From f1f892abf339247ea634021b7576f40cd2f21768 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 15:23:00 +0100 Subject: [PATCH 01/20] ipgroup api --- arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/ipGroups/deploy.bicep | 2 +- arm/Microsoft.Network/ipGroups/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep index b42fa91373..e43498baa1 100644 --- a/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource ipGroup 'Microsoft.Network/ipGroups@2021-02-01' existing = { +resource ipGroup 'Microsoft.Network/ipGroups@2021-08-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/ipGroups/deploy.bicep b/arm/Microsoft.Network/ipGroups/deploy.bicep index d759d4d1bf..1f49e4cb91 100644 --- a/arm/Microsoft.Network/ipGroups/deploy.bicep +++ b/arm/Microsoft.Network/ipGroups/deploy.bicep @@ -30,7 +30,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource ipGroup 'Microsoft.Network/ipGroups@2021-02-01' = { +resource ipGroup 'Microsoft.Network/ipGroups@2021-08-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/ipGroups/readme.md b/arm/Microsoft.Network/ipGroups/readme.md index bead9844f0..cf573f8881 100644 --- a/arm/Microsoft.Network/ipGroups/readme.md +++ b/arm/Microsoft.Network/ipGroups/readme.md @@ -8,7 +8,7 @@ This module deploys an IP group. | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.Network/ipGroups` | 2021-02-01 | +| `Microsoft.Network/ipGroups` | 2021-08-01 | ## Parameters @@ -71,6 +71,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Ipgroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/ipGroups) +- [Ipgroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/ipGroups) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From e84a2b500d6bef5129d9ae10e9107c43b2fdd1c1 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 15:32:43 +0100 Subject: [PATCH 02/20] vnetgw api --- .../virtualNetworkGateways/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep | 2 +- arm/Microsoft.Network/virtualNetworkGateways/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep index ea6e435d0a..7ad155b4c0 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-02-01' existing = { +resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-08-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep b/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep index 381f6b946b..1a4fcc401a 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep @@ -321,7 +321,7 @@ resource virtualNetworkGatewayPublicIp_diagnosticSettings 'Microsoft.Insights/di // VNET Gateway // ============ -resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-02-01' = { +resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-08-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/virtualNetworkGateways/readme.md b/arm/Microsoft.Network/virtualNetworkGateways/readme.md index 1e0ed25450..81b481f52c 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/readme.md +++ b/arm/Microsoft.Network/virtualNetworkGateways/readme.md @@ -10,7 +10,7 @@ This module deploys a virtual network gateway. | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | | `Microsoft.Network/publicIPAddresses` | 2021-02-01 | -| `Microsoft.Network/virtualNetworkGateways` | 2021-02-01 | +| `Microsoft.Network/virtualNetworkGateways` | 2021-08-01 | ## Parameters @@ -130,4 +130,4 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/publicIPAddresses) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) -- [Virtualnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/virtualNetworkGateways) +- [Virtualnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/virtualNetworkGateways) From d7985e8cda478a5a4789c64ea39f6f85a1fec969 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 15:36:12 +0100 Subject: [PATCH 03/20] locvnetgw api --- .../localNetworkGateways/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/localNetworkGateways/deploy.bicep | 2 +- arm/Microsoft.Network/localNetworkGateways/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/localNetworkGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/localNetworkGateways/.bicep/nested_rbac.bicep index 796eaf4f55..dfc653e0ae 100644 --- a/arm/Microsoft.Network/localNetworkGateways/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/localNetworkGateways/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2021-02-01' existing = { +resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2021-08-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/localNetworkGateways/deploy.bicep b/arm/Microsoft.Network/localNetworkGateways/deploy.bicep index 4edbcd10ea..71af3d56ee 100644 --- a/arm/Microsoft.Network/localNetworkGateways/deploy.bicep +++ b/arm/Microsoft.Network/localNetworkGateways/deploy.bicep @@ -51,7 +51,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2021-02-01' = { +resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2021-08-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/localNetworkGateways/readme.md b/arm/Microsoft.Network/localNetworkGateways/readme.md index 93a4adbbfd..211fcdac83 100644 --- a/arm/Microsoft.Network/localNetworkGateways/readme.md +++ b/arm/Microsoft.Network/localNetworkGateways/readme.md @@ -8,7 +8,7 @@ This module deploys a local network gateway. | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.Network/localNetworkGateways` | 2021-02-01 | +| `Microsoft.Network/localNetworkGateways` | 2021-08-01 | ## Parameters @@ -76,6 +76,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Localnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/localNetworkGateways) +- [Localnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/localNetworkGateways) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From 097a878039dd92b4f7b1306e9411787a86a25ee7 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 15:39:47 +0100 Subject: [PATCH 04/20] vnetgw api --- .../virtualNetworkGateways/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep index 7ad155b4c0..d8188e9e6b 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-08-01' existing = { +resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep b/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep index 1a4fcc401a..39eff3d0ac 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep @@ -321,7 +321,7 @@ resource virtualNetworkGatewayPublicIp_diagnosticSettings 'Microsoft.Insights/di // VNET Gateway // ============ -resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-08-01' = { +resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-05-01' = { name: name location: location tags: tags From f161b04d5d8f8593216694c0c9cabf04a9e853e4 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 15:40:21 +0100 Subject: [PATCH 05/20] vnetgw api --- arm/Microsoft.Network/virtualNetworkGateways/readme.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arm/Microsoft.Network/virtualNetworkGateways/readme.md b/arm/Microsoft.Network/virtualNetworkGateways/readme.md index 81b481f52c..1acfbd1135 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/readme.md +++ b/arm/Microsoft.Network/virtualNetworkGateways/readme.md @@ -10,7 +10,7 @@ This module deploys a virtual network gateway. | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | | `Microsoft.Network/publicIPAddresses` | 2021-02-01 | -| `Microsoft.Network/virtualNetworkGateways` | 2021-08-01 | +| `Microsoft.Network/virtualNetworkGateways` | 2021-05-01 | ## Parameters @@ -130,4 +130,4 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/publicIPAddresses) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) -- [Virtualnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/virtualNetworkGateways) +- [Virtualnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/virtualNetworkGateways) From ee19f20f5d8ce1e7f9a664d3807909079170aa04 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 15:47:21 +0100 Subject: [PATCH 06/20] pip api --- .../.bicep/nested_networkInterface_publicIPAddress.bicep | 2 +- .../.bicep/nested_networkInterface_publicIPAddress_rbac.bicep | 2 +- arm/Microsoft.Compute/virtualMachines/readme.md | 4 ++-- .../bastionHosts/.bicep/nested_publicIPAddress.bicep | 2 +- .../bastionHosts/.bicep/nested_publicIPAddress_rbac.bicep | 2 +- arm/Microsoft.Network/bastionHosts/deploy.bicep | 2 +- arm/Microsoft.Network/bastionHosts/readme.md | 4 ++-- arm/Microsoft.Network/natGateways/deploy.bicep | 2 +- arm/Microsoft.Network/natGateways/readme.md | 4 ++-- .../publicIPAddresses/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep | 2 +- arm/Microsoft.Network/virtualNetworkGateways/readme.md | 4 ++-- 12 files changed, 16 insertions(+), 16 deletions(-) diff --git a/arm/Microsoft.Compute/virtualMachines/.bicep/nested_networkInterface_publicIPAddress.bicep b/arm/Microsoft.Compute/virtualMachines/.bicep/nested_networkInterface_publicIPAddress.bicep index 3e839c8752..e12f5a8fb7 100644 --- a/arm/Microsoft.Compute/virtualMachines/.bicep/nested_networkInterface_publicIPAddress.bicep +++ b/arm/Microsoft.Compute/virtualMachines/.bicep/nested_networkInterface_publicIPAddress.bicep @@ -34,7 +34,7 @@ var diagnosticsMetrics = [for metric in metricsToEnable: { } }] -resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-03-01' = { +resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' = { name: publicIPAddressName location: location tags: tags diff --git a/arm/Microsoft.Compute/virtualMachines/.bicep/nested_networkInterface_publicIPAddress_rbac.bicep b/arm/Microsoft.Compute/virtualMachines/.bicep/nested_networkInterface_publicIPAddress_rbac.bicep index f2d02c5cbb..a900d31e2e 100644 --- a/arm/Microsoft.Compute/virtualMachines/.bicep/nested_networkInterface_publicIPAddress_rbac.bicep +++ b/arm/Microsoft.Compute/virtualMachines/.bicep/nested_networkInterface_publicIPAddress_rbac.bicep @@ -26,7 +26,7 @@ var builtInRoleNames = { 'Virtual Machine User Login': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'fb879df8-f326-4884-b1cf-06f3ad86be52') } -resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-03-01' existing = { +resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Compute/virtualMachines/readme.md b/arm/Microsoft.Compute/virtualMachines/readme.md index f42b7171e7..04571bd1a4 100644 --- a/arm/Microsoft.Compute/virtualMachines/readme.md +++ b/arm/Microsoft.Compute/virtualMachines/readme.md @@ -13,7 +13,7 @@ This module deploys one Virtual Machine with one or multiple nics and optionally | `Microsoft.Compute/virtualMachines/extensions` | 2021-07-01 | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | | `Microsoft.Network/networkInterfaces` | 2021-03-01 | -| `Microsoft.Network/publicIPAddresses` | 2021-03-01 | +| `Microsoft.Network/publicIPAddresses` | 2021-05-01 | | `Microsoft.RecoveryServices/vaults/backupFabrics/protectionContainers/protectedItems` | 2021-06-01 | ## Parameters @@ -533,7 +533,7 @@ You can specify multiple user assigned identities to a resource by providing add - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Networkinterfaces](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/networkInterfaces) -- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/publicIPAddresses) +- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPAddresses) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) - [Vaults/Backupfabrics/Protectioncontainers/Protecteditems](https://docs.microsoft.com/en-us/azure/templates/Microsoft.RecoveryServices/2021-06-01/vaults/backupFabrics/protectionContainers/protectedItems) - [Virtualmachines](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Compute/2021-07-01/virtualMachines) diff --git a/arm/Microsoft.Network/bastionHosts/.bicep/nested_publicIPAddress.bicep b/arm/Microsoft.Network/bastionHosts/.bicep/nested_publicIPAddress.bicep index a89fcae977..c0dfd0194b 100644 --- a/arm/Microsoft.Network/bastionHosts/.bicep/nested_publicIPAddress.bicep +++ b/arm/Microsoft.Network/bastionHosts/.bicep/nested_publicIPAddress.bicep @@ -90,7 +90,7 @@ var publicIPPrefix = { id: publicIPPrefixResourceId } -resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-02-01' = { +resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/bastionHosts/.bicep/nested_publicIPAddress_rbac.bicep b/arm/Microsoft.Network/bastionHosts/.bicep/nested_publicIPAddress_rbac.bicep index f2d02c5cbb..a900d31e2e 100644 --- a/arm/Microsoft.Network/bastionHosts/.bicep/nested_publicIPAddress_rbac.bicep +++ b/arm/Microsoft.Network/bastionHosts/.bicep/nested_publicIPAddress_rbac.bicep @@ -26,7 +26,7 @@ var builtInRoleNames = { 'Virtual Machine User Login': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'fb879df8-f326-4884-b1cf-06f3ad86be52') } -resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-03-01' existing = { +resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/bastionHosts/deploy.bicep b/arm/Microsoft.Network/bastionHosts/deploy.bicep index af2962aed8..d1925677c6 100644 --- a/arm/Microsoft.Network/bastionHosts/deploy.bicep +++ b/arm/Microsoft.Network/bastionHosts/deploy.bicep @@ -69,7 +69,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource publicIPAddressExisting 'Microsoft.Network/publicIPAddresses@2021-02-01' existing = if (!empty(publicIPAddressId)) { +resource publicIPAddressExisting 'Microsoft.Network/publicIPAddresses@2021-05-01' existing = if (!empty(publicIPAddressId)) { name: last(split(publicIPAddressId, '/')) scope: resourceGroup(split(publicIPAddressId, '/')[2], split(publicIPAddressId, '/')[4]) } diff --git a/arm/Microsoft.Network/bastionHosts/readme.md b/arm/Microsoft.Network/bastionHosts/readme.md index 8654a631cd..9ecb7ecd61 100644 --- a/arm/Microsoft.Network/bastionHosts/readme.md +++ b/arm/Microsoft.Network/bastionHosts/readme.md @@ -10,7 +10,7 @@ This module deploys a bastion host. | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | | `Microsoft.Network/bastionHosts` | 2021-02-01 | -| `Microsoft.Network/publicIPAddresses` | 2021-02-01 | +| `Microsoft.Network/publicIPAddresses` | 2021-05-01 | ## Parameters @@ -84,5 +84,5 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Bastionhosts](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/bastionHosts) - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) -- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/publicIPAddresses) +- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPAddresses) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) diff --git a/arm/Microsoft.Network/natGateways/deploy.bicep b/arm/Microsoft.Network/natGateways/deploy.bicep index e17862ef47..879f3caca7 100644 --- a/arm/Microsoft.Network/natGateways/deploy.bicep +++ b/arm/Microsoft.Network/natGateways/deploy.bicep @@ -125,7 +125,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { // PUBLIC IP // ========= -resource publicIP 'Microsoft.Network/publicIPAddresses@2021-02-01' = if (natGatewayPublicIpAddress) { +resource publicIP 'Microsoft.Network/publicIPAddresses@2021-05-01' = if (natGatewayPublicIpAddress) { name: natGatewayPipName_var location: location tags: tags diff --git a/arm/Microsoft.Network/natGateways/readme.md b/arm/Microsoft.Network/natGateways/readme.md index ffde503e6d..c9405943ff 100644 --- a/arm/Microsoft.Network/natGateways/readme.md +++ b/arm/Microsoft.Network/natGateways/readme.md @@ -10,7 +10,7 @@ This module deploys a NAT gateway. | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | | `Microsoft.Network/natGateways` | 2021-02-01 | -| `Microsoft.Network/publicIPAddresses` | 2021-02-01 | +| `Microsoft.Network/publicIPAddresses` | 2021-05-01 | ## Parameters @@ -90,5 +90,5 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Natgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/natGateways) -- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/publicIPAddresses) +- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPAddresses) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) diff --git a/arm/Microsoft.Network/publicIPAddresses/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/publicIPAddresses/.bicep/nested_rbac.bicep index 16caa97465..5d97a62778 100644 --- a/arm/Microsoft.Network/publicIPAddresses/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/publicIPAddresses/.bicep/nested_rbac.bicep @@ -24,7 +24,7 @@ var builtInRoleNames = { 'Virtual Machine User Login': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'fb879df8-f326-4884-b1cf-06f3ad86be52') } -resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-02-01' existing = { +resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep b/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep index 39eff3d0ac..149119bae2 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep @@ -278,7 +278,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { // Public IPs // ========== @batchSize(1) -resource virtualGatewayPublicIP 'Microsoft.Network/publicIPAddresses@2021-02-01' = [for (virtualGatewayPublicIpName, index) in virtualGatewayPipName_var: { +resource virtualGatewayPublicIP 'Microsoft.Network/publicIPAddresses@2021-05-01' = [for (virtualGatewayPublicIpName, index) in virtualGatewayPipName_var: { name: virtualGatewayPublicIpName location: location tags: tags diff --git a/arm/Microsoft.Network/virtualNetworkGateways/readme.md b/arm/Microsoft.Network/virtualNetworkGateways/readme.md index 1acfbd1135..2475088103 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/readme.md +++ b/arm/Microsoft.Network/virtualNetworkGateways/readme.md @@ -9,7 +9,7 @@ This module deploys a virtual network gateway. | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | -| `Microsoft.Network/publicIPAddresses` | 2021-02-01 | +| `Microsoft.Network/publicIPAddresses` | 2021-05-01 | | `Microsoft.Network/virtualNetworkGateways` | 2021-05-01 | ## Parameters @@ -128,6 +128,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) -- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/publicIPAddresses) +- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPAddresses) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) - [Virtualnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/virtualNetworkGateways) From 5a5b646fb59bf25a61486c660c639bc025ab415b Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 16:01:00 +0100 Subject: [PATCH 07/20] ippref api --- .../publicIPPrefixes/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/publicIPPrefixes/deploy.bicep | 2 +- arm/Microsoft.Network/publicIPPrefixes/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/publicIPPrefixes/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/publicIPPrefixes/.bicep/nested_rbac.bicep index 0d917e12fb..a5ce0c8547 100644 --- a/arm/Microsoft.Network/publicIPPrefixes/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/publicIPPrefixes/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource publicIpPrefix 'Microsoft.Network/publicIPPrefixes@2021-02-01' existing = { +resource publicIpPrefix 'Microsoft.Network/publicIPPrefixes@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/publicIPPrefixes/deploy.bicep b/arm/Microsoft.Network/publicIPPrefixes/deploy.bicep index b2b54c0098..64120a2eba 100644 --- a/arm/Microsoft.Network/publicIPPrefixes/deploy.bicep +++ b/arm/Microsoft.Network/publicIPPrefixes/deploy.bicep @@ -32,7 +32,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource publicIpPrefix 'Microsoft.Network/publicIPPrefixes@2021-02-01' = { +resource publicIpPrefix 'Microsoft.Network/publicIPPrefixes@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/publicIPPrefixes/readme.md b/arm/Microsoft.Network/publicIPPrefixes/readme.md index cf4903b2a5..ce588d4cb1 100644 --- a/arm/Microsoft.Network/publicIPPrefixes/readme.md +++ b/arm/Microsoft.Network/publicIPPrefixes/readme.md @@ -8,7 +8,7 @@ This template deploys a public IP prefix. | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.Network/publicIPPrefixes` | 2021-02-01 | +| `Microsoft.Network/publicIPPrefixes` | 2021-05-01 | ## Parameters @@ -72,5 +72,5 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) -- [Publicipprefixes](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/publicIPPrefixes) +- [Publicipprefixes](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPPrefixes) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From 0335d4a07d86a7f8a9b2d543669ad4b37fa4b7aa Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 16:53:01 +0100 Subject: [PATCH 08/20] bastion api --- arm/Microsoft.Network/bastionHosts/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/bastionHosts/deploy.bicep | 2 +- arm/Microsoft.Network/bastionHosts/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/bastionHosts/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/bastionHosts/.bicep/nested_rbac.bicep index 2b74a32883..9d53357a28 100644 --- a/arm/Microsoft.Network/bastionHosts/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/bastionHosts/.bicep/nested_rbac.bicep @@ -25,7 +25,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource azureBastion 'Microsoft.Network/bastionHosts@2021-02-01' existing = { +resource azureBastion 'Microsoft.Network/bastionHosts@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/bastionHosts/deploy.bicep b/arm/Microsoft.Network/bastionHosts/deploy.bicep index d1925677c6..3c1547cc30 100644 --- a/arm/Microsoft.Network/bastionHosts/deploy.bicep +++ b/arm/Microsoft.Network/bastionHosts/deploy.bicep @@ -108,7 +108,7 @@ module publicIPAddress '.bicep/nested_publicIPAddress.bicep' = if (empty(publicI } } -resource azureBastion 'Microsoft.Network/bastionHosts@2021-02-01' = { +resource azureBastion 'Microsoft.Network/bastionHosts@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/bastionHosts/readme.md b/arm/Microsoft.Network/bastionHosts/readme.md index 9ecb7ecd61..80f42cf38a 100644 --- a/arm/Microsoft.Network/bastionHosts/readme.md +++ b/arm/Microsoft.Network/bastionHosts/readme.md @@ -9,7 +9,7 @@ This module deploys a bastion host. | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | -| `Microsoft.Network/bastionHosts` | 2021-02-01 | +| `Microsoft.Network/bastionHosts` | 2021-05-01 | | `Microsoft.Network/publicIPAddresses` | 2021-05-01 | ## Parameters @@ -81,7 +81,7 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Bastionhosts](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/bastionHosts) +- [Bastionhosts](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/bastionHosts) - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPAddresses) From a436a50dd14c99668df8d14d30088cdcc77a93bd Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 17:01:44 +0100 Subject: [PATCH 09/20] asg api --- .../applicationSecurityGroups/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep | 2 +- arm/Microsoft.Network/applicationSecurityGroups/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/applicationSecurityGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/applicationSecurityGroups/.bicep/nested_rbac.bicep index c7196c15d2..6f915c8c83 100644 --- a/arm/Microsoft.Network/applicationSecurityGroups/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/applicationSecurityGroups/.bicep/nested_rbac.bicep @@ -25,7 +25,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-02-01' existing = { +resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep b/arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep index 07157a8334..5e4b2b6465 100644 --- a/arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep +++ b/arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep @@ -26,7 +26,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-02-01' = { +resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/applicationSecurityGroups/readme.md b/arm/Microsoft.Network/applicationSecurityGroups/readme.md index d3d1175d7f..88e3fa2c1f 100644 --- a/arm/Microsoft.Network/applicationSecurityGroups/readme.md +++ b/arm/Microsoft.Network/applicationSecurityGroups/readme.md @@ -8,7 +8,7 @@ This module deploys an application security group. | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.Network/applicationSecurityGroups` | 2021-02-01 | +| `Microsoft.Network/applicationSecurityGroups` | 2021-05-01 | ## Parameters @@ -70,6 +70,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Applicationsecuritygroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/applicationSecurityGroups) +- [Applicationsecuritygroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/applicationSecurityGroups) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From 46b5dacdbb23602d98f8904cbbe7a6a82ad55130 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 17:16:05 +0100 Subject: [PATCH 10/20] rt api --- arm/Microsoft.Network/routeTables/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/routeTables/deploy.bicep | 2 +- arm/Microsoft.Network/routeTables/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/routeTables/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/routeTables/.bicep/nested_rbac.bicep index 4bf2e9e2c3..162ee0f0a0 100644 --- a/arm/Microsoft.Network/routeTables/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/routeTables/.bicep/nested_rbac.bicep @@ -21,7 +21,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource routeTable 'Microsoft.Network/routeTables@2021-02-01' existing = { +resource routeTable 'Microsoft.Network/routeTables@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/routeTables/deploy.bicep b/arm/Microsoft.Network/routeTables/deploy.bicep index 62b04284b2..6712b2a980 100644 --- a/arm/Microsoft.Network/routeTables/deploy.bicep +++ b/arm/Microsoft.Network/routeTables/deploy.bicep @@ -32,7 +32,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource routeTable 'Microsoft.Network/routeTables@2021-02-01' = { +resource routeTable 'Microsoft.Network/routeTables@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/routeTables/readme.md b/arm/Microsoft.Network/routeTables/readme.md index 47815bf409..f880cc1afd 100644 --- a/arm/Microsoft.Network/routeTables/readme.md +++ b/arm/Microsoft.Network/routeTables/readme.md @@ -8,7 +8,7 @@ This module deploys a user defined route table. | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.Network/routeTables` | 2021-02-01 | +| `Microsoft.Network/routeTables` | 2021-05-01 | ## Parameters @@ -116,4 +116,4 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) -- [Routetables](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/routeTables) +- [Routetables](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/routeTables) From 70c3eba17fc935ef1f7cd2c1ed30f39139336fa3 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 17:53:36 +0100 Subject: [PATCH 11/20] ipgroups api --- arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/ipGroups/deploy.bicep | 2 +- arm/Microsoft.Network/ipGroups/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep index e43498baa1..f48c2bb18c 100644 --- a/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource ipGroup 'Microsoft.Network/ipGroups@2021-08-01' existing = { +resource ipGroup 'Microsoft.Network/ipGroups@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/ipGroups/deploy.bicep b/arm/Microsoft.Network/ipGroups/deploy.bicep index 1f49e4cb91..3938200362 100644 --- a/arm/Microsoft.Network/ipGroups/deploy.bicep +++ b/arm/Microsoft.Network/ipGroups/deploy.bicep @@ -30,7 +30,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource ipGroup 'Microsoft.Network/ipGroups@2021-08-01' = { +resource ipGroup 'Microsoft.Network/ipGroups@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/ipGroups/readme.md b/arm/Microsoft.Network/ipGroups/readme.md index cf573f8881..1a6d257e42 100644 --- a/arm/Microsoft.Network/ipGroups/readme.md +++ b/arm/Microsoft.Network/ipGroups/readme.md @@ -8,7 +8,7 @@ This module deploys an IP group. | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.Network/ipGroups` | 2021-08-01 | +| `Microsoft.Network/ipGroups` | 2021-05-01 | ## Parameters @@ -71,6 +71,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Ipgroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/ipGroups) +- [Ipgroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/ipGroups) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From 3257bc5fdf3b60e629817ab275b8a7654c238cef Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:02:22 +0100 Subject: [PATCH 12/20] reg api --- .../registries/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.ContainerRegistry/registries/deploy.bicep | 2 +- arm/Microsoft.ContainerRegistry/registries/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_rbac.bicep b/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_rbac.bicep index a89f40e9cc..d350e3174a 100644 --- a/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_rbac.bicep @@ -27,7 +27,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource registry 'Microsoft.ContainerRegistry/registries@2020-11-01-preview' existing = { +resource registry 'Microsoft.ContainerRegistry/registries@2021-09-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.ContainerRegistry/registries/deploy.bicep b/arm/Microsoft.ContainerRegistry/registries/deploy.bicep index 116f43733a..1711b579ac 100644 --- a/arm/Microsoft.ContainerRegistry/registries/deploy.bicep +++ b/arm/Microsoft.ContainerRegistry/registries/deploy.bicep @@ -130,7 +130,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource registry 'Microsoft.ContainerRegistry/registries@2020-11-01-preview' = { +resource registry 'Microsoft.ContainerRegistry/registries@2021-09-01' = { name: name location: location identity: identity diff --git a/arm/Microsoft.ContainerRegistry/registries/readme.md b/arm/Microsoft.ContainerRegistry/registries/readme.md index 9285b1f7ff..a1d57fb47b 100644 --- a/arm/Microsoft.ContainerRegistry/registries/readme.md +++ b/arm/Microsoft.ContainerRegistry/registries/readme.md @@ -8,7 +8,7 @@ Azure Container Registry is a managed, private Docker registry service based on | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.ContainerRegistry/registries` | 2020-11-01-preview | +| `Microsoft.ContainerRegistry/registries` | 2021-09-01 | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | | `Microsoft.Network/privateEndpoints` | 2021-02-01 | | `Microsoft.Network/privateEndpoints/privateDnsZoneGroups` | 2021-02-01 | @@ -162,5 +162,5 @@ You can specify multiple user assigned identities to a resource by providing add - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Privateendpoints](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/privateEndpoints) - [Privateendpoints/Privatednszonegroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/privateEndpoints/privateDnsZoneGroups) -- [Registries](https://docs.microsoft.com/en-us/azure/templates/Microsoft.ContainerRegistry/2020-11-01-preview/registries) +- [Registries](https://docs.microsoft.com/en-us/azure/templates/Microsoft.ContainerRegistry/2021-09-01/registries) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From 4434f402610d4f673586c6e40ed3756edf31a60c Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:05:30 +0100 Subject: [PATCH 13/20] ddos api --- .../ddosProtectionPlans/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep | 2 +- arm/Microsoft.Network/ddosProtectionPlans/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/ddosProtectionPlans/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/ddosProtectionPlans/.bicep/nested_rbac.bicep index c4c999b454..e1468d6eb4 100644 --- a/arm/Microsoft.Network/ddosProtectionPlans/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/ddosProtectionPlans/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2021-02-01' existing = { +resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep b/arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep index 570fb209b4..bd1c9d3323 100644 --- a/arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep +++ b/arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep @@ -27,7 +27,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2021-02-01' = { +resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/ddosProtectionPlans/readme.md b/arm/Microsoft.Network/ddosProtectionPlans/readme.md index f04b54f443..097028aa8c 100644 --- a/arm/Microsoft.Network/ddosProtectionPlans/readme.md +++ b/arm/Microsoft.Network/ddosProtectionPlans/readme.md @@ -8,7 +8,7 @@ This template deploys a DDoS protection plan. | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.Network/ddosProtectionPlans` | 2021-02-01 | +| `Microsoft.Network/ddosProtectionPlans` | 2021-05-01 | ## Parameters @@ -70,6 +70,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Ddosprotectionplans](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/ddosProtectionPlans) +- [Ddosprotectionplans](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/ddosProtectionPlans) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From c5551e7aa635c92f2d2adde94a86908140e5fb81 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:08:59 +0100 Subject: [PATCH 14/20] er api --- .../expressRouteCircuits/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/expressRouteCircuits/deploy.bicep | 2 +- arm/Microsoft.Network/expressRouteCircuits/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/expressRouteCircuits/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/expressRouteCircuits/.bicep/nested_rbac.bicep index 92bb469fc2..f5e3afb9c3 100644 --- a/arm/Microsoft.Network/expressRouteCircuits/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/expressRouteCircuits/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-02-01' existing = { +resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/expressRouteCircuits/deploy.bicep b/arm/Microsoft.Network/expressRouteCircuits/deploy.bicep index 9160afa632..725d93d243 100644 --- a/arm/Microsoft.Network/expressRouteCircuits/deploy.bicep +++ b/arm/Microsoft.Network/expressRouteCircuits/deploy.bicep @@ -145,7 +145,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-02-01' = { +resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/expressRouteCircuits/readme.md b/arm/Microsoft.Network/expressRouteCircuits/readme.md index d5ad83ca55..3017157c35 100644 --- a/arm/Microsoft.Network/expressRouteCircuits/readme.md +++ b/arm/Microsoft.Network/expressRouteCircuits/readme.md @@ -9,7 +9,7 @@ This template deploys an express route circuit. | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | -| `Microsoft.Network/expressRouteCircuits` | 2021-02-01 | +| `Microsoft.Network/expressRouteCircuits` | 2021-05-01 | ## Parameters @@ -92,6 +92,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) -- [Expressroutecircuits](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/expressRouteCircuits) +- [Expressroutecircuits](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/expressRouteCircuits) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From d66110f4c780df60c41299d90e27fd9f83cf582c Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:15:00 +0100 Subject: [PATCH 15/20] lb api --- arm/Microsoft.Network/loadBalancers/.bicep/nested_rbac.bicep | 2 +- .../loadBalancers/backendAddressPools/deploy.bicep | 2 +- arm/Microsoft.Network/loadBalancers/deploy.bicep | 2 +- .../loadBalancers/inboundNatRules/deploy.bicep | 2 +- arm/Microsoft.Network/loadBalancers/readme.md | 4 ++-- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arm/Microsoft.Network/loadBalancers/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/loadBalancers/.bicep/nested_rbac.bicep index b9960c3ff9..7888113ca2 100644 --- a/arm/Microsoft.Network/loadBalancers/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/loadBalancers/.bicep/nested_rbac.bicep @@ -24,7 +24,7 @@ var builtInRoleNames = { 'Virtual Machine User Login': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'fb879df8-f326-4884-b1cf-06f3ad86be52') } -resource loadBalancer 'Microsoft.Network/loadBalancers@2021-02-01' existing = { +resource loadBalancer 'Microsoft.Network/loadBalancers@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/loadBalancers/backendAddressPools/deploy.bicep b/arm/Microsoft.Network/loadBalancers/backendAddressPools/deploy.bicep index 5d610ac59f..85b118de6b 100644 --- a/arm/Microsoft.Network/loadBalancers/backendAddressPools/deploy.bicep +++ b/arm/Microsoft.Network/loadBalancers/backendAddressPools/deploy.bicep @@ -18,7 +18,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource loadBalancer 'Microsoft.Network/loadBalancers@2021-02-01' existing = { +resource loadBalancer 'Microsoft.Network/loadBalancers@2021-05-01' existing = { name: loadBalancerName } diff --git a/arm/Microsoft.Network/loadBalancers/deploy.bicep b/arm/Microsoft.Network/loadBalancers/deploy.bicep index af3695de4a..fce86c4573 100644 --- a/arm/Microsoft.Network/loadBalancers/deploy.bicep +++ b/arm/Microsoft.Network/loadBalancers/deploy.bicep @@ -160,7 +160,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource loadBalancer 'Microsoft.Network/loadBalancers@2021-02-01' = { +resource loadBalancer 'Microsoft.Network/loadBalancers@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/loadBalancers/inboundNatRules/deploy.bicep b/arm/Microsoft.Network/loadBalancers/inboundNatRules/deploy.bicep index cd20e269a3..6c7da8f4fa 100644 --- a/arm/Microsoft.Network/loadBalancers/inboundNatRules/deploy.bicep +++ b/arm/Microsoft.Network/loadBalancers/inboundNatRules/deploy.bicep @@ -55,7 +55,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource loadBalancer 'Microsoft.Network/loadBalancers@2021-02-01' existing = { +resource loadBalancer 'Microsoft.Network/loadBalancers@2021-05-01' existing = { name: loadBalancerName } diff --git a/arm/Microsoft.Network/loadBalancers/readme.md b/arm/Microsoft.Network/loadBalancers/readme.md index ca9f7c0a6a..462bf1d2dc 100644 --- a/arm/Microsoft.Network/loadBalancers/readme.md +++ b/arm/Microsoft.Network/loadBalancers/readme.md @@ -9,7 +9,7 @@ This module deploys a load balancer. | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | -| `Microsoft.Network/loadBalancers` | 2021-02-01 | +| `Microsoft.Network/loadBalancers` | 2021-05-01 | | `Microsoft.Network/loadBalancers/backendAddressPools` | 2021-05-01 | | `Microsoft.Network/loadBalancers/inboundNatRules` | 2021-05-01 | @@ -217,7 +217,7 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) -- [Loadbalancers](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/loadBalancers) +- [Loadbalancers](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/loadBalancers) - [Loadbalancers/Backendaddresspools](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/loadBalancers/backendAddressPools) - [Loadbalancers/Inboundnatrules](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/loadBalancers/inboundNatRules) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) From 1fbc2c730551747097a5ff1176379677e8110682 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:25:07 +0100 Subject: [PATCH 16/20] natgw api --- arm/Microsoft.Network/natGateways/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/natGateways/deploy.bicep | 2 +- arm/Microsoft.Network/natGateways/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/natGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/natGateways/.bicep/nested_rbac.bicep index 80bfba5cfd..dd5e86935a 100644 --- a/arm/Microsoft.Network/natGateways/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/natGateways/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource natGateway 'Microsoft.Network/natGateways@2021-02-01' existing = { +resource natGateway 'Microsoft.Network/natGateways@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/natGateways/deploy.bicep b/arm/Microsoft.Network/natGateways/deploy.bicep index 879f3caca7..aa50000191 100644 --- a/arm/Microsoft.Network/natGateways/deploy.bicep +++ b/arm/Microsoft.Network/natGateways/deploy.bicep @@ -163,7 +163,7 @@ resource publicIP_diagnosticSettings 'Microsoft.Insights/diagnosticSettings@2021 // NAT GATEWAY // =========== -resource natGateway 'Microsoft.Network/natGateways@2021-02-01' = { +resource natGateway 'Microsoft.Network/natGateways@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/natGateways/readme.md b/arm/Microsoft.Network/natGateways/readme.md index c9405943ff..c96317f119 100644 --- a/arm/Microsoft.Network/natGateways/readme.md +++ b/arm/Microsoft.Network/natGateways/readme.md @@ -9,7 +9,7 @@ This module deploys a NAT gateway. | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | -| `Microsoft.Network/natGateways` | 2021-02-01 | +| `Microsoft.Network/natGateways` | 2021-05-01 | | `Microsoft.Network/publicIPAddresses` | 2021-05-01 | ## Parameters @@ -89,6 +89,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) -- [Natgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/natGateways) +- [Natgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/natGateways) - [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPAddresses) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From a79607620a2ce168349d876cbf16a59cadaf363f Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:28:29 +0100 Subject: [PATCH 17/20] nsg api --- .../networkSecurityGroups/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/networkSecurityGroups/deploy.bicep | 2 +- arm/Microsoft.Network/networkSecurityGroups/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/networkSecurityGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/networkSecurityGroups/.bicep/nested_rbac.bicep index 700e0d6d2b..b01db6840b 100644 --- a/arm/Microsoft.Network/networkSecurityGroups/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/networkSecurityGroups/.bicep/nested_rbac.bicep @@ -23,7 +23,7 @@ var builtInRoleNames = { 'Virtual Machine Contributor': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '9980e02c-c2be-4d73-94e8-173b1dc7cf3c') } -resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2021-02-01' existing = { +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/networkSecurityGroups/deploy.bicep b/arm/Microsoft.Network/networkSecurityGroups/deploy.bicep index efc071e10c..92ef624221 100644 --- a/arm/Microsoft.Network/networkSecurityGroups/deploy.bicep +++ b/arm/Microsoft.Network/networkSecurityGroups/deploy.bicep @@ -65,7 +65,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2021-02-01' = { +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/networkSecurityGroups/readme.md b/arm/Microsoft.Network/networkSecurityGroups/readme.md index 5d9cb99f10..93c865c621 100644 --- a/arm/Microsoft.Network/networkSecurityGroups/readme.md +++ b/arm/Microsoft.Network/networkSecurityGroups/readme.md @@ -9,7 +9,7 @@ This template deploys a network security group (NSG) with optional security rule | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | | `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview | -| `Microsoft.Network/networkSecurityGroups` | 2021-02-01 | +| `Microsoft.Network/networkSecurityGroups` | 2021-05-01 | ## Parameters @@ -160,5 +160,5 @@ Tag names and tag values can be provided as needed. A tag can be left without a - [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) -- [Networksecuritygroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/networkSecurityGroups) +- [Networksecuritygroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/networkSecurityGroups) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments) From 37c2052c9c713db4cab4c54a6609e6c264158f98 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:36:09 +0100 Subject: [PATCH 18/20] reg api --- .../registries/.bicep/nested_privateEndpoints.bicep | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_privateEndpoints.bicep b/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_privateEndpoints.bicep index 7a802f9c8b..9deaf8c02f 100644 --- a/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_privateEndpoints.bicep +++ b/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_privateEndpoints.bicep @@ -14,7 +14,7 @@ var privateEndpoint_var = { customDnsConfigs: (contains(privateEndpointObj, 'customDnsConfigs') ? (empty(privateEndpointObj.customDnsConfigs) ? null : privateEndpointObj.customDnsConfigs) : null) } -resource privateEndpoint 'Microsoft.Network/privateEndpoints@2021-02-01' = { +resource privateEndpoint 'Microsoft.Network/privateEndpoints@2021-05-01' = { name: privateEndpoint_var.name location: privateEndpointVnetLocation tags: tags From c5925f459ab3ca26f8528d329cc35b9f8fbbe823 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:42:08 +0100 Subject: [PATCH 19/20] conn api --- arm/Microsoft.Network/connections/deploy.bicep | 2 +- arm/Microsoft.Network/connections/readme.md | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/arm/Microsoft.Network/connections/deploy.bicep b/arm/Microsoft.Network/connections/deploy.bicep index e3f47910eb..780381578a 100644 --- a/arm/Microsoft.Network/connections/deploy.bicep +++ b/arm/Microsoft.Network/connections/deploy.bicep @@ -93,7 +93,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource connection 'Microsoft.Network/connections@2021-02-01' = { +resource connection 'Microsoft.Network/connections@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/connections/readme.md b/arm/Microsoft.Network/connections/readme.md index 46ec426f00..7ee278fe57 100644 --- a/arm/Microsoft.Network/connections/readme.md +++ b/arm/Microsoft.Network/connections/readme.md @@ -7,7 +7,7 @@ This template deploys a virtual network gateway connection. | Resource Type | API Version | | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | -| `Microsoft.Network/connections` | 2021-02-01 | +| `Microsoft.Network/connections` | 2021-05-01 | ## Parameters @@ -92,5 +92,5 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references -- [Connections](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/connections) +- [Connections](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/connections) - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) From f2475ba34a859f9a9a54dd84afce3f57f954c4a8 Mon Sep 17 00:00:00 2001 From: Erika Gressi Date: Wed, 2 Feb 2022 18:57:21 +0100 Subject: [PATCH 20/20] nw api --- .../networkWatchers/.bicep/nested_rbac.bicep | 2 +- arm/Microsoft.Network/networkWatchers/deploy.bicep | 2 +- arm/Microsoft.Network/networkWatchers/readme.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arm/Microsoft.Network/networkWatchers/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/networkWatchers/.bicep/nested_rbac.bicep index a69cf79289..b2cac768e5 100644 --- a/arm/Microsoft.Network/networkWatchers/.bicep/nested_rbac.bicep +++ b/arm/Microsoft.Network/networkWatchers/.bicep/nested_rbac.bicep @@ -20,7 +20,7 @@ var builtInRoleNames = { 'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9') } -resource networkWatcher 'Microsoft.Network/networkWatchers@2021-02-01' existing = { +resource networkWatcher 'Microsoft.Network/networkWatchers@2021-05-01' existing = { name: last(split(resourceId, '/')) } diff --git a/arm/Microsoft.Network/networkWatchers/deploy.bicep b/arm/Microsoft.Network/networkWatchers/deploy.bicep index 3cc42624e3..9d6ab97fac 100644 --- a/arm/Microsoft.Network/networkWatchers/deploy.bicep +++ b/arm/Microsoft.Network/networkWatchers/deploy.bicep @@ -33,7 +33,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) { params: {} } -resource networkWatcher 'Microsoft.Network/networkWatchers@2021-02-01' = { +resource networkWatcher 'Microsoft.Network/networkWatchers@2021-05-01' = { name: name location: location tags: tags diff --git a/arm/Microsoft.Network/networkWatchers/readme.md b/arm/Microsoft.Network/networkWatchers/readme.md index 0ad4e879ff..c923c14bff 100644 --- a/arm/Microsoft.Network/networkWatchers/readme.md +++ b/arm/Microsoft.Network/networkWatchers/readme.md @@ -8,7 +8,7 @@ This template deploys a network watcher. | :-- | :-- | | `Microsoft.Authorization/locks` | 2017-04-01 | | `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview | -| `Microsoft.Network/networkWatchers` | 2021-02-01 | +| `Microsoft.Network/networkWatchers` | 2021-05-01 | | `Microsoft.Network/networkWatchers/connectionMonitors` | 2021-03-01 | | `Microsoft.Network/networkWatchers/flowLogs` | 2021-03-01 | @@ -76,7 +76,7 @@ Tag names and tag values can be provided as needed. A tag can be left without a ## Template references - [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks) -- [Networkwatchers](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/networkWatchers) +- [Networkwatchers](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/networkWatchers) - [Networkwatchers/Connectionmonitors](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/networkWatchers/connectionMonitors) - [Networkwatchers/Flowlogs](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/networkWatchers/flowLogs) - [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)