeName Microsoft.Azure.Commands.ResourceManager.Common.RMProfileClient -ArgumentList ($azProfile)
$token = $profileClient.AcquireAccessToken($azContext.Subscription.TenantId)
$authHeader = @{
'Authorization'='Bearer ' + $token.AccessToken
}
# Set other REST API parameters
$action = "GET"
$contentType = "application/json"
$uriPrefix = "https://management.azure.com/providers/"
$uriSuffix = "/operations?api-version="
# Enumerate diagnostic categories for supported resource types for all resource providers
$providerNames | ForEach-Object {
$providerName = $_
$apiVersions = @()
$apiVersions +=
((Get-AzResourceProvider -ProviderNamespace $providerName).ResourceTypes |
Where-Object ResourceTypeName -eq "operations").ApiVersions
$apiVersion = $apiVersions[0]
if ($apiVersion -ne $null) {
$uri = $uriPrefix + $providerName + $uriSuffix + $apiVersion
$results = $null
try {
$results =
Invoke-RestMethod `
-ContentType $contentType `
-Uri $uri `
-Method $action `
-Headers $authHeader
} catch [System.Net.WebException] {
if (
($error[0].ErrorDetails.Message | ConvertFrom-Json).Error.Code `
-notin
@("AuthorizationFailed","ResourceNotSupported")
)
{
Write-Error $error[0].ErrorDetails.Message
}
}
$results.value |
Where-Object name -Like "*/logDefinitions/*" |
Select-Object `
@{n='resourceType';e={%{ (($_.name.replace("/Microsoft.Insights",$null)).split("/") | ? {$_ -notIn @("providers", "logDefinitions", "read") }) -join "/" }}},
@{n='categoryType';e={"log"}},
@{n='categoryNames';e={$_.properties.serviceSpecification.logSpecifications.name}}
$results.value |
Where-Object name -Like "*/metricDefinitions/*" |
Select-Object `
@{n='resourceType';e={%{ (($_.name.replace("/Microsoft.Insights",$null)).split("/") | ? {$_ -notIn @("providers", "metricDefinitions", "read") }) -join "/" }}},
@{n='categoryType';e={"metric"}},
@{n='categoryNames';e={$_.properties.serviceSpecification.metricSpecifications.name}}
}
} |
Where-Object categoryNames -ne $null |
Sort-Object -Property categoryType, resourceType |
ConvertTo-Json