Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ var diagnosticsMetrics = [for metric in metricsToEnable: {
}
}]

resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-03-01' = {
resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' = {
name: publicIPAddressName
location: location
tags: tags
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ var builtInRoleNames = {
'Virtual Machine User Login': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'fb879df8-f326-4884-b1cf-06f3ad86be52')
}

resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-03-01' existing = {
resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Compute/virtualMachines/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ This module deploys one Virtual Machine with one or multiple nics and optionally
| `Microsoft.Compute/virtualMachines/extensions` | 2021-07-01 |
| `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview |
| `Microsoft.Network/networkInterfaces` | 2021-03-01 |
| `Microsoft.Network/publicIPAddresses` | 2021-03-01 |
| `Microsoft.Network/publicIPAddresses` | 2021-05-01 |
| `Microsoft.RecoveryServices/vaults/backupFabrics/protectionContainers/protectedItems` | 2021-06-01 |

## Parameters
Expand Down Expand Up @@ -533,7 +533,7 @@ You can specify multiple user assigned identities to a resource by providing add
- [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
- [Networkinterfaces](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/networkInterfaces)
- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-03-01/publicIPAddresses)
- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPAddresses)
- [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)
- [Vaults/Backupfabrics/Protectioncontainers/Protecteditems](https://docs.microsoft.com/en-us/azure/templates/Microsoft.RecoveryServices/2021-06-01/vaults/backupFabrics/protectionContainers/protectedItems)
- [Virtualmachines](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Compute/2021-07-01/virtualMachines)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ var privateEndpoint_var = {
customDnsConfigs: (contains(privateEndpointObj, 'customDnsConfigs') ? (empty(privateEndpointObj.customDnsConfigs) ? null : privateEndpointObj.customDnsConfigs) : null)
}

resource privateEndpoint 'Microsoft.Network/privateEndpoints@2021-02-01' = {
resource privateEndpoint 'Microsoft.Network/privateEndpoints@2021-05-01' = {
name: privateEndpoint_var.name
location: privateEndpointVnetLocation
tags: tags
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ var builtInRoleNames = {
'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9')
}

resource registry 'Microsoft.ContainerRegistry/registries@2020-11-01-preview' existing = {
resource registry 'Microsoft.ContainerRegistry/registries@2021-09-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
2 changes: 1 addition & 1 deletion arm/Microsoft.ContainerRegistry/registries/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource registry 'Microsoft.ContainerRegistry/registries@2020-11-01-preview' = {
resource registry 'Microsoft.ContainerRegistry/registries@2021-09-01' = {
name: name
location: location
identity: identity
Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.ContainerRegistry/registries/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Azure Container Registry is a managed, private Docker registry service based on
| :-- | :-- |
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview |
| `Microsoft.ContainerRegistry/registries` | 2020-11-01-preview |
| `Microsoft.ContainerRegistry/registries` | 2021-09-01 |
| `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview |
| `Microsoft.Network/privateEndpoints` | 2021-02-01 |
| `Microsoft.Network/privateEndpoints/privateDnsZoneGroups` | 2021-02-01 |
Expand Down Expand Up @@ -162,5 +162,5 @@ You can specify multiple user assigned identities to a resource by providing add
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
- [Privateendpoints](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/privateEndpoints)
- [Privateendpoints/Privatednszonegroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/privateEndpoints/privateDnsZoneGroups)
- [Registries](https://docs.microsoft.com/en-us/azure/templates/Microsoft.ContainerRegistry/2020-11-01-preview/registries)
- [Registries](https://docs.microsoft.com/en-us/azure/templates/Microsoft.ContainerRegistry/2021-09-01/registries)
- [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ var builtInRoleNames = {
'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9')
}

resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-02-01' existing = {
resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-05-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-02-01' = {
resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-05-01' = {
name: name
location: location
tags: tags
Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Network/applicationSecurityGroups/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ This module deploys an application security group.
| :-- | :-- |
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview |
| `Microsoft.Network/applicationSecurityGroups` | 2021-02-01 |
| `Microsoft.Network/applicationSecurityGroups` | 2021-05-01 |

## Parameters

Expand Down Expand Up @@ -70,6 +70,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a

## Template references

- [Applicationsecuritygroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/applicationSecurityGroups)
- [Applicationsecuritygroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/applicationSecurityGroups)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
- [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ var publicIPPrefix = {
id: publicIPPrefixResourceId
}

resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-02-01' = {
resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' = {
name: name
location: location
tags: tags
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ var builtInRoleNames = {
'Virtual Machine User Login': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'fb879df8-f326-4884-b1cf-06f3ad86be52')
}

resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-03-01' existing = {
resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2021-05-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ var builtInRoleNames = {
'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9')
}

resource azureBastion 'Microsoft.Network/bastionHosts@2021-02-01' existing = {
resource azureBastion 'Microsoft.Network/bastionHosts@2021-05-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Network/bastionHosts/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource publicIPAddressExisting 'Microsoft.Network/publicIPAddresses@2021-02-01' existing = if (!empty(publicIPAddressId)) {
resource publicIPAddressExisting 'Microsoft.Network/publicIPAddresses@2021-05-01' existing = if (!empty(publicIPAddressId)) {
name: last(split(publicIPAddressId, '/'))
scope: resourceGroup(split(publicIPAddressId, '/')[2], split(publicIPAddressId, '/')[4])
}
Expand Down Expand Up @@ -108,7 +108,7 @@ module publicIPAddress '.bicep/nested_publicIPAddress.bicep' = if (empty(publicI
}
}

resource azureBastion 'Microsoft.Network/bastionHosts@2021-02-01' = {
resource azureBastion 'Microsoft.Network/bastionHosts@2021-05-01' = {
name: name
location: location
tags: tags
Expand Down
8 changes: 4 additions & 4 deletions arm/Microsoft.Network/bastionHosts/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,8 @@ This module deploys a bastion host.
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview |
| `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview |
| `Microsoft.Network/bastionHosts` | 2021-02-01 |
| `Microsoft.Network/publicIPAddresses` | 2021-02-01 |
| `Microsoft.Network/bastionHosts` | 2021-05-01 |
| `Microsoft.Network/publicIPAddresses` | 2021-05-01 |

## Parameters

Expand Down Expand Up @@ -81,8 +81,8 @@ Tag names and tag values can be provided as needed. A tag can be left without a

## Template references

- [Bastionhosts](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/bastionHosts)
- [Bastionhosts](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/bastionHosts)
- [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/publicIPAddresses)
- [Publicipaddresses](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/publicIPAddresses)
- [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)
2 changes: 1 addition & 1 deletion arm/Microsoft.Network/connections/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource connection 'Microsoft.Network/connections@2021-02-01' = {
resource connection 'Microsoft.Network/connections@2021-05-01' = {
name: name
location: location
tags: tags
Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Network/connections/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ This template deploys a virtual network gateway connection.
| Resource Type | API Version |
| :-- | :-- |
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Network/connections` | 2021-02-01 |
| `Microsoft.Network/connections` | 2021-05-01 |

## Parameters

Expand Down Expand Up @@ -92,5 +92,5 @@ Tag names and tag values can be provided as needed. A tag can be left without a

## Template references

- [Connections](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/connections)
- [Connections](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/connections)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ var builtInRoleNames = {
'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9')
}

resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2021-02-01' existing = {
resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2021-05-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
2 changes: 1 addition & 1 deletion arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2021-02-01' = {
resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2021-05-01' = {
name: name
location: location
tags: tags
Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Network/ddosProtectionPlans/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ This template deploys a DDoS protection plan.
| :-- | :-- |
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview |
| `Microsoft.Network/ddosProtectionPlans` | 2021-02-01 |
| `Microsoft.Network/ddosProtectionPlans` | 2021-05-01 |

## Parameters

Expand Down Expand Up @@ -70,6 +70,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a

## Template references

- [Ddosprotectionplans](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/ddosProtectionPlans)
- [Ddosprotectionplans](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/ddosProtectionPlans)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
- [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ var builtInRoleNames = {
'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9')
}

resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-02-01' existing = {
resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-05-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
2 changes: 1 addition & 1 deletion arm/Microsoft.Network/expressRouteCircuits/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-02-01' = {
resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-05-01' = {
name: name
location: location
tags: tags
Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Network/expressRouteCircuits/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ This template deploys an express route circuit.
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview |
| `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview |
| `Microsoft.Network/expressRouteCircuits` | 2021-02-01 |
| `Microsoft.Network/expressRouteCircuits` | 2021-05-01 |

## Parameters

Expand Down Expand Up @@ -92,6 +92,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a
## Template references

- [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings)
- [Expressroutecircuits](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/expressRouteCircuits)
- [Expressroutecircuits](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/expressRouteCircuits)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
- [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)
2 changes: 1 addition & 1 deletion arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ var builtInRoleNames = {
'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9')
}

resource ipGroup 'Microsoft.Network/ipGroups@2021-02-01' existing = {
resource ipGroup 'Microsoft.Network/ipGroups@2021-05-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
2 changes: 1 addition & 1 deletion arm/Microsoft.Network/ipGroups/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource ipGroup 'Microsoft.Network/ipGroups@2021-02-01' = {
resource ipGroup 'Microsoft.Network/ipGroups@2021-05-01' = {
name: name
location: location
tags: tags
Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Network/ipGroups/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ This module deploys an IP group.
| :-- | :-- |
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview |
| `Microsoft.Network/ipGroups` | 2021-02-01 |
| `Microsoft.Network/ipGroups` | 2021-05-01 |

## Parameters

Expand Down Expand Up @@ -71,6 +71,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a

## Template references

- [Ipgroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/ipGroups)
- [Ipgroups](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/ipGroups)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
- [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ var builtInRoleNames = {
'Virtual Machine User Login': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'fb879df8-f326-4884-b1cf-06f3ad86be52')
}

resource loadBalancer 'Microsoft.Network/loadBalancers@2021-02-01' existing = {
resource loadBalancer 'Microsoft.Network/loadBalancers@2021-05-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource loadBalancer 'Microsoft.Network/loadBalancers@2021-02-01' existing = {
resource loadBalancer 'Microsoft.Network/loadBalancers@2021-05-01' existing = {
name: loadBalancerName
}

Expand Down
2 changes: 1 addition & 1 deletion arm/Microsoft.Network/loadBalancers/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -160,7 +160,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource loadBalancer 'Microsoft.Network/loadBalancers@2021-02-01' = {
resource loadBalancer 'Microsoft.Network/loadBalancers@2021-05-01' = {
name: name
location: location
tags: tags
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource loadBalancer 'Microsoft.Network/loadBalancers@2021-02-01' existing = {
resource loadBalancer 'Microsoft.Network/loadBalancers@2021-05-01' existing = {
name: loadBalancerName
}

Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Network/loadBalancers/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ This module deploys a load balancer.
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview |
| `Microsoft.Insights/diagnosticSettings` | 2021-05-01-preview |
| `Microsoft.Network/loadBalancers` | 2021-02-01 |
| `Microsoft.Network/loadBalancers` | 2021-05-01 |
| `Microsoft.Network/loadBalancers/backendAddressPools` | 2021-05-01 |
| `Microsoft.Network/loadBalancers/inboundNatRules` | 2021-05-01 |

Expand Down Expand Up @@ -217,7 +217,7 @@ Tag names and tag values can be provided as needed. A tag can be left without a
## Template references

- [Diagnosticsettings](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings)
- [Loadbalancers](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/loadBalancers)
- [Loadbalancers](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/loadBalancers)
- [Loadbalancers/Backendaddresspools](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/loadBalancers/backendAddressPools)
- [Loadbalancers/Inboundnatrules](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-05-01/loadBalancers/inboundNatRules)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ var builtInRoleNames = {
'User Access Administrator': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9')
}

resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2021-02-01' existing = {
resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2021-08-01' existing = {
name: last(split(resourceId, '/'))
}

Expand Down
2 changes: 1 addition & 1 deletion arm/Microsoft.Network/localNetworkGateways/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ module pid_cuaId '.bicep/nested_cuaId.bicep' = if (!empty(cuaId)) {
params: {}
}

resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2021-02-01' = {
resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2021-08-01' = {
name: name
location: location
tags: tags
Expand Down
4 changes: 2 additions & 2 deletions arm/Microsoft.Network/localNetworkGateways/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ This module deploys a local network gateway.
| :-- | :-- |
| `Microsoft.Authorization/locks` | 2017-04-01 |
| `Microsoft.Authorization/roleAssignments` | 2021-04-01-preview |
| `Microsoft.Network/localNetworkGateways` | 2021-02-01 |
| `Microsoft.Network/localNetworkGateways` | 2021-08-01 |

## Parameters

Expand Down Expand Up @@ -76,6 +76,6 @@ Tag names and tag values can be provided as needed. A tag can be left without a

## Template references

- [Localnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/2021-02-01/localNetworkGateways)
- [Localnetworkgateways](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Network/localNetworkGateways)
- [Locks](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2017-04-01/locks)
- [Roleassignments](https://docs.microsoft.com/en-us/azure/templates/Microsoft.Authorization/roleAssignments)
Loading