The current inspector of Azure collects not the whole Azure infrastructreWe use a lot of Virtual network gateways. They are not visible in the Azure inspector.There are 3 types of VPN's, Express-route, site-to-site and point-to-site.In the point-to-site VPN, you have authenctication thru a certificate, that will expire in 1 year.We want to use liongard to monitor the certificates en get a notification when the certificate is going to expire (in 30 days)We use currently the following powershell code to collect the data manually:$query = "Resources | where isnotempty(properties['vpnClientConfiguration']['vpnClientRootCertificates'][0]['properties']['publicCertData'])"
$results = Search-AzGraph -Query $query
foreach($result in $results){
$p2sCert = $result.properties.vpnClientConfiguration.vpnClientRootCertificates | Where-Object {$_.name -match "P2S"}
$cert =
[System.Security.Cryptography.X509Certificates.X509Certificate2]([System.Convert]::FromBase64String($p2sCert.Properties.publicCertData.Replace(' ','')
))
if($cert.NotAfter.date -le (get-date).AddMonths(1)){
Write-Error "validity for P2S cert RG $($result.resourceGroup) with subject $($cert.subject) is less that 1 month, currently $((($cert.NotAfter.date) - (get-date)).days) days."
}
} This is for our company the most importend data, but if you can upgrade the inspector to collect al the data of the automation accounts, that will be fantastic:NameRecourcegroupVirutal NetworkSubnetSKUGateway typeConnections (status, connection type)Point-to-Site configuration (adress pool, certificate) I hope you put this onder consideration and implement this in liongard