Open Electronickss opened 5 years ago
Looks to me like this could potentially be an issue with azure-cli or how cs-suite interfaces with azure-cli?
Azure Cloud shell fails to identify server. Throws error : Can not perform requested operation on nested resource. Parent resource not found
Fix:
The failure was because I have multiple subscriptions on Azure and my default subscription did not have the sql-server. I changed the subscription by using az account set --subscription and now the command to get firewall works
I discovered it was an issue with one of the DBs in my setup. I can run:
az sql db audit-policy show --resource-group REDACTED_RG --server REDACTED_SERVER_NAME --name REDACTED_DB_2 --query 'state' --output tsv
And it works. However when I run:
az sql db audit-policy show --resource-group REDACTED_RG --server REDACTED_SERVER_NAME --name REDACTED_DB_1 --query 'state' --output tsv
I get the error: Can not perform requested operation on nested resource. Parent resource 'REDACTED_SERVER_NAME/REQUESTED_DB_1' not found.
I have tested that I can see the DB with the command:
az sql db list --server REDACTED_SERVER_NAME --resource-group REDACTED_RG --query "[*].name" --output tsv
and I see the DB that is giving me trouble.
Does your team have a recommendation for working through this? I am assuming this issue is being caused because something from a different resource or subscription created the DB I am having issues with. I will attempt to confirm this theory
When looking at this server through the webui, the DB I am having issues with does not show up on the SQL server. Is it possible to just add some error handling and skip over this? The api and the webui are showing a different number of DBs
yes @Electronickss I think you're right, the azure-cli sometimes does not show the right output and that's possibly the case, due to which it fails I had commented on a issue on azure-cli on a different case, regarding the output it throws https://github.com/Azure/azure-cli/issues/5243 We will add error handling into this, but it might take us some time thanks for raising this issue and if you have further suggestions regarding the Azure checks, if we have missed any, please let us know, it'll be really helpful.
So I need this to work as soon as possible so I am looking at implementing error handling myself. As an example:
try:
email_policy = subprocess.check_output(['az sql db threat-policy show --resource-group %s --server %s --name %s --query \'emailAccountAdmins\' --output tsv' %(resource_group, name, database)], shell=True).strip()
except subprocess.CalledProcessError as e:
continue
I can fork/pr this if you like the solution
sure can you just submit a PR, that will be great, I will verify once as well, it shouldn't break anything though.
Running into an issue with CS-Suite on MacOS and Azure
git pull
before running it4.2.1: Checking if SQL DB has AUDIT policy enabled
Here is the error