Connectors
...
Actions
Delete Alert Rules
4 min
description removes specified alert rules from microsoft azure sentinel using subscription id, resource group, workspace name, and rule id endpoint url /subscriptions/{{subscriptionid}}/resourcegroups/{{resourcegroupname}}/providers/microsoft operationalinsights/workspaces/{{workspacename}}/providers/microsoft securityinsights/alertrules/{{ruleid}} method delete inputs path parameters (object) – required ruleid (string) – required alert rule id subscriptionid (string) – required the id of the target subscription resourcegroupname (string) – required the name of the resource group the name is case insensitive workspacename (string) – required the name of the workspace regex pattern ^\[a za z0 9]\[a za z0 9 ]+\[a za z0 9]$ parameters (object) – required api version (string) – required the api version to use for this operation output example \[ { "status code" 200, "response headers" {}, "reason" "ok", "json body" {} } ] output parameters status code (number) reason (string) json body (object)