turbot/azure_tags

Control: App Service environments should not have prohibited tags

Description

Check if App Service environments have any prohibited tags.

Usage

Run the control in your terminal:

powerpipe control run azure_tags.control.app_service_environment_prohibited

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_tags.control.app_service_environment_prohibited --share

Steampipe Tables

Params

ArgsNameDefaultDescriptionVariable
$1prohibited_tags
["Password","Key"]

SQL

with analysis as (
select
id,
array_agg(k) as prohibited_tags
from
azure_app_service_environment,
jsonb_object_keys(tags) as k,
unnest($1::text[]) as prohibited_key
where
k = prohibited_key
group by
id
)
select
r.id as resource,
case
when a.prohibited_tags <> array[]::text[] then 'alarm'
else 'ok'
end as status,
case
when a.prohibited_tags <> array[]::text[] then r.title || ' has prohibited tags: ' || array_to_string(a.prohibited_tags, ', ') || '.'
else r.title || ' has no prohibited tags.'
end as reason,
r.resource_group, r.subscription_id
from
azure_app_service_environment as r
full outer join
analysis as a on a.id = r.id;