Powershell Ddos custom policy cmdlets#29387
Powershell Ddos custom policy cmdlets#29387venkatasaimaram7 wants to merge 5 commits intoAzure:release-network-2025-07-01from
Conversation
| Thanks for your contribution! The pull request validation has started. Please revisit this comment for updated status. |
49b565d to
55a7001
Compare
|
/azp run |
|
Azure Pipelines successfully started running 3 pipeline(s). |
f875aa4 to
a13d882
Compare
- New cmdlets: New-AzDdosCustomPolicy, Get-AzDdosCustomPolicy, Set-AzDdosCustomPolicy, Remove-AzDdosCustomPolicy - New cmdlets: New-AzDdosCustomPolicyDetectionRule, Add-AzDdosCustomPolicyDetectionRule, Remove-AzDdosCustomPolicyDetectionRule - Models: PSDdosCustomPolicy and PSDdosCustomPolicyDetectionRule - Validation: DdosCustomPolicyDetectionRuleValidator for threshold rules - Help: Complete markdown documentation for all cmdlets - Tests: Comprehensive scenario tests for CRUD operations and validation - Updated module manifest and resource mappings
a13d882 to
2504094
Compare
|
/azp run |
|
Azure Pipelines successfully started running 3 pipeline(s). |
|
/azp run |
|
Azure Pipelines successfully started running 3 pipeline(s). |
|
as i see those checks are failing not because of my changes |
|
I investigated the failing checks on this PR and validated the DDoS custom policy changes separately. What I validated: DDoS custom policy tests pass in live run: Failed 0, Passed 20, Skipped 0, Total 20. The current check failures are not caused by this PR’s DDoS custom policy cmdlet changes. Please review this PR based on the scoped DDoS validation and treat the current CI failures as unrelated/pre-existing for this change. |
|
- 17 tests have fresh session recordings from live Azure API calls - Replaces broken 403 authorization error recordings with valid responses - Tests now pass in playback mode for check-in validation - 3 detection rule tests remain as LiveOnly (no recordings created)
…n recordings - DdosCustomPolicyTests: Change all 20 tests from LiveOnly to CheckIn - Session Recordings: 17 updated + 3 newly created with fresh recordings
…tasaimaram7/azure-powershell into ddos-custom-policy-cmdlets
|
Azure Pipelines: 4 pipeline(s) require an authorized user to comment /azp run to run. |
|
/azp run |
|
Azure Pipelines: Successfully started running 3 pipeline(s). |
|
@VeryEarly |
|
all checks are passing, please do review and approve this pr |
Description
Add comprehensive DDoS Custom Policy management cmdlets to Azure PowerShell. These cmdlets enable users to create, retrieve, update, and delete DDoS custom protection policies with detection rules for threat mitigation.
Cmdlets Added:
New-AzDdosCustomPolicy- Create a new DDoS custom policyGet-AzDdosCustomPolicy- Retrieve DDoS custom policiesSet-AzDdosCustomPolicy- Update existing DDoS custom policiesRemove-AzDdosCustomPolicy- Delete DDoS custom policiesNew-AzDdosCustomPolicyDetectionRule- Create detection rule configurationsAdd-AzDdosCustomPolicyDetectionRule- Add rules to policiesRemove-AzDdosCustomPolicyDetectionRule- Remove rules from policiesFeatures:
Validation:
20/20Validation Doc
-DCP_cmdlets_E2E_Validation.docx
Mandatory Checklist
Please choose the target release of Azure PowerShell. (⚠️ Target release is a different concept from API readiness. Please click below links for details.)
Check this box to confirm: I have read the Submitting Changes section of
CONTRIBUTING.mdand reviewed the following information:ChangeLog.mdfile(s) appropriatelysrc/Network/Network/ChangeLog.mdwith DDoS Custom Policy feature notes