Security News
tea.xyz Spam Plagues npm and RubyGems Package Registries
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
@datafire/azure_monitor_scheduledqueryrule_api
Advanced tools
Readme
Client library for Microsoft Insights
npm install --save @datafire/azure_monitor_scheduledqueryrule_api
let azure_monitor_scheduledqueryrule_api = require('@datafire/azure_monitor_scheduledqueryrule_api').create({
access_token: "",
refresh_token: "",
client_id: "",
client_secret: "",
redirect_uri: ""
});
.then(data => {
console.log(data);
});
Azure Monitor client to create/update/delete Scheduled Query Rules
List the Log Search rules within a subscription group.
azure_monitor_scheduledqueryrule_api.ScheduledQueryRules_ListBySubscription({
"api-version": "",
"subscriptionId": ""
}, context)
object
string
: Client Api Version.string
: The filter to apply on the operation. For more information please see https://msdn.microsoft.com/en-us/library/azure/dn931934.aspxstring
: The Azure subscription Id.List the Log Search rules within a resource group.
azure_monitor_scheduledqueryrule_api.ScheduledQueryRules_ListByResourceGroup({
"resourceGroupName": "",
"api-version": "",
"subscriptionId": ""
}, context)
object
string
: The name of the resource group.string
: Client Api Version.string
: The filter to apply on the operation. For more information please see https://msdn.microsoft.com/en-us/library/azure/dn931934.aspxstring
: The Azure subscription Id.Deletes a Log Search rule
azure_monitor_scheduledqueryrule_api.ScheduledQueryRules_Delete({
"resourceGroupName": "",
"ruleName": "",
"api-version": "",
"subscriptionId": ""
}, context)
object
string
: The name of the resource group.string
: The name of the rule.string
: Client Api Version.string
: The Azure subscription Id.Output schema unknown
Gets an Log Search rule
azure_monitor_scheduledqueryrule_api.ScheduledQueryRules_Get({
"resourceGroupName": "",
"ruleName": "",
"api-version": "",
"subscriptionId": ""
}, context)
object
string
: The name of the resource group.string
: The name of the rule.string
: Client Api Version.string
: The Azure subscription Id.Update log search Rule.
azure_monitor_scheduledqueryrule_api.ScheduledQueryRules_Update({
"subscriptionId": "",
"resourceGroupName": "",
"ruleName": "",
"api-version": "",
"parameters": null
}, context)
object
string
: The Azure subscription Id.string
: The name of the resource group.string
: The name of the rule.string
: Client Api Version.Creates or updates an log search rule.
azure_monitor_scheduledqueryrule_api.ScheduledQueryRules_CreateOrUpdate({
"subscriptionId": "",
"resourceGroupName": "",
"ruleName": "",
"api-version": "",
"parameters": {
"properties": null
}
}, context)
object
string
: The Azure subscription Id.string
: The name of the resource group.string
: The name of the rule.string
: Client Api Version.object
: Action descriptor.
string
: Specifies the action. Supported values - AlertingAction, LogToMetricActionstring
(values: 0, 1, 2, 3, 4): Severity Level of Alertobject
: Specify action need to be taken when rule type is Alert
integer
: time (in minutes) for which Alerts should be throttled or suppressed.string
: Specifies the action. Supported values - AlertingAction, LogToMetricActionobject
: Azure action group
array
: Azure Action Group reference.
string
string
: Custom payload to be sent for all webhook URI in Azure action groupstring
: Custom subject override for all email ids in Azure action groupstring
(values: GreaterThan, LessThan, Equal): Result Condition Evaluation criteria. Supported Values - 'GreaterThan' or 'LessThan' or 'Equal'.object
: Specifies the criteria for converting log to metric.
array
: List of Dimensions for creating metric
string
: Name of the metricobject
: Specifies the criteria for converting log to metric.
string
: Name of the dimensionstring
(values: Include): Operator for dimension valuesarray
: List of dimension values
string
object
: Describes the format of Error response.
string
: Error codestring
: Error message indicating why the operation failed.object
: A log metrics trigger descriptor.
string
: Evaluation of metric on a particular columnnumber
: The threshold of the metric trigger.object
: Log Search Rule Definition
string
: The description of the Log Search rule.string
(values: true, false): The flag which indicates whether the Log Search rule is enabled. Value should be true or falsestring
: Last time the rule was updated in IS08601 format.string
(values: Succeeded, Deploying, Canceled, Failed): Provisioning state of the scheduled query ruleobject
: Log Search Rule Definition for Patching
string
(values: true, false): The flag which indicates whether the Log Search rule is enabled. Value should be true or falseobject
: The Log Search Rule resource.
string
: Azure resource Idstring
: Resource locationstring
: Azure resource namestring
: Azure resource typeobject
: Represents a collection of Log Search rule resources.
array
: The values for the Log Search Rule resources.
object
: The log search rule resource for patch operations.
object
: Specify action need to be taken when rule type is converting log to metric
array
: Criteria of Metric
string
: Specifies the action. Supported values - AlertingAction, LogToMetricActionstring
(values: Consecutive, Total): Metric Trigger Evaluation Typestring
(values: ResultCount): Set value to 'ResultAccount'object
: An azure resource object
string
: Azure resource Idstring
: Resource locationstring
: Azure resource namestring
: Azure resource typeobject
: Defines how often to run the search and the time interval.
integer
: frequency (in minutes) at which rule condition should be evaluated.integer
: Time window for which data needs to be fetched for query (should be greater than or equal to frequencyInMinutes).object
: Specifies the log search query.
array
: List of Resource referred into query
string
string
: The resource uri over which log search query is to be run.string
: Log search query. Required for action type - AlertingActionobject
: The condition that results in the Log Search rule.
number
: Result or count threshold based on which rule should be triggered.FAQs
DataFire integration for Microsoft Insights
The npm package @datafire/azure_monitor_scheduledqueryrule_api receives a total of 1 weekly downloads. As such, @datafire/azure_monitor_scheduledqueryrule_api popularity was classified as not popular.
We found that @datafire/azure_monitor_scheduledqueryrule_api demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.
Security News
UnitedHealth Group disclosed that the ransomware attack on Change Healthcare compromised protected health information for millions in the U.S., with estimated costs to the company expected to reach $1 billion.