diff --git a/modules/Microsoft.AppConfiguration/configurationStores/deploy.bicep b/modules/Microsoft.AppConfiguration/configurationStores/deploy.bicep index e24d77bf11..329d3ee7a9 100644 --- a/modules/Microsoft.AppConfiguration/configurationStores/deploy.bicep +++ b/modules/Microsoft.AppConfiguration/configurationStores/deploy.bicep @@ -236,6 +236,9 @@ module configurationStore_privateEndpoints '../../Microsoft.Network/privateEndpo tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.AppConfiguration/configurationStores/readme.md b/modules/Microsoft.AppConfiguration/configurationStores/readme.md index 93bd19f20f..c4171e3ee4 100644 --- a/modules/Microsoft.AppConfiguration/configurationStores/readme.md +++ b/modules/Microsoft.AppConfiguration/configurationStores/readme.md @@ -58,7 +58,6 @@ This module deploys an App Configuration Store. | `tags` | object | `{object}` | | Tags of the resource. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `tags` Tag names and tag values can be provided as needed. A tag can be left without a value. @@ -216,7 +215,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -252,7 +261,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -261,6 +269,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Automation/automationAccounts/deploy.bicep b/modules/Microsoft.Automation/automationAccounts/deploy.bicep index 46ec445afe..428d2894e3 100644 --- a/modules/Microsoft.Automation/automationAccounts/deploy.bicep +++ b/modules/Microsoft.Automation/automationAccounts/deploy.bicep @@ -399,6 +399,9 @@ module automationAccount_privateEndpoints '../../Microsoft.Network/privateEndpoi tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Automation/automationAccounts/readme.md b/modules/Microsoft.Automation/automationAccounts/readme.md index 7566fa2269..4e27eaf6c9 100644 --- a/modules/Microsoft.Automation/automationAccounts/readme.md +++ b/modules/Microsoft.Automation/automationAccounts/readme.md @@ -78,9 +78,10 @@ This module deploys an Azure Automation Account. | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | | `variables` | _[variables](variables/readme.md)_ array | `[]` | | List of variables to be created in the automation account. | - ### Parameter Usage: `encryption` + Prerequisites: + - User Assigned Identity for Encryption needs `Get`, `List`, `Wrap` and `Unwrap` permissions on the key. - User Assigned Identity have to be one of the defined identities in userAssignedIdentities parameter block. - To use Azure Automation with customer managed keys, both `Soft Delete` and `Do Not Purge` features must be turned on to allow for recovery of keys in case of accidental deletion. @@ -156,7 +157,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -192,7 +203,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -201,6 +211,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Batch/batchAccounts/deploy.bicep b/modules/Microsoft.Batch/batchAccounts/deploy.bicep index e99958cee2..6136f483b2 100644 --- a/modules/Microsoft.Batch/batchAccounts/deploy.bicep +++ b/modules/Microsoft.Batch/batchAccounts/deploy.bicep @@ -266,6 +266,9 @@ module batchAccount_privateEndpoints '../../Microsoft.Network/privateEndpoints/d tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Batch/batchAccounts/readme.md b/modules/Microsoft.Batch/batchAccounts/readme.md index 6bb48c7fb9..d400d363f4 100644 --- a/modules/Microsoft.Batch/batchAccounts/readme.md +++ b/modules/Microsoft.Batch/batchAccounts/readme.md @@ -64,7 +64,6 @@ | `tags` | object | `{object}` | | Tags of the resource. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `tags` Tag names and tag values can be provided as needed. A tag can be left without a value. @@ -163,7 +162,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -199,7 +208,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -208,6 +216,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Cache/redis/deploy.bicep b/modules/Microsoft.Cache/redis/deploy.bicep index 3827d2fdc7..8c6a43b391 100644 --- a/modules/Microsoft.Cache/redis/deploy.bicep +++ b/modules/Microsoft.Cache/redis/deploy.bicep @@ -266,6 +266,9 @@ module redisCache_privateEndpoints '../../Microsoft.Network/privateEndpoints/dep tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Cache/redis/readme.md b/modules/Microsoft.Cache/redis/readme.md index 341a37d366..8a21fca10b 100644 --- a/modules/Microsoft.Cache/redis/readme.md +++ b/modules/Microsoft.Cache/redis/readme.md @@ -63,7 +63,6 @@ This module deploys a Redis Cache service. | `tenantSettings` | object | `{object}` | | A dictionary of tenant settings. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. @@ -254,7 +253,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -290,7 +299,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -299,6 +307,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.CognitiveServices/accounts/deploy.bicep b/modules/Microsoft.CognitiveServices/accounts/deploy.bicep index 1084f74334..fbcdb24386 100644 --- a/modules/Microsoft.CognitiveServices/accounts/deploy.bicep +++ b/modules/Microsoft.CognitiveServices/accounts/deploy.bicep @@ -309,6 +309,9 @@ module cognitiveServices_privateEndpoints '../../Microsoft.Network/privateEndpoi tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.CognitiveServices/accounts/readme.md b/modules/Microsoft.CognitiveServices/accounts/readme.md index cf0b0cfe54..7fd9958377 100644 --- a/modules/Microsoft.CognitiveServices/accounts/readme.md +++ b/modules/Microsoft.CognitiveServices/accounts/readme.md @@ -73,7 +73,6 @@ This module deploys different kinds of cognitive services resources | `tags` | object | `{object}` | | Tags of the resource. | | `userOwnedStorage` | array | `[]` | | The storage accounts for this resource. | - ### Parameter Usage: `privateEndpoints` To use Private Endpoint the following dependencies must be deployed: @@ -98,7 +97,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -134,7 +143,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -143,6 +151,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { @@ -337,7 +355,6 @@ tags: { -
Bicep format diff --git a/modules/Microsoft.ContainerRegistry/registries/deploy.bicep b/modules/Microsoft.ContainerRegistry/registries/deploy.bicep index 26ff7e3941..373c3b467a 100644 --- a/modules/Microsoft.ContainerRegistry/registries/deploy.bicep +++ b/modules/Microsoft.ContainerRegistry/registries/deploy.bicep @@ -384,6 +384,9 @@ module registry_privateEndpoints '../../Microsoft.Network/privateEndpoints/deplo tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.ContainerRegistry/registries/readme.md b/modules/Microsoft.ContainerRegistry/registries/readme.md index 9d1a8b8a63..cc3c4bad6a 100644 --- a/modules/Microsoft.ContainerRegistry/registries/readme.md +++ b/modules/Microsoft.ContainerRegistry/registries/readme.md @@ -80,7 +80,6 @@ Azure Container Registry is a managed, private Docker registry service based on | `webhooks` | _[webhooks](webhooks/readme.md)_ array | `[]` | | All webhooks to create. | | `zoneRedundancy` | string | `'Disabled'` | `[Disabled, Enabled]` | Whether or not zone redundancy is enabled for this container registry. | - ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. @@ -199,7 +198,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -235,7 +244,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -244,6 +252,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.DataFactory/factories/deploy.bicep b/modules/Microsoft.DataFactory/factories/deploy.bicep index 9cee7a6ecc..e40458ab16 100644 --- a/modules/Microsoft.DataFactory/factories/deploy.bicep +++ b/modules/Microsoft.DataFactory/factories/deploy.bicep @@ -285,6 +285,9 @@ module dataFactory_privateEndpoints '../../Microsoft.Network/privateEndpoints/de tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.DataFactory/factories/readme.md b/modules/Microsoft.DataFactory/factories/readme.md index d28c94379f..e9ee9ac78b 100644 --- a/modules/Microsoft.DataFactory/factories/readme.md +++ b/modules/Microsoft.DataFactory/factories/readme.md @@ -71,7 +71,6 @@ | `tags` | object | `{object}` | | Tags of the resource. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. @@ -229,7 +228,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -265,7 +274,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -274,6 +282,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.EventGrid/topics/deploy.bicep b/modules/Microsoft.EventGrid/topics/deploy.bicep index c479bda0f3..8c4986dcd4 100644 --- a/modules/Microsoft.EventGrid/topics/deploy.bicep +++ b/modules/Microsoft.EventGrid/topics/deploy.bicep @@ -166,6 +166,9 @@ module topic_privateEndpoints '../../Microsoft.Network/privateEndpoints/deploy.b tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.EventGrid/topics/readme.md b/modules/Microsoft.EventGrid/topics/readme.md index 6f527140d9..85eaefa089 100644 --- a/modules/Microsoft.EventGrid/topics/readme.md +++ b/modules/Microsoft.EventGrid/topics/readme.md @@ -50,7 +50,6 @@ This module deploys an event grid topic. | `roleAssignments` | array | `[]` | | Array of role assignment objects that contain the 'roleDefinitionIdOrName' and 'principalId' to define RBAC role assignments on this resource. In the roleDefinitionIdOrName attribute, you can provide either the display name of the role definition, or its fully qualified ID in the following format: '/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11'. | | `tags` | object | `{object}` | | Tags of the resource. | - ### Parameter Usage: `privateEndpoints` To use Private Endpoint the following dependencies must be deployed: @@ -75,7 +74,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -111,7 +120,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -120,6 +128,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.EventHub/namespaces/deploy.bicep b/modules/Microsoft.EventHub/namespaces/deploy.bicep index c7df8eeadd..3a9db96337 100644 --- a/modules/Microsoft.EventHub/namespaces/deploy.bicep +++ b/modules/Microsoft.EventHub/namespaces/deploy.bicep @@ -274,6 +274,9 @@ module eventHubNamespace_privateEndpoints '../../Microsoft.Network/privateEndpoi tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.EventHub/namespaces/readme.md b/modules/Microsoft.EventHub/namespaces/readme.md index 8fddb8c47e..27418cac61 100644 --- a/modules/Microsoft.EventHub/namespaces/readme.md +++ b/modules/Microsoft.EventHub/namespaces/readme.md @@ -65,7 +65,6 @@ This module deploys an event hub namespace. | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | | `zoneRedundant` | bool | `False` | | Switch to make the Event Hub Namespace zone redundant. | - ### Parameter Usage: `privateEndpoints` To use Private Endpoint the following dependencies must be deployed: @@ -90,7 +89,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -126,7 +135,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -135,6 +143,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Insights/privateLinkScopes/deploy.bicep b/modules/Microsoft.Insights/privateLinkScopes/deploy.bicep index 72c92f298f..1ec84c0a48 100644 --- a/modules/Microsoft.Insights/privateLinkScopes/deploy.bicep +++ b/modules/Microsoft.Insights/privateLinkScopes/deploy.bicep @@ -85,6 +85,9 @@ module privateLinkScope_privateEndpoints '../../Microsoft.Network/privateEndpoin tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Insights/privateLinkScopes/readme.md b/modules/Microsoft.Insights/privateLinkScopes/readme.md index df6c9fa0db..c53d0eec7e 100644 --- a/modules/Microsoft.Insights/privateLinkScopes/readme.md +++ b/modules/Microsoft.Insights/privateLinkScopes/readme.md @@ -41,7 +41,6 @@ This module deploys an Azure Monitor Private Link Scope. | `scopedResources` | _[scopedResources](scopedResources/readme.md)_ array | `[]` | | Configuration details for Azure Monitor Resources. | | `tags` | object | `{object}` | | Resource tags. | - ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. @@ -125,7 +124,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -161,7 +170,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -170,6 +178,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.KeyVault/vaults/deploy.bicep b/modules/Microsoft.KeyVault/vaults/deploy.bicep index 52a17835ac..86f95988dc 100644 --- a/modules/Microsoft.KeyVault/vaults/deploy.bicep +++ b/modules/Microsoft.KeyVault/vaults/deploy.bicep @@ -288,6 +288,9 @@ module keyVault_privateEndpoints '../../Microsoft.Network/privateEndpoints/deplo tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.KeyVault/vaults/readme.md b/modules/Microsoft.KeyVault/vaults/readme.md index 55e816e838..e29434491b 100644 --- a/modules/Microsoft.KeyVault/vaults/readme.md +++ b/modules/Microsoft.KeyVault/vaults/readme.md @@ -65,7 +65,6 @@ This module deploys a key vault and its child resources. | `tags` | object | `{object}` | | Resource tags. | | `vaultSku` | string | `'premium'` | `[premium, standard]` | Specifies the SKU for the vault. | - ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. @@ -302,7 +301,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -338,7 +347,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -347,6 +355,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.RecoveryServices/vaults/deploy.bicep b/modules/Microsoft.RecoveryServices/vaults/deploy.bicep index 82963daa91..643d505479 100644 --- a/modules/Microsoft.RecoveryServices/vaults/deploy.bicep +++ b/modules/Microsoft.RecoveryServices/vaults/deploy.bicep @@ -305,6 +305,9 @@ module rsv_privateEndpoints '../../Microsoft.Network/privateEndpoints/deploy.bic tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.RecoveryServices/vaults/readme.md b/modules/Microsoft.RecoveryServices/vaults/readme.md index b170aa1c43..660c739c83 100644 --- a/modules/Microsoft.RecoveryServices/vaults/readme.md +++ b/modules/Microsoft.RecoveryServices/vaults/readme.md @@ -69,7 +69,6 @@ This module deploys a recovery service vault. | `tags` | object | `{object}` | | Tags of the Recovery Service Vault resource. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `backupStorageConfig`
@@ -835,7 +834,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -871,7 +880,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -880,6 +888,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.ServiceBus/namespaces/deploy.bicep b/modules/Microsoft.ServiceBus/namespaces/deploy.bicep index 8a17a4f686..d04dfceb68 100644 --- a/modules/Microsoft.ServiceBus/namespaces/deploy.bicep +++ b/modules/Microsoft.ServiceBus/namespaces/deploy.bicep @@ -358,6 +358,9 @@ module serviceBusNamespace_privateEndpoints '../../Microsoft.Network/privateEndp tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.ServiceBus/namespaces/readme.md b/modules/Microsoft.ServiceBus/namespaces/readme.md index 068e870c80..ed7da1fcbe 100644 --- a/modules/Microsoft.ServiceBus/namespaces/readme.md +++ b/modules/Microsoft.ServiceBus/namespaces/readme.md @@ -76,7 +76,6 @@ This module deploys a service bus namespace resource. | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | | `zoneRedundant` | bool | `False` | | Enabling this property creates a Premium Service Bus Namespace in regions supported availability zones. | - ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. @@ -160,7 +159,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -196,7 +205,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -205,6 +213,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.SignalRService/webPubSub/deploy.bicep b/modules/Microsoft.SignalRService/webPubSub/deploy.bicep index 071ac23840..faf6871bdb 100644 --- a/modules/Microsoft.SignalRService/webPubSub/deploy.bicep +++ b/modules/Microsoft.SignalRService/webPubSub/deploy.bicep @@ -134,6 +134,9 @@ module webPubSub_privateEndpoints '../../Microsoft.Network/privateEndpoints/depl tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.SignalRService/webPubSub/readme.md b/modules/Microsoft.SignalRService/webPubSub/readme.md index 1b4756d530..f992dbe631 100644 --- a/modules/Microsoft.SignalRService/webPubSub/readme.md +++ b/modules/Microsoft.SignalRService/webPubSub/readme.md @@ -49,7 +49,6 @@ This module deploys a Web PubSub Service resource. | `tags` | object | `{object}` | | Tags of the resource. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `privateEndpoints` To use Private Endpoint the following dependencies must be deployed: @@ -74,7 +73,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -110,7 +119,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -119,6 +127,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { @@ -269,6 +287,7 @@ userAssignedIdentities: { Using this object you can configure the service's firewall. Note, that the `defaultAction` either allows all / denies all communication via the `publicNetwork` and `privateEndpoints`. You can subsequently allow/deny individual actions using the corresponding arrays. Either block supports any array of values: + - 'ClientConnection' - 'RESTAPI' - 'ServerConnection' diff --git a/modules/Microsoft.Sql/servers/deploy.bicep b/modules/Microsoft.Sql/servers/deploy.bicep index 735bd32b4c..d2a1ebceaf 100644 --- a/modules/Microsoft.Sql/servers/deploy.bicep +++ b/modules/Microsoft.Sql/servers/deploy.bicep @@ -225,6 +225,9 @@ module server_privateEndpoints '../../Microsoft.Network/privateEndpoints/deploy. tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Sql/servers/readme.md b/modules/Microsoft.Sql/servers/readme.md index 8d376a76ae..210af89f97 100644 --- a/modules/Microsoft.Sql/servers/readme.md +++ b/modules/Microsoft.Sql/servers/readme.md @@ -67,7 +67,6 @@ This module deploys a SQL server. | `virtualNetworkRules` | _[virtualNetworkRules](virtualNetworkRules/readme.md)_ array | `[]` | | The virtual network rules to create in the server. | | `vulnerabilityAssessmentsObj` | _[vulnerabilityAssessments](vulnerabilityAssessments/readme.md)_ object | `{object}` | | The vulnerability assessment configuration. | - ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. @@ -204,7 +203,7 @@ userAssignedIdentities: { ### Parameter Usage: `administrators` Configure Azure Active Directory Authentication method for server administrator. -https://docs.microsoft.com/en-us/azure/templates/microsoft.sql/servers/administrators?tabs=bicep +
@@ -265,7 +264,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -301,7 +310,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -310,6 +318,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Storage/storageAccounts/deploy.bicep b/modules/Microsoft.Storage/storageAccounts/deploy.bicep index a781d8b828..37b148ec5e 100644 --- a/modules/Microsoft.Storage/storageAccounts/deploy.bicep +++ b/modules/Microsoft.Storage/storageAccounts/deploy.bicep @@ -291,6 +291,9 @@ module storageAccount_privateEndpoints '../../Microsoft.Network/privateEndpoints tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Storage/storageAccounts/readme.md b/modules/Microsoft.Storage/storageAccounts/readme.md index 9dc4d70b92..7a9d43f9ff 100644 --- a/modules/Microsoft.Storage/storageAccounts/readme.md +++ b/modules/Microsoft.Storage/storageAccounts/readme.md @@ -85,7 +85,6 @@ This module is used to deploy a storage account, with the ability to deploy 1 or | `tags` | object | `{object}` | | Tags of the resource. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. @@ -265,7 +264,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -301,7 +310,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -310,6 +318,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Synapse/privateLinkHubs/deploy.bicep b/modules/Microsoft.Synapse/privateLinkHubs/deploy.bicep index d898635384..1440eb22e5 100644 --- a/modules/Microsoft.Synapse/privateLinkHubs/deploy.bicep +++ b/modules/Microsoft.Synapse/privateLinkHubs/deploy.bicep @@ -86,6 +86,9 @@ module privateLinkHub_privateEndpoints '../../Microsoft.Network/privateEndpoints tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Synapse/privateLinkHubs/readme.md b/modules/Microsoft.Synapse/privateLinkHubs/readme.md index 898e1dc65c..beb7ed693f 100644 --- a/modules/Microsoft.Synapse/privateLinkHubs/readme.md +++ b/modules/Microsoft.Synapse/privateLinkHubs/readme.md @@ -39,7 +39,6 @@ This module deploys Azure Synapse Analytics (private link hubs). | `roleAssignments` | array | `[]` | | Array of role assignment objects that contain the 'roleDefinitionIdOrName' and 'principalId' to define RBAC role assignments on this resource. In the roleDefinitionIdOrName attribute, you can provide either the display name of the role definition, or its fully qualified ID in the following format: '/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11'. | | `tags` | object | `{object}` | | Tags of the resource. | - ### Parameter Usage: `privateEndpoints` To use Private Endpoint the following dependencies must be deployed: @@ -64,7 +63,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -100,7 +109,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -109,6 +117,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Synapse/workspaces/deploy.bicep b/modules/Microsoft.Synapse/workspaces/deploy.bicep index 8aa4753b0d..f83f5fe890 100644 --- a/modules/Microsoft.Synapse/workspaces/deploy.bicep +++ b/modules/Microsoft.Synapse/workspaces/deploy.bicep @@ -292,6 +292,9 @@ module workspace_privateEndpoints '../../Microsoft.Network/privateEndpoints/depl tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Synapse/workspaces/readme.md b/modules/Microsoft.Synapse/workspaces/readme.md index f0cbf2ec7b..312b5c862b 100644 --- a/modules/Microsoft.Synapse/workspaces/readme.md +++ b/modules/Microsoft.Synapse/workspaces/readme.md @@ -75,7 +75,6 @@ This module deploys a Synapse Workspace. | `tags` | object | `{object}` | | Tags of the resource. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `privateEndpoints` To use Private Endpoint the following dependencies must be deployed: @@ -100,7 +99,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -136,7 +145,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -145,6 +153,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Web/sites/deploy.bicep b/modules/Microsoft.Web/sites/deploy.bicep index 486a2fb8d9..f14f86dd57 100644 --- a/modules/Microsoft.Web/sites/deploy.bicep +++ b/modules/Microsoft.Web/sites/deploy.bicep @@ -292,6 +292,9 @@ module app_privateEndpoints '../../Microsoft.Network/privateEndpoints/deploy.bic tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Web/sites/readme.md b/modules/Microsoft.Web/sites/readme.md index 3bf3591346..f9808817c8 100644 --- a/modules/Microsoft.Web/sites/readme.md +++ b/modules/Microsoft.Web/sites/readme.md @@ -65,7 +65,6 @@ This module deploys a web or function app. | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | | `virtualNetworkSubnetId` | string | `''` | | Azure Resource Manager ID of the Virtual network and subnet to be joined by Regional VNET Integration. This must be of the form /subscriptions/{subscriptionName}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/virtualNetworks/{vnetName}/subnets/{subnetName}. | - ### Parameter Usage: `appSettingsKeyValuePairs` AzureWebJobsStorage, AzureWebJobsDashboard, APPINSIGHTS_INSTRUMENTATIONKEY and APPLICATIONINSIGHTS_CONNECTION_STRING are set separately (check parameters storageAccountId, setAzureWebJobsDashboard, appInsightId). @@ -190,7 +189,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -226,7 +235,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -235,6 +243,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/modules/Microsoft.Web/staticSites/deploy.bicep b/modules/Microsoft.Web/staticSites/deploy.bicep index d0468933a3..40491c44eb 100644 --- a/modules/Microsoft.Web/staticSites/deploy.bicep +++ b/modules/Microsoft.Web/staticSites/deploy.bicep @@ -207,6 +207,9 @@ module staticSite_privateEndpoints '../../Microsoft.Network/privateEndpoints/dep tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {} manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : [] customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : [] + ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : [] + applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : [] + customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : '' } }] diff --git a/modules/Microsoft.Web/staticSites/readme.md b/modules/Microsoft.Web/staticSites/readme.md index 60fcee6081..c9dfb5be96 100644 --- a/modules/Microsoft.Web/staticSites/readme.md +++ b/modules/Microsoft.Web/staticSites/readme.md @@ -14,7 +14,7 @@ This module deploys a Static Web App. | Resource Type | API Version | | :-- | :-- | -| `Microsoft.Authorization/locks` | [2020-05-01](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2020-05-01/locks) | +| `Microsoft.Authorization/locks` | [2020-05-01](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/locks) | | `Microsoft.Authorization/roleAssignments` | [2022-04-01](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2022-04-01/roleAssignments) | | `Microsoft.Network/privateEndpoints` | [2022-05-01](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2022-05-01/privateEndpoints) | | `Microsoft.Network/privateEndpoints/privateDnsZoneGroups` | [2022-05-01](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2022-05-01/privateEndpoints/privateDnsZoneGroups) | @@ -58,7 +58,6 @@ This module deploys a Static Web App. | `templateProperties` | object | `{object}` | | Template Options for the static site. | | `userAssignedIdentities` | object | `{object}` | | The ID(s) to assign to the resource. | - ### Parameter Usage: `privateEndpoints` To use Private Endpoint the following dependencies must be deployed: @@ -83,7 +82,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -119,7 +128,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -128,6 +136,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields { diff --git a/utilities/src/apiSpecsList.json b/utilities/src/apiSpecsList.json index a9998e5471..c8079cddd2 100644 --- a/utilities/src/apiSpecsList.json +++ b/utilities/src/apiSpecsList.json @@ -2841,7 +2841,8 @@ "2021-08-01-preview", "2021-09-01", "2021-12-01-preview", - "2022-02-01-preview" + "2022-02-01-preview", + "2022-12-01" ], "registries/agentPools": [ "2019-06-01-preview" @@ -2890,7 +2891,8 @@ "2021-08-01-preview", "2021-09-01", "2021-12-01-preview", - "2022-02-01-preview" + "2022-02-01-preview", + "2022-12-01" ], "registries/replications": [ "2017-06-01-preview", @@ -2902,7 +2904,8 @@ "2021-08-01-preview", "2021-09-01", "2021-12-01-preview", - "2022-02-01-preview" + "2022-02-01-preview", + "2022-12-01" ], "registries/scopeMaps": [ "2019-05-01-preview", @@ -2910,7 +2913,8 @@ "2021-06-01-preview", "2021-08-01-preview", "2021-12-01-preview", - "2022-02-01-preview" + "2022-02-01-preview", + "2022-12-01" ], "registries/taskRuns": [ "2019-06-01-preview" @@ -2926,7 +2930,8 @@ "2021-06-01-preview", "2021-08-01-preview", "2021-12-01-preview", - "2022-02-01-preview" + "2022-02-01-preview", + "2022-12-01" ], "registries/webhooks": [ "2017-06-01-preview", @@ -2938,7 +2943,8 @@ "2021-08-01-preview", "2021-09-01", "2021-12-01-preview", - "2022-02-01-preview" + "2022-02-01-preview", + "2022-12-01" ] }, "Microsoft.ContainerRegistry.Admin": { @@ -3331,7 +3337,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/bandwidthSchedules": [ "2019-03-01", @@ -3346,21 +3353,24 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/diagnosticProactiveLogCollectionSettings": [ "2021-02-01", "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/diagnosticRemoteSupportSettings": [ "2021-02-01", "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/orders": [ "2019-03-01", @@ -3375,7 +3385,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/roles": [ "2019-03-01", @@ -3390,7 +3401,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/roles/addons": [ "2020-09-01", @@ -3401,7 +3413,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/roles/monitoringConfig": [ "2020-09-01", @@ -3412,7 +3425,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/shares": [ "2019-03-01", @@ -3427,7 +3441,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/storageAccountCredentials": [ "2019-03-01", @@ -3442,7 +3457,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/storageAccounts": [ "2019-08-01", @@ -3455,7 +3471,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/storageAccounts/containers": [ "2019-08-01", @@ -3468,7 +3485,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/triggers": [ "2019-03-01", @@ -3483,7 +3501,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ], "dataBoxEdgeDevices/users": [ "2019-03-01", @@ -3498,7 +3517,8 @@ "2021-06-01", "2021-06-01-preview", "2022-03-01", - "2022-04-01-preview" + "2022-04-01-preview", + "2022-12-01-preview" ] }, "Microsoft.Databricks": { @@ -14201,6 +14221,17 @@ "2019-04-01" ] }, + "Microsoft.VoiceServices": { + "communicationsGateways": [ + "2022-12-01-preview" + ], + "communicationsGateways/contacts": [ + "2022-12-01-preview" + ], + "communicationsGateways/testLines": [ + "2022-12-01-preview" + ] + }, "Microsoft.Web": { "certificates": [ "2015-08-01", diff --git a/utilities/tools/moduleReadMeSource/resourceUsage-privateEndpoints.md b/utilities/tools/moduleReadMeSource/resourceUsage-privateEndpoints.md index 7f093c25b0..6304fc9900 100644 --- a/utilities/tools/moduleReadMeSource/resourceUsage-privateEndpoints.md +++ b/utilities/tools/moduleReadMeSource/resourceUsage-privateEndpoints.md @@ -20,7 +20,17 @@ To use Private Endpoint the following dependencies must be deployed: "/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/" // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] }, - "customDnsConfigs": [ // Optional + "ipConfigurations":[ + { + "name": "myIPconfigTest02", + "properties": { + "groupId": "blob", + "memberName": "blob", + "privateIPAddress": "10.0.0.30" + } + } + ], + "customDnsConfigs": [ { "fqdn": "customname.test.local", "ipAddresses": [ @@ -56,7 +66,6 @@ privateEndpoints: [ '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.Network/privateDnsZones/' // e.g. privatelink.vaultcore.azure.net, privatelink.azurecr.io, privatelink.blob.core.windows.net ] } - // Optional customDnsConfigs: [ { fqdn: 'customname.test.local' @@ -65,6 +74,16 @@ privateEndpoints: [ ] } ] + ipConfigurations:[ + { + name: 'myIPconfigTest02' + properties: { + groupId: 'blob' + memberName: 'blob' + privateIPAddress: '10.0.0.30' + } + } + ] } // Example showing only mandatory fields {