From e26281ab8c3bb87de252e1660a2f5646b1f72acf Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Mon, 28 Feb 2022 09:26:38 +0100 Subject: [PATCH 1/3] law 2 --- .../automationAccounts/parameters/law.parameters.json | 9 +++++++++ 1 file changed, 9 insertions(+) create mode 100644 utilities/pipelines/dependencies/Microsoft.Automation/automationAccounts/parameters/law.parameters.json diff --git a/utilities/pipelines/dependencies/Microsoft.Automation/automationAccounts/parameters/law.parameters.json b/utilities/pipelines/dependencies/Microsoft.Automation/automationAccounts/parameters/law.parameters.json new file mode 100644 index 0000000000..1081107515 --- /dev/null +++ b/utilities/pipelines/dependencies/Microsoft.Automation/automationAccounts/parameters/law.parameters.json @@ -0,0 +1,9 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "name": { + "value": "adp-<>-az-aut-law-001" + } + } +} From 52c16ad0b0e208c28541b5f6ff9e1b5b58952270 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Tue, 1 Mar 2022 17:21:28 +0100 Subject: [PATCH 2/3] update network api --- .../virtualNetworks/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/virtualNetworks/deploy.bicep | 2 +- arm/Microsoft.Network/virtualNetworks/readme.md | 12 ++++++------ .../virtualNetworks/subnets/deploy.bicep | 4 ++-- .../virtualNetworks/subnets/readme.md | 4 ++-- .../virtualNetworkPeerings/deploy.bicep | 4 ++-- .../virtualNetworks/virtualNetworkPeerings/readme.md | 8 ++++---- 7 files changed, 18 insertions(+), 18 deletions(-) diff --git a/arm/Microsoft.Network/virtualNetworks/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/virtualNetworks/.bicep/nested_rbac.bicep index eb79a9be0b..bdc2ba0f01 100644 --- a/arm/Microsoft.Network/virtualNetworks/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/virtualNetworks/.bicep/nested_rbac.bicep @@ -35,7 +35,7 @@ var builtInRoleNames = { 'Virtual Machine User Login': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'fb879df8-f326-4884-b1cf-06f3ad86be52') } -resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-03-01' existing = { +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/virtualNetworks/deploy.bicep b/arm/Microsoft.Network/virtualNetworks/deploy.bicep index 6b41b2b203..7f64396c56 100644 --- a/arm/Microsoft.Network/virtualNetworks/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworks/deploy.bicep @@ -100,7 +100,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-03-01' = { +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/virtualNetworks/readme.md b/arm/Microsoft.Network/virtualNetworks/readme.md index e403185136..d5a3d5ba0c 100644 --- a/arm/Microsoft.Network/virtualNetworks/readme.md +++ b/arm/Microsoft.Network/virtualNetworks/readme.md @@ -9,9 +9,9 @@ This template deploys a virtual network (vNet). | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | -| `Microsoft.Network/virtualNetworks` | 2021-03-01 | -| `Microsoft.Network/virtualNetworks/subnets` | 2021-03-01 | -| `Microsoft.Network/virtualNetworks/virtualNetworkPeerings` | 2021-02-01 | +| `Microsoft.Network/virtualNetworks` | 2021-05-01 | +| `Microsoft.Network/virtualNetworks/subnets` | 2021-05-01 | +| `Microsoft.Network/virtualNetworks/virtualNetworkPeerings` | 2021-05-01 | ## Parameters @@ -122,6 +122,6 @@ The network security group and route table resources must reside in the same res - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) -- [Virtualnetworks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/virtualNetworks) -- [Virtualnetworks/Subnets](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/virtualNetworks/subnets) -- [Virtualnetworks/Virtualnetworkpeerings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/virtualNetworks/virtualNetworkPeerings) +- [Virtualnetworks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/virtualNetworks) +- [Virtualnetworks/Subnets](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/virtualNetworks/subnets) +- [Virtualnetworks/Virtualnetworkpeerings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/virtualNetworks/virtualNetworkPeerings) diff --git a/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep b/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep index d6c0d37c8f..47a0845a0e 100644 --- a/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep @@ -66,7 +66,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-03-01' existing = { +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-05-01' existing = { name: virtualNetworkName } @@ -83,7 +83,7 @@ resource natGateway 'Microsoft.Network/natGateways@2021-03-01' existing = if (!e name: natGatewayName } -resource subnet 'Microsoft.Network/virtualNetworks/subnets@2021-03-01' = { +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2021-05-01' = { name: name parent: virtualNetwork properties: { diff --git a/arm/Microsoft.Network/virtualNetworks/subnets/readme.md b/arm/Microsoft.Network/virtualNetworks/subnets/readme.md index 15167901fa..7e783a3e6e 100644 --- a/arm/Microsoft.Network/virtualNetworks/subnets/readme.md +++ b/arm/Microsoft.Network/virtualNetworks/subnets/readme.md @@ -6,7 +6,7 @@ This module deploys a virtual network subnet. | Resource Type | API Version | | :-- | :-- | -| `Microsoft.Network/virtualNetworks/subnets` | 2021-03-01 | +| `Microsoft.Network/virtualNetworks/subnets` | 2021-05-01 | ## Parameters @@ -70,4 +70,4 @@ The `privateEndpointNetworkPolicies` property must be set to disabled for subnet ## Template references -- [Virtualnetworks/Subnets](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/virtualNetworks/subnets) +- [Virtualnetworks/Subnets](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/virtualNetworks/subnets) diff --git a/arm/Microsoft.Network/virtualNetworks/virtualNetworkPeerings/deploy.bicep b/arm/Microsoft.Network/virtualNetworks/virtualNetworkPeerings/deploy.bicep index dab2bbe153..7d482b78f1 100644 --- a/arm/Microsoft.Network/virtualNetworks/virtualNetworkPeerings/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworks/virtualNetworkPeerings/deploy.bicep @@ -30,11 +30,11 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-03-01' existing = { +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-05-01' existing = { name: localVnetName } -resource virtualNetworkPeering 'Microsoft.Network/virtualNetworks/virtualNetworkPeerings@2021-02-01' = { +resource virtualNetworkPeering 'Microsoft.Network/virtualNetworks/virtualNetworkPeerings@2021-05-01' = { name: name parent: virtualNetwork properties: { diff --git a/arm/Microsoft.Network/virtualNetworks/virtualNetworkPeerings/readme.md b/arm/Microsoft.Network/virtualNetworks/virtualNetworkPeerings/readme.md index 0ab6d795a7..7f6731486a 100644 --- a/arm/Microsoft.Network/virtualNetworks/virtualNetworkPeerings/readme.md +++ b/arm/Microsoft.Network/virtualNetworks/virtualNetworkPeerings/readme.md @@ -6,7 +6,7 @@ This template deploys Virtual Network Peering. | Resource Type | API Version | | :-- | :-- | -| `Microsoft.Network/virtualNetworks/virtualNetworkPeerings` | 2021-02-01 | +| `Microsoft.Network/virtualNetworks/virtualNetworkPeerings` | 2021-05-01 | ### Resource dependency @@ -20,14 +20,14 @@ The following resources are required to be able to deploy this resource. | Parameter Name | Type | Default Value | Possible Values | Description | | :-- | :-- | :-- | :-- | :-- | | `allowForwardedTraffic` | bool | `True` | | Optional. Whether the forwarded traffic from the VMs in the local virtual network will be allowed/disallowed in remote virtual network. Default is true | -| `allowGatewayTransit` | bool | | | Optional. If gateway links can be used in remote virtual networking to link to this virtual network. Default is false | +| `allowGatewayTransit` | bool | `False` | | Optional. If gateway links can be used in remote virtual networking to link to this virtual network. Default is false | | `allowVirtualNetworkAccess` | bool | `True` | | Optional. Whether the VMs in the local virtual network space would be able to access the VMs in remote virtual network space. Default is true | | `cuaId` | string | | | Optional. Customer Usage Attribution ID (GUID). This GUID must be previously registered | | `doNotVerifyRemoteGateways` | bool | `True` | | Optional. If we need to verify the provisioning state of the remote gateway. Default is true | | `localVnetName` | string | | | Required. The Name of the Virtual Network to add the peering to. | | `name` | string | `[format('{0}-{1}', parameters('localVnetName'), last(split(parameters('remoteVirtualNetworkId'), '/')))]` | | Optional. The Name of Vnet Peering resource. If not provided, default value will be localVnetName-remoteVnetName | | `remoteVirtualNetworkId` | string | | | Required. The Resource ID of the VNet that is this Local VNet is being peered to. Should be in the format of a Resource ID | -| `useRemoteGateways` | bool | | | Optional. If remote gateways can be used on this virtual network. If the flag is set to true, and allowGatewayTransit on remote peering is also true, virtual network will use gateways of remote virtual network for transit. Only one peering can have this flag set to true. This flag cannot be set if virtual network already has a gateway. Default is false | +| `useRemoteGateways` | bool | `False` | | Optional. If remote gateways can be used on this virtual network. If the flag is set to true, and allowGatewayTransit on remote peering is also true, virtual network will use gateways of remote virtual network for transit. Only one peering can have this flag set to true. This flag cannot be set if virtual network already has a gateway. Default is false | ## Outputs @@ -39,4 +39,4 @@ The following resources are required to be able to deploy this resource. ## Template references -- [Virtualnetworks/Virtualnetworkpeerings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/virtualNetworks/virtualNetworkPeerings) +- [Virtualnetworks/Virtualnetworkpeerings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/virtualNetworks/virtualNetworkPeerings) From 9b7852d60682a6807da01fbea5300445d6750100 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Tue, 1 Mar 2022 17:51:36 +0100 Subject: [PATCH 3/3] update network api fwpol and nw --- .../applicationGateways/.bicep/nested_rbac.bicep | 2 +- .../azureFirewalls/.bicep/nested_rbac.bicep | 2 +- .../firewallPolicies/deploy.bicep | 2 +- arm/Microsoft.Network/firewallPolicies/readme.md | 14 +++++++------- .../ruleCollectionGroups/deploy.bicep | 4 ++-- .../ruleCollectionGroups/readme.md | 4 ++-- .../firewallPolicies/ruleGroups/deploy.bicep | 2 +- .../connectionMonitors/deploy.bicep | 4 ++-- .../networkWatchers/connectionMonitors/readme.md | 4 ++-- .../networkWatchers/flowLogs/deploy.bicep | 4 ++-- .../networkWatchers/flowLogs/readme.md | 4 ++-- arm/Microsoft.Network/networkWatchers/readme.md | 8 ++++---- .../virtualNetworks/subnets/deploy.bicep | 6 +++--- 13 files changed, 30 insertions(+), 30 deletions(-) diff --git a/arm/Microsoft.Network/applicationGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/applicationGateways/.bicep/nested_rbac.bicep index 53e506ee6c..fd2516943a 100644 --- a/arm/Microsoft.Network/applicationGateways/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/applicationGateways/.bicep/nested_rbac.bicep @@ -26,7 +26,7 @@ var builtInRoleNames = { 'Virtual Machine Contributor': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '9980e02c-c2be-4d73-94e8-173b1dc7cf3c') } -resource applicationGateway 'Microsoft.Network/applicationGateways@2021-02-01' existing = { +resource applicationGateway 'Microsoft.Network/applicationGateways@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/azureFirewalls/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/azureFirewalls/.bicep/nested_rbac.bicep index aea4610a17..545f3f4ac0 100644 --- a/arm/Microsoft.Network/azureFirewalls/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/azureFirewalls/.bicep/nested_rbac.bicep @@ -25,7 +25,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource azureFirewall 'Microsoft.Network/azureFirewalls@2021-02-01' existing = { +resource azureFirewall 'Microsoft.Network/azureFirewalls@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/firewallPolicies/deploy.bicep b/arm/Microsoft.Network/firewallPolicies/deploy.bicep index 944c81c728..8edc965248 100644 --- a/arm/Microsoft.Network/firewallPolicies/deploy.bicep +++ b/arm/Microsoft.Network/firewallPolicies/deploy.bicep @@ -99,7 +99,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource firewallPolicy 'Microsoft.Network/firewallPolicies@2021-03-01' = { +resource firewallPolicy 'Microsoft.Network/firewallPolicies@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/firewallPolicies/readme.md b/arm/Microsoft.Network/firewallPolicies/readme.md index 9b5e4a3eef..2e30425fc5 100644 --- a/arm/Microsoft.Network/firewallPolicies/readme.md +++ b/arm/Microsoft.Network/firewallPolicies/readme.md @@ -6,8 +6,8 @@ This module deploys Network Firewall Policies. | Resource Type | API Version | | :-- | :-- | -| `Microsoft.Network/firewallPolicies` | 2021-03-01 | -| `Microsoft.Network/firewallPolicies/ruleCollectionGroups` | 2021-03-01 | +| `Microsoft.Network/firewallPolicies` | 2021-05-01 | +| `Microsoft.Network/firewallPolicies/ruleCollectionGroups` | 2021-05-01 | | `Microsoft.Network/firewallPolicies/ruleGroups` | 2020-04-01 | ## Parameters @@ -19,9 +19,9 @@ This module deploys Network Firewall Policies. | `certificateName` | string | | | Optional. Name of the CA certificate. | | `cuaId` | string | | | Optional. Customer Usage Attribution ID (GUID). This GUID must be previously registered | | `defaultWorkspaceId` | string | | | Optional. Default Log Analytics Resource ID for Firewall Policy Insights. | -| `enableProxy` | bool | | | Optional. Enable DNS Proxy on Firewalls attached to the Firewall Policy. | +| `enableProxy` | bool | `False` | | Optional. Enable DNS Proxy on Firewalls attached to the Firewall Policy. | | `fqdns` | array | `[]` | | Optional. List of FQDNs for the ThreatIntel Allowlist. | -| `insightsIsEnabled` | bool | | | Optional. A flag to indicate if the insights are enabled on the policy. | +| `insightsIsEnabled` | bool | `False` | | Optional. A flag to indicate if the insights are enabled on the policy. | | `ipAddresses` | array | `[]` | | Optional. List of IP addresses for the ThreatIntel Allowlist. | | `keyVaultSecretId` | string | | | Optional. Secret Id of (base-64 encoded unencrypted pfx) Secret or Certificate object stored in KeyVault. | | `location` | string | `[resourceGroup().location]` | | Optional. Location for all resources. | @@ -33,7 +33,7 @@ This module deploys Network Firewall Policies. | `ruleGroups` | _[ruleGroups](ruleGroups/readme.md)_ array | `[]` | | Optional. Rule groups. | | `servers` | array | `[]` | | Optional. List of Custom DNS Servers. | | `signatureOverrides` | array | `[]` | | Optional. List of specific signatures states. | -| `systemAssignedIdentity` | bool | | | Optional. Enables system assigned managed identity on the resource. | +| `systemAssignedIdentity` | bool | `False` | | Optional. Enables system assigned managed identity on the resource. | | `tags` | object | `{object}` | | Optional. Tags of the Firewall policy resource. | | `threatIntelMode` | string | `Off` | `[Alert, Deny, Off]` | Optional. The operation mode for Threat Intel. | | `tier` | string | `Standard` | `[Premium, Standard]` | Optional. Tier of Firewall Policy. | @@ -81,5 +81,5 @@ You can specify multiple user assigned identities to a resource by providing add ## Template references - ['firewallPolicies/ruleGroups' Parent Documentation](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/firewallPolicies) -- [Firewallpolicies](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/firewallPolicies) -- [Firewallpolicies/Rulecollectiongroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/firewallPolicies/ruleCollectionGroups) +- [Firewallpolicies](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/firewallPolicies) +- [Firewallpolicies/Rulecollectiongroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/firewallPolicies/ruleCollectionGroups) diff --git a/arm/Microsoft.Network/firewallPolicies/ruleCollectionGroups/deploy.bicep b/arm/Microsoft.Network/firewallPolicies/ruleCollectionGroups/deploy.bicep index 8570325827..72f1ebdfb3 100644 --- a/arm/Microsoft.Network/firewallPolicies/ruleCollectionGroups/deploy.bicep +++ b/arm/Microsoft.Network/firewallPolicies/ruleCollectionGroups/deploy.bicep @@ -18,11 +18,11 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource firewallPolicy 'Microsoft.Network/firewallPolicies@2021-03-01' existing = { +resource firewallPolicy 'Microsoft.Network/firewallPolicies@2021-05-01' existing = { name: firewallPolicyName } -resource ruleCollectionGroup 'Microsoft.Network/firewallPolicies/ruleCollectionGroups@2021-03-01' = { +resource ruleCollectionGroup 'Microsoft.Network/firewallPolicies/ruleCollectionGroups@2021-05-01' = { name: name parent: firewallPolicy properties: { diff --git a/arm/Microsoft.Network/firewallPolicies/ruleCollectionGroups/readme.md b/arm/Microsoft.Network/firewallPolicies/ruleCollectionGroups/readme.md index feb9b570cd..ad4cb4dafe 100644 --- a/arm/Microsoft.Network/firewallPolicies/ruleCollectionGroups/readme.md +++ b/arm/Microsoft.Network/firewallPolicies/ruleCollectionGroups/readme.md @@ -6,7 +6,7 @@ This module deploys Network Firewall Policies Rule Collection Groups. | Resource Type | API Version | | :-- | :-- | -| `Microsoft.Network/firewallPolicies/ruleCollectionGroups` | 2021-03-01 | +| `Microsoft.Network/firewallPolicies/ruleCollectionGroups` | 2021-05-01 | ## Parameters @@ -43,4 +43,4 @@ For remaining properties, see [FirewallPolicyRuleCollection objects](https://doc ## Template references -- [Firewallpolicies/Rulecollectiongroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/firewallPolicies/ruleCollectionGroups) +- [Firewallpolicies/Rulecollectiongroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/firewallPolicies/ruleCollectionGroups) diff --git a/arm/Microsoft.Network/firewallPolicies/ruleGroups/deploy.bicep b/arm/Microsoft.Network/firewallPolicies/ruleGroups/deploy.bicep index 93fb4a00ff..afd5fc5e12 100644 --- a/arm/Microsoft.Network/firewallPolicies/ruleGroups/deploy.bicep +++ b/arm/Microsoft.Network/firewallPolicies/ruleGroups/deploy.bicep @@ -18,7 +18,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource firewallPolicy 'Microsoft.Network/firewallPolicies@2021-03-01' existing = { +resource firewallPolicy 'Microsoft.Network/firewallPolicies@2021-05-01' existing = { name: firewallPolicyName } diff --git a/arm/Microsoft.Network/networkWatchers/connectionMonitors/deploy.bicep b/arm/Microsoft.Network/networkWatchers/connectionMonitors/deploy.bicep index d1fa6a69ab..542cca57f7 100644 --- a/arm/Microsoft.Network/networkWatchers/connectionMonitors/deploy.bicep +++ b/arm/Microsoft.Network/networkWatchers/connectionMonitors/deploy.bicep @@ -39,11 +39,11 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource networkWatcher 'Microsoft.Network/networkWatchers@2021-03-01' existing = { +resource networkWatcher 'Microsoft.Network/networkWatchers@2021-05-01' existing = { name: networkWatcherName } -resource connectionMonitor 'Microsoft.Network/networkWatchers/connectionMonitors@2021-03-01' = { +resource connectionMonitor 'Microsoft.Network/networkWatchers/connectionMonitors@2021-05-01' = { name: name parent: networkWatcher tags: tags diff --git a/arm/Microsoft.Network/networkWatchers/connectionMonitors/readme.md b/arm/Microsoft.Network/networkWatchers/connectionMonitors/readme.md index 173ae5a314..4bcf93a958 100644 --- a/arm/Microsoft.Network/networkWatchers/connectionMonitors/readme.md +++ b/arm/Microsoft.Network/networkWatchers/connectionMonitors/readme.md @@ -6,7 +6,7 @@ This template deploys Connection Monitors. | Resource Type | API Version | | :-- | :-- | -| `Microsoft.Network/networkWatchers/connectionMonitors` | 2021-03-01 | +| `Microsoft.Network/networkWatchers/connectionMonitors` | 2021-05-01 | ## Parameters @@ -49,4 +49,4 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Networkwatchers/Connectionmonitors](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/networkWatchers/connectionMonitors) +- [Networkwatchers/Connectionmonitors](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/networkWatchers/connectionMonitors) diff --git a/arm/Microsoft.Network/networkWatchers/flowLogs/deploy.bicep b/arm/Microsoft.Network/networkWatchers/flowLogs/deploy.bicep index 5518c735e3..f022078b1c 100644 --- a/arm/Microsoft.Network/networkWatchers/flowLogs/deploy.bicep +++ b/arm/Microsoft.Network/networkWatchers/flowLogs/deploy.bicep @@ -61,11 +61,11 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource networkWatcher 'Microsoft.Network/networkWatchers@2021-03-01' existing = { +resource networkWatcher 'Microsoft.Network/networkWatchers@2021-05-01' existing = { name: networkWatcherName } -resource flowLog 'Microsoft.Network/networkWatchers/flowLogs@2021-03-01' = { +resource flowLog 'Microsoft.Network/networkWatchers/flowLogs@2021-05-01' = { name: name parent: networkWatcher tags: tags diff --git a/arm/Microsoft.Network/networkWatchers/flowLogs/readme.md b/arm/Microsoft.Network/networkWatchers/flowLogs/readme.md index af84dadbfc..607b3c5e79 100644 --- a/arm/Microsoft.Network/networkWatchers/flowLogs/readme.md +++ b/arm/Microsoft.Network/networkWatchers/flowLogs/readme.md @@ -7,7 +7,7 @@ This module controls the Network Security Group Flow Logs and analytics settings | Resource Type | API Version | | :-- | :-- | -| `Microsoft.Network/networkWatchers/flowLogs` | 2021-03-01 | +| `Microsoft.Network/networkWatchers/flowLogs` | 2021-05-01 | ## Parameters @@ -53,4 +53,4 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Networkwatchers/Flowlogs](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/networkWatchers/flowLogs) +- [Networkwatchers/Flowlogs](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/networkWatchers/flowLogs) diff --git a/arm/Microsoft.Network/networkWatchers/readme.md b/arm/Microsoft.Network/networkWatchers/readme.md index c923c14bff..243e9131e1 100644 --- a/arm/Microsoft.Network/networkWatchers/readme.md +++ b/arm/Microsoft.Network/networkWatchers/readme.md @@ -9,8 +9,8 @@ This template deploys a network watcher. | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Network/networkWatchers` | 2021-05-01 | -| `Microsoft.Network/networkWatchers/connectionMonitors` | 2021-03-01 | -| `Microsoft.Network/networkWatchers/flowLogs` | 2021-03-01 | +| `Microsoft.Network/networkWatchers/connectionMonitors` | 2021-05-01 | +| `Microsoft.Network/networkWatchers/flowLogs` | 2021-05-01 | ## Parameters @@ -77,6 +77,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Networkwatchers](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/networkWatchers) -- [Networkwatchers/Connectionmonitors](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/networkWatchers/connectionMonitors) -- [Networkwatchers/Flowlogs](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/networkWatchers/flowLogs) +- [Networkwatchers/Connectionmonitors](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/networkWatchers/connectionMonitors) +- [Networkwatchers/Flowlogs](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/networkWatchers/flowLogs) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) diff --git a/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep b/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep index 47a0845a0e..9466a0a063 100644 --- a/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep @@ -70,16 +70,16 @@ resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-05-01' existing name: virtualNetworkName } -resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2021-03-01' existing = if (!empty(networkSecurityGroupName)) { +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2021-05-01' existing = if (!empty(networkSecurityGroupName)) { name: networkSecurityGroupName scope: resourceGroup(networkSecurityGroupNameResourceGroupName) } -resource routeTable 'Microsoft.Network/routeTables@2021-03-01' existing = if (!empty(routeTableName)) { +resource routeTable 'Microsoft.Network/routeTables@2021-05-01' existing = if (!empty(routeTableName)) { name: routeTableName } -resource natGateway 'Microsoft.Network/natGateways@2021-03-01' existing = if (!empty(natGatewayName)) { +resource natGateway 'Microsoft.Network/natGateways@2021-05-01' existing = if (!empty(natGatewayName)) { name: natGatewayName }