diff --git a/settings/remarks/microsoft.advisor/samples/recommendations/suppressions/main.bicep b/settings/remarks/microsoft.advisor/samples/recommendations/suppressions/main.bicep new file mode 100644 index 00000000..8b137891 --- /dev/null +++ b/settings/remarks/microsoft.advisor/samples/recommendations/suppressions/main.bicep @@ -0,0 +1 @@ + diff --git a/settings/remarks/microsoft.alertsmanagement/samples/actionrules/main.bicep b/settings/remarks/microsoft.alertsmanagement/samples/actionrules/main.bicep new file mode 100644 index 00000000..c6fba9b9 --- /dev/null +++ b/settings/remarks/microsoft.alertsmanagement/samples/actionrules/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' + +resource actionRule 'Microsoft.AlertsManagement/actionRules@2021-08-08' = { + name: resourceName + location: 'global' + properties: { + actions: [ + { + actionType: 'RemoveAllActionGroups' + } + ] + description: '' + enabled: true + scopes: [ + resourceGroup().id + ] + } +} diff --git a/settings/remarks/microsoft.alertsmanagement/samples/prometheusrulegroups/main.bicep b/settings/remarks/microsoft.alertsmanagement/samples/prometheusrulegroups/main.bicep new file mode 100644 index 00000000..3ef991c6 --- /dev/null +++ b/settings/remarks/microsoft.alertsmanagement/samples/prometheusrulegroups/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.Monitor/accounts@2023-04-03' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} + +resource prometheusRuleGroup 'Microsoft.AlertsManagement/prometheusRuleGroups@2023-03-01' = { + name: resourceName + location: location + properties: { + clusterName: '' + description: '' + enabled: false + rules: [ + { + enabled: false + expression: '''histogram_quantile(0.99, sum(rate(jobs_duration_seconds_bucket{service="billing-processing"}[5m])) by (job_type)) +''' + labels: { + team: 'prod' + } + record: 'job_type:billing_jobs_duration_seconds:99p5m' + } + ] + scopes: [ + account.id + ] + } +} diff --git a/settings/remarks/microsoft.alertsmanagement/samples/smartdetectoralertrules/main.bicep b/settings/remarks/microsoft.alertsmanagement/samples/smartdetectoralertrules/main.bicep new file mode 100644 index 00000000..7c2efcf8 --- /dev/null +++ b/settings/remarks/microsoft.alertsmanagement/samples/smartdetectoralertrules/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource actionGroup 'Microsoft.Insights/actionGroups@2023-01-01' = { + name: resourceName + location: 'global' + properties: { + armRoleReceivers: [] + automationRunbookReceivers: [] + azureAppPushReceivers: [] + azureFunctionReceivers: [] + emailReceivers: [] + enabled: true + eventHubReceivers: [] + groupShortName: 'acctestag' + itsmReceivers: [] + logicAppReceivers: [] + smsReceivers: [] + voiceReceivers: [] + webhookReceivers: [] + } +} + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource smartDetectorAlertRule 'microsoft.alertsManagement/smartDetectorAlertRules@2019-06-01' = { + name: resourceName + location: 'global' + properties: { + actionGroups: { + customEmailSubject: '' + customWebhookPayload: '' + groupIds: [ + actionGroup.id + ] + } + description: '' + detector: { + id: 'FailureAnomaliesDetector' + } + frequency: 'PT1M' + scope: [ + component.id + ] + severity: 'Sev0' + state: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.analysisservices/samples/servers/main.bicep b/settings/remarks/microsoft.analysisservices/samples/servers/main.bicep new file mode 100644 index 00000000..828a8406 --- /dev/null +++ b/settings/remarks/microsoft.analysisservices/samples/servers/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource server 'Microsoft.AnalysisServices/servers@2017-08-01' = { + name: resourceName + location: location + properties: { + asAdministrators: { + members: [] + } + ipV4FirewallSettings: { + enablePowerBIService: false + firewallRules: [] + } + } + sku: { + name: 'B1' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/diagnostics/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/diagnostics/main.bicep new file mode 100644 index 00000000..6e6d91b8 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/diagnostics/main.bicep @@ -0,0 +1,77 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = { + parent: service + name: '${resourceName};rev=1' + properties: { + apiType: 'http' + apiVersion: '' + format: 'swagger-link-json' + path: 'test' + type: 'http' + value: 'http://conferenceapi.azurewebsites.net/?format=json' + } +} + +resource logger 'Microsoft.ApiManagement/service/loggers@2021-08-01' = { + parent: service + name: resourceName + properties: { + credentials: { + instrumentationKey: component.properties.InstrumentationKey + } + description: '' + isBuffered: true + loggerType: 'applicationInsights' + } +} + +resource diagnostic 'Microsoft.ApiManagement/service/apis/diagnostics@2021-08-01' = { + parent: api + name: 'applicationinsights' + properties: { + loggerId: logger.id + operationNameFormat: 'Name' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/main.bicep new file mode 100644 index 00000000..c15f73f6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = { + parent: service + name: '${resourceName};rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersion: '' + apiVersionDescription: '' + authenticationSettings: {} + description: '' + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + serviceUrl: '' + subscriptionRequired: true + type: 'http' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/operations/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/operations/main.bicep new file mode 100644 index 00000000..28df9ff6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/operations/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource service 'Microsoft.ApiManagement/service@2022-08-01' = { + name: '${resourceName}-am' + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2022-08-01' = { + parent: service + name: '${resourceName}-api;rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersionDescription: '' + authenticationSettings: {} + description: 'What is my purpose? You parse butter.' + displayName: 'Butter Parser' + path: 'butter-parser' + protocols: [ + 'http' + 'https' + ] + serviceUrl: 'https://example.com/foo/bar' + subscriptionKeyParameterNames: { + header: 'X-Butter-Robot-API-Key' + query: 'location' + } + subscriptionRequired: true + type: 'http' + } +} + +resource operation 'Microsoft.ApiManagement/service/apis/operations@2022-08-01' = { + parent: api + name: '${resourceName}-operation' + properties: { + description: '' + displayName: 'DELETE Resource' + method: 'DELETE' + responses: [] + templateParameters: [] + urlTemplate: '/resource' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/policies/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/policies/main.bicep new file mode 100644 index 00000000..181e1961 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/policies/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = { + parent: service + name: '${resourceName};rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersion: '' + apiVersionDescription: '' + authenticationSettings: {} + description: '' + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + serviceUrl: '' + subscriptionRequired: true + type: 'http' + } +} + +resource policy 'Microsoft.ApiManagement/service/apis/policies@2021-08-01' = { + parent: api + name: 'policy' + properties: { + format: 'xml' + value: ''' + + + + + +''' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/schemas/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/schemas/main.bicep new file mode 100644 index 00000000..e62d1103 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/schemas/main.bicep @@ -0,0 +1,63 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = { + parent: service + name: '${resourceName};rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersion: '' + apiVersionDescription: '' + authenticationSettings: {} + description: '' + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + serviceUrl: '' + subscriptionRequired: true + type: 'http' + } +} + +resource schema 'Microsoft.ApiManagement/service/apis/schemas@2021-08-01' = { + parent: api + name: resourceName + properties: { + contentType: 'application/vnd.ms-azure-apim.xsd+xml' + document: { + value: ''' + + ''' + } + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/tagdescriptions/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/tagdescriptions/main.bicep new file mode 100644 index 00000000..4f4c4267 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/tagdescriptions/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource service 'Microsoft.ApiManagement/service@2022-08-01' = { + name: '${resourceName}-service' + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2022-08-01' = { + parent: service + name: '${resourceName}-api;rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersionDescription: '' + authenticationSettings: {} + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + subscriptionRequired: true + type: 'http' + } +} + +resource tag 'Microsoft.ApiManagement/service/tags@2022-08-01' = { + parent: service + name: '${resourceName}-tag' + properties: { + displayName: 'acctest0001-tag' + } +} + +resource tagDescription 'Microsoft.ApiManagement/service/apis/tagDescriptions@2022-08-01' = { + parent: api + name: '${resourceName}-tag' + properties: { + description: 'tag description' + externalDocsDescription: 'external tag description' + externalDocsUrl: 'https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs' + } +} + +resource tag1 'Microsoft.ApiManagement/service/apis/tags@2022-08-01' = { + parent: api + name: '${resourceName}-tag' +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/tags/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/tags/main.bicep new file mode 100644 index 00000000..9263f2e8 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/tags/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource service 'Microsoft.ApiManagement/service@2022-08-01' = { + name: '${resourceName}-service' + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2022-08-01' = { + parent: service + name: '${resourceName}-api;rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersionDescription: '' + authenticationSettings: {} + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + subscriptionRequired: true + type: 'http' + } +} + +resource tag 'Microsoft.ApiManagement/service/tags@2022-08-01' = { + parent: service + name: '${resourceName}-tag' + properties: { + displayName: 'acctest0001-tag' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apiversionsets/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apiversionsets/main.bicep new file mode 100644 index 00000000..079e3fb3 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apiversionsets/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource apiVersionSet 'Microsoft.ApiManagement/service/apiVersionSets@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: 'TestDescription1' + displayName: 'TestApiVersionSet1230630032559674766' + versioningScheme: 'Segment' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/authorizationservers/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/authorizationservers/main.bicep new file mode 100644 index 00000000..244a30d9 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/authorizationservers/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The OAuth client ID for the authorization server') +param oauthClientId string +@secure() +@description('The OAuth client secret for the authorization server') +param oauthClientSecret string + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource authorizationServer 'Microsoft.ApiManagement/service/authorizationServers@2021-08-01' = { + parent: service + name: resourceName + properties: { + authorizationEndpoint: 'https://azacceptance.hashicorptest.com/client/authorize' + authorizationMethods: [ + 'GET' + ] + clientAuthenticationMethod: [] + clientId: null + clientRegistrationEndpoint: 'https://azacceptance.hashicorptest.com/client/register' + clientSecret: null + defaultScope: '' + description: '' + displayName: 'Test Group' + grantTypes: [ + 'implicit' + ] + resourceOwnerPassword: '' + resourceOwnerUsername: '' + supportState: false + tokenBodyParameters: [] + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/backends/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/backends/main.bicep new file mode 100644 index 00000000..aa963401 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/backends/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource backend 'Microsoft.ApiManagement/service/backends@2021-08-01' = { + parent: service + name: resourceName + properties: { + protocol: 'http' + url: 'https://acctest' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/caches/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/caches/main.bicep new file mode 100644 index 00000000..63f1096f --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/caches/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource redis 'Microsoft.Cache/redis@2023-04-01' = { + name: resourceName + properties: { + enableNonSslPort: true + minimumTlsVersion: '1.2' + sku: { + capacity: 2 + family: 'C' + name: 'Standard' + } + } +} + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource cache 'Microsoft.ApiManagement/service/caches@2021-08-01' = { + parent: service + name: resourceName + properties: { + connectionString: '${redis.name}.redis.cache.windows.net:6380,password=redis.listKeys().primaryKey,ssl=true,abortConnect=False' + useFromLocation: 'default' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/certificates/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/certificates/main.bicep new file mode 100644 index 00000000..9fa37d0f --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/certificates/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource certificate 'Microsoft.ApiManagement/service/certificates@2021-08-01' = { + parent: service + name: resourceName + properties: { + data: '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' + password: '' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/diagnostics/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/diagnostics/main.bicep new file mode 100644 index 00000000..247cece4 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/diagnostics/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource diagnostic 'Microsoft.ApiManagement/service/diagnostics@2021-08-01' = { + parent: service + name: 'applicationinsights' + properties: { + loggerId: logger.id + operationNameFormat: 'Name' + } +} + +resource logger 'Microsoft.ApiManagement/service/loggers@2021-08-01' = { + parent: service + name: resourceName + properties: { + credentials: { + instrumentationKey: component.properties.InstrumentationKey + } + description: '' + isBuffered: true + loggerType: 'applicationInsights' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/gateways/certificateauthorities/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/gateways/certificateauthorities/main.bicep new file mode 100644 index 00000000..d400e9d2 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/gateways/certificateauthorities/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The base64-encoded certificate data') +param certificateData string +@secure() +@description('The password for the certificate') +param certificatePassword string + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource certificate 'Microsoft.ApiManagement/service/certificates@2021-08-01' = { + parent: service + name: resourceName + properties: { + data: null + password: null + } +} + +resource gateway 'Microsoft.ApiManagement/service/gateways@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + locationData: { + city: '' + countryOrRegion: '' + district: '' + name: 'test' + } + } +} + +resource certificateAuthority 'Microsoft.ApiManagement/service/gateways/certificateAuthorities@2021-08-01' = { + parent: gateway + name: 'certificate.name' + properties: { + isTrusted: false + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/gateways/hostnameconfigurations/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/gateways/hostnameconfigurations/main.bicep new file mode 100644 index 00000000..30472942 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/gateways/hostnameconfigurations/main.bicep @@ -0,0 +1,74 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource certificate 'Microsoft.ApiManagement/service/certificates@2021-08-01' = { + parent: service + name: resourceName + properties: { + data: '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' + password: '' + } +} + +resource gateway 'Microsoft.ApiManagement/service/gateways@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + locationData: { + city: '' + countryOrRegion: '' + district: '' + name: 'test' + } + } +} + +resource hostnameConfiguration 'Microsoft.ApiManagement/service/gateways/hostnameConfigurations@2021-08-01' = { + parent: gateway + name: resourceName + properties: { + certificateId: certificate.id + hostname: 'host-name-230630032559671742' + http2Enabled: true + negotiateClientCertificate: false + tls10Enabled: false + tls11Enabled: false + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/gateways/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/gateways/main.bicep new file mode 100644 index 00000000..e8c528a7 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/gateways/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource gateway 'Microsoft.ApiManagement/service/gateways@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + locationData: { + city: '' + countryOrRegion: '' + district: '' + name: 'test' + } + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/groups/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/groups/main.bicep new file mode 100644 index 00000000..dd41d7a0 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/groups/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource group 'Microsoft.ApiManagement/service/groups@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Group' + externalId: '' + type: 'custom' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/identityproviders/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/identityproviders/main.bicep new file mode 100644 index 00000000..53ae60d6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/identityproviders/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The client ID for the Twitter identity provider') +param identityProviderClientId string +@secure() +@description('The client secret for the Twitter identity provider') +param identityProviderClientSecret string + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource identityProvider 'Microsoft.ApiManagement/service/identityProviders@2021-08-01' = { + parent: service + name: 'twitter' + properties: { + clientId: null + clientSecret: null + type: 'twitter' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/loggers/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/loggers/main.bicep new file mode 100644 index 00000000..5c044a15 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/loggers/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource logger 'Microsoft.ApiManagement/service/loggers@2021-08-01' = { + parent: service + name: resourceName + properties: { + credentials: { + instrumentationKey: component.properties.InstrumentationKey + } + description: '' + isBuffered: true + loggerType: 'applicationInsights' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/main.bicep new file mode 100644 index 00000000..6d40bf73 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/namedvalues/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/namedvalues/main.bicep new file mode 100644 index 00000000..872f016c --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/namedvalues/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource namedValue 'Microsoft.ApiManagement/service/namedValues@2021-08-01' = { + parent: service + name: resourceName + properties: { + displayName: 'TestProperty230630032559683679' + secret: false + tags: [ + 'tag1' + 'tag2' + ] + value: 'Test Value' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/openidconnectproviders/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/openidconnectproviders/main.bicep new file mode 100644 index 00000000..5ca9141b --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/openidconnectproviders/main.bicep @@ -0,0 +1,43 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The client ID for the OpenID Connect provider') +param openidClientId string +@secure() +@description('The client secret for the OpenID Connect provider') +param openidClientSecret string + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource openidConnectProvider 'Microsoft.ApiManagement/service/openidConnectProviders@2021-08-01' = { + parent: service + name: resourceName + properties: { + clientId: null + clientSecret: null + description: '' + displayName: 'Initial Name' + metadataEndpoint: 'https://azacceptance.hashicorptest.com/example/foo' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/policyfragments/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/policyfragments/main.bicep new file mode 100644 index 00000000..b0ee6500 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/policyfragments/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource policyFragment 'Microsoft.ApiManagement/service/policyFragments@2021-12-01-preview' = { + parent: service + name: 'error-handler' + properties: { + description: 'Fragment for Error Handling' + format: 'xml' + value: ''' + + + +''' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/portalsettings/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/portalsettings/main.bicep new file mode 100644 index 00000000..5b803d1a --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/portalsettings/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource portalsetting 'Microsoft.ApiManagement/service/portalsettings@2021-08-01' = { + parent: service + name: 'signup' + properties: { + enabled: false + termsOfService: { + consentRequired: false + enabled: false + text: '' + } + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/products/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/products/main.bicep new file mode 100644 index 00000000..f85e8ff6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/products/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource product 'Microsoft.ApiManagement/service/products@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Product' + state: 'notPublished' + subscriptionRequired: false + terms: '' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/products/policies/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/products/policies/main.bicep new file mode 100644 index 00000000..3fdf411f --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/products/policies/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource product 'Microsoft.ApiManagement/service/products@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Product' + state: 'notPublished' + subscriptionRequired: false + terms: '' + } +} + +resource policy2 'Microsoft.ApiManagement/service/products/policies@2021-08-01' = { + parent: product + name: 'policy' + properties: { + format: 'rawxml-link' + value: 'https://gist.githubusercontent.com/riordanp/ca22f8113afae0eb38cc12d718fd048d/raw/d6ac89a2f35a6881a7729f8cb4883179dc88eea1/example.xml' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/products/tags/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/products/tags/main.bicep new file mode 100644 index 00000000..b7bc916b --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/products/tags/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource product 'Microsoft.ApiManagement/service/products@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Product' + state: 'notPublished' + subscriptionRequired: false + terms: '' + } +} + +resource serviceTag 'Microsoft.ApiManagement/service/tags@2021-08-01' = { + parent: service + name: resourceName + properties: { + displayName: 'acctest0001' + } +} + +resource tag 'Microsoft.ApiManagement/service/products/tags@2021-08-01' = { + parent: product + name: 'service_tag.name' +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/schemas/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/schemas/main.bicep new file mode 100644 index 00000000..beda098c --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/schemas/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource schema 'Microsoft.ApiManagement/service/schemas@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + schemaType: 'xml' + value: ''' + + + + + + + + + + + + + + + + + + + +''' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/subscriptions/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/subscriptions/main.bicep new file mode 100644 index 00000000..bd723fb6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/subscriptions/main.bicep @@ -0,0 +1,72 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource product 'Microsoft.ApiManagement/service/products@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Product' + state: 'published' + subscriptionRequired: true + terms: '' + } +} + +resource subscription 'Microsoft.ApiManagement/service/subscriptions@2021-08-01' = { + parent: service + name: '0f393927-8f2d-499d-906f-c03943328d31' + properties: { + allowTracing: true + displayName: 'Butter Parser API Enterprise Edition' + ownerId: user.id + scope: product.id + state: 'submitted' + } +} + +resource user 'Microsoft.ApiManagement/service/users@2021-08-01' = { + parent: service + name: resourceName + properties: { + email: 'azure-acctest230630032559695401@example.com' + firstName: 'Acceptance' + lastName: 'Test' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/tags/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/tags/main.bicep new file mode 100644 index 00000000..bcdae209 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/tags/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource tag 'Microsoft.ApiManagement/service/tags@2021-08-01' = { + parent: service + name: resourceName + properties: { + displayName: 'acctest0001' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/users/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/users/main.bicep new file mode 100644 index 00000000..cbb54ba1 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/users/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource user 'Microsoft.ApiManagement/service/users@2021-08-01' = { + parent: service + name: resourceName + properties: { + email: 'azure-acctest230630032559695401@example.com' + firstName: 'Acceptance' + lastName: 'Test' + } +} diff --git a/settings/remarks/microsoft.app/samples/containerapps/main.bicep b/settings/remarks/microsoft.app/samples/containerapps/main.bicep new file mode 100644 index 00000000..91f538b1 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/containerapps/main.bicep @@ -0,0 +1,68 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource containerApp 'Microsoft.App/containerApps@2022-03-01' = { + name: resourceName + location: location + properties: { + configuration: { + activeRevisionsMode: 'Single' + } + managedEnvironmentId: managedEnvironment.id + template: { + containers: [ + { + env: [] + image: 'jackofallops/azure-containerapps-python-acctest:v0.0.1' + name: 'acctest-cont-230630032906865620' + probes: [] + resources: { + cpu: any('0.25') + ephemeralStorage: '1Gi' + memory: '0.5Gi' + } + volumeMounts: [] + } + ] + scale: { + maxReplicas: 10 + } + volumes: [] + } + } +} + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.app/samples/jobs/main.bicep b/settings/remarks/microsoft.app/samples/jobs/main.bicep new file mode 100644 index 00000000..890a500a --- /dev/null +++ b/settings/remarks/microsoft.app/samples/jobs/main.bicep @@ -0,0 +1,61 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource job 'Microsoft.App/jobs@2025-01-01' = { + name: '${resourceName}-cajob' + location: location + properties: { + configuration: { + manualTriggerConfig: { + parallelism: 4 + replicaCompletionCount: 1 + } + replicaRetryLimit: 10 + replicaTimeout: 10 + triggerType: 'Manual' + } + environmentId: managedEnvironment.id + template: { + containers: [ + { + env: [] + image: 'jackofallops/azure-containerapps-python-acctest:v0.0.1' + name: 'testcontainerappsjob0' + probes: [] + resources: { + cpu: any('0.5') + memory: '1Gi' + } + volumeMounts: [] + } + ] + initContainers: [] + volumes: [] + } + } +} + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2025-01-01' = { + name: '${resourceName}-env' + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2023-09-01' = { + name: '${resourceName}-law' + location: location + properties: { + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/certificates/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/certificates/main.bicep new file mode 100644 index 00000000..eb160a33 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/certificates/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the certificate used in the managed environment') +param certificatePassword string + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource certificate 'Microsoft.App/managedEnvironments/certificates@2022-03-01' = { + parent: managedEnvironment + name: resourceName + location: location + properties: { + password: null + value: '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' + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/daprcomponents/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/daprcomponents/main.bicep new file mode 100644 index 00000000..225e48b5 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/daprcomponents/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource daprComponent 'Microsoft.App/managedEnvironments/daprComponents@2022-03-01' = { + parent: managedEnvironment + name: resourceName + properties: { + componentType: 'state.azure.blobstorage' + ignoreErrors: false + initTimeout: '5s' + scopes: null + version: 'v1' + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/dotnetcomponents/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/dotnetcomponents/main.bicep new file mode 100644 index 00000000..9e0a93f6 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/dotnetcomponents/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource aspireDashboard 'Microsoft.App/managedEnvironments/dotNetComponents@2024-10-02-preview' = { + parent: managedEnvironment + name: resourceName + properties: { + componentType: 'AspireDashboard' + configurations: [] + serviceBinds: [] + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/main.bicep new file mode 100644 index 00000000..88753ea0 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/storages/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/storages/main.bicep new file mode 100644 index 00000000..c819d4ca --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/storages/main.bicep @@ -0,0 +1,89 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } + tags: { + environment: 'accTest' + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource storage 'Microsoft.App/managedEnvironments/storages@2022-03-01' = { + parent: managedEnvironment + name: resourceName + properties: { + azureFile: { + accessMode: 'ReadWrite' + accountKey: storageAccount.listKeys().keys[0].value + accountName: storageAccount.properties.name + shareName: 'testsharehkez7' + } + } +} diff --git a/settings/remarks/microsoft.appconfiguration/samples/configurationstores/main.bicep b/settings/remarks/microsoft.appconfiguration/samples/configurationstores/main.bicep new file mode 100644 index 00000000..e443bc1f --- /dev/null +++ b/settings/remarks/microsoft.appconfiguration/samples/configurationstores/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource configurationStore 'Microsoft.AppConfiguration/configurationStores@2023-03-01' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + enablePurgeProtection: false + } + sku: { + name: 'standard' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apiportals/domains/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apiportals/domains/main.bicep new file mode 100644 index 00000000..f7d61a68 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apiportals/domains/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource apiPortal 'Microsoft.AppPlatform/Spring/apiPortals@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + gatewayIds: [] + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} + +resource domain 'Microsoft.AppPlatform/Spring/apiPortals/domains@2023-05-01-preview' = { + parent: apiPortal + name: '${resourceName}.azuremicroservices.io' + properties: { + thumbprint: '' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apiportals/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apiportals/main.bicep new file mode 100644 index 00000000..8397c83d --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apiportals/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource apiPortal 'Microsoft.AppPlatform/Spring/apiPortals@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + gatewayIds: [] + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/customizedaccelerators/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/customizedaccelerators/main.bicep new file mode 100644 index 00000000..cae0847c --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/customizedaccelerators/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource applicationAccelerator 'Microsoft.AppPlatform/Spring/applicationAccelerators@2023-05-01-preview' = { + parent: spring + name: 'default' +} + +resource customizedAccelerator 'Microsoft.AppPlatform/Spring/applicationAccelerators/customizedAccelerators@2023-05-01-preview' = { + parent: applicationAccelerator + name: resourceName + properties: { + description: '' + displayName: '' + gitRepository: { + authSetting: { + authType: 'Public' + } + branch: 'master' + commit: '' + gitTag: '' + url: 'https://github.com/Azure-Samples/piggymetrics' + } + iconUrl: '' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/main.bicep new file mode 100644 index 00000000..63c0908a --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource applicationAccelerator 'Microsoft.AppPlatform/Spring/applicationAccelerators@2023-05-01-preview' = { + parent: spring + name: 'default' +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/applicationliveviews/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/applicationliveviews/main.bicep new file mode 100644 index 00000000..bfd66a0c --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/applicationliveviews/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource applicationLiveView 'Microsoft.AppPlatform/Spring/applicationLiveViews@2023-05-01-preview' = { + parent: spring + name: 'default' +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apps/bindings/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apps/bindings/main.bicep new file mode 100644 index 00000000..f1b5e915 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apps/bindings/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource redis 'Microsoft.Cache/redis@2023-04-01' = { + name: resourceName + location: location + properties: { + enableNonSslPort: true + minimumTlsVersion: '1.2' + sku: { + capacity: 2 + family: 'C' + name: 'Standard' + } + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} + +resource binding 'Microsoft.AppPlatform/Spring/apps/bindings@2023-05-01-preview' = { + parent: app + name: resourceName + properties: { + bindingParameters: { + useSsl: 'true' + } + key: 'redis.listKeys().primaryKey' + resourceId: redis.id + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apps/deployments/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apps/deployments/main.bicep new file mode 100644 index 00000000..0d143257 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apps/deployments/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} + +resource deployment 'Microsoft.AppPlatform/Spring/apps/deployments@2023-05-01-preview' = { + parent: app + name: resourceName + properties: { + deploymentSettings: { + environmentVariables: {} + } + source: { + customContainer: { + args: [] + command: [] + containerImage: 'springio/gs-spring-boot-docker' + languageFramework: '' + server: 'docker.io' + } + type: 'Container' + } + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apps/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apps/main.bicep new file mode 100644 index 00000000..f0248f20 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apps/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/buildpackbindings/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/buildpackbindings/main.bicep new file mode 100644 index 00000000..21a9abab --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/buildpackbindings/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource buildService 'Microsoft.AppPlatform/Spring/buildServices@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: {} +} + +resource builder 'Microsoft.AppPlatform/Spring/buildServices/builders@2023-05-01-preview' = { + name: resourceName + properties: { + buildpackGroups: [ + { + buildpacks: [ + { + id: 'tanzu-buildpacks/java-azure' + } + ] + name: 'mix' + } + ] + stack: { + id: 'io.buildpacks.stacks.bionic' + version: 'base' + } + } +} + +resource buildpackBinding 'Microsoft.AppPlatform/Spring/buildServices/builders/buildpackBindings@2023-05-01-preview' = { + parent: builder + name: resourceName + properties: { + bindingType: 'ApplicationInsights' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/main.bicep new file mode 100644 index 00000000..649a93ba --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource buildService 'Microsoft.AppPlatform/Spring/buildServices@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: {} +} + +resource builder 'Microsoft.AppPlatform/Spring/buildServices/builders@2023-05-01-preview' = { + name: resourceName + properties: { + buildpackGroups: [ + { + buildpacks: [ + { + id: 'tanzu-buildpacks/java-azure' + } + ] + name: 'mix' + } + ] + stack: { + id: 'io.buildpacks.stacks.bionic' + version: 'base' + } + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/configservers/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/configservers/main.bicep new file mode 100644 index 00000000..d683b9a9 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/configservers/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource configServer 'Microsoft.AppPlatform/Spring/configServers@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + configServer: {} + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/configurationservices/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/configurationservices/main.bicep new file mode 100644 index 00000000..9650fb4d --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/configurationservices/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource configurationService 'Microsoft.AppPlatform/Spring/configurationServices@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + settings: { + gitProperty: {} + } + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/devtoolportals/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/devtoolportals/main.bicep new file mode 100644 index 00000000..95f0bda9 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/devtoolportals/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource devtoolportal 'Microsoft.AppPlatform/Spring/DevToolPortals@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + features: { + applicationAccelerator: { + state: 'Disabled' + } + applicationLiveView: { + state: 'Disabled' + } + } + public: false + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/gateways/domains/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/gateways/domains/main.bicep new file mode 100644 index 00000000..e0e7e5ac --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/gateways/domains/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource gateway 'Microsoft.AppPlatform/Spring/gateways@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} + +resource domain 'Microsoft.AppPlatform/Spring/gateways/domains@2023-05-01-preview' = { + parent: gateway + name: '${resourceName}.azuremicroservices.io' + properties: { + thumbprint: '' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/gateways/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/gateways/main.bicep new file mode 100644 index 00000000..4d3c60fa --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/gateways/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource gateway 'Microsoft.AppPlatform/Spring/gateways@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/gateways/routeconfigs/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/gateways/routeconfigs/main.bicep new file mode 100644 index 00000000..dd36bcdb --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/gateways/routeconfigs/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} + +resource gateway 'Microsoft.AppPlatform/Spring/gateways@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} + +resource routeConfig 'Microsoft.AppPlatform/Spring/gateways/routeConfigs@2023-05-01-preview' = { + parent: gateway + name: resourceName + properties: { + appResourceId: app.id + protocol: 'HTTP' + routes: [] + ssoEnabled: false + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/main.bicep new file mode 100644 index 00000000..0a56e401 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/monitoringsettings/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/monitoringsettings/main.bicep new file mode 100644 index 00000000..78031b28 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/monitoringsettings/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource monitoringSetting 'Microsoft.AppPlatform/Spring/monitoringSettings@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + traceEnabled: false + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/storages/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/storages/main.bicep new file mode 100644 index 00000000..caebb15d --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/storages/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource storage 'Microsoft.AppPlatform/Spring/storages@2023-05-01-preview' = { + parent: spring + name: resourceName + properties: { + accountKey: storageAccount.listKeys().keys[0].value + accountName: storageAccount.name + storageType: 'StorageAccount' + } +} diff --git a/settings/remarks/microsoft.attestation/samples/attestationproviders/main.bicep b/settings/remarks/microsoft.attestation/samples/attestationproviders/main.bicep new file mode 100644 index 00000000..945985a0 --- /dev/null +++ b/settings/remarks/microsoft.attestation/samples/attestationproviders/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource attestationProvider 'Microsoft.Attestation/attestationProviders@2020-10-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.authorization/samples/locks/main.bicep b/settings/remarks/microsoft.authorization/samples/locks/main.bicep new file mode 100644 index 00000000..01847652 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/locks/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource lock 'Microsoft.Authorization/locks@2020-05-01' = { + scope: publicIPAddress + name: resourceName + properties: { + level: 'CanNotDelete' + notes: '' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 30 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Basic' + tier: 'Regional' + } +} diff --git a/settings/remarks/microsoft.authorization/samples/policyassignments/main.bicep b/settings/remarks/microsoft.authorization/samples/policyassignments/main.bicep new file mode 100644 index 00000000..13204f20 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/policyassignments/main.bicep @@ -0,0 +1,53 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyAssignment 'Microsoft.Authorization/policyAssignments@2022-06-01' = { + name: resourceName + properties: { + displayName: '' + enforcementMode: 'Default' + parameters: { + listOfAllowedLocations: { + value: [ + 'West Europe' + 'West US 2' + 'East US 2' + ] + } + } + policyDefinitionId: policyDefinition.id + scope: subscription().id + } +} + +resource policyDefinition 'Microsoft.Authorization/policyDefinitions@2021-06-01' = { + name: resourceName + properties: { + description: '' + displayName: 'my-policy-definition' + mode: 'All' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyRule: { + if: { + not: { + field: 'location' + in: '[parameters(\'allowedLocations\')]' + } + } + then: { + effect: 'audit' + } + } + policyType: 'Custom' + } +} diff --git a/settings/remarks/microsoft.authorization/samples/policydefinitions/main.bicep b/settings/remarks/microsoft.authorization/samples/policydefinitions/main.bicep new file mode 100644 index 00000000..e4cd4a97 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/policydefinitions/main.bicep @@ -0,0 +1,34 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyDefinition 'Microsoft.Authorization/policyDefinitions@2021-06-01' = { + name: resourceName + properties: { + description: '' + displayName: 'my-policy-definition' + mode: 'All' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyRule: { + if: { + not: { + field: 'location' + in: '[parameters(\'allowedLocations\')]' + } + } + then: { + effect: 'audit' + } + } + policyType: 'Custom' + } +} diff --git a/settings/remarks/microsoft.authorization/samples/policyexemptions/main.bicep b/settings/remarks/microsoft.authorization/samples/policyexemptions/main.bicep new file mode 100644 index 00000000..0b94be00 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/policyexemptions/main.bicep @@ -0,0 +1,53 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyAssignment 'Microsoft.Authorization/policyAssignments@2022-06-01' = { + name: resourceName + properties: { + displayName: '' + enforcementMode: 'Default' + policyDefinitionId: policyDefinition.id + scope: subscription().id + } +} + +resource policyDefinition 'Microsoft.Authorization/policyDefinitions@2021-06-01' = { + name: resourceName + properties: { + description: '' + displayName: 'my-policy-definition' + mode: 'All' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyRule: { + if: { + not: { + field: 'location' + in: '[parameters(\'allowedLocations\')]' + } + } + then: { + effect: 'audit' + } + } + policyType: 'Custom' + } +} + +resource policyExemption 'Microsoft.Authorization/policyExemptions@2020-07-01-preview' = { + name: resourceName + properties: { + exemptionCategory: 'Mitigated' + policyAssignmentId: policyAssignment.id + policyDefinitionReferenceIds: [] + } +} diff --git a/settings/remarks/microsoft.authorization/samples/policysetdefinitions/main.bicep b/settings/remarks/microsoft.authorization/samples/policysetdefinitions/main.bicep new file mode 100644 index 00000000..9dd7d3ef --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/policysetdefinitions/main.bicep @@ -0,0 +1,65 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyDefinition 'Microsoft.Authorization/policyDefinitions@2021-06-01' = { + name: resourceName + properties: { + description: '' + displayName: 'my-policy-definition' + mode: 'All' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyRule: { + if: { + not: { + field: 'location' + in: '[parameters(\'allowedLocations\')]' + } + } + then: { + effect: 'audit' + } + } + policyType: 'Custom' + } +} + +resource policySetDefinition 'Microsoft.Authorization/policySetDefinitions@2025-01-01' = { + name: 'acctestpolset-${resourceName}' + properties: { + description: '' + displayName: 'acctestpolset-acctest0001' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyDefinitions: [ + { + groupNames: [] + parameters: { + listOfAllowedLocations: { + value: '[parameters(\'allowedLocations\')]' + } + } + policyDefinitionId: policyDefinition.id + policyDefinitionReferenceId: '' + } + ] + policyType: 'Custom' + } +} diff --git a/settings/remarks/microsoft.authorization/samples/resourcemanagementprivatelinks/main.bicep b/settings/remarks/microsoft.authorization/samples/resourcemanagementprivatelinks/main.bicep new file mode 100644 index 00000000..11d69aa8 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/resourcemanagementprivatelinks/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource resourceManagementPrivateLink 'Microsoft.Authorization/resourceManagementPrivateLinks@2020-05-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.authorization/samples/roledefinitions/main.bicep b/settings/remarks/microsoft.authorization/samples/roledefinitions/main.bicep new file mode 100644 index 00000000..5f726a3e --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/roledefinitions/main.bicep @@ -0,0 +1,25 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource roleDefinition 'Microsoft.Authorization/roleDefinitions@2018-01-01-preview' = { + name: '6faae21a-0cd6-4536-8c23-a278823d12ed' + properties: { + assignableScopes: [ + subscription().id + ] + description: '' + permissions: [ + { + actions: [ + '*' + ] + dataActions: [] + notActions: [] + notDataActions: [] + } + ] + roleName: 'acctest0001' + type: 'CustomRole' + } +} diff --git a/settings/remarks/microsoft.automanage/samples/configurationprofiles/main.bicep b/settings/remarks/microsoft.automanage/samples/configurationprofiles/main.bicep new file mode 100644 index 00000000..c9c9fb65 --- /dev/null +++ b/settings/remarks/microsoft.automanage/samples/configurationprofiles/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource configurationProfile 'Microsoft.Automanage/configurationProfiles@2022-05-04' = { + name: resourceName + location: location + properties: { + configuration: {} + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/certificates/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/certificates/main.bicep new file mode 100644 index 00000000..e4863be0 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/certificates/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource certificate 'Microsoft.Automation/automationAccounts/certificates@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + base64Value: 'MIIJXQIBAzCCCSMGCSqGSIb3DQEHAaCCCRQEggkQMIIJDDCCA0cGCSqGSIb3DQEHBqCCAzgwggM0AgEAMIIDLQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIgZpS0MR7AtwCAggAgIIDABD/o+pR2WXdr9RKUXVH3+L5/iNcSEAf5IFtBs2DftFE4wF+y32TUsp67M0LY4YfGLs3UEyv6qL2Mf1/nHRL87CaKWza9Dzz1H+TWIffA2fj/AsqLr+6QDJ4Ur9cvmvqdL2xL0hfmWt3RwCn7F0JLBfwLeColacsLkEqwqStGkFvjQ8r2CJ+E0xZ8GRzOdT8TOz0cGNzDl3dkSeRGYqDQ5/5NlGE6n3MJTqhullbff61hM6NBEZyB9xhNNs6zkT5j6Askx40YFpEStdFJ1TQSRMLDoCEpb6lqYY+HQ07ezoxYKvK/XMq43eN15sZz320ktkEkUF5ICyAry+ud1Cd6ReSV6ai4JvOaZGNwLVuFxinAq8TXqpBlqLOQSJCA6dItWo1O4snfPKTqblj8LxRYecLR8Pl9R55iVf2rh6p70b89UviTWrdlnUxhz3Ilb2CDC1dFIZCy8/qVA7pT0NwfNrhCIqv+qUrIRdhMAJkifa61EIQPUKJaWJutpnBHg82T1FKKpuIqgQvHnsctrQegW1KdF1WJKa/p8knRbKKeID4TQxM/c5+GdP+wAfsNjEedoZ4Z9Ud69ZMGYHrv21CgdafSzfhSecuz89kDzG8XNVXjIjhRA3aRkxMXK+xPD2ikmy0kZjBchpTbzy7zfC8SHfKypUkYTSqbQKakgqSQY9Ydd0XxGS+GovQ4TgCDr1qHCP8KYhtYbuW8PPDUblhLOxJzP3AzDbmMuZfFrRzUrq24F8FgOVvFiGrvLVgOXzMOX+mah+cli5fw3XqnBeu72yYhhXi/jxCHZ4C8I2T0okcCu016f4a0T9+dx///F7HsEjIkGI/Vrpiqiwclu1BXdiUwGpWBDvMHjTa0nD/2mqMZzSD6KclmeuQEzGLcgbVUzcg2VYGMfw8PHlDJNCJVZKf6TaK39+M+tW1BRB4/vSjBeZ2rSHDHzIykUGWmowPnb8mb50CaRa3k1iqhGmzcIaGbsDupPc+lTXB+VuaDQT+WAquINnhKQqIsgopDvmh1zCCBb0GCSqGSIb3DQEHAaCCBa4EggWqMIIFpjCCBaIGCyqGSIb3DQEMCgECoIIE7jCCBOowHAYKKoZIhvcNAQwBAzAOBAicxAYjkBRUlAICCAAEggTI6TAZVzV4qOBs34TeAIembvZyAxzknzIMB1jdKWQJgRXbeICY9v4ch68ilhKJGkzexOwqaEcOuB7rG8GKw4f+DIimLTSpHdKXpqVlUbhapQxnKvOvrcX3jJrfBmXu7cqaEXwol5b6Sx4zKbryAyNqACHxD2XOeUFG0man/aoVrJVfyLgv4i+K/I3hNwtaX4NY4Yegmlm05MH+pInHmt2lNKLKJhwgMiImarmoixFymSvt/4bqBfZMzXf4iWzacK+MjHVLZL6B7AeY026AGEOmlH/yEQCpee/LXzkpG3iAABQlVPuioYTv7svTiEi9IQa3qg2xjLQKAC8rsaUabNZ4rRJgmU2BNrzhgkNpKCjtLqpXMUB+hGi8njlLVciIxjElG3xpu829sNCm/hnXUyTiGvamNbQ0LfsFBttXX0OtnYeWoaBQMUsPsnc7HqsPVo2TD29PMs6Pgh2k6H6L7HSUWv5TN7kRFujDGCG79AKjSHTlF6htrioo3ZZRxUMOAWB4KBrLxLrR3Fs1B5etvvUd+nG2GY4sKZf2ezwblfjCqNYX2CmbH8xT+2L0WRBfp+QsOEZP8VnBpO1uSLhqogIr4fs10sWq9CZ8fnE4NRGgb1Di++8OSeXxSiIJox4zsME8HjePUKTajO2l/q22D29CCMh6aPW2cWQSDBbHE80UMrb2ewa/lKohviqm1Z/BaHRyqAf4J5szrroQe0KrFGk/7ju3s4xZ3qagg+vhgQin8csHrolq1mW2RiTSzNgPyTP54axZqAXO75LxcYoexsxZi1anvubc8L49kuD6Sra8SU9Op0GYSLQwtVug0IqYaQbZFiN8CW5cxG6T1F6CBSM91xBBld3Cq8xwTltOBG1u1jXgMHWTeXCBzBPADC8zmJ8Xth4ZBRdOj8krUQI07feTz+xFhVRs4FHgimJBzv9HtqvDaZFUajQyBLRucTqC5pj4bVcZCKPAwTr4dpgb0C4OvYJD92YDI5h1lUgdC1oRERf9gv0j+gfOJwnDNPq8WwmdvHbYdoATPqIqLcfFig5bElX1BRQGnP6CmfUzU/yiN48saHoYw0Xsg/C6pBvI9daxz/8qpsAjacJw/SkUveqLxkSvrRyiDm6mnTb0L/tl/wk0KwOT5SkR7viD7GvG5ChSr9nhfIjcOXEuorNEe8bEgrwrQqinCz9Q3UGZI0ZdsvI+2eK9YRgyp4p2Z4skXlPZP2p9MbTJDLdIAwFsvtwCBfM/SQc93YkkIvT6JQvAs9krhnWbMg5jpgQR7gRZvUyLkscxq1Q0hFmWQ9eeyACgOmC8iC6tjANLaAM9gu6i8PnTWIgy5DKzxyCi8ql0JgCtT+oMVz9bA8HY9sxB5v+qSssQB2j110URUTw77XFHfmas8vR7fajhuOTgBN5ohyidHSC3LlKv6l5r1NbI+66nYDabJn/DEk2VpkJ2+0HhmiW6mTqGSTf2P1prHzGXKnQpxodr5s5Z/X94Nwc3jyhZcDkOOEDpw0DvrwBjjhaTRnMvA7x1Re8aBQC9+5cXnG45x6AGMI1kB/wwE9PLZM7EiyTh2mj2cqZQ84H9uG2MhSBMMKC8fDxB/rezV+2HF4gBHOYbLw6YBZKXVvL1sb07yMOhirBcs1eOMYGgMCMGCSqGSIb3DQEJFTEWBBSuuXuBpo6JiIUJcpFqi4ts2POYEzB5BgkrBgEEAYI3EQExbB5qAE0AaQBjAHIAbwBzAG8AZgB0ACAARQBuAGgAYQBuAGMAZQBkACAAUgBTAEEAIABhAG4AZAAgAEEARQBTACAAQwByAHkAcAB0AG8AZwByAGEAcABoAGkAYwAgAFAAcgBvAHYAaQBkAGUAcjAxMCEwCQYFKw4DAhoFAAQUbe4FrGhxVExQjYdlCaXBHX2nbG4ECAHH8i4dQCJDAgIIAA==' + description: '' + isExportable: false + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/configurations/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/configurations/main.bicep new file mode 100644 index 00000000..bb8b1030 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/configurations/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource configuration 'Microsoft.Automation/automationAccounts/configurations@2022-08-08' = { + parent: automationAccount + name: resourceName + location: location + properties: { + description: 'test' + logVerbose: false + source: { + type: 'embeddedContent' + value: 'configuration acctest {}' + } + } + tags: { + ENV: 'prod' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/connections/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/connections/main.bicep new file mode 100644 index 00000000..d8df2325 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/connections/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The Application ID of the Azure service principal for the automation account connection') +param servicePrincipalApplicationId string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource connection 'Microsoft.Automation/automationAccounts/connections@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + connectionType: { + name: 'AzureServicePrincipal' + } + description: '' + fieldDefinitionValues: { + ApplicationId: null + CertificateThumbprint: '''AEB97B81A68E8988850972916A8B8B6CD8F39813 +''' + SubscriptionId: subscription().subscriptionId + TenantId: deployer().tenantId + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/connectiontypes/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/connectiontypes/main.bicep new file mode 100644 index 00000000..192e8d59 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/connectiontypes/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource connectionType 'Microsoft.Automation/automationAccounts/connectionTypes@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + fieldDefinitions: { + my_def: { + isEncrypted: false + isOptional: false + type: 'string' + } + } + isGlobal: false + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/credentials/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/credentials/main.bicep new file mode 100644 index 00000000..92ad0950 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/credentials/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the automation account credential') +param automationCredentialPassword string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource credential 'Microsoft.Automation/automationAccounts/credentials@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + password: null + userName: 'test_user' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.bicep new file mode 100644 index 00000000..7782f89a --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.bicep @@ -0,0 +1,167 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the automation account hybrid runbook worker') +param automationWorkerPassword string +@secure() +@description('The administrator password for the virtual machine') +param vmAdminPassword string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_D2s_v3' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource credential 'Microsoft.Automation/automationAccounts/credentials@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + password: null + userName: 'test_user' + } +} + +resource hybridRunbookWorkerGroup 'Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups@2021-06-22' = { + parent: automationAccount + name: resourceName + credential: { + name: credential.name + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource hybridRunbookWorker 'Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups/hybridRunbookWorkers@2021-06-22' = { + parent: hybridRunbookWorkerGroup + name: 'c7714056-5ba8-4bbe-920e-2993171164eb' + properties: { + vmResourceId: virtualMachine.id + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/main.bicep new file mode 100644 index 00000000..07bf40b6 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the automation account credential') +param credentialPassword string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource credential 'Microsoft.Automation/automationAccounts/credentials@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + password: null + userName: 'test_user' + } +} + +resource hybridRunbookWorkerGroup 'Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups@2021-06-22' = { + parent: automationAccount + name: resourceName + credential: { + name: credential.name + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/main.bicep new file mode 100644 index 00000000..a0e7dac9 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/modules/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/modules/main.bicep new file mode 100644 index 00000000..d664d2d8 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/modules/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource module 'Microsoft.Automation/automationAccounts/modules@2020-01-13-preview' = { + parent: automationAccount + name: 'xActiveDirectory' + properties: { + contentLink: { + uri: 'https://devopsgallerystorage.blob.core.windows.net/packages/xactivedirectory.2.19.0.nupkg' + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/powershell72modules/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/powershell72modules/main.bicep new file mode 100644 index 00000000..64a0d1b0 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/powershell72modules/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource powerShell72Module 'Microsoft.Automation/automationAccounts/powerShell72Modules@2020-01-13-preview' = { + parent: automationAccount + name: 'xActiveDirectory' + properties: { + contentLink: { + uri: 'https://devopsgallerystorage.blob.core.windows.net/packages/xactivedirectory.2.19.0.nupkg' + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/python3packages/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/python3packages/main.bicep new file mode 100644 index 00000000..656fe259 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/python3packages/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2023-11-01' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource python3Package 'Microsoft.Automation/automationAccounts/python3Packages@2023-11-01' = { + parent: automationAccount + name: resourceName + properties: { + contentLink: { + uri: 'https://files.pythonhosted.org/packages/py3/r/requests/requests-2.31.0-py3-none-any.whl' + version: '2.31.0' + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/draft/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/draft/main.bicep new file mode 100644 index 00000000..645c6422 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/draft/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource runbook 'Microsoft.Automation/automationAccounts/runbooks@2019-06-01' = { + parent: automationAccount + name: 'Get-AzureVMTutorial' + location: location + properties: { + description: 'This is a test runbook for terraform acceptance test' + draft: {} + logActivityTrace: 0 + logProgress: true + logVerbose: true + runbookType: 'PowerShell' + } +} + +resource draft 'Microsoft.Automation/automationAccounts/runbooks/draft@2018-06-30' = { + parent: runbook + name: 'content' +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/main.bicep new file mode 100644 index 00000000..3e84d9ce --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource runbook 'Microsoft.Automation/automationAccounts/runbooks@2019-06-01' = { + parent: automationAccount + name: 'Get-AzureVMTutorial' + location: location + properties: { + description: 'This is a test runbook for terraform acceptance test' + draft: {} + logActivityTrace: 0 + logProgress: true + logVerbose: true + runbookType: 'PowerShell' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/schedules/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/schedules/main.bicep new file mode 100644 index 00000000..bf571ec0 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/schedules/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource schedule 'Microsoft.Automation/automationAccounts/schedules@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + frequency: 'OneTime' + startTime: '2024-07-05T08:51:00+00:00' + timeZone: 'Etc/UTC' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/softwareupdateconfigurations/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/softwareupdateconfigurations/main.bicep new file mode 100644 index 00000000..020e8583 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/softwareupdateconfigurations/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource softwareUpdateConfiguration 'Microsoft.Automation/automationAccounts/softwareUpdateConfigurations@2019-06-01' = { + parent: automationAccount + name: resourceName + properties: { + scheduleInfo: { + description: '' + expiryTimeOffsetMinutes: 0 + frequency: 'OneTime' + interval: 0 + isEnabled: true + nextRunOffsetMinutes: 0 + startTimeOffsetMinutes: 0 + timeZone: 'Etc/UTC' + } + updateConfiguration: { + duration: 'PT2H' + linux: { + excludedPackageNameMasks: [] + includedPackageClassifications: 'Security' + includedPackageNameMasks: [] + rebootSetting: 'IfRequired' + } + operatingSystem: 'Linux' + targets: { + azureQueries: [ + { + locations: [ + 'westeurope' + ] + scope: [ + resourceGroup().id + ] + } + ] + } + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/sourcecontrols/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/sourcecontrols/main.bicep new file mode 100644 index 00000000..5a18a7a3 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/sourcecontrols/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('GitHub Personal Access Token') +param pat string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2023-11-01' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource sourceControl 'Microsoft.Automation/automationAccounts/sourceControls@2023-11-01' = { + parent: automationAccount + name: resourceName + properties: { + autoSync: false + branch: 'master' + folderPath: '/' + publishRunbook: false + repoUrl: 'https://github.com/Azure-Samples/acr-build-helloworld-node.git' + securityToken: { + accessToken: null + tokenType: 'PersonalAccessToken' + } + sourceType: 'GitHub' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/variables/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/variables/main.bicep new file mode 100644 index 00000000..b64904b1 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/variables/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource variable 'Microsoft.Automation/automationAccounts/variables@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + isEncrypted: false + value: '"Hello, Terraform Basic Test."' + } +} diff --git a/settings/remarks/microsoft.avs/samples/privateclouds/authorizations/main.bicep b/settings/remarks/microsoft.avs/samples/privateclouds/authorizations/main.bicep new file mode 100644 index 00000000..afde51c0 --- /dev/null +++ b/settings/remarks/microsoft.avs/samples/privateclouds/authorizations/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource privateCloud 'Microsoft.AVS/privateClouds@2022-05-01' = { + name: resourceName + location: location + properties: { + internet: 'Disabled' + managementCluster: { + clusterSize: 3 + } + networkBlock: '192.168.48.0/22' + } + sku: { + name: 'av36' + } +} + +resource authorization 'Microsoft.AVS/privateClouds/authorizations@2022-05-01' = { + parent: privateCloud + name: resourceName +} diff --git a/settings/remarks/microsoft.avs/samples/privateclouds/main.bicep b/settings/remarks/microsoft.avs/samples/privateclouds/main.bicep new file mode 100644 index 00000000..96933b18 --- /dev/null +++ b/settings/remarks/microsoft.avs/samples/privateclouds/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource privateCloud 'Microsoft.AVS/privateClouds@2022-05-01' = { + name: resourceName + location: location + properties: { + internet: 'Disabled' + managementCluster: { + clusterSize: 3 + } + networkBlock: '192.168.48.0/22' + } + sku: { + name: 'av36' + } +} diff --git a/settings/remarks/microsoft.azureactivedirectory/samples/b2cdirectories/main.bicep b/settings/remarks/microsoft.azureactivedirectory/samples/b2cdirectories/main.bicep new file mode 100644 index 00000000..5a6c877c --- /dev/null +++ b/settings/remarks/microsoft.azureactivedirectory/samples/b2cdirectories/main.bicep @@ -0,0 +1,24 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0003' +param location string = 'westeurope' + +resource resourceGroup 'Microsoft.Resources/resourceGroups@2020-06-01' = { + name: resourceName + location: location +} + +resource b2cDirectory 'Microsoft.AzureActiveDirectory/b2cDirectories@2021-04-01-preview' = { + name: '${resourceName}.onmicrosoft.com' + location: 'United States' + properties: { + createTenantProperties: { + countryCode: 'US' + displayName: 'acctest0003' + } + } + sku: { + name: 'PremiumP1' + tier: 'A0' + } +} diff --git a/settings/remarks/microsoft.batch/samples/batchaccounts/applications/main.bicep b/settings/remarks/microsoft.batch/samples/batchaccounts/applications/main.bicep new file mode 100644 index 00000000..1ab86d68 --- /dev/null +++ b/settings/remarks/microsoft.batch/samples/batchaccounts/applications/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource batchAccount 'Microsoft.Batch/batchAccounts@2022-10-01' = { + name: resourceName + location: location + properties: { + autoStorage: { + authenticationMode: 'StorageKeys' + storageAccountId: storageAccount.id + } + encryption: { + keySource: 'Microsoft.Batch' + } + poolAllocationMode: 'BatchService' + publicNetworkAccess: 'Enabled' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource application 'Microsoft.Batch/batchAccounts/applications@2022-10-01' = { + parent: batchAccount + name: resourceName + properties: { + allowUpdates: true + defaultVersion: '' + displayName: '' + } +} diff --git a/settings/remarks/microsoft.batch/samples/batchaccounts/certificates/main.bicep b/settings/remarks/microsoft.batch/samples/batchaccounts/certificates/main.bicep new file mode 100644 index 00000000..52dc66f5 --- /dev/null +++ b/settings/remarks/microsoft.batch/samples/batchaccounts/certificates/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The base64-encoded certificate data') +param certificateData string +@description('The thumbprint of the certificate') +param certificateThumbprint string + +resource batchAccount 'Microsoft.Batch/batchAccounts@2022-10-01' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Batch' + } + poolAllocationMode: 'BatchService' + publicNetworkAccess: 'Enabled' + } +} + +resource certificate 'Microsoft.Batch/batchAccounts/certificates@2022-10-01' = { + parent: batchAccount + name: 'SHA1-${certificateThumbprint}' + properties: { + data: null + format: 'Cer' + thumbprint: null + thumbprintAlgorithm: 'sha1' + } +} diff --git a/settings/remarks/microsoft.batch/samples/batchaccounts/main.bicep b/settings/remarks/microsoft.batch/samples/batchaccounts/main.bicep new file mode 100644 index 00000000..7d5bccd0 --- /dev/null +++ b/settings/remarks/microsoft.batch/samples/batchaccounts/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource batchAccount 'Microsoft.Batch/batchAccounts@2022-10-01' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Batch' + } + poolAllocationMode: 'BatchService' + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.batch/samples/batchaccounts/pools/main.bicep b/settings/remarks/microsoft.batch/samples/batchaccounts/pools/main.bicep new file mode 100644 index 00000000..f4661451 --- /dev/null +++ b/settings/remarks/microsoft.batch/samples/batchaccounts/pools/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource batchAccount 'Microsoft.Batch/batchAccounts@2022-10-01' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Batch' + } + poolAllocationMode: 'BatchService' + publicNetworkAccess: 'Enabled' + } +} + +resource pool 'Microsoft.Batch/batchAccounts/pools@2022-10-01' = { + parent: batchAccount + name: resourceName + properties: { + certificates: null + deploymentConfiguration: { + virtualMachineConfiguration: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '18.04-lts' + version: 'latest' + } + nodeAgentSkuId: 'batch.node.ubuntu 18.04' + osDisk: { + ephemeralOSDiskSettings: { + placement: '' + } + } + } + } + displayName: '' + interNodeCommunication: 'Enabled' + metadata: [] + scaleSettings: { + fixedScale: { + nodeDeallocationOption: '' + resizeTimeout: 'PT15M' + targetDedicatedNodes: 1 + targetLowPriorityNodes: 0 + } + } + taskSlotsPerNode: 1 + vmSize: 'STANDARD_A1' + } +} diff --git a/settings/remarks/microsoft.botservice/samples/botservices/channels/main.bicep b/settings/remarks/microsoft.botservice/samples/botservices/channels/main.bicep new file mode 100644 index 00000000..2b1fa1b6 --- /dev/null +++ b/settings/remarks/microsoft.botservice/samples/botservices/channels/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource botService 'Microsoft.BotService/botServices@2021-05-01-preview' = { + name: resourceName + location: location + kind: 'bot' + properties: { + cmekKeyVaultUrl: '' + description: '' + developerAppInsightKey: '' + developerAppInsightsApiKey: '' + developerAppInsightsApplicationId: '' + displayName: 'acctest0001' + endpoint: '' + iconUrl: 'https://docs.botframework.com/static/devportal/client/images/bot-framework-default.png' + isCmekEnabled: false + isStreamingSupported: false + msaAppId: '12345678-1234-1234-1234-123456789012' + } + sku: { + name: 'F0' + } +} + +resource channel 'Microsoft.BotService/botServices/channels@2021-05-01-preview' = { + parent: botService + name: 'AlexaChannel' + location: location + kind: 'bot' + properties: { + channelName: 'AlexaChannel' + properties: { + alexaSkillId: 'amzn1.ask.skill.19126e57-867f-4553-b953-ad0a720dddec' + isEnabled: true + } + } +} diff --git a/settings/remarks/microsoft.botservice/samples/botservices/main.bicep b/settings/remarks/microsoft.botservice/samples/botservices/main.bicep new file mode 100644 index 00000000..f369a978 --- /dev/null +++ b/settings/remarks/microsoft.botservice/samples/botservices/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource botService 'Microsoft.BotService/botServices@2021-05-01-preview' = { + name: resourceName + location: 'global' + kind: 'sdk' + properties: { + developerAppInsightKey: '' + developerAppInsightsApiKey: '' + developerAppInsightsApplicationId: '' + displayName: 'acctest0001' + endpoint: '' + luisAppIds: [] + luisKey: '' + msaAppId: deployer().objectId + } + sku: { + name: 'F0' + } + tags: { + environment: 'production' + } +} diff --git a/settings/remarks/microsoft.cache/samples/redis/accesspolicies/main.bicep b/settings/remarks/microsoft.cache/samples/redis/accesspolicies/main.bicep new file mode 100644 index 00000000..81125cb5 --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redis/accesspolicies/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource redis 'Microsoft.Cache/redis@2024-11-01' = { + name: resourceName + location: location + properties: { + disableAccessKeyAuthentication: false + enableNonSslPort: true + minimumTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + redisConfiguration: { + 'maxmemory-policy': 'volatile-lru' + 'preferred-data-persistence-auth-method': '' + } + redisVersion: '6' + sku: { + capacity: 1 + family: 'C' + name: 'Basic' + } + } +} + +resource accessPolicy 'Microsoft.Cache/redis/accessPolicies@2024-11-01' = { + parent: redis + name: '${resourceName}-accessPolicy' + properties: { + permissions: '+@read +@connection +cluster|info allkeys' + } +} diff --git a/settings/remarks/microsoft.cache/samples/redis/accesspolicyassignments/main.bicep b/settings/remarks/microsoft.cache/samples/redis/accesspolicyassignments/main.bicep new file mode 100644 index 00000000..512d5360 --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redis/accesspolicyassignments/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource redis 'Microsoft.Cache/redis@2023-04-01' = { + name: resourceName + location: location + properties: { + enableNonSslPort: true + minimumTlsVersion: '1.2' + sku: { + capacity: 2 + family: 'C' + name: 'Standard' + } + } +} + +resource accessPolicyAssignment 'Microsoft.Cache/redis/accessPolicyAssignments@2024-03-01' = { + parent: redis + name: resourceName + properties: { + accessPolicyName: 'Data Contributor' + objectId: deployer().objectId + objectIdAlias: 'ServicePrincipal' + } +} diff --git a/settings/remarks/microsoft.cache/samples/redis/firewallrules/main.bicep b/settings/remarks/microsoft.cache/samples/redis/firewallrules/main.bicep new file mode 100644 index 00000000..7785eb12 --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redis/firewallrules/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource redis 'Microsoft.Cache/redis@2024-11-01' = { + name: resourceName + location: location + properties: { + disableAccessKeyAuthentication: false + enableNonSslPort: false + minimumTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + redisConfiguration: { + 'maxmemory-delta': '642' + 'maxmemory-policy': 'allkeys-lru' + 'maxmemory-reserved': '642' + 'preferred-data-persistence-auth-method': '' + } + redisVersion: '6.0' + sku: { + capacity: 1 + family: 'P' + name: 'Premium' + } + } +} + +resource firewallRule 'Microsoft.Cache/redis/firewallRules@2024-11-01' = { + parent: redis + name: '${resourceName}_fwrule' + properties: { + endIP: '2.3.4.5' + startIP: '1.2.3.4' + } +} diff --git a/settings/remarks/microsoft.cache/samples/redis/main.bicep b/settings/remarks/microsoft.cache/samples/redis/main.bicep new file mode 100644 index 00000000..b4171f1a --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redis/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource redis 'Microsoft.Cache/redis@2023-04-01' = { + name: resourceName + location: location + properties: { + enableNonSslPort: true + minimumTlsVersion: '1.2' + sku: { + capacity: 2 + family: 'C' + name: 'Standard' + } + } +} diff --git a/settings/remarks/microsoft.cache/samples/redisenterprise/databases/main.bicep b/settings/remarks/microsoft.cache/samples/redisenterprise/databases/main.bicep new file mode 100644 index 00000000..332151c3 --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redisenterprise/databases/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource redisEnterprise 'Microsoft.Cache/redisEnterprise@2025-04-01' = { + name: resourceName + location: location + properties: { + encryption: {} + highAvailability: 'Enabled' + minimumTlsVersion: '1.2' + } + sku: { + name: 'Balanced_B0' + } +} + +resource defaultDatabase 'Microsoft.Cache/redisEnterprise/databases@2025-04-01' = { + parent: redisEnterprise + name: 'default' + properties: { + clientProtocol: 'Encrypted' + clusteringPolicy: 'OSSCluster' + evictionPolicy: 'VolatileLRU' + modules: [] + port: 10000 + } +} diff --git a/settings/remarks/microsoft.cache/samples/redisenterprise/main.bicep b/settings/remarks/microsoft.cache/samples/redisenterprise/main.bicep new file mode 100644 index 00000000..1e337bec --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redisenterprise/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource redisEnterprise 'Microsoft.Cache/redisEnterprise@2025-04-01' = { + name: resourceName + location: location + properties: { + encryption: {} + highAvailability: 'Enabled' + minimumTlsVersion: '1.2' + } + sku: { + name: 'Balanced_B0' + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/main.bicep new file mode 100644 index 00000000..2e318bc4 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource afdEndpoint 'Microsoft.Cdn/profiles/afdEndpoints@2021-06-01' = { + parent: profile + name: resourceName + location: 'global' + properties: { + enabledState: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/routes/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/routes/main.bicep new file mode 100644 index 00000000..76b591ce --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/routes/main.bicep @@ -0,0 +1,71 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource afdEndpoint 'Microsoft.Cdn/profiles/afdEndpoints@2021-06-01' = { + parent: profile + name: resourceName + location: 'global' + properties: { + enabledState: 'Enabled' + } +} + +resource originGroup 'Microsoft.Cdn/profiles/originGroups@2021-06-01' = { + parent: profile + name: resourceName + properties: { + loadBalancingSettings: { + additionalLatencyInMilliseconds: 0 + sampleSize: 16 + successfulSamplesRequired: 3 + } + sessionAffinityState: 'Enabled' + trafficRestorationTimeToHealedOrNewEndpointsInMinutes: 10 + } +} + +resource origin 'Microsoft.Cdn/profiles/originGroups/origins@2021-06-01' = { + parent: originGroup + name: resourceName + properties: { + enabledState: 'Enabled' + enforceCertificateNameCheck: false + hostName: 'contoso.com' + httpPort: 80 + httpsPort: 443 + originHostHeader: 'www.contoso.com' + priority: 1 + weight: 1 + } +} + +resource route 'Microsoft.Cdn/profiles/afdEndpoints/routes@2021-06-01' = { + parent: afdEndpoint + name: resourceName + properties: { + enabledState: 'Enabled' + forwardingProtocol: 'MatchRequest' + httpsRedirect: 'Enabled' + linkToDefaultDomain: 'Enabled' + originGroup: { + id: originGroup.id + } + patternsToMatch: [ + '/*' + ] + supportedProtocols: [ + 'Https' + 'Http' + ] + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/customdomains/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/customdomains/main.bicep new file mode 100644 index 00000000..96d9bbca --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/customdomains/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} + +resource customDomain 'Microsoft.Cdn/profiles/customDomains@2021-06-01' = { + parent: profile + name: resourceName + properties: { + azureDnsZone: { + id: dnsZone.id + } + hostName: 'fabrikam.acctest0001.com' + tlsSettings: { + certificateType: 'ManagedCertificate' + minimumTlsVersion: 'TLS12' + } + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/endpoints/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/endpoints/main.bicep new file mode 100644 index 00000000..572ff490 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/endpoints/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource profile 'Microsoft.Cdn/profiles@2020-09-01' = { + name: resourceName + location: location + sku: { + name: 'Standard_Verizon' + } +} + +resource endpoint 'Microsoft.Cdn/profiles/endpoints@2020-09-01' = { + parent: profile + name: resourceName + location: location + properties: { + isHttpAllowed: true + isHttpsAllowed: true + origins: [ + { + name: 'acceptanceTestCdnOrigin1' + properties: { + hostName: 'www.contoso.com' + httpPort: 80 + httpsPort: 443 + } + } + ] + queryStringCachingBehavior: 'IgnoreQueryString' + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/main.bicep new file mode 100644 index 00000000..dbd2929d --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/origingroups/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/origingroups/main.bicep new file mode 100644 index 00000000..4294b4ed --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/origingroups/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource originGroup 'Microsoft.Cdn/profiles/originGroups@2021-06-01' = { + parent: profile + name: resourceName + properties: { + loadBalancingSettings: { + additionalLatencyInMilliseconds: 0 + sampleSize: 16 + successfulSamplesRequired: 3 + } + sessionAffinityState: 'Enabled' + trafficRestorationTimeToHealedOrNewEndpointsInMinutes: 10 + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/origingroups/origins/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/origingroups/origins/main.bicep new file mode 100644 index 00000000..a76d00b7 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/origingroups/origins/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource originGroup 'Microsoft.Cdn/profiles/originGroups@2021-06-01' = { + parent: profile + name: resourceName + properties: { + loadBalancingSettings: { + additionalLatencyInMilliseconds: 0 + sampleSize: 16 + successfulSamplesRequired: 3 + } + sessionAffinityState: 'Enabled' + trafficRestorationTimeToHealedOrNewEndpointsInMinutes: 10 + } +} + +resource origin 'Microsoft.Cdn/profiles/originGroups/origins@2021-06-01' = { + parent: originGroup + name: resourceName + properties: { + enabledState: 'Enabled' + enforceCertificateNameCheck: false + hostName: 'contoso.com' + httpPort: 80 + httpsPort: 443 + originHostHeader: 'www.contoso.com' + priority: 1 + weight: 1 + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/rulesets/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/rulesets/main.bicep new file mode 100644 index 00000000..2ee48591 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/rulesets/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource ruleSet 'Microsoft.Cdn/profiles/ruleSets@2021-06-01' = { + parent: profile + name: resourceName +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/rulesets/rules/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/rulesets/rules/main.bicep new file mode 100644 index 00000000..7908e707 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/rulesets/rules/main.bicep @@ -0,0 +1,77 @@ +param resourceName string = 'acctest0001' +param cdnLocation string = 'global' + +resource profile 'Microsoft.Cdn/profiles@2024-09-01' = { + name: '${resourceName}-profile' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource originGroup 'Microsoft.Cdn/profiles/originGroups@2024-09-01' = { + parent: profile + name: '${resourceName}-origingroup' + properties: { + loadBalancingSettings: { + additionalLatencyInMilliseconds: 0 + sampleSize: 16 + successfulSamplesRequired: 3 + } + sessionAffinityState: 'Enabled' + trafficRestorationTimeToHealedOrNewEndpointsInMinutes: 10 + } +} + +resource ruleSet 'Microsoft.Cdn/profiles/ruleSets@2024-09-01' = { + parent: profile + name: 'ruleSet${substring(resourceName, length(resourceName) - 4, 4)}' +} + +resource origin 'Microsoft.Cdn/profiles/originGroups/origins@2024-09-01' = { + parent: originGroup + name: '${resourceName}-origin' + properties: { + enabledState: 'Enabled' + enforceCertificateNameCheck: false + hostName: 'contoso.com' + httpPort: 80 + httpsPort: 443 + originHostHeader: 'www.contoso.com' + priority: 1 + weight: 1 + } +} + +resource rule 'Microsoft.Cdn/profiles/ruleSets/rules@2024-09-01' = { + parent: ruleSet + name: 'rule${substring(resourceName, length(resourceName) - 4, 4)}' + properties: { + actions: [ + { + name: 'RouteConfigurationOverride' + parameters: { + cacheConfiguration: { + cacheBehavior: 'OverrideIfOriginMissing' + cacheDuration: '23:59:59' + isCompressionEnabled: 'Disabled' + queryParameters: 'clientIp={client_ip}' + queryStringCachingBehavior: 'IgnoreSpecifiedQueryStrings' + } + originGroupOverride: { + forwardingProtocol: 'HttpsOnly' + originGroup: { + id: originGroup.id + } + } + typeName: 'DeliveryRuleRouteConfigurationOverrideActionParameters' + } + } + ] + conditions: [] + matchProcessingBehavior: 'Continue' + order: 1 + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/securitypolicies/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/securitypolicies/main.bicep new file mode 100644 index 00000000..59c3d517 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/securitypolicies/main.bicep @@ -0,0 +1,124 @@ +param resourceName string = 'acctest0001' + +resource frontdoorwebapplicationfirewallpolicy 'Microsoft.Network/FrontDoorWebApplicationFirewallPolicies@2020-11-01' = { + name: resourceName + location: 'global' + properties: { + customRules: { + rules: [ + { + action: 'Block' + enabledState: 'Enabled' + matchConditions: [ + { + matchValue: [ + '192.168.1.0/24' + '10.0.0.0/24' + ] + matchVariable: 'RemoteAddr' + negateCondition: false + operator: 'IPMatch' + } + ] + name: 'Rule1' + priority: 1 + rateLimitDurationInMinutes: 1 + rateLimitThreshold: 10 + ruleType: 'MatchRule' + } + ] + } + managedRules: { + managedRuleSets: [ + { + ruleGroupOverrides: [ + { + ruleGroupName: 'PHP' + rules: [ + { + action: 'Block' + enabledState: 'Disabled' + ruleId: '933111' + } + ] + } + ] + ruleSetAction: 'Block' + ruleSetType: 'DefaultRuleSet' + ruleSetVersion: 'preview-0.1' + } + { + ruleSetAction: 'Block' + ruleSetType: 'BotProtection' + ruleSetVersion: 'preview-0.1' + } + ] + } + policySettings: { + customBlockResponseBody: 'PGh0bWw+CjxoZWFkZXI+PHRpdGxlPkhlbGxvPC90aXRsZT48L2hlYWRlcj4KPGJvZHk+CkhlbGxvIHdvcmxkCjwvYm9keT4KPC9odG1sPg==' + customBlockResponseStatusCode: 403 + enabledState: 'Enabled' + mode: 'Prevention' + redirectUrl: 'https://www.fabrikam.com' + } + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} + +resource customDomain 'Microsoft.Cdn/profiles/customDomains@2021-06-01' = { + parent: profile + name: resourceName + properties: { + azureDnsZone: { + id: dnsZone.id + } + hostName: 'fabrikam.acctest0001.com' + tlsSettings: { + certificateType: 'ManagedCertificate' + minimumTlsVersion: 'TLS12' + } + } +} + +resource securityPolicy 'Microsoft.Cdn/profiles/securityPolicies@2021-06-01' = { + parent: profile + name: resourceName + properties: { + parameters: { + associations: [ + { + domains: [ + { + id: customDomain.id + } + ] + patternsToMatch: [ + '/*' + ] + } + ] + type: 'WebApplicationFirewall' + wafPolicy: { + id: frontdoorwebapplicationfirewallpolicy.id + } + } + } +} diff --git a/settings/remarks/microsoft.certificateregistration/samples/certificateorders/main.bicep b/settings/remarks/microsoft.certificateregistration/samples/certificateorders/main.bicep new file mode 100644 index 00000000..9d9cd839 --- /dev/null +++ b/settings/remarks/microsoft.certificateregistration/samples/certificateorders/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' + +resource certificateOrder 'Microsoft.CertificateRegistration/certificateOrders@2021-02-01' = { + name: resourceName + location: 'global' + properties: { + autoRenew: true + distinguishedName: 'CN=example.com' + keySize: 2048 + productType: 'StandardDomainValidatedSsl' + validityInYears: 1 + } +} diff --git a/settings/remarks/microsoft.codesigning/samples/codesigningaccounts/main.bicep b/settings/remarks/microsoft.codesigning/samples/codesigningaccounts/main.bicep new file mode 100644 index 00000000..6fc40d4d --- /dev/null +++ b/settings/remarks/microsoft.codesigning/samples/codesigningaccounts/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource codeSigningAccount 'Microsoft.CodeSigning/codeSigningAccounts@2024-09-30-preview' = { + name: resourceName + location: location + properties: { + sku: { + name: 'Basic' + } + } +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/deployments/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/deployments/main.bicep new file mode 100644 index 00000000..a8ce9a6c --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/deployments/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0003' +param location string = 'eastus' + +resource account 'Microsoft.CognitiveServices/accounts@2022-10-01' = { + name: resourceName + location: location + identity: { + type: 'None' + userAssignedIdentities: null + } + kind: 'OpenAI' + properties: { + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + } +} + +resource deployment 'Microsoft.CognitiveServices/accounts/deployments@2023-05-01' = { + parent: account + name: 'testdep' + properties: { + model: { + format: 'OpenAI' + name: 'text-embedding-ada-002' + } + } +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/main.bicep new file mode 100644 index 00000000..f5ae4140 --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westus2' + +resource account 'Microsoft.CognitiveServices/accounts@2022-10-01' = { + name: resourceName + location: location + kind: 'SpeechServices' + properties: { + allowedFqdnList: [] + apiProperties: {} + customSubDomainName: 'acctest-cogacc-230630032807723157' + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + tier: 'Standard' + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/projects/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/projects/main.bicep new file mode 100644 index 00000000..9c0ebd8c --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/projects/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westus2' + +resource account 'Microsoft.CognitiveServices/accounts@2025-06-01' = { + name: resourceName + location: location + kind: 'AIServices' + properties: { + allowProjectManagement: true + customSubDomainName: 'cog-acctest0001' + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + } +} + +resource project 'Microsoft.CognitiveServices/accounts/projects@2025-06-01' = { + parent: account + name: resourceName + location: location + properties: { + description: 'test project' + displayName: 'project-acctest0001' + } +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/raiblocklists/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/raiblocklists/main.bicep new file mode 100644 index 00000000..de03fb57 --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/raiblocklists/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource account 'Microsoft.CognitiveServices/accounts@2024-10-01' = { + name: '${resourceName}-ca' + location: location + kind: 'OpenAI' + properties: { + allowedFqdnList: [] + apiProperties: {} + customSubDomainName: '' + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + } +} + +resource raiBlocklist 'Microsoft.CognitiveServices/accounts/raiBlocklists@2024-10-01' = { + parent: account + name: '${resourceName}-crb' + properties: { + description: 'Acceptance test data new azurerm resource' + } +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/raipolicies/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/raipolicies/main.bicep new file mode 100644 index 00000000..8aba460d --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/raipolicies/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0003' +param location string = 'eastus' + +resource account 'Microsoft.CognitiveServices/accounts@2022-10-01' = { + name: resourceName + location: location + kind: 'OpenAI' + properties: { + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + } +} + +resource raiPolicy 'Microsoft.CognitiveServices/accounts/raiPolicies@2024-10-01' = { + parent: account + name: 'NoModerationPolicy' + properties: { + basePolicyName: 'Microsoft.Default' + contentFilters: [ + { + blocking: true + enabled: true + name: 'Hate' + severityThreshold: 'High' + source: 'Prompt' + } + ] + } +} diff --git a/settings/remarks/microsoft.communication/samples/communicationservices/main.bicep b/settings/remarks/microsoft.communication/samples/communicationservices/main.bicep new file mode 100644 index 00000000..df28431d --- /dev/null +++ b/settings/remarks/microsoft.communication/samples/communicationservices/main.bicep @@ -0,0 +1,9 @@ +param resourceName string = 'acctest0001' + +resource communicationService 'Microsoft.Communication/communicationServices@2023-03-31' = { + name: resourceName + location: 'global' + properties: { + dataLocation: 'United States' + } +} diff --git a/settings/remarks/microsoft.communication/samples/emailservices/domains/main.bicep b/settings/remarks/microsoft.communication/samples/emailservices/domains/main.bicep new file mode 100644 index 00000000..f41783c0 --- /dev/null +++ b/settings/remarks/microsoft.communication/samples/emailservices/domains/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' + +resource emailService 'Microsoft.Communication/emailServices@2023-04-01-preview' = { + name: resourceName + location: 'global' + properties: { + dataLocation: 'United States' + } +} + +resource domain 'Microsoft.Communication/emailServices/domains@2023-04-01-preview' = { + parent: emailService + name: 'example.com' + location: 'global' + properties: { + domainManagement: 'CustomerManaged' + userEngagementTracking: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.communication/samples/emailservices/domains/senderusernames/main.bicep b/settings/remarks/microsoft.communication/samples/emailservices/domains/senderusernames/main.bicep new file mode 100644 index 00000000..f31ba812 --- /dev/null +++ b/settings/remarks/microsoft.communication/samples/emailservices/domains/senderusernames/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' + +resource emailService 'Microsoft.Communication/emailServices@2023-04-01-preview' = { + name: resourceName + location: 'global' + properties: { + dataLocation: 'United States' + } +} + +resource domain 'Microsoft.Communication/emailServices/domains@2023-04-01-preview' = { + parent: emailService + name: 'example.com' + location: 'global' + properties: { + domainManagement: 'CustomerManaged' + userEngagementTracking: 'Disabled' + } +} + +resource senderUsername 'Microsoft.Communication/emailServices/domains/senderUsernames@2023-04-01-preview' = { + parent: domain + name: 'TestSenderUserName' + properties: { + displayName: 'TestDisplayName' + username: 'TestSenderUserName' + } +} diff --git a/settings/remarks/microsoft.communication/samples/emailservices/main.bicep b/settings/remarks/microsoft.communication/samples/emailservices/main.bicep new file mode 100644 index 00000000..f1ddb214 --- /dev/null +++ b/settings/remarks/microsoft.communication/samples/emailservices/main.bicep @@ -0,0 +1,9 @@ +param resourceName string = 'acctest0001' + +resource emailService 'Microsoft.Communication/emailServices@2023-03-31' = { + name: resourceName + location: 'global' + properties: { + dataLocation: 'United States' + } +} diff --git a/settings/remarks/microsoft.compute/samples/availabilitysets/main.bicep b/settings/remarks/microsoft.compute/samples/availabilitysets/main.bicep new file mode 100644 index 00000000..52496255 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/availabilitysets/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource availabilitySet 'Microsoft.Compute/availabilitySets@2021-11-01' = { + name: resourceName + location: location + properties: { + platformFaultDomainCount: 3 + platformUpdateDomainCount: 5 + } + sku: { + name: 'Aligned' + } +} diff --git a/settings/remarks/microsoft.compute/samples/capacityreservationgroups/capacityreservations/main.bicep b/settings/remarks/microsoft.compute/samples/capacityreservationgroups/capacityreservations/main.bicep new file mode 100644 index 00000000..db2d3eeb --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/capacityreservationgroups/capacityreservations/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource capacityReservationGroup 'Microsoft.Compute/capacityReservationGroups@2022-03-01' = { + name: '${resourceName}-ccrg' + location: location +} + +resource capacityReservation 'Microsoft.Compute/capacityReservationGroups/capacityReservations@2022-03-01' = { + parent: capacityReservationGroup + name: '${resourceName}-ccr' + location: location + sku: { + capacity: 2 + name: 'Standard_F2' + } +} diff --git a/settings/remarks/microsoft.compute/samples/capacityreservationgroups/main.bicep b/settings/remarks/microsoft.compute/samples/capacityreservationgroups/main.bicep new file mode 100644 index 00000000..1a49be09 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/capacityreservationgroups/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource capacityReservationGroup 'Microsoft.Compute/capacityReservationGroups@2022-03-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.compute/samples/diskaccesses/main.bicep b/settings/remarks/microsoft.compute/samples/diskaccesses/main.bicep new file mode 100644 index 00000000..d194267d --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/diskaccesses/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource diskAccess 'Microsoft.Compute/diskAccesses@2022-03-02' = { + name: resourceName + location: location + tags: { + 'cost-center': 'ops' + environment: 'acctest' + } +} diff --git a/settings/remarks/microsoft.compute/samples/diskencryptionsets/main.bicep b/settings/remarks/microsoft.compute/samples/diskencryptionsets/main.bicep new file mode 100644 index 00000000..bcc6162e --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/diskencryptionsets/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource diskEncryptionSet 'Microsoft.Compute/diskEncryptionSets@2022-03-02' = { + name: resourceName + location: location + properties: { + activeKey: { + keyUrl: key.properties.keyUriWithVersion + sourceVault: { + id: vault.id + } + } + encryptionType: 'EncryptionAtRestWithCustomerKey' + rotationToLatestKeyVersionEnabled: false + } +} + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + enableSoftDelete: true + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource key 'Microsoft.KeyVault/vaults/keys@2023-02-01' = { + parent: vault + name: resourceName + properties: { + keyOps: [ + 'encrypt' + 'decrypt' + 'sign' + 'verify' + 'wrapKey' + 'unwrapKey' + ] + keySize: 2048 + kty: 'RSA' + } +} diff --git a/settings/remarks/microsoft.compute/samples/disks/main.bicep b/settings/remarks/microsoft.compute/samples/disks/main.bicep new file mode 100644 index 00000000..9da32a6f --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/disks/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource disk 'Microsoft.Compute/disks@2022-03-02' = { + name: resourceName + location: location + properties: { + creationData: { + createOption: 'Empty' + } + diskSizeGB: 10 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + networkAccessPolicy: 'AllowAll' + osType: '' + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.compute/samples/galleries/applications/main.bicep b/settings/remarks/microsoft.compute/samples/galleries/applications/main.bicep new file mode 100644 index 00000000..1f8ab269 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/galleries/applications/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource gallery 'Microsoft.Compute/galleries@2022-03-03' = { + name: resourceName + location: location + properties: { + description: '' + } +} + +resource application 'Microsoft.Compute/galleries/applications@2022-03-03' = { + parent: gallery + name: resourceName + location: location + properties: { + supportedOSType: 'Linux' + } +} diff --git a/settings/remarks/microsoft.compute/samples/galleries/applications/versions/main.bicep b/settings/remarks/microsoft.compute/samples/galleries/applications/versions/main.bicep new file mode 100644 index 00000000..cbc629ca --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/galleries/applications/versions/main.bicep @@ -0,0 +1,109 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource gallery 'Microsoft.Compute/galleries@2022-03-03' = { + name: '${resourceName}sig' + location: location + properties: { + description: '' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: '${resourceName}acc' + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource application 'Microsoft.Compute/galleries/applications@2022-03-03' = { + parent: gallery + name: '${resourceName}-app' + location: location + properties: { + supportedOSType: 'Linux' + } +} + +// The blob service is a singleton named 'default' under the storage account +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2023-05-01' existing = { + parent: storageAccount + name: 'default' +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2023-05-01' = { + parent: blobService + name: 'mycontainer' + properties: { + publicAccess: 'Blob' + } +} + +resource version 'Microsoft.Compute/galleries/applications/versions@2022-03-03' = { + parent: application + name: '0.0.1' + location: location + properties: { + publishingProfile: { + enableHealthCheck: false + excludeFromLatest: false + manageActions: { + install: '[install command]' + remove: '[remove command]' + update: '' + } + source: { + defaultConfigurationLink: '' + mediaLink: 'https://${storageAccount.name}.blob.core.windows.net/mycontainer/myblob' + } + targetRegions: [ + { + name: 'westus' + regionalReplicaCount: 1 + storageAccountType: 'Standard_LRS' + } + ] + } + safetyProfile: { + allowDeletionOfReplicatedLocations: true + } + } + dependsOn: [ + container + ] +} diff --git a/settings/remarks/microsoft.compute/samples/galleries/images/main.bicep b/settings/remarks/microsoft.compute/samples/galleries/images/main.bicep new file mode 100644 index 00000000..58285d6e --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/galleries/images/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource gallery 'Microsoft.Compute/galleries@2022-03-03' = { + name: resourceName + location: location + properties: { + description: '' + } +} + +resource image 'Microsoft.Compute/galleries/images@2022-03-03' = { + parent: gallery + name: resourceName + location: location + properties: { + architecture: 'x64' + description: '' + disallowed: { + diskTypes: [] + } + features: null + hyperVGeneration: 'V1' + identifier: { + offer: 'AccTesOffer230630032848825313' + publisher: 'AccTesPublisher230630032848825313' + sku: 'AccTesSku230630032848825313' + } + osState: 'Generalized' + osType: 'Linux' + privacyStatementUri: '' + recommended: { + memory: {} + vCPUs: {} + } + releaseNoteUri: '' + } +} diff --git a/settings/remarks/microsoft.compute/samples/galleries/main.bicep b/settings/remarks/microsoft.compute/samples/galleries/main.bicep new file mode 100644 index 00000000..af5d9fe9 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/galleries/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource gallery 'Microsoft.Compute/galleries@2022-03-03' = { + name: resourceName + location: location + properties: { + description: '' + } +} diff --git a/settings/remarks/microsoft.compute/samples/hostgroups/hosts/main.bicep b/settings/remarks/microsoft.compute/samples/hostgroups/hosts/main.bicep new file mode 100644 index 00000000..7d01a4fb --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/hostgroups/hosts/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource hostGroup 'Microsoft.Compute/hostGroups@2021-11-01' = { + name: resourceName + location: location + properties: { + platformFaultDomainCount: 2 + } +} + +resource host 'Microsoft.Compute/hostGroups/hosts@2021-11-01' = { + parent: hostGroup + name: resourceName + location: location + properties: { + autoReplaceOnFailure: true + licenseType: 'None' + platformFaultDomain: 1 + } + sku: { + name: 'DSv3-Type1' + } +} diff --git a/settings/remarks/microsoft.compute/samples/hostgroups/main.bicep b/settings/remarks/microsoft.compute/samples/hostgroups/main.bicep new file mode 100644 index 00000000..b9bf1dcc --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/hostgroups/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource hostGroup 'Microsoft.Compute/hostGroups@2021-11-01' = { + name: resourceName + location: location + properties: { + platformFaultDomainCount: 2 + } +} diff --git a/settings/remarks/microsoft.compute/samples/proximityplacementgroups/main.bicep b/settings/remarks/microsoft.compute/samples/proximityplacementgroups/main.bicep new file mode 100644 index 00000000..44d43f35 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/proximityplacementgroups/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource proximityPlacementGroup 'Microsoft.Compute/proximityPlacementGroups@2022-03-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.compute/samples/restorepointcollections/main.bicep b/settings/remarks/microsoft.compute/samples/restorepointcollections/main.bicep new file mode 100644 index 00000000..1963c586 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/restorepointcollections/main.bicep @@ -0,0 +1,137 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: false + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource restorePointCollection 'Microsoft.Compute/restorePointCollections@2024-03-01' = { + name: resourceName + location: location + properties: { + source: { + id: virtualMachine.id + } + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: true + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + path: '/home/adminuser/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: '0001-com-ubuntu-server-jammy' + publisher: 'Canonical' + sku: '22_04-lts' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.0.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/restorepointcollections/restorepoints/main.bicep b/settings/remarks/microsoft.compute/samples/restorepointcollections/restorepoints/main.bicep new file mode 100644 index 00000000..79442794 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/restorepointcollections/restorepoints/main.bicep @@ -0,0 +1,143 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: '${resourceName}-nic' + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: false + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource restorePointCollection 'Microsoft.Compute/restorePointCollections@2024-03-01' = { + name: '${resourceName}-rpc' + location: location + properties: { + source: { + id: virtualMachine.id + } + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-03-01' = { + name: '${resourceName}-vm' + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001-vm' + linuxConfiguration: { + disablePasswordAuthentication: true + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + path: '/home/adminuser/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: '0001-com-ubuntu-server-jammy' + publisher: 'Canonical' + sku: '22_04-lts' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource restorePoint 'Microsoft.Compute/restorePointCollections/restorePoints@2024-03-01' = { + parent: restorePointCollection + name: '${resourceName}-rp' + properties: {} +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.0.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/snapshots/main.bicep b/settings/remarks/microsoft.compute/samples/snapshots/main.bicep new file mode 100644 index 00000000..a79e0b2c --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/snapshots/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource disk 'Microsoft.Compute/disks@2023-04-02' = { + name: '${resourceName}disk' + location: location + properties: { + creationData: { + createOption: 'Empty' + performancePlus: false + } + diskSizeGB: 10 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + networkAccessPolicy: 'AllowAll' + optimizedForFrequentAttach: false + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard_LRS' + } +} + +resource snapshot 'Microsoft.Compute/snapshots@2022-03-02' = { + name: '${resourceName}snapshot' + location: location + properties: { + creationData: { + createOption: 'Copy' + sourceUri: disk.id + } + diskSizeGB: 20 + incremental: false + networkAccessPolicy: 'AllowAll' + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.compute/samples/sshpublickeys/main.bicep b/settings/remarks/microsoft.compute/samples/sshpublickeys/main.bicep new file mode 100644 index 00000000..b4259318 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/sshpublickeys/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource sshPublicKey 'Microsoft.Compute/sshPublicKeys@2021-11-01' = { + name: resourceName + location: location + properties: { + publicKey: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + } + tags: { + 'test-tag': 'test-value-230630032848837073' + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/attachdatadisk/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/attachdatadisk/main.bicep new file mode 100644 index 00000000..47749e03 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/attachdatadisk/main.bicep @@ -0,0 +1,145 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the virtual machine') +param adminUsername string +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +var osDiskName = 'myosdisk1' +var dataDiskName = 'mydatadisk1' +var attachedDataDiskName = 'myattacheddatadisk1' + +resource attachedDisk 'Microsoft.Compute/disks@2022-03-02' = { + name: attachedDataDiskName + location: location + properties: { + creationData: { + createOption: 'Empty' + } + diskSizeGB: 1 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + networkAccessPolicy: 'AllowAll' + osType: 'Linux' + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard_LRS' + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: adminPassword + adminUsername: adminUsername + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: osDiskName + writeAcceleratorEnabled: false + } + dataDisks: [ + { + caching: 'ReadWrite' + createOption: 'Empty' + name: dataDiskName + diskSizeGB: 1 + lun: 1 + managedDisk: { + storageAccountType: 'Standard_LRS' + } + } + { + caching: 'ReadWrite' + createOption: 'Attach' + name: attachedDisk.name + lun: 2 + managedDisk: { + id: attachedDisk.id + } + } + ] + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/attachosdisk/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/attachosdisk/main.bicep new file mode 100644 index 00000000..f066b25c --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/attachosdisk/main.bicep @@ -0,0 +1,216 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the virtual machine') +param adminUsername string +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string +param attachedResourceName string = 'acctest0002' + +var osDiskName = 'myosdisk1' +var attachedOsDiskName = 'myosdisk2' + +resource managedDisk 'Microsoft.Compute/disks@2023-10-02' existing = { + name: osDiskName +} + +resource attachedManagedDisk 'Microsoft.Compute/disks@2023-10-02' = { + name: attachedOsDiskName + location: location + properties: { + creationData: { + createOption: 'Copy' + sourceResourceId: snapshot.id + } + diskSizeGB: 30 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + hyperVGeneration: 'V1' + networkAccessPolicy: 'AllowAll' + osType: 'Linux' + publicNetworkAccess: 'Enabled' + supportedCapabilities: { + architecture: 'x64' + } + } + sku: { + name: 'Standard_LRS' + } + zones: [ + '1' + ] +} + +resource attachedNetworkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: attachedResourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration2' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource attachedVirtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: attachedResourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: attachedNetworkInterface.id + properties: { + primary: false + } + } + ] + } + storageProfile: { + osDisk: { + caching: 'ReadWrite' + createOption: 'Attach' + name: attachedOsDiskName + osType: 'Linux' + writeAcceleratorEnabled: false + managedDisk: { + id: attachedManagedDisk.id + } + } + } + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource snapshot 'Microsoft.Compute/snapshots@2023-10-02' = { + name: resourceName + location: location + properties: { + creationData: { + createOption: 'Copy' + sourceResourceId: managedDisk.id + } + diskSizeGB: 30 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + hyperVGeneration: 'V1' + incremental: true + networkAccessPolicy: 'AllowAll' + osType: 'Linux' + publicNetworkAccess: 'Enabled' + supportedCapabilities: { + architecture: 'x64' + } + } + sku: { + name: 'Standard_ZRS' + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: adminPassword + adminUsername: adminUsername + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: osDiskName + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/basic/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/basic/main.bicep new file mode 100644 index 00000000..93a31595 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/basic/main.bicep @@ -0,0 +1,100 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the virtual machine') +param adminUsername string +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: null + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: 'myosdisk1' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/extensions/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/extensions/main.bicep new file mode 100644 index 00000000..1092716f --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/extensions/main.bicep @@ -0,0 +1,118 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param vmAdminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: 'myosdisk1' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource extension 'Microsoft.Compute/virtualMachines/extensions@2023-03-01' = { + parent: virtualMachine + name: resourceName + location: location + properties: { + autoUpgradeMinorVersion: false + enableAutomaticUpgrade: false + publisher: 'Microsoft.Azure.Extensions' + settings: { + commandToExecute: 'hostname' + } + suppressFailures: false + type: 'CustomScript' + typeHandlerVersion: '2.0' + } + tags: { + environment: 'Production' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/runcommands/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/runcommands/main.bicep new file mode 100644 index 00000000..7a26f542 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/runcommands/main.bicep @@ -0,0 +1,151 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: '${resourceName}-nic' + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: false + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-uai' + location: location +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-03-01' = { + name: '${resourceName}-vm' + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_B2s' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001-vm' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: '0001-com-ubuntu-server-jammy' + publisher: 'Canonical' + sku: '22_04-lts' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Premium_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource runCommand 'Microsoft.Compute/virtualMachines/runCommands@2023-03-01' = { + parent: virtualMachine + name: '${resourceName}-runcommand' + location: location + properties: { + asyncExecution: false + errorBlobUri: '' + outputBlobUri: '' + parameters: [] + protectedParameters: [] + runAsPassword: '' + runAsUser: '' + source: { + script: 'echo \'hello world\'' + } + timeoutInSeconds: 1200 + treatFailureAsDeploymentFailure: true + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/extensions/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/extensions/main.bicep new file mode 100644 index 00000000..7fd25e57 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/extensions/main.bicep @@ -0,0 +1,152 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualMachineScaleSet 'Microsoft.Compute/virtualMachineScaleSets@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + doNotRunExtensionsOnOverprovisionedVMs: false + orchestrationMode: 'Uniform' + overprovision: true + scaleInPolicy: { + forceDeletion: false + rules: [ + 'Default' + ] + } + singlePlacementGroup: true + upgradePolicy: { + mode: 'Manual' + } + virtualMachineProfile: { + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionProfile: { + extensionsTimeBudget: 'PT1H30M' + } + networkProfile: { + networkInterfaceConfigurations: [ + { + name: 'example' + properties: { + dnsSettings: { + dnsServers: [] + } + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + applicationGatewayBackendAddressPools: [] + applicationSecurityGroups: [] + loadBalancerBackendAddressPools: [] + loadBalancerInboundNatPools: [] + primary: true + privateIPAddressVersion: 'IPv4' + subnet: { + id: subnet.id + } + } + } + ] + primary: true + } + } + ] + } + osProfile: { + adminUsername: 'adminuser' + computerNamePrefix: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: true + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + path: '/home/adminuser/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } + } + sku: { + capacity: 1 + name: 'Standard_F2' + tier: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource extension 'Microsoft.Compute/virtualMachineScaleSets/extensions@2023-03-01' = { + parent: virtualMachineScaleSet + name: resourceName + properties: { + autoUpgradeMinorVersion: true + enableAutomaticUpgrade: false + provisionAfterExtensions: [] + publisher: 'Microsoft.Azure.Extensions' + settings: { + commandToExecute: 'echo $HOSTNAME' + } + suppressFailures: false + type: 'CustomScript' + typeHandlerVersion: '2.0' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/main.bicep new file mode 100644 index 00000000..149cea35 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/main.bicep @@ -0,0 +1,135 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualMachineScaleSet 'Microsoft.Compute/virtualMachineScaleSets@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + doNotRunExtensionsOnOverprovisionedVMs: false + orchestrationMode: 'Uniform' + overprovision: true + scaleInPolicy: { + forceDeletion: false + rules: [ + 'Default' + ] + } + singlePlacementGroup: true + upgradePolicy: { + mode: 'Manual' + } + virtualMachineProfile: { + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionProfile: { + extensionsTimeBudget: 'PT1H30M' + } + networkProfile: { + networkInterfaceConfigurations: [ + { + name: 'example' + properties: { + dnsSettings: { + dnsServers: [] + } + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + applicationGatewayBackendAddressPools: [] + applicationSecurityGroups: [] + loadBalancerBackendAddressPools: [] + loadBalancerInboundNatPools: [] + primary: true + privateIPAddressVersion: 'IPv4' + subnet: { + id: subnet.id + } + } + } + ] + primary: true + } + } + ] + } + osProfile: { + adminUsername: 'adminuser' + computerNamePrefix: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: true + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + path: '/home/adminuser/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } + } + sku: { + capacity: 1 + name: 'Standard_F2' + tier: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.confidentialledger/samples/ledgers/main.bicep b/settings/remarks/microsoft.confidentialledger/samples/ledgers/main.bicep new file mode 100644 index 00000000..248c723d --- /dev/null +++ b/settings/remarks/microsoft.confidentialledger/samples/ledgers/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The PEM-encoded certificate for the confidential ledger administrator') +param ledgerCertificate string + +resource ledger 'Microsoft.ConfidentialLedger/ledgers@2022-05-13' = { + name: resourceName + location: location + properties: { + aadBasedSecurityPrincipals: [ + { + ledgerRoleName: 'Administrator' + principalId: deployer().objectId + tenantId: deployer().tenantId + } + ] + certBasedSecurityPrincipals: [ + { + cert: null + ledgerRoleName: 'Administrator' + } + ] + ledgerType: 'Private' + } +} diff --git a/settings/remarks/microsoft.consumption/samples/budgets/main.bicep b/settings/remarks/microsoft.consumption/samples/budgets/main.bicep new file mode 100644 index 00000000..d8ab99ee --- /dev/null +++ b/settings/remarks/microsoft.consumption/samples/budgets/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' + +resource budget 'Microsoft.Consumption/budgets@2019-10-01' = { + name: resourceName + properties: { + amount: 1000 + category: 'Cost' + filter: { + tags: { + name: 'foo' + operator: 'In' + values: [ + 'bar' + ] + } + } + notifications: { + 'Actual_EqualTo_90.000000_Percent': { + contactEmails: [ + 'foo@example.com' + 'bar@example.com' + ] + contactGroups: [] + contactRoles: [] + enabled: true + operator: 'EqualTo' + threshold: 90 + thresholdType: 'Actual' + } + } + timeGrain: 'Monthly' + timePeriod: { + startDate: '2025-08-01T00:00:00Z' + } + } +} diff --git a/settings/remarks/microsoft.containerinstance/samples/containergroups/main.bicep b/settings/remarks/microsoft.containerinstance/samples/containergroups/main.bicep new file mode 100644 index 00000000..cd16892d --- /dev/null +++ b/settings/remarks/microsoft.containerinstance/samples/containergroups/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource containerGroup 'Microsoft.ContainerInstance/containerGroups@2023-05-01' = { + name: resourceName + location: location + properties: { + containers: [ + { + name: 'hw' + properties: { + command: [] + environmentVariables: [] + image: 'ubuntu:20.04' + ports: [ + { + port: 80 + protocol: 'TCP' + } + ] + resources: { + requests: { + cpu: any('0.5') + memoryInGB: any('0.5') + } + } + } + } + ] + initContainers: [] + ipAddress: { + autoGeneratedDomainNameLabelScope: 'Unsecure' + ports: [ + { + port: 80 + protocol: 'TCP' + } + ] + type: 'Public' + } + osType: 'Linux' + restartPolicy: 'Always' + volumes: [] + } + tags: { + environment: 'Testing' + } + zones: [] +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/agentpools/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/agentpools/main.bicep new file mode 100644 index 00000000..d5cfa193 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/agentpools/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Premium' + tier: 'Premium' + } +} + +resource agentPool 'Microsoft.ContainerRegistry/registries/agentPools@2019-06-01-preview' = { + parent: registry + name: resourceName + location: location + properties: { + count: 1 + os: 'Linux' + tier: 'S1' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/cacherules/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/cacherules/main.bicep new file mode 100644 index 00000000..a4ecf510 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/cacherules/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource registry 'Microsoft.ContainerRegistry/registries@2023-11-01-preview' = { + name: '${resourceName}registry' + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: {} + trustPolicy: {} + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Basic' + } +} + +resource cacheRule 'Microsoft.ContainerRegistry/registries/cacheRules@2023-07-01' = { + parent: registry + name: '${resourceName}-cache-rule' + properties: { + sourceRepository: 'mcr.microsoft.com/hello-world' + targetRepository: 'target' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/connectedregistries/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/connectedregistries/main.bicep new file mode 100644 index 00000000..e709e2a0 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/connectedregistries/main.bicep @@ -0,0 +1,77 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource registry 'Microsoft.ContainerRegistry/registries@2023-11-01-preview' = { + name: '${resourceName}registry' + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: true + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: {} + trustPolicy: {} + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Premium' + } +} + +resource connectedRegistry 'Microsoft.ContainerRegistry/registries/connectedRegistries@2023-11-01-preview' = { + parent: registry + name: '${resourceName}connectedregistry' + properties: { + clientTokenIds: null + logging: { + auditLogStatus: 'Disabled' + logLevel: 'None' + } + mode: 'ReadWrite' + parent: { + syncProperties: { + messageTtl: 'P1D' + schedule: '* * * * *' + syncWindow: '' + tokenId: token.id + } + } + } +} + +resource scopeMap 'Microsoft.ContainerRegistry/registries/scopeMaps@2023-11-01-preview' = { + parent: registry + name: '${resourceName}scopemap' + properties: { + actions: [ + 'repositories/hello-world/content/delete' + 'repositories/hello-world/content/read' + 'repositories/hello-world/content/write' + 'repositories/hello-world/metadata/read' + 'repositories/hello-world/metadata/write' + 'gateway/acctest0001connectedregistry/config/read' + 'gateway/acctest0001connectedregistry/config/write' + 'gateway/acctest0001connectedregistry/message/read' + 'gateway/acctest0001connectedregistry/message/write' + ] + description: '' + } +} + +resource token 'Microsoft.ContainerRegistry/registries/tokens@2023-11-01-preview' = { + parent: registry + name: '${resourceName}token' + properties: { + scopeMapId: scopeMap.id + status: 'enabled' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/credentialsets/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/credentialsets/main.bicep new file mode 100644 index 00000000..83e8da41 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/credentialsets/main.bicep @@ -0,0 +1,102 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The username for the container registry credential') +param credentialUsername string = 'testuser' +@secure() +@description('The password for the container registry credential') +param credentialPassword string + +resource registry 'Microsoft.ContainerRegistry/registries@2023-11-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: {} + trustPolicy: {} + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Basic' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: '${resourceName}vault' + location: location + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [] + keys: [] + secrets: [ + 'Get' + 'Set' + 'Delete' + 'Purge' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} + +resource credentialSet 'Microsoft.ContainerRegistry/registries/credentialSets@2023-07-01' = { + parent: registry + name: '${resourceName}-acr-credential-set' + properties: { + authCredentials: [ + { + name: 'Credential1' + passwordSecretIdentifier: 'https://acctest0001vault.vault.azure.net/secrets/password' + usernameSecretIdentifier: 'https://acctest0001vault.vault.azure.net/secrets/username' + } + ] + loginServer: 'docker.io' + } +} + +resource passwordSecret 'Microsoft.KeyVault/vaults/secrets@2023-02-01' = { + parent: vault + name: 'password' + properties: { + value: null + } +} + +resource usernameSecret 'Microsoft.KeyVault/vaults/secrets@2023-02-01' = { + parent: vault + name: 'username' + properties: { + value: 'testuser' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/main.bicep new file mode 100644 index 00000000..b9e3386c --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/scopemaps/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/scopemaps/main.bicep new file mode 100644 index 00000000..b40cc76a --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/scopemaps/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Premium' + tier: 'Premium' + } +} + +resource scopeMap 'Microsoft.ContainerRegistry/registries/scopeMaps@2021-08-01-preview' = { + parent: registry + name: resourceName + properties: { + actions: [ + 'repositories/testrepo/content/read' + ] + description: '' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/taskruns/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/taskruns/main.bicep new file mode 100644 index 00000000..0789863e --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/taskruns/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource taskRun 'Microsoft.ContainerRegistry/registries/taskRuns@2019-06-01-preview' = { + parent: registry + name: resourceName + location: location + properties: { + runRequest: { + dockerFilePath: 'Dockerfile' + imageNames: [ + 'helloworld:{{.Run.ID}}' + 'helloworld:latest' + ] + platform: { + os: 'Linux' + } + sourceLocation: 'https://github.com/Azure-Samples/aci-helloworld.git#master' + type: 'DockerBuildRequest' + } + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/tasks/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/tasks/main.bicep new file mode 100644 index 00000000..c31bbd8c --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/tasks/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} + +resource task 'Microsoft.ContainerRegistry/registries/tasks@2019-06-01-preview' = { + parent: registry + name: resourceName + location: location + properties: { + isSystemTask: true + status: 'Enabled' + step: null + timeout: 3600 + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/tokens/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/tokens/main.bicep new file mode 100644 index 00000000..b4380ac1 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/tokens/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: true + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Premium' + tier: 'Premium' + } +} + +resource token 'Microsoft.ContainerRegistry/registries/tokens@2021-08-01-preview' = { + parent: registry + name: resourceName + properties: { + scopeMapId: resourceId('Microsoft.ContainerRegistry/registries/scopeMaps', registry.name, '_repositories_pull') + status: 'enabled' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/webhooks/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/webhooks/main.bicep new file mode 100644 index 00000000..23f95fe2 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/webhooks/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource webHook 'Microsoft.ContainerRegistry/registries/webHooks@2021-08-01-preview' = { + parent: registry + name: resourceName + location: location + properties: { + actions: [ + 'push' + ] + customHeaders: {} + scope: '' + serviceUri: 'https://mywebhookreceiver.example/mytag' + status: 'enabled' + } +} diff --git a/settings/remarks/microsoft.containerservice/samples/fleets/main.bicep b/settings/remarks/microsoft.containerservice/samples/fleets/main.bicep new file mode 100644 index 00000000..67faef51 --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/fleets/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource fleet 'Microsoft.ContainerService/fleets@2024-04-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.containerservice/samples/fleets/members/main.bicep b/settings/remarks/microsoft.containerservice/samples/fleets/members/main.bicep new file mode 100644 index 00000000..627308ea --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/fleets/members/main.bicep @@ -0,0 +1,83 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource fleet 'Microsoft.ContainerService/fleets@2024-04-01' = { + name: resourceName + location: location + properties: {} +} + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2025-02-01' = { + name: resourceName + location: location + properties: { + addonProfiles: {} + agentPoolProfiles: [ + { + count: 1 + enableAutoScaling: false + enableEncryptionAtHost: false + enableFIPS: false + enableNodePublicIP: false + enableUltraSSD: false + kubeletDiskType: '' + mode: 'System' + name: 'default' + nodeLabels: {} + osDiskType: 'Managed' + osType: 'Linux' + scaleDownMode: 'Delete' + tags: {} + type: 'VirtualMachineScaleSets' + upgradeSettings: { + drainTimeoutInMinutes: 0 + maxSurge: '10%' + nodeSoakDurationInMinutes: 0 + } + vmSize: 'Standard_B2s' + } + ] + apiServerAccessProfile: { + disableRunCommand: false + enablePrivateCluster: false + enablePrivateClusterPublicFQDN: false + } + autoUpgradeProfile: { + nodeOSUpgradeChannel: 'NodeImage' + upgradeChannel: 'none' + } + azureMonitorProfile: { + metrics: { + enabled: false + } + } + disableLocalAccounts: false + dnsPrefix: 'acctest0001' + enableRBAC: true + kubernetesVersion: '' + metricsProfile: { + costAnalysis: { + enabled: false + } + } + nodeResourceGroup: '' + securityProfile: {} + servicePrincipalProfile: { + clientId: 'msi' + } + supportPlan: 'KubernetesOfficial' + } + sku: { + name: 'Base' + tier: 'Free' + } +} + +resource member 'Microsoft.ContainerService/fleets/members@2024-04-01' = { + parent: fleet + name: resourceName + properties: { + clusterResourceId: managedCluster.id + group: 'default' + } +} diff --git a/settings/remarks/microsoft.containerservice/samples/managedclusters/agentpools/main.bicep b/settings/remarks/microsoft.containerservice/samples/managedclusters/agentpools/main.bicep new file mode 100644 index 00000000..c752f464 --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/managedclusters/agentpools/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2023-04-02-preview' = { + name: resourceName + location: location + properties: { + agentPoolProfiles: [ + { + count: 1 + mode: 'System' + name: 'default' + vmSize: 'Standard_DS2_v2' + } + ] + dnsPrefix: 'acctest0001' + } +} + +resource agentPool 'Microsoft.ContainerService/managedClusters/agentPools@2023-04-02-preview' = { + parent: managedCluster + name: 'internal' + properties: { + count: 1 + mode: 'User' + vmSize: 'Standard_DS2_v2' + } +} diff --git a/settings/remarks/microsoft.containerservice/samples/managedclusters/main.bicep b/settings/remarks/microsoft.containerservice/samples/managedclusters/main.bicep new file mode 100644 index 00000000..786bb9f1 --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/managedclusters/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2023-04-02-preview' = { + name: resourceName + location: location + properties: { + agentPoolProfiles: [ + { + count: 1 + mode: 'System' + name: 'default' + vmSize: 'Standard_DS2_v2' + } + ] + dnsPrefix: 'acctest0001' + } +} diff --git a/settings/remarks/microsoft.containerservice/samples/managedclusters/trustedaccessrolebindings/main.bicep b/settings/remarks/microsoft.containerservice/samples/managedclusters/trustedaccessrolebindings/main.bicep new file mode 100644 index 00000000..25a49290 --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/managedclusters/trustedaccessrolebindings/main.bicep @@ -0,0 +1,174 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: 'ai-${resourceName}' + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2025-02-01' = { + name: 'aks-${resourceName}' + location: location + properties: { + addonProfiles: {} + agentPoolProfiles: [ + { + count: 1 + enableAutoScaling: false + enableEncryptionAtHost: false + enableFIPS: false + enableNodePublicIP: false + enableUltraSSD: false + kubeletDiskType: '' + mode: 'System' + name: 'default' + nodeLabels: {} + osDiskType: 'Managed' + osType: 'Linux' + scaleDownMode: 'Delete' + tags: {} + type: 'VirtualMachineScaleSets' + upgradeSettings: { + drainTimeoutInMinutes: 0 + maxSurge: '10%' + nodeSoakDurationInMinutes: 0 + } + vmSize: 'Standard_B2s' + } + ] + apiServerAccessProfile: { + disableRunCommand: false + enablePrivateCluster: false + enablePrivateClusterPublicFQDN: false + } + autoUpgradeProfile: { + nodeOSUpgradeChannel: 'NodeImage' + upgradeChannel: 'none' + } + azureMonitorProfile: { + metrics: { + enabled: false + } + } + disableLocalAccounts: false + dnsPrefix: 'aks-acctest0001' + enableRBAC: true + kubernetesVersion: '' + metricsProfile: { + costAnalysis: { + enabled: false + } + } + nodeResourceGroup: '' + securityProfile: {} + servicePrincipalProfile: { + clientId: 'msi' + } + supportPlan: 'KubernetesOfficial' + } + sku: { + name: 'Base' + tier: 'Free' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: 'st${resourceName}' + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: 'kv${resourceName}' + location: location + properties: { + accessPolicies: [] + createMode: 'default' + enableRbacAuthorization: false + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} + +resource workspace 'Microsoft.MachineLearningServices/workspaces@2024-04-01' = { + name: 'mlw-${resourceName}' + location: location + kind: 'Default' + properties: { + applicationInsights: component.id + keyVault: vault.id + publicNetworkAccess: 'Enabled' + storageAccount: storageAccount.id + v1LegacyMode: false + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} + +resource trustedAccessRoleBinding 'Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings@2025-02-01' = { + parent: managedCluster + name: 'tarb-${resourceName}' + properties: { + roles: [ + 'Microsoft.MachineLearningServices/workspaces/mlworkload' + ] + sourceResourceId: workspace.id + } +} diff --git a/settings/remarks/microsoft.costmanagement/samples/scheduledactions/main.bicep b/settings/remarks/microsoft.costmanagement/samples/scheduledactions/main.bicep new file mode 100644 index 00000000..1eb2dc82 --- /dev/null +++ b/settings/remarks/microsoft.costmanagement/samples/scheduledactions/main.bicep @@ -0,0 +1,34 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource scheduledAction 'Microsoft.CostManagement/scheduledActions@2022-10-01' = { + name: resourceName + kind: 'Email' + properties: { + displayName: 'CostByServiceViewerz3k' + fileDestination: { + fileFormats: [] + } + notification: { + message: '' + subject: 'Cost Management Report for Terraform Testing on Azure with TTL = 2 Day' + to: [ + 'test@test.com' + 'hashicorp@test.com' + ] + } + notificationEmail: 'test@test.com' + schedule: { + dayOfMonth: 0 + daysOfWeek: null + endDate: '2023-07-02T00:00:00Z' + frequency: 'Daily' + hourOfDay: 0 + startDate: '2023-07-01T00:00:00Z' + weeksOfMonth: null + } + status: 'Enabled' + viewId: resourceId('Microsoft.CostManagement/views', 'ms:CostByService') + } +} diff --git a/settings/remarks/microsoft.costmanagement/samples/views/main.bicep b/settings/remarks/microsoft.costmanagement/samples/views/main.bicep new file mode 100644 index 00000000..be056d90 --- /dev/null +++ b/settings/remarks/microsoft.costmanagement/samples/views/main.bicep @@ -0,0 +1,61 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource view 'Microsoft.CostManagement/views@2022-10-01' = { + name: resourceName + properties: { + accumulated: 'False' + chart: 'StackedColumn' + displayName: 'Test View wgvtl' + kpis: [ + { + enabled: true + type: 'Forecast' + } + ] + pivots: [ + { + name: 'ServiceName' + type: 'Dimension' + } + { + name: 'ResourceLocation' + type: 'Dimension' + } + { + name: 'ResourceGroupName' + type: 'Dimension' + } + ] + query: { + dataSet: { + aggregation: { + totalCost: { + function: 'Sum' + name: 'Cost' + } + totalCostUSD: { + function: 'Sum' + name: 'CostUSD' + } + } + granularity: 'Monthly' + grouping: [ + { + name: 'ResourceGroupName' + type: 'Dimension' + } + ] + sorting: [ + { + direction: 'Ascending' + name: 'BillingMonth' + } + ] + } + timeframe: 'MonthToDate' + type: 'Usage' + } + } +} diff --git a/settings/remarks/microsoft.customproviders/samples/resourceproviders/main.bicep b/settings/remarks/microsoft.customproviders/samples/resourceproviders/main.bicep new file mode 100644 index 00000000..9cfb6695 --- /dev/null +++ b/settings/remarks/microsoft.customproviders/samples/resourceproviders/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource resourceProvider 'Microsoft.CustomProviders/resourceProviders@2018-09-01-preview' = { + name: resourceName + location: location + properties: { + resourceTypes: [ + { + endpoint: 'https://example.com/' + name: 'dEf1' + routingType: 'Proxy' + } + ] + } +} diff --git a/settings/remarks/microsoft.dashboard/samples/grafana/main.bicep b/settings/remarks/microsoft.dashboard/samples/grafana/main.bicep new file mode 100644 index 00000000..042f70ca --- /dev/null +++ b/settings/remarks/microsoft.dashboard/samples/grafana/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource grafana 'Microsoft.Dashboard/grafana@2022-08-01' = { + name: resourceName + location: location + properties: { + apiKey: 'Disabled' + autoGeneratedDomainNameLabelScope: 'TenantReuse' + deterministicOutboundIP: 'Disabled' + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + } +} diff --git a/settings/remarks/microsoft.dashboard/samples/grafana/managedprivateendpoints/main.bicep b/settings/remarks/microsoft.dashboard/samples/grafana/managedprivateendpoints/main.bicep new file mode 100644 index 00000000..71e55b93 --- /dev/null +++ b/settings/remarks/microsoft.dashboard/samples/grafana/managedprivateendpoints/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource account 'Microsoft.Monitor/accounts@2023-04-03' = { + name: '${resourceName}-mw' + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} + +resource grafana 'Microsoft.Dashboard/grafana@2023-09-01' = { + name: '${resourceName}-graf' + location: location + properties: { + apiKey: 'Disabled' + autoGeneratedDomainNameLabelScope: 'TenantReuse' + deterministicOutboundIP: 'Disabled' + grafanaMajorVersion: '11' + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + } +} + +resource managedPrivateEndpoint 'Microsoft.Dashboard/grafana/managedPrivateEndpoints@2023-09-01' = { + parent: grafana + name: '${resourceName}-mpe' + location: location + properties: { + groupIds: [ + 'prometheusMetrics' + ] + privateLinkResourceId: account.id + privateLinkResourceRegion: 'eastus' + privateLinkServiceUrl: '' + requestMessage: '' + } +} diff --git a/settings/remarks/microsoft.databoxedge/samples/databoxedgedevices/main.bicep b/settings/remarks/microsoft.databoxedge/samples/databoxedgedevices/main.bicep new file mode 100644 index 00000000..da5c4132 --- /dev/null +++ b/settings/remarks/microsoft.databoxedge/samples/databoxedgedevices/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource dataBoxEdgeDevice 'Microsoft.DataBoxEdge/dataBoxEdgeDevices@2022-03-01' = { + name: resourceName + location: location + sku: { + name: 'EdgeP_Base' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.databricks/samples/accessconnectors/main.bicep b/settings/remarks/microsoft.databricks/samples/accessconnectors/main.bicep new file mode 100644 index 00000000..f493107f --- /dev/null +++ b/settings/remarks/microsoft.databricks/samples/accessconnectors/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource accessConnector 'Microsoft.Databricks/accessConnectors@2022-10-01-preview' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.databricks/samples/workspaces/main.bicep b/settings/remarks/microsoft.databricks/samples/workspaces/main.bicep new file mode 100644 index 00000000..73fa901d --- /dev/null +++ b/settings/remarks/microsoft.databricks/samples/workspaces/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2' + +resource workspace 'Microsoft.Databricks/workspaces@2023-02-01' = { + name: resourceName + location: location + properties: { + managedResourceGroupId: resourceId('Microsoft.Resources/resourceGroups', 'databricks-rg-${resourceName}') + parameters: { + prepareEncryption: { + value: true + } + requireInfrastructureEncryption: { + value: true + } + } + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'premium' + } +} diff --git a/settings/remarks/microsoft.databricks/samples/workspaces/virtualnetworkpeerings/main.bicep b/settings/remarks/microsoft.databricks/samples/workspaces/virtualnetworkpeerings/main.bicep new file mode 100644 index 00000000..a75f36b6 --- /dev/null +++ b/settings/remarks/microsoft.databricks/samples/workspaces/virtualnetworkpeerings/main.bicep @@ -0,0 +1,54 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource workspace 'Microsoft.Databricks/workspaces@2023-02-01' = { + name: resourceName + location: location + properties: { + managedResourceGroupId: resourceId('Microsoft.Resources/resourceGroups', 'databricks-rg-${resourceName}') + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'standard' + } +} + +resource virtualNetworkPeering 'Microsoft.Databricks/workspaces/virtualNetworkPeerings@2023-02-01' = { + parent: workspace + name: resourceName + properties: { + allowForwardedTraffic: false + allowGatewayTransit: false + allowVirtualNetworkAccess: true + databricksAddressSpace: { + addressPrefixes: [ + '10.139.0.0/16' + ] + } + remoteAddressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + remoteVirtualNetwork: { + id: virtualNetwork.id + } + useRemoteGateways: false + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/credentials/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/credentials/main.bicep new file mode 100644 index 00000000..74ba3e81 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/credentials/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName +} + +resource credential 'Microsoft.DataFactory/factories/credentials@2018-06-01' = { + parent: factory + name: resourceName + properties: { + annotations: [ + 'test' + ] + description: 'this is a test' + type: 'ManagedIdentity' + typeProperties: { + resourceId: userAssignedIdentity.id + } + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/dataflows/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/dataflows/main.bicep new file mode 100644 index 00000000..f8f1274a --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/dataflows/main.bicep @@ -0,0 +1,104 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource dataflow 'Microsoft.DataFactory/factories/dataflows@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'Flowlet' + typeProperties: { + script: '''source( + allowSchemaDrift: true, + validateSchema: false, + limit: 100, + ignoreNoFilesFound: false, + documentForm: ''documentPerLine'') ~> source1 +source1 sink( + allowSchemaDrift: true, + validateSchema: false, + skipDuplicateMapInputs: true, + skipDuplicateMapOutputs: true) ~> sink1 +''' + sinks: [ + { + description: '' + linkedService: { + parameters: {} + referenceName: linkedservice.name + type: 'LinkedServiceReference' + } + name: 'sink1' + } + ] + sources: [ + { + description: '' + linkedService: { + parameters: {} + referenceName: linkedservice.name + type: 'LinkedServiceReference' + } + name: 'source1' + } + ] + } + } +} + +resource linkedservice 'Microsoft.DataFactory/factories/linkedservices@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'AzureBlobStorage' + typeProperties: { + serviceEndpoint: storageAccount.properties.primaryEndpoints.blob + } + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/datasets/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/datasets/main.bicep new file mode 100644 index 00000000..8f874454 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/datasets/main.bicep @@ -0,0 +1,81 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource dataset 'Microsoft.DataFactory/factories/datasets@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + linkedServiceName: { + referenceName: linkedservice.name + type: 'LinkedServiceReference' + } + type: 'Json' + typeProperties: { + encodingName: 'UTF-8' + location: { + container: 'container' + fileName: 'bar.txt' + folderPath: 'foo/bar/' + type: 'AzureBlobStorageLocation' + } + } + } +} + +resource linkedservice 'Microsoft.DataFactory/factories/linkedservices@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'AzureBlobStorage' + typeProperties: { + serviceEndpoint: storageAccount.properties.primaryEndpoints.blob + } + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/integrationruntimes/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/integrationruntimes/main.bicep new file mode 100644 index 00000000..0b9e810d --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/integrationruntimes/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource integrationRuntime 'Microsoft.DataFactory/factories/integrationRuntimes@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'SelfHosted' + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/linkedservices/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/linkedservices/main.bicep new file mode 100644 index 00000000..6eb10574 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/linkedservices/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource linkedservice 'Microsoft.DataFactory/factories/linkedservices@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'AzureBlobStorage' + typeProperties: { + serviceEndpoint: storageAccount.properties.primaryEndpoints.blob + } + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/main.bicep new file mode 100644 index 00000000..f41575b8 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/main.bicep new file mode 100644 index 00000000..bf26c35b --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + globalParameters: {} + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource managedVirtualNetwork 'Microsoft.DataFactory/factories/managedVirtualNetworks@2018-06-01' = { + parent: factory + name: 'default' + properties: {} +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/managedprivateendpoints/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/managedprivateendpoints/main.bicep new file mode 100644 index 00000000..aecaf32e --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/managedprivateendpoints/main.bicep @@ -0,0 +1,63 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + globalParameters: {} + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'BlobStorage' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource managedVirtualNetwork 'Microsoft.DataFactory/factories/managedVirtualNetworks@2018-06-01' = { + parent: factory + name: 'default' + properties: {} +} + +resource managedPrivateEndpoint 'Microsoft.DataFactory/factories/managedVirtualNetworks/managedPrivateEndpoints@2018-06-01' = { + parent: managedVirtualNetwork + name: resourceName + properties: { + groupId: 'blob' + privateLinkResourceId: storageAccount.id + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/pipelines/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/pipelines/main.bicep new file mode 100644 index 00000000..a17dd9d8 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/pipelines/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource pipeline 'Microsoft.DataFactory/factories/pipelines@2018-06-01' = { + parent: factory + name: resourceName + properties: { + annotations: [] + description: '' + parameters: { + test: { + defaultValue: 'testparameter' + type: 'String' + } + } + variables: {} + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/triggers/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/triggers/main.bicep new file mode 100644 index 00000000..4921a197 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/triggers/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource pipeline 'Microsoft.DataFactory/factories/pipelines@2018-06-01' = { + parent: factory + name: resourceName + properties: { + annotations: [] + description: '' + parameters: { + test: { + defaultValue: 'testparameter' + type: 'String' + } + } + variables: {} + } +} + +resource trigger 'Microsoft.DataFactory/factories/triggers@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + pipeline: { + parameters: {} + pipelineReference: { + referenceName: pipeline.name + type: 'PipelineReference' + } + } + type: 'TumblingWindowTrigger' + typeProperties: { + frequency: 'Minute' + interval: 15 + maxConcurrency: 50 + startTime: '2022-09-21T00:00:00Z' + } + } +} diff --git a/settings/remarks/microsoft.datamigration/samples/services/main.bicep b/settings/remarks/microsoft.datamigration/samples/services/main.bicep new file mode 100644 index 00000000..655e65d7 --- /dev/null +++ b/settings/remarks/microsoft.datamigration/samples/services/main.bicep @@ -0,0 +1,43 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.DataMigration/services@2018-04-19' = { + name: resourceName + location: location + kind: 'Cloud' + properties: { + virtualSubnetId: subnet.id + } + sku: { + name: 'Standard_1vCores' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.datamigration/samples/services/projects/main.bicep b/settings/remarks/microsoft.datamigration/samples/services/projects/main.bicep new file mode 100644 index 00000000..097ee330 --- /dev/null +++ b/settings/remarks/microsoft.datamigration/samples/services/projects/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.DataMigration/services@2018-04-19' = { + name: resourceName + location: location + kind: 'Cloud' + properties: { + virtualSubnetId: subnet.id + } + sku: { + name: 'Standard_1vCores' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource project 'Microsoft.DataMigration/services/projects@2018-04-19' = { + parent: service + name: resourceName + location: location + properties: { + sourcePlatform: 'SQL' + targetPlatform: 'SQLDB' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.dataprotection/samples/backupvaults/backupinstances/main.bicep b/settings/remarks/microsoft.dataprotection/samples/backupvaults/backupinstances/main.bicep new file mode 100644 index 00000000..85769b4f --- /dev/null +++ b/settings/remarks/microsoft.dataprotection/samples/backupvaults/backupinstances/main.bicep @@ -0,0 +1,145 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource backupVault 'Microsoft.DataProtection/backupVaults@2022-04-01' = { + name: resourceName + location: location + properties: { + storageSettings: [ + { + datastoreType: 'VaultStore' + type: 'LocallyRedundant' + } + ] + } +} + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: 'psqladmin' + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 5120 + } + version: '9.5' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'B_Gen5_2' + tier: 'Basic' + } +} + +resource backupInstance 'Microsoft.DataProtection/backupVaults/backupInstances@2022-04-01' = { + parent: backupVault + name: resourceName + properties: { + dataSourceInfo: { + datasourceType: 'Microsoft.DBforPostgreSQL/servers/databases' + objectType: 'Datasource' + resourceID: database.id + resourceLocation: 'database.location' + resourceName: database.name + resourceType: 'Microsoft.DBforPostgreSQL/servers/databases' + resourceUri: '' + } + dataSourceSetInfo: { + datasourceType: 'Microsoft.DBforPostgreSQL/servers/databases' + objectType: 'DatasourceSet' + resourceID: server.id + resourceLocation: 'server.location' + resourceName: server.name + resourceType: 'Microsoft.DBForPostgreSQL/servers' + resourceUri: '' + } + datasourceAuthCredentials: null + friendlyName: 'acctest0001' + objectType: 'BackupInstance' + policyInfo: { + policyId: backupPolicy.id + } + } +} + +resource backupPolicy 'Microsoft.DataProtection/backupVaults/backupPolicies@2022-04-01' = { + parent: backupVault + name: resourceName + properties: { + datasourceTypes: [ + 'Microsoft.DBforPostgreSQL/servers/databases' + ] + objectType: 'BackupPolicy' + policyRules: [ + { + backupParameters: { + backupType: 'Full' + objectType: 'AzureBackupParams' + } + dataStore: { + dataStoreType: 'VaultStore' + objectType: 'DataStoreInfoBase' + } + name: 'BackupIntervals' + objectType: 'AzureBackupRule' + trigger: { + objectType: 'ScheduleBasedTriggerContext' + schedule: { + repeatingTimeIntervals: [ + 'R/2021-05-23T02:30:00+00:00/P1W' + ] + } + taggingCriteria: [ + { + isDefault: true + tagInfo: { + id: 'Default_' + tagName: 'Default' + } + taggingPriority: 99 + } + ] + } + } + { + isDefault: true + lifecycles: [ + { + deleteAfter: { + duration: 'P4M' + objectType: 'AbsoluteDeleteOption' + } + sourceDataStore: { + dataStoreType: 'VaultStore' + objectType: 'DataStoreInfoBase' + } + targetDataStoreCopySettings: [] + } + ] + name: 'Default' + objectType: 'AzureRetentionRule' + } + ] + } +} + +resource database 'Microsoft.DBforPostgreSQL/servers/databases@2017-12-01' = { + parent: server + name: resourceName + properties: { + charset: 'UTF8' + collation: 'English_United States.1252' + } +} diff --git a/settings/remarks/microsoft.dataprotection/samples/backupvaults/backuppolicies/main.bicep b/settings/remarks/microsoft.dataprotection/samples/backupvaults/backuppolicies/main.bicep new file mode 100644 index 00000000..0e11a48b --- /dev/null +++ b/settings/remarks/microsoft.dataprotection/samples/backupvaults/backuppolicies/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource backupVault 'Microsoft.DataProtection/backupVaults@2022-04-01' = { + name: resourceName + location: location + properties: { + storageSettings: [ + { + datastoreType: 'VaultStore' + type: 'LocallyRedundant' + } + ] + } +} + +resource backupPolicy 'Microsoft.DataProtection/backupVaults/backupPolicies@2022-04-01' = { + parent: backupVault + name: resourceName + properties: { + datasourceTypes: [ + 'Microsoft.DBforPostgreSQL/servers/databases' + ] + objectType: 'BackupPolicy' + policyRules: [ + { + backupParameters: { + backupType: 'Full' + objectType: 'AzureBackupParams' + } + dataStore: { + dataStoreType: 'VaultStore' + objectType: 'DataStoreInfoBase' + } + name: 'BackupIntervals' + objectType: 'AzureBackupRule' + trigger: { + objectType: 'ScheduleBasedTriggerContext' + schedule: { + repeatingTimeIntervals: [ + 'R/2021-05-23T02:30:00+00:00/P1W' + ] + } + taggingCriteria: [ + { + isDefault: true + tagInfo: { + id: 'Default_' + tagName: 'Default' + } + taggingPriority: 99 + } + ] + } + } + { + isDefault: true + lifecycles: [ + { + deleteAfter: { + duration: 'P4M' + objectType: 'AbsoluteDeleteOption' + } + sourceDataStore: { + dataStoreType: 'VaultStore' + objectType: 'DataStoreInfoBase' + } + targetDataStoreCopySettings: [] + } + ] + name: 'Default' + objectType: 'AzureRetentionRule' + } + ] + } +} diff --git a/settings/remarks/microsoft.dataprotection/samples/backupvaults/main.bicep b/settings/remarks/microsoft.dataprotection/samples/backupvaults/main.bicep new file mode 100644 index 00000000..00c95459 --- /dev/null +++ b/settings/remarks/microsoft.dataprotection/samples/backupvaults/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource backupVault 'Microsoft.DataProtection/backupVaults@2022-04-01' = { + name: resourceName + location: location + properties: { + storageSettings: [ + { + datastoreType: 'VaultStore' + type: 'LocallyRedundant' + } + ] + } +} diff --git a/settings/remarks/microsoft.dataprotection/samples/resourceguards/main.bicep b/settings/remarks/microsoft.dataprotection/samples/resourceguards/main.bicep new file mode 100644 index 00000000..388188e4 --- /dev/null +++ b/settings/remarks/microsoft.dataprotection/samples/resourceguards/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource resourceGuard 'Microsoft.DataProtection/resourceGuards@2022-04-01' = { + name: resourceName + location: location + properties: { + vaultCriticalOperationExclusionList: [] + } +} diff --git a/settings/remarks/microsoft.datashare/samples/accounts/main.bicep b/settings/remarks/microsoft.datashare/samples/accounts/main.bicep new file mode 100644 index 00000000..0e694088 --- /dev/null +++ b/settings/remarks/microsoft.datashare/samples/accounts/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.DataShare/accounts@2019-11-01' = { + name: resourceName + location: location + tags: { + env: 'Test' + } +} diff --git a/settings/remarks/microsoft.datashare/samples/accounts/shares/main.bicep b/settings/remarks/microsoft.datashare/samples/accounts/shares/main.bicep new file mode 100644 index 00000000..60c29ba6 --- /dev/null +++ b/settings/remarks/microsoft.datashare/samples/accounts/shares/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.DataShare/accounts@2019-11-01' = { + name: resourceName + location: location + tags: { + env: 'Test' + } +} + +resource share 'Microsoft.DataShare/accounts/shares@2019-11-01' = { + parent: account + name: resourceName + properties: { + description: '' + shareKind: 'CopyBased' + terms: '' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/configurations/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/configurations/main.bicep new file mode 100644 index 00000000..cd3d6b2e --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/configurations/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource configuration 'Microsoft.DBforMariaDB/servers/configurations@2018-06-01' = { + parent: server + name: 'character_set_server' + properties: { + value: 'LATIN1' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/databases/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/databases/main.bicep new file mode 100644 index 00000000..deeb5349 --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/databases/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'B_Gen5_2' + tier: 'Basic' + } +} + +resource database 'Microsoft.DBforMariaDB/servers/databases@2018-06-01' = { + parent: server + name: resourceName + properties: { + charset: 'utf8' + collation: 'utf8_general_ci' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/firewallrules/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/firewallrules/main.bicep new file mode 100644 index 00000000..a521dad4 --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/firewallrules/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource firewallRule 'Microsoft.DBforMariaDB/servers/firewallRules@2018-06-01' = { + parent: server + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/main.bicep new file mode 100644 index 00000000..2f777e9f --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/virtualnetworkrules/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/virtualnetworkrules/main.bicep new file mode 100644 index 00000000..a29902eb --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/virtualnetworkrules/main.bicep @@ -0,0 +1,74 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.7.29.0/29' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.7.29.0/29' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [ + { + service: 'Microsoft.Sql' + } + ] + } +} + +resource virtualNetworkRule 'Microsoft.DBforMariaDB/servers/virtualNetworkRules@2018-06-01' = { + parent: server + name: resourceName + properties: { + ignoreMissingVnetServiceEndpoint: false + virtualNetworkSubnetId: subnet.id + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/administrators/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/administrators/main.bicep new file mode 100644 index 00000000..e74f865d --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/administrators/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the MySQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2023-12-30' = { + name: '${resourceName}-mysql' + location: location + properties: { + administratorLogin: 'tfadmin' + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + version: '8.0.21' + } + sku: { + name: 'Standard_B1ms' + tier: 'Burstable' + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-uai1' + location: location +} + +resource userassignedidentity1 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-uai2' + location: location +} + +resource administrator 'Microsoft.DBforMySQL/flexibleServers/administrators@2023-12-30' = { + parent: flexibleServer + name: 'ActiveDirectory' + properties: { + administratorType: 'ActiveDirectory' + identityResourceId: userAssignedIdentity.id + login: 'sqladmin' + sid: deployer().objectId + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/configurations/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/configurations/main.bicep new file mode 100644 index 00000000..f6ea8f5b --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/configurations/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the MySQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2023-12-30' = { + name: '${resourceName}-mysql' + location: location + properties: { + administratorLogin: 'tfadmin' + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + version: '8.0.21' + } + sku: { + name: 'Standard_B1ms' + tier: 'Burstable' + } +} + +resource configuration 'Microsoft.DBforMySQL/flexibleServers/configurations@2023-12-30' = { + parent: flexibleServer + name: 'character_set_server' + properties: { + value: 'utf8mb4' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/databases/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/databases/main.bicep new file mode 100644 index 00000000..463da0ff --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/databases/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the MySQL flexible server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2021-05-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + createMode: '' + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + version: '' + } + sku: { + name: 'Standard_B1s' + tier: 'Burstable' + } +} + +resource database 'Microsoft.DBforMySQL/flexibleServers/databases@2021-05-01' = { + parent: flexibleServer + name: resourceName + properties: { + charset: 'utf8' + collation: 'utf8_unicode_ci' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/firewallrules/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/firewallrules/main.bicep new file mode 100644 index 00000000..01af1e66 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/firewallrules/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the MySQL flexible server') +param mysqlAdministratorPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2021-05-01' = { + name: resourceName + location: location + properties: { + administratorLogin: 'adminTerraform' + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + createMode: '' + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + version: '5.7' + } + sku: { + name: 'Standard_B1s' + tier: 'Burstable' + } +} + +resource firewallRule 'Microsoft.DBforMySQL/flexibleServers/firewallRules@2021-05-01' = { + parent: flexibleServer + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/main.bicep new file mode 100644 index 00000000..93c05978 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the MySQL flexible server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2021-05-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + createMode: '' + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + } + sku: { + name: 'Standard_B1s' + tier: 'Burstable' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/administrators/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/administrators/main.bicep new file mode 100644 index 00000000..d06f8361 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/administrators/main.bicep @@ -0,0 +1,44 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource administrator 'Microsoft.DBforMySQL/servers/administrators@2017-12-01' = { + parent: server + name: 'activeDirectory' + properties: { + administratorType: 'ActiveDirectory' + login: 'sqladmin' + sid: deployer().objectId + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/configurations/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/configurations/main.bicep new file mode 100644 index 00000000..28c38190 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/configurations/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource configuration 'Microsoft.DBforMySQL/servers/configurations@2017-12-01' = { + parent: server + name: 'character_set_server' + properties: { + value: 'latin1' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/databases/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/databases/main.bicep new file mode 100644 index 00000000..4464b7d9 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/databases/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_1' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource database 'Microsoft.DBforMySQL/servers/databases@2017-12-01' = { + parent: server + name: resourceName + properties: { + charset: 'utf8' + collation: 'utf8_unicode_ci' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/firewallrules/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/firewallrules/main.bicep new file mode 100644 index 00000000..6e518061 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/firewallrules/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource firewallRule 'Microsoft.DBforMySQL/servers/firewallRules@2017-12-01' = { + parent: server + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/main.bicep new file mode 100644 index 00000000..b2d69497 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_1' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/virtualnetworkrules/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/virtualnetworkrules/main.bicep new file mode 100644 index 00000000..8e5a7693 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/virtualnetworkrules/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.7.29.0/29' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.7.29.0/29' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [ + { + service: 'Microsoft.Sql' + } + ] + } +} + +resource virtualNetworkRule 'Microsoft.DBforMySQL/servers/virtualNetworkRules@2017-12-01' = { + parent: server + name: resourceName + properties: { + ignoreMissingVnetServiceEndpoint: false + virtualNetworkSubnetId: subnet.id + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/administrators/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/administrators/main.bicep new file mode 100644 index 00000000..a53943c6 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/administrators/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL flexible server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2022-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + authConfig: { + activeDirectoryAuth: 'Enabled' + passwordAuth: 'Enabled' + tenantId: deployer().tenantId + } + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} + +resource administrator 'Microsoft.DBforPostgreSQL/flexibleServers/administrators@2022-12-01' = { + parent: flexibleServer + name: 'data.azurerm_client_config.current.object_id' + properties: { + principalType: 'ServicePrincipal' + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/configurations/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/configurations/main.bicep new file mode 100644 index 00000000..29b9710c --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/configurations/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The administrator password for the PostgreSQL flexible server') +param postgresqlAdministratorPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2023-06-01-preview' = { + name: resourceName + location: location + identity: { + type: 'None' + userAssignedIdentities: null + } + properties: { + administratorLogin: 'adminTerraform' + administratorLoginPassword: null + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} + +resource pgbouncerDefaultPoolSize 'Microsoft.DBforPostgreSQL/flexibleServers/configurations@2022-12-01' = { + parent: flexibleServer + name: 'pgbouncer.default_pool_size' + properties: { + source: 'user-override' + value: '40' + } + dependsOn: [ + pgbouncerEnabled + ] +} + +resource pgbouncerEnabled 'Microsoft.DBforPostgreSQL/flexibleServers/configurations@2022-12-01' = { + parent: flexibleServer + name: 'pgbouncer.enabled' + properties: { + source: 'user-override' + value: 'true' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/databases/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/databases/main.bicep new file mode 100644 index 00000000..36781900 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/databases/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the PostgreSQL flexible server') +param postgresqlAdministratorPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2022-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: 'adminTerraform' + administratorLoginPassword: null + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} + +resource database 'Microsoft.DBforPostgreSQL/flexibleServers/databases@2022-12-01' = { + parent: flexibleServer + name: resourceName + properties: { + charset: 'UTF8' + collation: 'en_US.UTF8' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/firewallrules/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/firewallrules/main.bicep new file mode 100644 index 00000000..0f1d9126 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/firewallrules/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the PostgreSQL flexible server') +param postgresqlAdministratorPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2022-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: 'adminTerraform' + administratorLoginPassword: null + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} + +resource firewallRule 'Microsoft.DBforPostgreSQL/flexibleServers/firewallRules@2022-12-01' = { + parent: flexibleServer + name: resourceName + properties: { + endIpAddress: '122.122.0.0' + startIpAddress: '122.122.0.0' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/main.bicep new file mode 100644 index 00000000..bd677693 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@description('The administrator login name for the PostgreSQL flexible server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2023-06-01-preview' = { + name: resourceName + location: location + identity: { + type: 'None' + userAssignedIdentities: null + } + properties: { + administratorLogin: null + administratorLoginPassword: null + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/virtualendpoints/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/virtualendpoints/main.bicep new file mode 100644 index 00000000..f32b3bc8 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/virtualendpoints/main.bicep @@ -0,0 +1,70 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the PostgreSQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2024-08-01' = { + name: '${resourceName}-primary' + location: location + properties: { + administratorLogin: 'psqladmin' + administratorLoginPassword: null + availabilityZone: '1' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: { + publicNetworkAccess: 'Disabled' + } + storage: { + autoGrow: 'Disabled' + storageSizeGB: 32 + tier: 'P30' + } + version: '16' + } + sku: { + name: 'Standard_D2ads_v5' + tier: 'GeneralPurpose' + } +} + +resource flexibleserver1 'Microsoft.DBforPostgreSQL/flexibleServers@2024-08-01' = { + name: '${resourceName}-replica' + location: location + properties: { + availabilityZone: '1' + backup: { + geoRedundantBackup: 'Disabled' + } + createMode: 'Replica' + highAvailability: { + mode: 'Disabled' + } + network: { + publicNetworkAccess: 'Disabled' + } + sourceServerResourceId: flexibleServer.id + storage: { + autoGrow: 'Disabled' + storageSizeGB: 32 + tier: 'P30' + } + version: '16' + } +} + +resource virtualEndpoint 'Microsoft.DBforPostgreSQL/flexibleServers/virtualEndpoints@2024-08-01' = { + parent: flexibleServer + name: resourceName + properties: { + endpointType: 'ReadWrite' + members: [ + flexibleserver1.name + ] + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servergroupsv2/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servergroupsv2/main.bicep new file mode 100644 index 00000000..b4888c67 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servergroupsv2/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the PostgreSQL server group') +param administratorLoginPassword string + +resource serverGroupsv2 'Microsoft.DBforPostgreSQL/serverGroupsv2@2022-11-08' = { + name: resourceName + location: location + properties: { + administratorLoginPassword: null + coordinatorEnablePublicIpAccess: true + coordinatorServerEdition: 'GeneralPurpose' + coordinatorStorageQuotaInMb: 131072 + coordinatorVCores: 2 + enableHa: false + nodeCount: 0 + nodeEnablePublicIpAccess: false + nodeServerEdition: 'MemoryOptimized' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/administrators/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/administrators/main.bicep new file mode 100644 index 00000000..042fc32c --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/administrators/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string +@description('The administrator login name for the PostgreSQL server admin') +param adminLogin string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.6' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource administrator 'Microsoft.DBforPostgreSQL/servers/administrators@2017-12-01' = { + parent: server + name: 'activeDirectory' + properties: { + administratorType: 'ActiveDirectory' + login: null + sid: deployer().objectId + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/configurations/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/configurations/main.bicep new file mode 100644 index 00000000..e3a3be58 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/configurations/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.6' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource configuration 'Microsoft.DBforPostgreSQL/servers/configurations@2017-12-01' = { + parent: server + name: 'backslash_quote' + properties: { + value: 'on' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/databases/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/databases/main.bicep new file mode 100644 index 00000000..3b7730c5 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/databases/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.6' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource database 'Microsoft.DBforPostgreSQL/servers/databases@2017-12-01' = { + parent: server + name: resourceName + properties: { + charset: 'UTF8' + collation: 'English_United States.1252' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/firewallrules/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/firewallrules/main.bicep new file mode 100644 index 00000000..5d2022d7 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/firewallrules/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.6' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource firewallRule 'Microsoft.DBforPostgreSQL/servers/firewallRules@2017-12-01' = { + parent: server + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/main.bicep new file mode 100644 index 00000000..39559318 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.5' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/virtualnetworkrules/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/virtualnetworkrules/main.bicep new file mode 100644 index 00000000..471521bb --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/virtualnetworkrules/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.5' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.7.29.0/29' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.7.29.0/29' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [ + { + service: 'Microsoft.Sql' + } + ] + } +} + +resource virtualNetworkRule 'Microsoft.DBforPostgreSQL/servers/virtualNetworkRules@2017-12-01' = { + parent: server + name: resourceName + properties: { + ignoreMissingVnetServiceEndpoint: false + virtualNetworkSubnetId: subnet.id + } +} diff --git a/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/applications/main.bicep b/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/applications/main.bicep new file mode 100644 index 00000000..190e9064 --- /dev/null +++ b/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/applications/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource applicationGroup 'Microsoft.DesktopVirtualization/applicationGroups@2023-09-05' = { + name: resourceName + location: location + properties: { + applicationGroupType: 'RemoteApp' + hostPoolArmPath: hostPool.id + } +} + +resource hostPool 'Microsoft.DesktopVirtualization/hostPools@2023-09-05' = { + name: resourceName + location: location + properties: { + hostPoolType: 'Pooled' + loadBalancerType: 'BreadthFirst' + maxSessionLimit: 999999 + preferredAppGroupType: 'Desktop' + publicNetworkAccess: 'Enabled' + startVMOnConnect: false + validationEnvironment: false + } +} + +resource application 'Microsoft.DesktopVirtualization/applicationGroups/applications@2023-09-05' = { + parent: applicationGroup + name: resourceName + location: location + properties: { + commandLineSetting: 'DoNotAllow' + filePath: 'C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe' + showInPortal: false + } +} diff --git a/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/main.bicep b/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/main.bicep new file mode 100644 index 00000000..75e4a4c3 --- /dev/null +++ b/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource applicationGroup 'Microsoft.DesktopVirtualization/applicationGroups@2024-04-03' = { + name: '${resourceName}-ag' + location: location + properties: { + applicationGroupType: 'Desktop' + description: '' + friendlyName: '' + hostPoolArmPath: hostPool.id + } +} + +resource hostPool 'Microsoft.DesktopVirtualization/hostPools@2024-04-03' = { + name: '${resourceName}-hp' + location: location + properties: { + customRdpProperty: '' + description: '' + friendlyName: '' + hostPoolType: 'Pooled' + loadBalancerType: 'BreadthFirst' + maxSessionLimit: 999999 + personalDesktopAssignmentType: '' + preferredAppGroupType: 'Desktop' + publicNetworkAccess: 'Enabled' + startVMOnConnect: false + validationEnvironment: false + vmTemplate: '' + } +} diff --git a/settings/remarks/microsoft.desktopvirtualization/samples/workspaces/main.bicep b/settings/remarks/microsoft.desktopvirtualization/samples/workspaces/main.bicep new file mode 100644 index 00000000..41fcd7a5 --- /dev/null +++ b/settings/remarks/microsoft.desktopvirtualization/samples/workspaces/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource workspace 'Microsoft.DesktopVirtualization/workspaces@2024-04-03' = { + name: resourceName + location: location + properties: { + description: '' + friendlyName: '' + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/attachednetworks/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/attachednetworks/main.bicep new file mode 100644 index 00000000..7cb03984 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/attachednetworks/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource devCenter 'Microsoft.DevCenter/devcenters@2023-04-01' = { + name: resourceName + location: location + identity: { + type: 'SystemAssigned' + userAssignedIdentities: null + } +} + +resource networkConnection 'Microsoft.DevCenter/networkConnections@2023-04-01' = { + name: resourceName + location: 'westeurope' + properties: { + domainJoinType: 'AzureADJoin' + subnetId: subnet.id + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + } +} + +resource attachNetwork 'Microsoft.DevCenter/devcenters/attachednetworks@2023-04-01' = { + parent: devCenter + name: resourceName + properties: { + networkConnectionId: networkConnection.id + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/catalogs/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/catalogs/main.bicep new file mode 100644 index 00000000..a6a3809a --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/catalogs/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: '${substring(resourceName, 0, 22)}-dc' + location: location + properties: {} +} + +resource catalog 'Microsoft.DevCenter/devCenters/catalogs@2025-02-01' = { + parent: devCenter + name: '${substring(resourceName, 0, 17)}-catalog' + properties: { + adoGit: { + branch: 'main' + path: '/template' + secretIdentifier: 'https://amlim-kv.vault.azure.net/secrets/ado/6279752c2bdd4a38a3e79d958cc36a75' + uri: 'https://amlim@dev.azure.com/amlim/testCatalog/_git/testCatalog' + } + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/devboxdefinitions/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/devboxdefinitions/main.bicep new file mode 100644 index 00000000..2368eef0 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/devboxdefinitions/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource devCenter 'Microsoft.DevCenter/devcenters@2023-04-01' = { + name: resourceName + location: location + identity: { + type: 'SystemAssigned' + userAssignedIdentities: null + } +} + +resource devBoxDefinition 'Microsoft.DevCenter/devcenters/devboxdefinitions@2024-10-01-preview' = { + parent: devCenter + name: resourceName + location: location + properties: { + hibernateSupport: 'Enabled' + imageReference: { + id: '${devCenter.id}/galleries/default/images/microsoftvisualstudio_visualstudioplustools_vs-2022-ent-general-win10-m365-gen2' + } + sku: { + name: 'general_i_8c32gb256ssd_v2' + } + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/environmenttypes/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/environmenttypes/main.bicep new file mode 100644 index 00000000..48152382 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/environmenttypes/main.bicep @@ -0,0 +1,13 @@ +param resourceName string +param location string + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: resourceName + location: location + properties: {} +} + +resource environmentType 'Microsoft.DevCenter/devCenters/environmentTypes@2025-02-01' = { + parent: devCenter + name: resourceName +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/main.bicep new file mode 100644 index 00000000..c091a718 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: resourceName + location: location +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-uai' + location: location +} diff --git a/settings/remarks/microsoft.devcenter/samples/networkconnections/main.bicep b/settings/remarks/microsoft.devcenter/samples/networkconnections/main.bicep new file mode 100644 index 00000000..b1655e53 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/networkconnections/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkConnection 'Microsoft.DevCenter/networkConnections@2023-04-01' = { + name: resourceName + location: location + properties: { + domainJoinType: 'AzureADJoin' + subnetId: subnet.id + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/projects/environmenttypes/main.bicep b/settings/remarks/microsoft.devcenter/samples/projects/environmenttypes/main.bicep new file mode 100644 index 00000000..85ced5c5 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/projects/environmenttypes/main.bicep @@ -0,0 +1,32 @@ +param resourceName string +param location string + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: resourceName + location: location + properties: {} +} + +resource project 'Microsoft.DevCenter/projects@2025-02-01' = { + name: '${resourceName}-proj' + location: location + properties: { + description: '' + devCenterId: devCenter.id + maxDevBoxesPerUser: 0 + } +} + +resource environmentType 'Microsoft.DevCenter/devCenters/environmentTypes@2025-02-01' = { + parent: devCenter + name: '${resourceName}-envtype' +} + +resource environmenttype1 'Microsoft.DevCenter/projects/environmentTypes@2025-02-01' = { + parent: project + name: 'environmentType.name' + properties: { + deploymentTargetId: '/subscriptions/subscription().subscriptionId' + status: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/projects/main.bicep b/settings/remarks/microsoft.devcenter/samples/projects/main.bicep new file mode 100644 index 00000000..53ecbc92 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/projects/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: resourceName + location: location + properties: {} +} + +resource project 'Microsoft.DevCenter/projects@2025-02-01' = { + name: '${resourceName}-proj' + location: location + properties: { + description: '' + devCenterId: devCenter.id + maxDevBoxesPerUser: 0 + } +} diff --git a/settings/remarks/microsoft.devices/samples/iothubs/certificates/main.bicep b/settings/remarks/microsoft.devices/samples/iothubs/certificates/main.bicep new file mode 100644 index 00000000..eaac0850 --- /dev/null +++ b/settings/remarks/microsoft.devices/samples/iothubs/certificates/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The Base64 encoded certificate content for the IoT Hub') +param certificateContent string + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'B1' + } +} + +resource certificate 'Microsoft.Devices/IotHubs/certificates@2022-04-30-preview' = { + parent: iothub + name: resourceName + properties: { + certificate: null + isVerified: false + } +} diff --git a/settings/remarks/microsoft.devices/samples/iothubs/main.bicep b/settings/remarks/microsoft.devices/samples/iothubs/main.bicep new file mode 100644 index 00000000..036e8dd0 --- /dev/null +++ b/settings/remarks/microsoft.devices/samples/iothubs/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'S1' + } +} diff --git a/settings/remarks/microsoft.devices/samples/provisioningservices/certificates/main.bicep b/settings/remarks/microsoft.devices/samples/provisioningservices/certificates/main.bicep new file mode 100644 index 00000000..0132ce72 --- /dev/null +++ b/settings/remarks/microsoft.devices/samples/provisioningservices/certificates/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource provisioningService 'Microsoft.Devices/provisioningServices@2022-02-05' = { + name: resourceName + location: location + properties: { + allocationPolicy: 'Hashed' + enableDataResidency: false + iotHubs: [] + publicNetworkAccess: 'Enabled' + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource certificate 'Microsoft.Devices/provisioningServices/certificates@2022-02-05' = { + parent: provisioningService + name: resourceName + properties: { + certificate: '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' + } +} diff --git a/settings/remarks/microsoft.devices/samples/provisioningservices/main.bicep b/settings/remarks/microsoft.devices/samples/provisioningservices/main.bicep new file mode 100644 index 00000000..e38ef376 --- /dev/null +++ b/settings/remarks/microsoft.devices/samples/provisioningservices/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource provisioningService 'Microsoft.Devices/provisioningServices@2022-02-05' = { + name: resourceName + location: location + properties: { + allocationPolicy: 'Hashed' + enableDataResidency: false + iotHubs: [] + publicNetworkAccess: 'Enabled' + } + sku: { + capacity: 1 + name: 'S1' + } +} diff --git a/settings/remarks/microsoft.deviceupdate/samples/accounts/instances/main.bicep b/settings/remarks/microsoft.deviceupdate/samples/accounts/instances/main.bicep new file mode 100644 index 00000000..348c8fb1 --- /dev/null +++ b/settings/remarks/microsoft.deviceupdate/samples/accounts/instances/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource account 'Microsoft.DeviceUpdate/accounts@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + sku: 'Standard' + } +} + +resource instance 'Microsoft.DeviceUpdate/accounts/instances@2022-10-01' = { + parent: account + name: resourceName + location: location + properties: { + accountName: account.name + enableDiagnostics: false + iotHubs: [ + { + resourceId: iothub.id + } + ] + } +} diff --git a/settings/remarks/microsoft.deviceupdate/samples/accounts/main.bicep b/settings/remarks/microsoft.deviceupdate/samples/accounts/main.bicep new file mode 100644 index 00000000..1850c1aa --- /dev/null +++ b/settings/remarks/microsoft.deviceupdate/samples/accounts/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.DeviceUpdate/accounts@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + sku: 'Standard' + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/main.bicep new file mode 100644 index 00000000..c9b0ad5d --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location + properties: { + labStorageType: 'Premium' + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/policysets/policies/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/policysets/policies/main.bicep new file mode 100644 index 00000000..94a1f5c2 --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/policysets/policies/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location +} + +// The policy set is a singleton named 'default' under the lab +resource policySet 'Microsoft.DevTestLab/labs/policySets@2018-09-15' existing = { + parent: lab + name: 'default' +} + +resource policy 'Microsoft.DevTestLab/labs/policySets/policies@2018-09-15' = { + parent: policySet + name: 'LabVmCount' + properties: { + description: '' + evaluatorType: 'MaxValuePolicy' + factData: '' + factName: 'LabVmCount' + threshold: '999' + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/schedules/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/schedules/main.bicep new file mode 100644 index 00000000..c4733acb --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/schedules/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location + properties: { + labStorageType: 'Premium' + } +} + +resource schedule 'Microsoft.DevTestLab/labs/schedules@2018-09-15' = { + parent: lab + name: 'LabVmsShutdown' + location: location + properties: { + dailyRecurrence: { + time: '0100' + } + notificationSettings: { + status: 'Disabled' + timeInMinutes: 0 + webhookUrl: '' + } + status: 'Disabled' + taskType: 'LabVmsShutdownTask' + timeZoneId: 'India Standard Time' + } + tags: { + environment: 'Production' + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/virtualmachines/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/virtualmachines/main.bicep new file mode 100644 index 00000000..ce588176 --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/virtualmachines/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the DevTest Lab virtual machine') +param vmPassword string + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location + properties: { + labStorageType: 'Premium' + } +} + +resource virtualMachine 'Microsoft.DevTestLab/labs/virtualMachines@2018-09-15' = { + parent: lab + name: resourceName + location: location + properties: { + allowClaim: true + disallowPublicIpAddress: false + galleryImageReference: { + offer: 'WindowsServer' + osType: 'Windows' + publisher: 'MicrosoftWindowsServer' + sku: '2012-Datacenter' + version: 'latest' + } + isAuthenticationWithSshKey: false + labSubnetName: '\'${resourceName}Subnet\'' + labVirtualNetworkId: virtualNetwork.id + networkInterface: {} + notes: '' + osType: 'Windows' + password: null + size: 'Standard_F2' + storageType: 'Standard' + userName: 'acct5stU5er' + } +} + +resource virtualNetwork 'Microsoft.DevTestLab/labs/virtualNetworks@2018-09-15' = { + parent: lab + name: resourceName + properties: { + description: '' + subnetOverrides: [ + { + labSubnetName: '\'${resourceName}Subnet\'' + resourceId: resourceId('Microsoft.Network/virtualNetworks/subnets', resourceName, '${resourceName}Subnet') + useInVmCreationPermission: 'Allow' + usePublicIpAddressPermission: 'Allow' + } + ] + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/virtualnetworks/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/virtualnetworks/main.bicep new file mode 100644 index 00000000..68435e1e --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/virtualnetworks/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location + properties: { + labStorageType: 'Premium' + } +} + +resource virtualNetwork 'Microsoft.DevTestLab/labs/virtualNetworks@2018-09-15' = { + parent: lab + name: resourceName + properties: { + description: '' + subnetOverrides: [ + { + labSubnetName: '\'${resourceName}Subnet\'' + resourceId: resourceId('Microsoft.Network/virtualNetworks/subnets', resourceName, '${resourceName}Subnet') + useInVmCreationPermission: 'Allow' + usePublicIpAddressPermission: 'Allow' + } + ] + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/schedules/main.bicep b/settings/remarks/microsoft.devtestlab/samples/schedules/main.bicep new file mode 100644 index 00000000..6aa87538 --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/schedules/main.bicep @@ -0,0 +1,148 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource schedule 'Microsoft.DevTestLab/schedules@2018-09-15' = { + name: resourceName + location: location + properties: { + dailyRecurrence: { + time: '0100' + } + notificationSettings: { + emailRecipient: '' + status: 'Disabled' + timeInMinutes: 30 + webhookUrl: '' + } + status: 'Enabled' + targetResourceId: virtualMachine.id + taskType: 'ComputeVmShutdownTask' + timeZoneId: 'Pacific Standard Time' + } + tags: { + environment: 'Production' + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_B2s' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + allowExtensionOperations: true + computerName: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '18.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + name: 'myosdisk-230630033106863551' + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/endpoints/main.bicep b/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/endpoints/main.bicep new file mode 100644 index 00000000..7ed9bdf0 --- /dev/null +++ b/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/endpoints/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource digitalTwinsInstance 'Microsoft.DigitalTwins/digitalTwinsInstances@2020-12-01' = { + name: resourceName + location: location +} + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource endpoint 'Microsoft.DigitalTwins/digitalTwinsInstances/endpoints@2020-12-01' = { + parent: digitalTwinsInstance + name: resourceName + properties: { + authenticationType: 'KeyBased' + deadLetterSecret: '' + endpointType: 'ServiceBus' + primaryConnectionString: 'authorizationRule.listKeys().primaryConnectionString' + secondaryConnectionString: 'authorizationRule.listKeys().secondaryConnectionString' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: false + maxSizeInMegabytes: 5120 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} + +resource authorizationRule 'Microsoft.ServiceBus/namespaces/topics/authorizationRules@2021-06-01-preview' = { + parent: topic + name: resourceName + properties: { + rights: [ + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/main.bicep b/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/main.bicep new file mode 100644 index 00000000..ec3d55c4 --- /dev/null +++ b/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource digitalTwinsInstance 'Microsoft.DigitalTwins/digitalTwinsInstances@2020-12-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/main.bicep new file mode 100644 index 00000000..6c9cc2f6 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [ + { + name: 'EnableCassandra' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource cassandraKeyspace 'Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/tables/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/tables/main.bicep new file mode 100644 index 00000000..ce3ac515 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/tables/main.bicep @@ -0,0 +1,90 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +var tableName = '${toLower(resourceName)}tbl' +var accountName = toLower(replace(resourceName, '-', '')) +var keyspaceName = '${toLower(resourceName)}ks' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2024-08-15' = { + name: accountName + location: location + kind: 'GlobalDocumentDB' + properties: { + backupPolicy: null + capabilities: [ + { + name: 'EnableCassandra' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: true + enableAutomaticFailover: false + enableBurstCapacity: false + enableFreeTier: false + enableMultipleWriteLocations: false + enablePartitionMerge: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'eastus' + } + ] + minimalTlsVersion: 'Tls12' + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource cassandraKeyspace 'Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces@2021-10-15' = { + parent: databaseAccount + name: keyspaceName + properties: { + options: {} + resource: { + id: keyspaceName + } + } +} + +resource table 'Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces/tables@2021-10-15' = { + parent: cassandraKeyspace + name: tableName + properties: { + options: {} + resource: { + analyticalStorageTtl: 1 + id: tableName + schema: { + clusterKeys: [] + columns: [ + { + name: 'test1' + type: 'ascii' + } + { + name: 'test2' + type: 'int' + } + ] + partitionKeys: [ + { + name: 'test1' + } + ] + } + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/graphs/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/graphs/main.bicep new file mode 100644 index 00000000..497566c8 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/graphs/main.bicep @@ -0,0 +1,71 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [ + { + name: 'EnableGremlin' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource gremlinDatabase 'Microsoft.DocumentDB/databaseAccounts/gremlinDatabases@2023-04-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} + +resource graph 'Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/graphs@2023-04-15' = { + parent: gremlinDatabase + name: resourceName + properties: { + options: { + throughput: 400 + } + resource: { + id: 'acctest0001' + partitionKey: { + kind: 'Hash' + paths: [ + '/test' + ] + } + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/main.bicep new file mode 100644 index 00000000..a620ab10 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [ + { + name: 'EnableGremlin' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource gremlinDatabase 'Microsoft.DocumentDB/databaseAccounts/gremlinDatabases@2023-04-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/main.bicep new file mode 100644 index 00000000..325a0359 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 10 + maxStalenessPrefix: 200 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbdatabases/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbdatabases/main.bicep new file mode 100644 index 00000000..55714880 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbdatabases/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'MongoDB' + properties: { + capabilities: [ + { + name: 'EnableMongo' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource mongodbDatabase 'Microsoft.DocumentDB/databaseAccounts/mongodbDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbroledefinitions/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbroledefinitions/main.bicep new file mode 100644 index 00000000..c6bc4736 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbroledefinitions/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +var accountName = toLower(replace(resourceName, '-', '')) +var dbName = '${toLower(resourceName)}db' +var roleName = '${toLower(resourceName)}role' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2024-08-15' = { + name: accountName + location: location + kind: 'MongoDB' + properties: { + backupPolicy: null + capabilities: [ + { + name: 'EnableMongoRoleBasedAccessControl' + } + { + name: 'EnableMongo' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableBurstCapacity: false + enableFreeTier: false + enableMultipleWriteLocations: false + enablePartitionMerge: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'eastus' + } + ] + minimalTlsVersion: 'Tls12' + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource mongodbDatabase 'Microsoft.DocumentDB/databaseAccounts/mongodbDatabases@2021-10-15' = { + parent: databaseAccount + name: dbName + properties: { + options: {} + resource: { + id: dbName + } + } +} + +resource mongodbRoleDefinition 'Microsoft.DocumentDB/databaseAccounts/mongodbRoleDefinitions@2022-11-15' = { + parent: databaseAccount + name: '${dbName}.${roleName}' + properties: { + databaseName: dbName + roleName: roleName + type: 1 + } + dependsOn: [ + mongodbDatabase + ] +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbuserdefinitions/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbuserdefinitions/main.bicep new file mode 100644 index 00000000..471dae66 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbuserdefinitions/main.bicep @@ -0,0 +1,72 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The password for the MongoDB user') +param mongodbUserPassword string + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2024-08-15' = { + name: '${resourceName}-acct' + location: location + kind: 'MongoDB' + properties: { + backupPolicy: null + capabilities: [ + { + name: 'EnableMongoRoleBasedAccessControl' + } + { + name: 'EnableMongo' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableBurstCapacity: false + enableFreeTier: false + enableMultipleWriteLocations: false + enablePartitionMerge: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'westus' + } + ] + minimalTlsVersion: 'Tls12' + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource mongodbDatabas 'Microsoft.DocumentDB/databaseAccounts/mongodbDatabases@2021-10-15' = { + parent: databaseAccount + name: '${resourceName}-mongodb' + properties: { + options: {} + resource: { + id: 'acctest0001-mongodb' + } + } +} + +resource mongodbUserDefinition 'Microsoft.DocumentDB/databaseAccounts/mongodbUserDefinitions@2022-11-15' = { + parent: databaseAccount + name: '${mongodbDatabas.name}.myUserName' + properties: { + databaseName: mongodbDatabas.name + mechanisms: 'SCRAM-SHA-256' + password: null + userName: 'myUserName' + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/services/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/services/main.bicep new file mode 100644 index 00000000..fe8b85c7 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/services/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource service 'Microsoft.DocumentDB/databaseAccounts/services@2022-05-15' = { + parent: databaseAccount + name: 'SqlDedicatedGateway' + properties: { + instanceCount: 1 + instanceSize: 'Cosmos.D4s' + serviceType: 'SqlDedicatedGateway' + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/main.bicep new file mode 100644 index 00000000..145232df --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 10 + maxStalenessPrefix: 200 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: { + throughput: 400 + } + resource: { + id: 'acctest0001' + } + } +} + +resource container 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers@2023-04-15' = { + parent: sqlDatabase + name: resourceName + properties: { + options: {} + resource: { + id: 'test-containerWest Europe' + partitionKey: { + kind: 'Hash' + paths: [ + '/definition' + ] + } + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.bicep new file mode 100644 index 00000000..e412697c --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Session' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} + +resource container 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers@2023-04-15' = { + parent: sqlDatabase + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + partitionKey: { + kind: 'Hash' + paths: [ + '/definition/id' + ] + } + } + } +} + +resource storedProcedure 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/storedProcedures@2021-10-15' = { + parent: container + name: resourceName + properties: { + options: {} + resource: { + body: ''' function () { + var context = getContext(); + var response = context.getResponse(); + response.setBody(''Hello, World''); + } +''' + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/triggers/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/triggers/main.bicep new file mode 100644 index 00000000..e580ac3c --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/triggers/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Session' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} + +resource container 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers@2023-04-15' = { + parent: sqlDatabase + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + partitionKey: { + kind: 'Hash' + paths: [ + '/definition/id' + ] + } + } + } +} + +resource trigger 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/triggers@2021-10-15' = { + parent: container + name: resourceName + properties: { + options: {} + resource: { + body: 'function trigger(){}' + id: 'acctest0001' + triggerOperation: 'All' + triggerType: 'Pre' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.bicep new file mode 100644 index 00000000..4ee0c4fb --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Session' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} + +resource container 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers@2023-04-15' = { + parent: sqlDatabase + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + partitionKey: { + kind: 'Hash' + paths: [ + '/definition/id' + ] + } + } + } +} + +resource userDefinedFunction 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/userDefinedFunctions@2021-10-15' = { + parent: container + name: resourceName + properties: { + options: {} + resource: { + body: ''' function test() { + var context = getContext(); + var response = context.getResponse(); + response.setBody(''Hello, World''); + } +''' + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/main.bicep new file mode 100644 index 00000000..a5d2f53d --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 10 + maxStalenessPrefix: 200 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: { + throughput: 400 + } + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroleassignments/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroleassignments/main.bicep new file mode 100644 index 00000000..f2ac0313 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroleassignments/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource sqlRoleDefinition 'Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions@2021-10-15' existing = { + parent: databaseAccount + name: '00000000-0000-0000-0000-000000000001' +} + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Session' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource database 'Microsoft.Kusto/clusters/databases@2023-05-02' = { + parent: cluster + name: resourceName + location: location + kind: 'ReadWrite' + properties: {} +} + +resource sqlRoleAssignment 'Microsoft.DocumentDB/databaseAccounts/sqlRoleAssignments@2021-10-15' = { + parent: databaseAccount + name: 'ff419bf7-f8ca-ef51-00d2-3576700c341b' + properties: { + principalId: cluster.properties.identity.principalId + roleDefinitionId: sqlRoleDefinition.id + scope: databaseAccount.id + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroledefinitions/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroledefinitions/main.bicep new file mode 100644 index 00000000..d27400e8 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroledefinitions/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlRoleDefinition 'Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions@2021-10-15' = { + parent: databaseAccount + name: 'c3ce1661-d0b9-3476-0a7c-2654ce2f3055' + properties: { + assignableScopes: [ + databaseAccount.id + ] + permissions: [ + { + dataActions: [ + 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read' + ] + } + ] + roleName: 'acctest0001' + type: 'CustomRole' + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/tables/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/tables/main.bicep new file mode 100644 index 00000000..210b7112 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/tables/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [ + { + name: 'EnableTable' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource table 'Microsoft.DocumentDB/databaseAccounts/tables@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/mongoclusters/firewallrules/main.bicep b/settings/remarks/microsoft.documentdb/samples/mongoclusters/firewallrules/main.bicep new file mode 100644 index 00000000..69e3ef43 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/mongoclusters/firewallrules/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westus3' + +resource mongoCluster 'Microsoft.DocumentDB/mongoClusters@2025-09-01' = { + name: resourceName + location: location + properties: { + authConfig: { + allowedModes: [ + 'MicrosoftEntraID' + ] + } + compute: { + tier: 'M40' + } + highAvailability: { + targetMode: 'Disabled' + } + previewFeatures: [ + 'ShardRebalancer' + ] + publicNetworkAccess: 'Enabled' + serverVersion: '5.0' + sharding: { + shardCount: 1 + } + storage: { + sizeGb: 32 + } + } +} + +resource firewallRule 'Microsoft.DocumentDB/mongoClusters/firewallRules@2025-09-01' = { + parent: mongoCluster + name: resourceName + properties: { + endIpAddress: '0.0.0.0' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/mongoclusters/users/main.bicep b/settings/remarks/microsoft.documentdb/samples/mongoclusters/users/main.bicep new file mode 100644 index 00000000..b5f1dd2e --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/mongoclusters/users/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'westus3' + +resource mongoClusterSSDv2 'Microsoft.DocumentDB/mongoClusters@2025-09-01' = { + name: '${resourceName}-ssdv2' + location: location + properties: { + authConfig: { + allowedModes: [ + 'MicrosoftEntraID' + ] + } + compute: { + tier: 'M30' + } + highAvailability: { + targetMode: 'Disabled' + } + publicNetworkAccess: 'Disabled' + serverVersion: '6.0' + sharding: { + shardCount: 1 + } + storage: { + sizeGb: 64 + type: 'PremiumSSDv2' + } + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName + location: location +} + +resource mongouserEntraserviceprincipal 'Microsoft.DocumentDB/mongoClusters/users@2025-09-01' = { + parent: mongoClusterSSDv2 + name: 'userAssignedIdentity.properties.principalId' + properties: { + identityProvider: { + properties: { + principalType: 'ServicePrincipal' + } + type: 'MicrosoftEntraID' + } + roles: [ + { + db: 'admin' + role: 'root' + } + ] + } +} diff --git a/settings/remarks/microsoft.elasticsan/samples/elasticsans/main.bicep b/settings/remarks/microsoft.elasticsan/samples/elasticsans/main.bicep new file mode 100644 index 00000000..9e0b659a --- /dev/null +++ b/settings/remarks/microsoft.elasticsan/samples/elasticsans/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource elasticSan 'Microsoft.ElasticSan/elasticSans@2023-01-01' = { + name: resourceName + location: location + properties: { + baseSizeTiB: 1 + extendedCapacitySizeTiB: 0 + sku: { + name: 'Premium_LRS' + tier: 'Premium' + } + } +} diff --git a/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/main.bicep b/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/main.bicep new file mode 100644 index 00000000..c9205983 --- /dev/null +++ b/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource elasticSan 'Microsoft.ElasticSan/elasticSans@2023-01-01' = { + name: '${resourceName}-es' + location: location + properties: { + baseSizeTiB: 1 + extendedCapacitySizeTiB: 0 + sku: { + name: 'Premium_LRS' + tier: 'Premium' + } + } +} + +resource volumeGroup 'Microsoft.ElasticSan/elasticSans/volumeGroups@2023-01-01' = { + parent: elasticSan + name: '${resourceName}-vg' + properties: { + encryption: 'EncryptionAtRestWithPlatformKey' + networkAcls: { + virtualNetworkRules: [] + } + protocolType: 'Iscsi' + } +} diff --git a/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/volumes/main.bicep b/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/volumes/main.bicep new file mode 100644 index 00000000..ab0d9770 --- /dev/null +++ b/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/volumes/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource elasticSan 'Microsoft.ElasticSan/elasticSans@2023-01-01' = { + name: '${resourceName}-es' + location: location + properties: { + baseSizeTiB: 1 + extendedCapacitySizeTiB: 0 + sku: { + name: 'Premium_LRS' + tier: 'Premium' + } + } +} + +resource volumeGroup 'Microsoft.ElasticSan/elasticSans/volumeGroups@2023-01-01' = { + parent: elasticSan + name: '${resourceName}-vg' + properties: { + encryption: 'EncryptionAtRestWithPlatformKey' + networkAcls: { + virtualNetworkRules: [] + } + protocolType: 'Iscsi' + } +} + +resource volume 'Microsoft.ElasticSan/elasticSans/volumeGroups/volumes@2023-01-01' = { + parent: volumeGroup + name: '${resourceName}-v' + properties: { + sizeGiB: 1 + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/domains/main.bicep b/settings/remarks/microsoft.eventgrid/samples/domains/main.bicep new file mode 100644 index 00000000..a9c9a9ec --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/domains/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource domain 'Microsoft.EventGrid/domains@2021-12-01' = { + name: resourceName + location: location + properties: { + autoCreateTopicWithFirstSubscription: true + autoDeleteTopicWithLastSubscription: true + disableLocalAuth: false + inputSchema: 'EventGridSchema' + inputSchemaMapping: null + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/domains/topics/main.bicep b/settings/remarks/microsoft.eventgrid/samples/domains/topics/main.bicep new file mode 100644 index 00000000..200dc074 --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/domains/topics/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource domain 'Microsoft.EventGrid/domains@2021-12-01' = { + name: resourceName + location: location + properties: { + autoCreateTopicWithFirstSubscription: true + autoDeleteTopicWithLastSubscription: true + disableLocalAuth: false + inputSchema: 'EventGridSchema' + inputSchemaMapping: null + publicNetworkAccess: 'Enabled' + } +} + +resource topic 'Microsoft.EventGrid/domains/topics@2021-12-01' = { + parent: domain + name: resourceName +} diff --git a/settings/remarks/microsoft.eventgrid/samples/eventsubscriptions/main.bicep b/settings/remarks/microsoft.eventgrid/samples/eventsubscriptions/main.bicep new file mode 100644 index 00000000..cb0ed3cd --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/eventsubscriptions/main.bicep @@ -0,0 +1,91 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource eventSubscription 'Microsoft.EventGrid/eventSubscriptions@2021-12-01' = { + scope: storageAccount + name: resourceName + properties: { + deadLetterDestination: null + destination: { + endpointType: 'EventHub' + properties: { + deliveryAttributeMappings: null + resourceId: eventhub.id + } + } + eventDeliverySchema: 'EventGridSchema' + filter: { + includedEventTypes: [ + 'Microsoft.Storage.BlobCreated' + 'Microsoft.Storage.BlobRenamed' + ] + } + labels: [] + retryPolicy: { + eventTimeToLiveInMinutes: 144 + maxDeliveryAttempts: 10 + } + } +} + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 1 + status: 'Active' + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/namespaces/main.bicep b/settings/remarks/microsoft.eventgrid/samples/namespaces/main.bicep new file mode 100644 index 00000000..cac8743f --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/namespaces/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource namespace 'Microsoft.EventGrid/namespaces@2023-12-15-preview' = { + name: '${resourceName}-ns' + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + capacity: 1 + name: 'Standard' + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/systemtopics/eventsubscriptions/main.bicep b/settings/remarks/microsoft.eventgrid/samples/systemtopics/eventsubscriptions/main.bicep new file mode 100644 index 00000000..41576cfc --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/systemtopics/eventsubscriptions/main.bicep @@ -0,0 +1,132 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +var storageAccountName = '${resourceName}sa01' +var queueName = '${resourceName}queue' +var eventSubscription1Name = '${resourceName}-es1' +var eventSubscription2Name = '${resourceName}-es2' +var systemTopicName = '${resourceName}-st' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: storageAccountName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource systemTopic 'Microsoft.EventGrid/systemTopics@2022-06-15' = { + name: systemTopicName + location: 'global' + properties: { + source: resourceGroup().id + topicType: 'Microsoft.Resources.ResourceGroups' + } +} + +resource eventSubscription 'Microsoft.EventGrid/systemTopics/eventSubscriptions@2022-06-15' = { + parent: systemTopic + name: eventSubscription1Name + properties: { + deadLetterDestination: null + destination: { + endpointType: 'StorageQueue' + properties: { + queueName: queueName + resourceId: storageAccount.id + } + } + eventDeliverySchema: 'EventGridSchema' + filter: { + advancedFilters: [ + { + key: 'subject' + operatorType: 'StringBeginsWith' + values: ['foo'] + } + ] + } + labels: [] + } + dependsOn: [ + queue + ] +} + +resource eventsubscription1 'Microsoft.EventGrid/systemTopics/eventSubscriptions@2022-06-15' = { + parent: systemTopic + name: eventSubscription2Name + properties: { + deadLetterDestination: null + destination: { + endpointType: 'StorageQueue' + properties: { + queueName: queueName + resourceId: storageAccount.id + } + } + eventDeliverySchema: 'EventGridSchema' + filter: { + advancedFilters: [ + { + key: 'subject' + operatorType: 'StringEndsWith' + values: ['bar'] + } + ] + } + labels: [] + } + dependsOn: [ + queue + ] +} + +// The queue service is a singleton named 'default' under the storage account +resource queueService 'Microsoft.Storage/storageAccounts/queueServices@2023-05-01' existing = { + parent: storageAccount + name: 'default' +} + +resource queue 'Microsoft.Storage/storageAccounts/queueServices/queues@2023-05-01' = { + parent: queueService + name: queueName + + dependsOn: [ + storageAccount + ] +} diff --git a/settings/remarks/microsoft.eventgrid/samples/systemtopics/main.bicep b/settings/remarks/microsoft.eventgrid/samples/systemtopics/main.bicep new file mode 100644 index 00000000..02267b1a --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/systemtopics/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' + +resource systemTopic 'Microsoft.EventGrid/systemTopics@2021-12-01' = { + name: resourceName + location: 'global' + properties: { + source: resourceGroup().id + topicType: 'Microsoft.Resources.ResourceGroups' + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/topics/main.bicep b/settings/remarks/microsoft.eventgrid/samples/topics/main.bicep new file mode 100644 index 00000000..7d52cb0d --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/topics/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource topic 'Microsoft.EventGrid/topics@2021-12-01' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + inputSchema: 'EventGridSchema' + inputSchemaMapping: null + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/clusters/main.bicep b/settings/remarks/microsoft.eventhub/samples/clusters/main.bicep new file mode 100644 index 00000000..0f1ada93 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/clusters/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.EventHub/clusters@2021-11-01' = { + name: resourceName + location: location + sku: { + capacity: 1 + name: 'Dedicated' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/authorizationrules/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/authorizationrules/main.bicep new file mode 100644 index 00000000..b2e9ba33 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/authorizationrules/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Basic' + tier: 'Basic' + } +} + +resource authorizationRule 'Microsoft.EventHub/namespaces/authorizationRules@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + rights: [ + 'Listen' + 'Send' + 'Manage' + ] + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/disasterrecoveryconfigs/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/disasterrecoveryconfigs/main.bicep new file mode 100644 index 00000000..e6831c27 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/disasterrecoveryconfigs/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource namespace2 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource disasterRecoveryConfig 'Microsoft.EventHub/namespaces/disasterRecoveryConfigs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + partnerNamespace: namespace2.id + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/authorizationrules/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/authorizationrules/main.bicep new file mode 100644 index 00000000..8101f1a7 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/authorizationrules/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Basic' + tier: 'Basic' + } +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} + +resource authorizationRule 'Microsoft.EventHub/namespaces/eventhubs/authorizationRules@2021-11-01' = { + parent: eventhub + name: resourceName + properties: { + rights: [ + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/consumergroups/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/consumergroups/main.bicep new file mode 100644 index 00000000..044a8065 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/consumergroups/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} + +resource consumerGroup 'Microsoft.EventHub/namespaces/eventhubs/consumerGroups@2021-11-01' = { + parent: eventhub + name: resourceName + properties: { + userMetadata: '' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/main.bicep new file mode 100644 index 00000000..423bc654 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/main.bicep new file mode 100644 index 00000000..e41aea1f --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/schemagroups/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/schemagroups/main.bicep new file mode 100644 index 00000000..b61787f7 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/schemagroups/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource schemaGroup 'Microsoft.EventHub/namespaces/schemaGroups@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + schemaCompatibility: 'Forward' + schemaType: 'Avro' + } +} diff --git a/settings/remarks/microsoft.fluidrelay/samples/fluidrelayservers/main.bicep b/settings/remarks/microsoft.fluidrelay/samples/fluidrelayservers/main.bicep new file mode 100644 index 00000000..06166752 --- /dev/null +++ b/settings/remarks/microsoft.fluidrelay/samples/fluidrelayservers/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource fluidRelayServer 'Microsoft.FluidRelay/fluidRelayServers@2022-05-26' = { + name: resourceName + location: location + properties: {} + tags: { + foo: 'bar' + } +} diff --git a/settings/remarks/microsoft.guestconfiguration/samples/guestconfigurationassignments/main.bicep b/settings/remarks/microsoft.guestconfiguration/samples/guestconfigurationassignments/main.bicep new file mode 100644 index 00000000..212e175b --- /dev/null +++ b/settings/remarks/microsoft.guestconfiguration/samples/guestconfigurationassignments/main.bicep @@ -0,0 +1,146 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource guestConfigurationAssignment 'Microsoft.GuestConfiguration/guestConfigurationAssignments@2020-06-25' = { + scope: virtualMachine + name: 'WhitelistedApplication' + location: location + properties: { + guestConfiguration: { + assignmentType: '' + configurationParameter: [ + { + name: '[InstalledApplication]bwhitelistedapp;Name' + value: 'NotePad,sql' + } + ] + contentHash: '' + contentUri: '' + name: 'WhitelistedApplication' + version: '1.*' + } + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctestvmdro23' + secrets: [] + windowsConfiguration: { + enableAutomaticUpdates: true + patchSettings: { + assessmentMode: 'ImageDefault' + enableHotpatching: false + patchMode: 'AutomaticByOS' + } + provisionVMAgent: true + winRM: { + listeners: [] + } + } + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'WindowsServer' + publisher: 'MicrosoftWindowsServer' + sku: '2016-Datacenter' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Windows' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.hdinsight/samples/clusters/main.bicep b/settings/remarks/microsoft.hdinsight/samples/clusters/main.bicep new file mode 100644 index 00000000..ce8260ec --- /dev/null +++ b/settings/remarks/microsoft.hdinsight/samples/clusters/main.bicep @@ -0,0 +1,142 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The username for the HDInsight cluster virtual machines') +param vmUsername string +@secure() +@description('The password for the HDInsight cluster virtual machines') +param vmPassword string +@secure() +@description('The REST API credential password for the HDInsight cluster gateway') +param restCredentialPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource cluster 'Microsoft.HDInsight/clusters@2018-06-01-preview' = { + name: resourceName + location: location + properties: { + clusterDefinition: { + componentVersion: { + Spark: '2.4' + } + configurations: { + gateway: { + 'restAuthCredential.isEnabled': true + 'restAuthCredential.password': restCredentialPassword + 'restAuthCredential.username': 'acctestusrgw' + } + } + kind: 'Spark' + } + clusterVersion: '4.0.3000.1' + computeProfile: { + roles: [ + { + hardwareProfile: { + vmSize: 'standard_a4_v2' + } + name: 'headnode' + osProfile: { + linuxOperatingSystemProfile: { + password: vmPassword + username: vmUsername + } + } + targetInstanceCount: 2 + } + { + hardwareProfile: { + vmSize: 'standard_a4_v2' + } + name: 'workernode' + osProfile: { + linuxOperatingSystemProfile: { + password: vmPassword + username: vmUsername + } + } + targetInstanceCount: 3 + } + { + hardwareProfile: { + vmSize: 'standard_a2_v2' + } + name: 'zookeepernode' + osProfile: { + linuxOperatingSystemProfile: { + password: vmPassword + username: vmUsername + } + } + targetInstanceCount: 3 + } + ] + } + encryptionInTransitProperties: { + isEncryptionInTransitEnabled: false + } + minSupportedTlsVersion: '1.2' + osType: 'Linux' + storageProfile: { + storageaccounts: [ + { + container: container.name + isDefault: true + key: storageAccount.listKeys().keys[0].value + name: '${storageAccount.name}.blob.core.windows.net' + resourceId: storageAccount.id + } + ] + } + tier: 'standard' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.healthbot/samples/healthbots/main.bicep b/settings/remarks/microsoft.healthbot/samples/healthbots/main.bicep new file mode 100644 index 00000000..6a54a915 --- /dev/null +++ b/settings/remarks/microsoft.healthbot/samples/healthbots/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource healthBot 'Microsoft.HealthBot/healthBots@2022-08-08' = { + name: resourceName + location: location + sku: { + name: 'F0' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/services/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/services/main.bicep new file mode 100644 index 00000000..47827fb8 --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/services/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westus2' + +resource service 'Microsoft.HealthcareApis/services@2022-12-01' = { + name: resourceName + location: location + kind: 'fhir' + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + } + ] + authenticationConfiguration: {} + corsConfiguration: {} + cosmosDbConfiguration: { + offerThroughput: 1000 + } + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/dicomservices/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/dicomservices/main.bicep new file mode 100644 index 00000000..1be52aff --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/dicomservices/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} + +resource dicomService 'Microsoft.HealthcareApis/workspaces/dicomServices@2022-12-01' = { + parent: workspace + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/fhirservices/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/fhirservices/main.bicep new file mode 100644 index 00000000..3fb569c6 --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/fhirservices/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} + +resource fhirService 'Microsoft.HealthcareApis/workspaces/fhirServices@2022-12-01' = { + parent: workspace + name: resourceName + location: location + kind: 'fhir-R4' + properties: { + acrConfiguration: {} + authenticationConfiguration: { + audience: 'https://acctestfhir.fhir.azurehealthcareapis.com' + authority: 'https://login.microsoftonline.com/deployer().tenantId' + smartProxyEnabled: false + } + corsConfiguration: { + allowCredentials: false + headers: [] + methods: [] + origins: [] + } + } +} + +resource fhirService2 'Microsoft.HealthcareApis/workspaces/fhirServices@2022-12-01' = { + parent: workspace + name: resourceName + location: location + kind: 'fhir-R4' + properties: { + acrConfiguration: {} + authenticationConfiguration: { + audience: fhirService.properties.authenticationConfiguration.audience + authority: fhirService.properties.authenticationConfiguration.authority + smartProxyEnabled: false + } + corsConfiguration: { + allowCredentials: false + headers: [] + methods: [] + origins: [] + } + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/fhirdestinations/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/fhirdestinations/main.bicep new file mode 100644 index 00000000..f2bcb8fc --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/fhirdestinations/main.bicep @@ -0,0 +1,97 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} + +resource fhirService 'Microsoft.HealthcareApis/workspaces/fhirServices@2022-12-01' = { + parent: workspace + name: resourceName + location: location + kind: 'fhir-R4' + properties: { + acrConfiguration: {} + authenticationConfiguration: { + audience: 'https://acctestfhir.fhir.azurehealthcareapis.com' + authority: 'https://login.microsoftonline.com/deployer().tenantId' + smartProxyEnabled: false + } + corsConfiguration: { + allowCredentials: false + headers: [] + methods: [] + origins: [] + } + } +} + +resource iotConnector 'Microsoft.HealthcareApis/workspaces/iotConnectors@2022-12-01' = { + parent: workspace + name: resourceName + location: location + properties: { + deviceMapping: { + content: { + template: [] + templateType: 'CollectionContent' + } + } + ingestionEndpointConfiguration: { + consumerGroup: consumerGroup.id + eventHubName: eventhub.name + fullyQualifiedEventHubNamespace: '${namespace.name}.servicebus.windows.net' + } + } +} + +resource consumerGroup 'Microsoft.EventHub/namespaces/eventhubs/consumerGroups@2021-11-01' = { + parent: eventhub + name: resourceName + properties: { + userMetadata: '' + } +} + +resource fhirDestination 'Microsoft.HealthcareApis/workspaces/iotConnectors/fhirDestinations@2022-12-01' = { + parent: iotConnector + name: resourceName + location: location + properties: { + fhirMapping: { + content: { + template: [] + templateType: 'CollectionFhirTemplate' + } + } + fhirServiceResourceId: fhirService.id + resourceIdentityResolutionType: 'Create' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/main.bicep new file mode 100644 index 00000000..eefb1927 --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} + +resource iotConnector 'Microsoft.HealthcareApis/workspaces/iotConnectors@2022-12-01' = { + parent: workspace + name: resourceName + location: location + properties: { + deviceMapping: { + content: { + template: [] + templateType: 'CollectionContent' + } + } + ingestionEndpointConfiguration: { + consumerGroup: consumerGroup.id + eventHubName: eventhub.name + fullyQualifiedEventHubNamespace: '${namespace.name}.servicebus.windows.net' + } + } +} + +resource consumerGroup 'Microsoft.EventHub/namespaces/eventhubs/consumerGroups@2021-11-01' = { + parent: eventhub + name: resourceName + properties: { + userMetadata: '' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/main.bicep new file mode 100644 index 00000000..3facef31 --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.hybridcompute/samples/machines/main.bicep b/settings/remarks/microsoft.hybridcompute/samples/machines/main.bicep new file mode 100644 index 00000000..3ddd517f --- /dev/null +++ b/settings/remarks/microsoft.hybridcompute/samples/machines/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource machine 'Microsoft.HybridCompute/machines@2024-07-10' = { + name: '${resourceName}hcm' + location: location + kind: 'SCVMM' +} diff --git a/settings/remarks/microsoft.hybridcompute/samples/privatelinkscopes/main.bicep b/settings/remarks/microsoft.hybridcompute/samples/privatelinkscopes/main.bicep new file mode 100644 index 00000000..cad6864a --- /dev/null +++ b/settings/remarks/microsoft.hybridcompute/samples/privatelinkscopes/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource privateLinkScope 'Microsoft.HybridCompute/privateLinkScopes@2022-11-10' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.impact/samples/connectors/main.bicep b/settings/remarks/microsoft.impact/samples/connectors/main.bicep new file mode 100644 index 00000000..39b2c82d --- /dev/null +++ b/settings/remarks/microsoft.impact/samples/connectors/main.bicep @@ -0,0 +1,10 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource connector 'Microsoft.Impact/connectors@2024-05-01-preview' = { + name: resourceName + properties: { + connectorType: 'AzureMonitor' + } +} diff --git a/settings/remarks/microsoft.insights/samples/actiongroups/main.bicep b/settings/remarks/microsoft.insights/samples/actiongroups/main.bicep new file mode 100644 index 00000000..a50473f2 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/actiongroups/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' + +resource actionGroup 'Microsoft.Insights/actionGroups@2023-01-01' = { + name: resourceName + location: 'global' + properties: { + armRoleReceivers: [] + automationRunbookReceivers: [] + azureAppPushReceivers: [] + azureFunctionReceivers: [] + emailReceivers: [] + enabled: true + eventHubReceivers: [] + groupShortName: 'acctestag' + itsmReceivers: [] + logicAppReceivers: [] + smsReceivers: [] + voiceReceivers: [] + webhookReceivers: [] + } +} diff --git a/settings/remarks/microsoft.insights/samples/activitylogalerts/main.bicep b/settings/remarks/microsoft.insights/samples/activitylogalerts/main.bicep new file mode 100644 index 00000000..fe95dfcf --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/activitylogalerts/main.bicep @@ -0,0 +1,150 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource actionGroup 'Microsoft.Insights/actionGroups@2023-01-01' = { + name: resourceName + location: 'global' + properties: { + armRoleReceivers: [] + automationRunbookReceivers: [] + azureAppPushReceivers: [] + azureFunctionReceivers: [] + emailReceivers: [] + enabled: true + eventHubReceivers: [] + groupShortName: 'acctestag1' + itsmReceivers: [] + logicAppReceivers: [] + smsReceivers: [] + voiceReceivers: [] + webhookReceivers: [] + } +} + +resource actionGroup2 'Microsoft.Insights/actionGroups@2023-01-01' = { + name: resourceName + location: 'global' + properties: { + armRoleReceivers: [] + automationRunbookReceivers: [] + azureAppPushReceivers: [] + azureFunctionReceivers: [] + emailReceivers: [] + enabled: true + eventHubReceivers: [] + groupShortName: 'acctestag2' + itsmReceivers: [] + logicAppReceivers: [] + smsReceivers: [] + voiceReceivers: [] + webhookReceivers: [] + } +} + +resource activityLogAlert 'Microsoft.Insights/activityLogAlerts@2020-10-01' = { + name: resourceName + location: 'global' + properties: { + actions: { + actionGroups: [ + { + actionGroupId: actionGroup.id + webhookProperties: {} + } + { + actionGroupId: actionGroup2.id + webhookProperties: { + from: 'terraform test' + to: 'microsoft azure' + } + } + ] + } + condition: { + allOf: [ + { + equals: 'ResourceHealth' + field: 'category' + } + { + anyOf: [ + { + equals: 'Unavailable' + field: 'properties.currentHealthStatus' + } + { + equals: 'Degraded' + field: 'properties.currentHealthStatus' + } + ] + } + { + anyOf: [ + { + equals: 'Unknown' + field: 'properties.previousHealthStatus' + } + { + equals: 'Available' + field: 'properties.previousHealthStatus' + } + ] + } + { + anyOf: [ + { + equals: 'PlatformInitiated' + field: 'properties.cause' + } + { + equals: 'UserInitiated' + field: 'properties.cause' + } + ] + } + ] + } + description: 'This is just a test acceptance.' + enabled: true + scopes: [ + resourceGroup().id + storageAccount.id + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.insights/samples/autoscalesettings/main.bicep b/settings/remarks/microsoft.insights/samples/autoscalesettings/main.bicep new file mode 100644 index 00000000..a1ef6631 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/autoscalesettings/main.bicep @@ -0,0 +1,184 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the virtual machine scale set') +param adminUsername string +@secure() +@description('The administrator password for the virtual machine scale set') +param adminPassword string + +resource autoScaleSetting 'Microsoft.Insights/autoScaleSettings@2022-10-01' = { + name: resourceName + location: location + properties: { + enabled: true + notifications: [] + profiles: [ + { + capacity: { + default: '1' + maximum: '10' + minimum: '1' + } + name: 'metricRules' + rules: [ + { + metricTrigger: { + dimensions: [] + dividePerInstance: true + metricName: 'Percentage CPU' + metricNamespace: '' + metricResourceUri: virtualMachineScaleSet.id + operator: 'GreaterThan' + statistic: 'Average' + threshold: 75 + timeAggregation: 'Last' + timeGrain: 'PT1M' + timeWindow: 'PT5M' + } + scaleAction: { + cooldown: 'PT1M' + direction: 'Increase' + type: 'ChangeCount' + value: '1' + } + } + ] + } + ] + targetResourceUri: virtualMachineScaleSet.id + } +} + +resource virtualMachineScaleSet 'Microsoft.Compute/virtualMachineScaleSets@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + doNotRunExtensionsOnOverprovisionedVMs: false + orchestrationMode: 'Uniform' + overprovision: true + scaleInPolicy: { + forceDeletion: false + rules: [ + 'Default' + ] + } + singlePlacementGroup: true + upgradePolicy: { + mode: 'Manual' + } + virtualMachineProfile: { + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionProfile: { + extensionsTimeBudget: 'PT1H30M' + } + networkProfile: { + networkInterfaceConfigurations: [ + { + name: 'TestNetworkProfile-230630033559396108' + properties: { + dnsSettings: { + dnsServers: [] + } + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'TestIPConfiguration' + properties: { + applicationGatewayBackendAddressPools: [] + applicationSecurityGroups: [] + loadBalancerBackendAddressPools: [] + loadBalancerInboundNatPools: [] + primary: true + privateIPAddressVersion: 'IPv4' + subnet: { + id: subnet.id + } + } + } + ] + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: null + computerNamePrefix: 'testvm-230630033559396108' + linuxConfiguration: { + disablePasswordAuthentication: false + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDCsTcryUl51Q2VSEHqDRNmceUFo55ZtcIwxl2QITbN1RREti5ml/VTytC0yeBOvnZA4x4CFpdw/lCDPk0yrH9Ei5vVkXmOrExdTlT3qI7YaAzj1tUVlBd4S6LX1F7y6VLActvdHuDDuXZXzCDd/97420jrDfWZqJMlUK/EmCE5ParCeHIRIvmBxcEnGfFIsw8xQZl0HphxWOtJil8qsUWSdMyCiJYYQpMoMliO99X40AUc4/AlsyPyT5ddbKk08YrZ+rKDVHF7o29rh4vi5MmHkVgVQHKiKybWlHq+b71gIAUQk9wrJxD+dqt4igrmDSpIjfjwnd+l5UIn5fJSO5DYV4YT/4hwK7OKmuo7OFHD0WyY5YnkYEMtFgzemnRBdE8ulcT60DQpVgRMXFWHvhyCWy0L6sgj1QWDZlLpvsIvNfHsyhKFMG1frLnMt/nP0+YCcfg+v1JYeCKjeoJxB8DWcRBsjzItY0CGmzP8UYZiYKl/2u+2TgFS5r7NWH11bxoUzjKdaa1NLw+ieA8GlBFfCbfWe6YVB9ggUte4VtYFMZGxOjS2bAiYtfgTKFJv+XqORAwExG6+G2eDxIDyo80/OA9IG7Xv/jwQr7D6KDjDuULFcN/iTxuttoKrHeYz1hf5ZQlBdllwJHYx6fK2g8kha6r2JIQKocvsAXiiONqSfw== hello@world.com' + path: '/home/myadmin/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'StandardSSD_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } + } + sku: { + capacity: 2 + name: 'Standard_F2' + tier: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.insights/samples/components/analyticsitems/main.bicep b/settings/remarks/microsoft.insights/samples/components/analyticsitems/main.bicep new file mode 100644 index 00000000..c22f4fd2 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/components/analyticsitems/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource analyticsItem 'microsoft.insights/components/analyticsItems@2015-05-01' = { + parent: component + name: 'item' + Content: 'requests #test' + Name: 'testquery' + Scope: 'shared' + Type: 'query' +} diff --git a/settings/remarks/microsoft.insights/samples/components/main.bicep b/settings/remarks/microsoft.insights/samples/components/main.bicep new file mode 100644 index 00000000..e36d6913 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/components/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.insights/samples/datacollectionendpoints/main.bicep b/settings/remarks/microsoft.insights/samples/datacollectionendpoints/main.bicep new file mode 100644 index 00000000..3f0bf9f1 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/datacollectionendpoints/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dataCollectionEndpoint 'Microsoft.Insights/dataCollectionEndpoints@2022-06-01' = { + name: resourceName + location: location + properties: { + description: '' + networkAcls: { + publicNetworkAccess: 'Enabled' + } + } +} diff --git a/settings/remarks/microsoft.insights/samples/datacollectionruleassociations/main.bicep b/settings/remarks/microsoft.insights/samples/datacollectionruleassociations/main.bicep new file mode 100644 index 00000000..72d5147a --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/datacollectionruleassociations/main.bicep @@ -0,0 +1,156 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource dataCollectionRule 'Microsoft.Insights/dataCollectionRules@2022-06-01' = { + name: resourceName + location: location + properties: { + dataFlows: [ + { + destinations: [ + 'test-destination-metrics' + ] + streams: [ + 'Microsoft-InsightsMetrics' + ] + } + ] + description: '' + destinations: { + azureMonitorMetrics: { + name: 'test-destination-metrics' + } + } + } +} + +resource dataCollectionRuleAssociation 'Microsoft.Insights/dataCollectionRuleAssociations@2022-06-01' = { + scope: virtualMachine + name: resourceName + properties: { + dataCollectionRuleId: dataCollectionRule.id + description: '' + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: 'nic-230630033559397415' + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: 'machine-230630033559397415' + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_B1ls' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'machine-230630033559397415' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: 'network-230630033559397415' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'subnet-230630033559397415' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.insights/samples/datacollectionrules/main.bicep b/settings/remarks/microsoft.insights/samples/datacollectionrules/main.bicep new file mode 100644 index 00000000..30fee3fa --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/datacollectionrules/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dataCollectionRule 'Microsoft.Insights/dataCollectionRules@2022-06-01' = { + name: resourceName + location: location + properties: { + dataFlows: [ + { + destinations: [ + 'test-destination-metrics' + ] + streams: [ + 'Microsoft-InsightsMetrics' + ] + } + ] + description: '' + destinations: { + azureMonitorMetrics: { + name: 'test-destination-metrics' + } + } + } +} diff --git a/settings/remarks/microsoft.insights/samples/diagnosticsettings/main.bicep b/settings/remarks/microsoft.insights/samples/diagnosticsettings/main.bicep new file mode 100644 index 00000000..0b673c3a --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/diagnosticsettings/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource diagnosticSetting 'Microsoft.Insights/diagnosticSettings@2021-05-01-preview' = { + scope: vault + name: resourceName + properties: { + eventHubAuthorizationRuleId: authorizationRule.id + eventHubName: namespace.name + logs: [ + { + categoryGroup: 'Audit' + enabled: true + retentionPolicy: { + days: 0 + enabled: false + } + } + ] + metrics: [ + { + category: 'AllMetrics' + enabled: true + retentionPolicy: { + days: 0 + enabled: false + } + } + ] + } +} + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Basic' + tier: 'Basic' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource authorizationRule 'Microsoft.EventHub/namespaces/authorizationRules@2021-11-01' = { + parent: namespace + name: 'example' + properties: { + rights: [ + 'Listen' + 'Send' + 'Manage' + ] + } +} diff --git a/settings/remarks/microsoft.insights/samples/metricalerts/main.bicep b/settings/remarks/microsoft.insights/samples/metricalerts/main.bicep new file mode 100644 index 00000000..f09c6e22 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/metricalerts/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource metricAlert 'Microsoft.Insights/metricAlerts@2018-03-01' = { + name: resourceName + location: 'global' + properties: { + actions: [] + autoMitigate: true + criteria: { + allOf: [ + { + criterionType: 'StaticThresholdCriterion' + dimensions: [] + metricName: 'UsedCapacity' + metricNamespace: 'Microsoft.Storage/storageAccounts' + name: 'Metric1' + operator: 'GreaterThan' + skipMetricValidation: false + threshold: any('55.5') + timeAggregation: 'Average' + } + ] + 'odata.type': 'Microsoft.Azure.Monitor.MultipleResourceMultipleMetricCriteria' + } + description: '' + enabled: true + evaluationFrequency: 'PT1M' + scopes: [ + storageAccount.id + ] + severity: 3 + targetResourceRegion: '' + targetResourceType: '' + windowSize: 'PT1H' + } + tags: { + CUSTOMER: 'CUSTOMERx' + Example: 'Example123' + terraform: 'Coolllll' + test: '123' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.insights/samples/privatelinkscopes/main.bicep b/settings/remarks/microsoft.insights/samples/privatelinkscopes/main.bicep new file mode 100644 index 00000000..59efc1be --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/privatelinkscopes/main.bicep @@ -0,0 +1,6 @@ +param resourceName string = 'acctest0001' + +resource privateLinkScope 'Microsoft.Insights/privateLinkScopes@2019-10-17-preview' = { + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.insights/samples/privatelinkscopes/scopedresources/main.bicep b/settings/remarks/microsoft.insights/samples/privatelinkscopes/scopedresources/main.bicep new file mode 100644 index 00000000..05a33bb3 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/privatelinkscopes/scopedresources/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource privateLinkScope 'Microsoft.Insights/privateLinkScopes@2019-10-17-preview' = { + name: resourceName + properties: {} +} + +resource scopedResource 'Microsoft.Insights/privateLinkScopes/scopedResources@2019-10-17-preview' = { + parent: privateLinkScope + name: resourceName + properties: { + linkedResourceId: component.id + } +} diff --git a/settings/remarks/microsoft.insights/samples/scheduledqueryrules/main.bicep b/settings/remarks/microsoft.insights/samples/scheduledqueryrules/main.bicep new file mode 100644 index 00000000..fae18770 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/scheduledqueryrules/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource scheduledQueryRule 'Microsoft.Insights/scheduledQueryRules@2021-08-01' = { + name: resourceName + location: location + kind: 'LogAlert' + properties: { + autoMitigate: false + checkWorkspaceAlertsStorageConfigured: false + criteria: { + allOf: [ + { + dimensions: null + operator: 'Equal' + query: ''' requests +| summarize CountByCountry=count() by client_CountryOrRegion +''' + threshold: 5 + timeAggregation: 'Count' + } + ] + } + enabled: true + evaluationFrequency: 'PT5M' + scopes: [ + component.id + ] + severity: 3 + skipQueryValidation: false + targetResourceTypes: null + windowSize: 'PT5M' + } +} diff --git a/settings/remarks/microsoft.insights/samples/webtests/main.bicep b/settings/remarks/microsoft.insights/samples/webtests/main.bicep new file mode 100644 index 00000000..072fc674 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/webtests/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource webTest 'Microsoft.Insights/webTests@2022-06-15' = { + name: resourceName + location: location + kind: 'standard' + properties: { + Description: '' + Enabled: false + Frequency: 300 + Kind: 'standard' + Locations: [ + { + Id: 'us-tx-sn1-azr' + } + ] + Name: 'acctest0001' + Request: { + FollowRedirects: false + Headers: [ + { + key: 'x-header' + value: 'testheader' + } + { + key: 'x-header-2' + value: 'testheader2' + } + ] + HttpVerb: 'GET' + ParseDependentRequests: false + RequestUrl: 'http://microsoft.com' + } + RetryEnabled: false + SyntheticMonitorId: 'acctest0001' + Timeout: 30 + ValidationRules: { + ExpectedHttpStatusCode: 200 + SSLCheck: false + } + } + tags: { + 'hidden-link:azapi_resource.component.id': 'Resource' + } +} diff --git a/settings/remarks/microsoft.insights/samples/workbooks/main.bicep b/settings/remarks/microsoft.insights/samples/workbooks/main.bicep new file mode 100644 index 00000000..50f54680 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/workbooks/main.bicep @@ -0,0 +1,13 @@ +param location string = 'westeurope' + +resource workbook 'Microsoft.Insights/workbooks@2022-04-01' = { + name: 'be1ad266-d329-4454-b693-8287e4d3b35d' + location: location + kind: 'shared' + properties: { + category: 'workbook' + displayName: 'acctest-amw-230630032616547405' + serializedData: '{"fallbackResourceIds":["Azure Monitor"],"isLocked":false,"items":[{"content":{"json":"Test2022"},"name":"text - 0","type":1}],"version":"Notebook/1.0"}' + sourceId: 'azure monitor' + } +} diff --git a/settings/remarks/microsoft.insights/samples/workbooktemplates/main.bicep b/settings/remarks/microsoft.insights/samples/workbooktemplates/main.bicep new file mode 100644 index 00000000..5538419d --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/workbooktemplates/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workbookTemplate 'Microsoft.Insights/workbookTemplates@2020-11-20' = { + name: resourceName + location: location + properties: { + galleries: [ + { + category: 'workbook' + name: 'test' + order: 0 + resourceType: 'Azure Monitor' + type: 'workbook' + } + ] + priority: 0 + templateData: { + '$schema': 'https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json' + items: [ + { + content: { + json: '''## New workbook +--- + +Welcome to your new workbook.''' + } + name: 'text - 2' + type: 1 + } + ] + styleSettings: {} + version: 'Notebook/1.0' + } + } +} diff --git a/settings/remarks/microsoft.iotcentral/samples/iotapps/main.bicep b/settings/remarks/microsoft.iotcentral/samples/iotapps/main.bicep new file mode 100644 index 00000000..464310e5 --- /dev/null +++ b/settings/remarks/microsoft.iotcentral/samples/iotapps/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iotApp 'Microsoft.IoTCentral/iotApps@2021-11-01-preview' = { + name: resourceName + location: location + properties: { + displayName: 'acctest0001' + publicNetworkAccess: 'Enabled' + subdomain: 'subdomain-2306300333537' + template: 'iotc-pnp-preview@1.0.0' + } + sku: { + name: 'ST1' + } +} diff --git a/settings/remarks/microsoft.keyvault/samples/managedhsms/main.bicep b/settings/remarks/microsoft.keyvault/samples/managedhsms/main.bicep new file mode 100644 index 00000000..bed18d28 --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/managedhsms/main.bicep @@ -0,0 +1,21 @@ +param location string = 'westeurope' + +resource managedHSM 'Microsoft.KeyVault/managedHSMs@2021-10-01' = { + name: 'kvHsm230630033342437496' + location: location + properties: { + createMode: 'default' + enablePurgeProtection: false + enableSoftDelete: true + initialAdminObjectIds: [ + deployer().objectId + ] + publicNetworkAccess: 'Enabled' + softDeleteRetentionInDays: 90 + tenantId: deployer().tenantId + } + sku: { + family: 'B' + name: 'Standard_B1' + } +} diff --git a/settings/remarks/microsoft.keyvault/samples/vaults/accesspolicies/main.bicep b/settings/remarks/microsoft.keyvault/samples/vaults/accesspolicies/main.bicep new file mode 100644 index 00000000..439d976c --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/vaults/accesspolicies/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + enableSoftDelete: true + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource putAccesspolicy 'Microsoft.KeyVault/vaults/accessPolicies@2023-02-01' = { + parent: vault + name: 'add' + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Create' + ] + secrets: [ + 'Set' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + } +} diff --git a/settings/remarks/microsoft.keyvault/samples/vaults/keys/main.bicep b/settings/remarks/microsoft.keyvault/samples/vaults/keys/main.bicep new file mode 100644 index 00000000..01dbf532 --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/vaults/keys/main.bicep @@ -0,0 +1,74 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + enablePurgeProtection: true + enableSoftDelete: true + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource putAccesspolicy 'Microsoft.KeyVault/vaults/accessPolicies@2023-02-01' = { + parent: vault + name: 'add' + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Get' + 'Create' + 'Delete' + 'List' + 'Restore' + 'Recover' + 'UnwrapKey' + 'WrapKey' + 'Purge' + 'Encrypt' + 'Decrypt' + 'Sign' + 'Verify' + ] + secrets: [ + 'Get' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + } +} + +resource putKey 'Microsoft.KeyVault/vaults/keys@2023-02-01' = { + parent: vault + name: resourceName + properties: { + keyOps: [ + 'encrypt' + 'decrypt' + 'sign' + 'verify' + 'wrapKey' + 'unwrapKey' + ] + keySize: 2048 + kty: 'RSA' + } + dependsOn: [ + putAccesspolicy + ] +} diff --git a/settings/remarks/microsoft.keyvault/samples/vaults/main.bicep b/settings/remarks/microsoft.keyvault/samples/vaults/main.bicep new file mode 100644 index 00000000..dbd1ed80 --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/vaults/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Create' + ] + secrets: [ + 'Set' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.keyvault/samples/vaults/secrets/main.bicep b/settings/remarks/microsoft.keyvault/samples/vaults/secrets/main.bicep new file mode 100644 index 00000000..a761e6f5 --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/vaults/secrets/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + enableSoftDelete: true + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource putSecret 'Microsoft.KeyVault/vaults/secrets@2023-02-01' = { + parent: vault + name: resourceName + properties: { + value: 'szechuan' + } +} diff --git a/settings/remarks/microsoft.kubernetes/samples/connectedclusters/main.bicep b/settings/remarks/microsoft.kubernetes/samples/connectedclusters/main.bicep new file mode 100644 index 00000000..c92ee190 --- /dev/null +++ b/settings/remarks/microsoft.kubernetes/samples/connectedclusters/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource connectedCluster 'Microsoft.Kubernetes/connectedClusters@2024-01-01' = { + name: '${resourceName}-cc' + location: location + kind: 'ProvisionedCluster' + properties: { + agentPublicKeyCertificate: '' + arcAgentProfile: { + agentAutoUpgrade: 'Enabled' + } + } +} diff --git a/settings/remarks/microsoft.kubernetesconfiguration/samples/extensions/main.bicep b/settings/remarks/microsoft.kubernetesconfiguration/samples/extensions/main.bicep new file mode 100644 index 00000000..f3c96a80 --- /dev/null +++ b/settings/remarks/microsoft.kubernetesconfiguration/samples/extensions/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource extension 'Microsoft.KubernetesConfiguration/extensions@2022-11-01' = { + scope: managedCluster + name: resourceName + properties: { + autoUpgradeMinorVersion: true + extensionType: 'microsoft.flux' + } +} + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2023-04-02-preview' = { + name: resourceName + location: location + properties: { + agentPoolProfiles: [ + { + count: 1 + mode: 'System' + name: 'default' + vmSize: 'Standard_DS2_v2' + } + ] + dnsPrefix: 'acctest0001' + } +} diff --git a/settings/remarks/microsoft.kubernetesconfiguration/samples/fluxconfigurations/main.bicep b/settings/remarks/microsoft.kubernetesconfiguration/samples/fluxconfigurations/main.bicep new file mode 100644 index 00000000..342721d7 --- /dev/null +++ b/settings/remarks/microsoft.kubernetesconfiguration/samples/fluxconfigurations/main.bicep @@ -0,0 +1,70 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource extension 'Microsoft.KubernetesConfiguration/extensions@2022-11-01' = { + scope: managedCluster + name: resourceName + properties: { + autoUpgradeMinorVersion: true + extensionType: 'microsoft.flux' + } +} + +resource fluxConfiguration 'Microsoft.KubernetesConfiguration/fluxConfigurations@2022-03-01' = { + scope: managedCluster + name: resourceName + properties: { + gitRepository: { + repositoryRef: { + branch: 'branch' + } + syncIntervalInSeconds: 120 + timeoutInSeconds: 120 + url: 'https://github.com/Azure/arc-k8s-demo' + } + kustomizations: { + applications: { + dependsOn: [ + 'shared' + ] + force: false + path: 'cluster-config/applications' + prune: false + retryIntervalInSeconds: 60 + syncIntervalInSeconds: 60 + timeoutInSeconds: 600 + } + shared: { + force: false + path: 'cluster-config/shared' + prune: false + retryIntervalInSeconds: 60 + syncIntervalInSeconds: 60 + timeoutInSeconds: 600 + } + } + namespace: 'flux-system' + scope: 'cluster' + sourceKind: 'GitRepository' + suspend: false + } + dependsOn: [ + extension + ] +} + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2023-04-02-preview' = { + name: resourceName + location: location + properties: { + agentPoolProfiles: [ + { + count: 1 + mode: 'System' + name: 'default' + vmSize: 'Standard_DS2_v2' + } + ] + dnsPrefix: 'acctest0001' + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/databases/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/databases/main.bicep new file mode 100644 index 00000000..e7f447c8 --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/databases/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource database 'Microsoft.Kusto/clusters/databases@2023-05-02' = { + parent: cluster + name: resourceName + location: location + kind: 'ReadWrite' + properties: {} +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/databases/principalassignments/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/databases/principalassignments/main.bicep new file mode 100644 index 00000000..fd2d641b --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/databases/principalassignments/main.bicep @@ -0,0 +1,43 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource database 'Microsoft.Kusto/clusters/databases@2023-05-02' = { + parent: cluster + name: resourceName + location: location + kind: 'ReadWrite' + properties: {} +} + +resource principalAssignment 'Microsoft.Kusto/clusters/databases/principalAssignments@2023-05-02' = { + parent: database + name: resourceName + properties: { + principalId: deployer().objectId + principalType: 'App' + role: 'Viewer' + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/databases/scripts/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/databases/scripts/main.bicep new file mode 100644 index 00000000..de6d36b8 --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/databases/scripts/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource database 'Microsoft.Kusto/clusters/databases@2023-05-02' = { + parent: cluster + name: resourceName + location: location + kind: 'ReadWrite' + properties: {} +} + +resource script 'Microsoft.Kusto/clusters/databases/scripts@2023-05-02' = { + parent: database + name: 'create-table-script' + properties: { + continueOnErrors: false + forceUpdateTag: '9e2e7874-aa37-7041-81b7-06397f03a37d' + scriptContent: '''.create table TestTable(Id:string, Name:string, _ts:long, _timestamp:datetime) +.create table TestTable ingestion json mapping "TestMapping" +''['' +'' {"column":"Id","path":"$.id"},'' +'' {"column":"Name","path":"$.name"},'' +'' {"column":"_ts","path":"$._ts"},'' +'' {"column":"_timestamp","path":"$._ts", "transform":"DateTimeFromUnixSeconds"}'' +'']'' +.alter table TestTable policy ingestionbatching "{''MaximumBatchingTimeSpan'': ''0:0:10'', ''MaximumNumberOfItems'': 10000}" +''' + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/main.bicep new file mode 100644 index 00000000..1a464e0e --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/managedprivateendpoints/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/managedprivateendpoints/main.bicep new file mode 100644 index 00000000..d595fe4c --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/managedprivateendpoints/main.bicep @@ -0,0 +1,69 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource managedPrivateEndpoint 'Microsoft.Kusto/clusters/managedPrivateEndpoints@2023-05-02' = { + parent: cluster + name: resourceName + properties: { + groupId: 'blob' + privateLinkResourceId: storageAccount.id + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/principalassignments/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/principalassignments/main.bicep new file mode 100644 index 00000000..bfe0741d --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/principalassignments/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource principalAssignment 'Microsoft.Kusto/clusters/principalAssignments@2023-05-02' = { + parent: cluster + name: resourceName + properties: { + principalId: deployer().objectId + principalType: 'App' + role: 'AllDatabasesViewer' + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.labservices/samples/labplans/main.bicep b/settings/remarks/microsoft.labservices/samples/labplans/main.bicep new file mode 100644 index 00000000..8b9e5b62 --- /dev/null +++ b/settings/remarks/microsoft.labservices/samples/labplans/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource labPlan 'Microsoft.LabServices/labPlans@2022-08-01' = { + name: resourceName + location: location + properties: { + allowedRegions: [ + 'westeurope' + ] + } +} diff --git a/settings/remarks/microsoft.labservices/samples/labs/main.bicep b/settings/remarks/microsoft.labservices/samples/labs/main.bicep new file mode 100644 index 00000000..16a69b18 --- /dev/null +++ b/settings/remarks/microsoft.labservices/samples/labs/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the lab virtual machine') +param adminPassword string + +resource lab 'Microsoft.LabServices/labs@2022-08-01' = { + name: resourceName + location: location + properties: { + autoShutdownProfile: { + shutdownOnDisconnect: 'Disabled' + shutdownOnIdle: 'None' + shutdownWhenNotConnected: 'Disabled' + } + connectionProfile: { + clientRdpAccess: 'None' + clientSshAccess: 'None' + webRdpAccess: 'None' + webSshAccess: 'None' + } + securityProfile: { + openAccess: 'Disabled' + } + title: 'Test Title' + virtualMachineProfile: { + additionalCapabilities: { + installGpuDrivers: 'Disabled' + } + adminUser: { + password: null + username: 'testadmin' + } + createOption: 'Image' + imageReference: { + offer: '0001-com-ubuntu-server-focal' + publisher: 'canonical' + sku: '20_04-lts' + version: 'latest' + } + sku: { + capacity: 1 + name: 'Classic_Fsv2_2_4GB_128_S_SSD' + } + usageQuota: 'PT0S' + useSharedPassword: 'Disabled' + } + } +} diff --git a/settings/remarks/microsoft.labservices/samples/labs/schedules/main.bicep b/settings/remarks/microsoft.labservices/samples/labs/schedules/main.bicep new file mode 100644 index 00000000..2794d8e2 --- /dev/null +++ b/settings/remarks/microsoft.labservices/samples/labs/schedules/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the lab virtual machine') +param adminPassword string + +resource lab 'Microsoft.LabServices/labs@2022-08-01' = { + name: resourceName + location: location + properties: { + autoShutdownProfile: { + shutdownOnDisconnect: 'Disabled' + shutdownOnIdle: 'None' + shutdownWhenNotConnected: 'Disabled' + } + connectionProfile: { + clientRdpAccess: 'None' + clientSshAccess: 'None' + webRdpAccess: 'None' + webSshAccess: 'None' + } + securityProfile: { + openAccess: 'Disabled' + } + title: 'Test Title' + virtualMachineProfile: { + additionalCapabilities: { + installGpuDrivers: 'Disabled' + } + adminUser: { + password: null + username: 'testadmin' + } + createOption: 'Image' + imageReference: { + offer: '0001-com-ubuntu-server-focal' + publisher: 'canonical' + sku: '20_04-lts' + version: 'latest' + } + sku: { + capacity: 1 + name: 'Classic_Fsv2_2_4GB_128_S_SSD' + } + usageQuota: 'PT0S' + useSharedPassword: 'Disabled' + } + } +} + +resource schedule 'Microsoft.LabServices/labs/schedules@2022-08-01' = { + parent: lab + name: resourceName + properties: { + stopAt: '2023-06-30T04:33:55Z' + timeZoneId: 'America/Los_Angeles' + } +} diff --git a/settings/remarks/microsoft.labservices/samples/labs/users/main.bicep b/settings/remarks/microsoft.labservices/samples/labs/users/main.bicep new file mode 100644 index 00000000..9453127f --- /dev/null +++ b/settings/remarks/microsoft.labservices/samples/labs/users/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the lab virtual machine') +param adminPassword string + +resource lab 'Microsoft.LabServices/labs@2022-08-01' = { + name: resourceName + location: location + properties: { + autoShutdownProfile: { + shutdownOnDisconnect: 'Disabled' + shutdownOnIdle: 'None' + shutdownWhenNotConnected: 'Disabled' + } + connectionProfile: { + clientRdpAccess: 'None' + clientSshAccess: 'None' + webRdpAccess: 'None' + webSshAccess: 'None' + } + securityProfile: { + openAccess: 'Disabled' + } + title: 'Test Title' + virtualMachineProfile: { + additionalCapabilities: { + installGpuDrivers: 'Disabled' + } + adminUser: { + password: null + username: 'testadmin' + } + createOption: 'Image' + imageReference: { + offer: '0001-com-ubuntu-server-focal' + publisher: 'canonical' + sku: '20_04-lts' + version: 'latest' + } + sku: { + capacity: 1 + name: 'Classic_Fsv2_2_4GB_128_S_SSD' + } + usageQuota: 'PT0S' + useSharedPassword: 'Disabled' + } + } +} + +resource user 'Microsoft.LabServices/labs/users@2022-08-01' = { + parent: lab + name: resourceName + properties: { + additionalUsageQuota: 'PT0S' + email: 'terraform-acctest@hashicorp.com' + } +} diff --git a/settings/remarks/microsoft.loadtestservice/samples/loadtests/main.bicep b/settings/remarks/microsoft.loadtestservice/samples/loadtests/main.bicep new file mode 100644 index 00000000..8e9482ee --- /dev/null +++ b/settings/remarks/microsoft.loadtestservice/samples/loadtests/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadTest 'Microsoft.LoadTestService/loadTests@2022-12-01' = { + name: resourceName + location: location + properties: { + description: 'This is new load test' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/agreements/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/agreements/main.bicep new file mode 100644 index 00000000..21d7e4b9 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/agreements/main.bicep @@ -0,0 +1,199 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + } +} + +resource agreement 'Microsoft.Logic/integrationAccounts/agreements@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + agreementType: 'AS2' + content: { + aS2: { + receiveAgreement: { + protocolSettings: { + acknowledgementConnectionSettings: { + ignoreCertificateNameMismatch: false + keepHttpConnectionAlive: false + supportHttpStatusCodeContinue: false + unfoldHttpHeaders: false + } + envelopeSettings: { + autogenerateFileName: false + fileNameTemplate: '%FILE().ReceivedFileName%' + messageContentType: 'text/plain' + suspendMessageOnFileNameGenerationError: true + transmitFileNameInMimeHeader: false + } + errorSettings: { + resendIfMDNNotReceived: false + suspendDuplicateMessage: false + } + mdnSettings: { + dispositionNotificationTo: 'http://localhost' + micHashingAlgorithm: 'SHA1' + needMDN: false + sendInboundMDNToMessageBox: true + sendMDNAsynchronously: false + signMDN: false + signOutboundMDNIfOptional: false + } + messageConnectionSettings: { + ignoreCertificateNameMismatch: false + keepHttpConnectionAlive: true + supportHttpStatusCodeContinue: true + unfoldHttpHeaders: true + } + securitySettings: { + enableNRRForInboundDecodedMessages: false + enableNRRForInboundEncodedMessages: false + enableNRRForInboundMDN: false + enableNRRForOutboundDecodedMessages: false + enableNRRForOutboundEncodedMessages: false + enableNRRForOutboundMDN: false + overrideGroupSigningCertificate: false + } + validationSettings: { + checkCertificateRevocationListOnReceive: false + checkCertificateRevocationListOnSend: false + checkDuplicateMessage: false + compressMessage: false + encryptMessage: false + encryptionAlgorithm: 'DES3' + interchangeDuplicatesValidityDays: 5 + overrideMessageProperties: false + signMessage: false + signingAlgorithm: 'Default' + } + } + receiverBusinessIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + senderBusinessIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamDC' + } + } + sendAgreement: { + protocolSettings: { + acknowledgementConnectionSettings: { + ignoreCertificateNameMismatch: false + keepHttpConnectionAlive: false + supportHttpStatusCodeContinue: false + unfoldHttpHeaders: false + } + envelopeSettings: { + autogenerateFileName: false + fileNameTemplate: '%FILE().ReceivedFileName%' + messageContentType: 'text/plain' + suspendMessageOnFileNameGenerationError: true + transmitFileNameInMimeHeader: false + } + errorSettings: { + resendIfMDNNotReceived: false + suspendDuplicateMessage: false + } + mdnSettings: { + dispositionNotificationTo: 'http://localhost' + micHashingAlgorithm: 'SHA1' + needMDN: false + sendInboundMDNToMessageBox: true + sendMDNAsynchronously: false + signMDN: false + signOutboundMDNIfOptional: false + } + messageConnectionSettings: { + ignoreCertificateNameMismatch: false + keepHttpConnectionAlive: true + supportHttpStatusCodeContinue: true + unfoldHttpHeaders: true + } + securitySettings: { + enableNRRForInboundDecodedMessages: false + enableNRRForInboundEncodedMessages: false + enableNRRForInboundMDN: false + enableNRRForOutboundDecodedMessages: false + enableNRRForOutboundEncodedMessages: false + enableNRRForOutboundMDN: false + overrideGroupSigningCertificate: false + } + validationSettings: { + checkCertificateRevocationListOnReceive: false + checkCertificateRevocationListOnSend: false + checkDuplicateMessage: false + compressMessage: false + encryptMessage: false + encryptionAlgorithm: 'DES3' + interchangeDuplicatesValidityDays: 5 + overrideMessageProperties: false + signMessage: false + signingAlgorithm: 'Default' + } + } + receiverBusinessIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamDC' + } + senderBusinessIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + } + } + } + guestIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamDC' + } + guestPartner: partner2.name + hostIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + hostPartner: partner.name + } +} + +resource partner 'Microsoft.Logic/integrationAccounts/partners@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: { + b2b: { + businessIdentities: [ + { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + ] + } + } + partnerType: 'B2B' + } +} + +resource partner2 'Microsoft.Logic/integrationAccounts/partners@2019-05-01' = { + parent: integrationAccount + name: '${resourceName}another' + properties: { + content: { + b2b: { + businessIdentities: [ + { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + ] + } + } + partnerType: 'B2B' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/assemblies/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/assemblies/main.bicep new file mode 100644 index 00000000..f52d2ca9 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/assemblies/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: '${resourceName}-ia' + location: location + properties: {} + sku: { + name: 'Standard' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: replace(substring(toLower('${resourceName}sa'), 0, 24), '-', '') + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource assembly 'Microsoft.Logic/integrationAccounts/assemblies@2019-05-01' = { + parent: integrationAccount + name: '${resourceName}-assembly' + properties: { + assemblyName: 'TestAssembly2' + assemblyVersion: '2.2.2.2' + content: 'dGVzdA==' + contentType: 'application/octet-stream' + metadata: { + foo: 'bar2' + } + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/batchconfigurations/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/batchconfigurations/main.bicep new file mode 100644 index 00000000..ffb5d1cd --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/batchconfigurations/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + } +} + +resource batchConfiguration 'Microsoft.Logic/integrationAccounts/batchConfigurations@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + batchGroupName: 'TestBatchGroup' + releaseCriteria: { + messageCount: 80 + } + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/main.bicep new file mode 100644 index 00000000..8f755960 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Basic' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/maps/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/maps/main.bicep new file mode 100644 index 00000000..5cf9e450 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/maps/main.bicep @@ -0,0 +1,91 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Basic' + } +} + +resource map 'Microsoft.Logic/integrationAccounts/maps@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: ''' + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +''' + contentType: 'application/xml' + mapType: 'Xslt' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/partners/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/partners/main.bicep new file mode 100644 index 00000000..b61925a7 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/partners/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + } +} + +resource partner 'Microsoft.Logic/integrationAccounts/partners@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: { + b2b: { + businessIdentities: [ + { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + ] + } + } + partnerType: 'B2B' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/schemas/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/schemas/main.bicep new file mode 100644 index 00000000..fa4c7780 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/schemas/main.bicep @@ -0,0 +1,243 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Basic' + } +} + +resource schema 'Microsoft.Logic/integrationAccounts/schemas@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: ''' + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +''' + contentType: 'application/xml' + schemaType: 'Xml' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/sessions/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/sessions/main.bicep new file mode 100644 index 00000000..1b05b99d --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/sessions/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Basic' + } +} + +resource session 'Microsoft.Logic/integrationAccounts/sessions@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: ''' { + "controlNumber": "1234" + } +''' + } +} diff --git a/settings/remarks/microsoft.logic/samples/workflows/main.bicep b/settings/remarks/microsoft.logic/samples/workflows/main.bicep new file mode 100644 index 00000000..837fca77 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/workflows/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workflow 'Microsoft.Logic/workflows@2019-05-01' = { + name: resourceName + location: location + properties: { + definition: { + '$schema': 'https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#' + actions: {} + contentVersion: '1.0.0.0' + parameters: null + triggers: {} + } + parameters: {} + state: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.machinelearningservices/samples/workspaces/computes/main.bicep b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/computes/main.bicep new file mode 100644 index 00000000..fa34ddd9 --- /dev/null +++ b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/computes/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + sku: { + name: 'Standard_LRS' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + createMode: 'default' + enablePurgeProtection: true + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource workspace 'Microsoft.MachineLearningServices/workspaces@2022-05-01' = { + name: resourceName + location: location + properties: { + applicationInsights: component.id + keyVault: vault.id + publicNetworkAccess: 'Enabled' + storageAccount: storageAccount.id + v1LegacyMode: false + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} + +resource compute 'Microsoft.MachineLearningServices/workspaces/computes@2022-05-01' = { + parent: workspace + name: resourceName + location: location + properties: { + computeLocation: 'westeurope' + computeType: 'ComputeInstance' + description: '' + disableLocalAuth: true + properties: { + vmSize: 'STANDARD_D2_V2' + } + } +} diff --git a/settings/remarks/microsoft.machinelearningservices/samples/workspaces/datastores/main.bicep b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/datastores/main.bicep new file mode 100644 index 00000000..8cc4565a --- /dev/null +++ b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/datastores/main.bicep @@ -0,0 +1,136 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: '${resourceName}-ai' + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: '${toLower(substring(resourceName, 0, 16))}acc' + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: '${resourceName}vault' + location: location + properties: { + accessPolicies: [] + createMode: 'default' + enablePurgeProtection: true + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource workspace 'Microsoft.MachineLearningServices/workspaces@2024-04-01' = { + name: '${resourceName}-mlw' + location: location + kind: 'Default' + properties: { + applicationInsights: component.id + keyVault: vault.id + publicNetworkAccess: 'Enabled' + storageAccount: storageAccount.id + v1LegacyMode: false + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} + +resource dataStore 'Microsoft.MachineLearningServices/workspaces/dataStores@2024-04-01' = { + parent: workspace + name: replace('${resourceName}_ds', '-', '_') + properties: { + accountName: storageAccount.name + containerName: container.name + credentials: { + credentialsType: 'AccountKey' + secrets: { + key: base64(storageAccount.listKeys().keys[0].value) + secretsType: 'AccountKey' + } + } + datastoreType: 'AzureBlob' + description: '' + endpoint: 'core.windows.net' + serviceDataAccessAuthIdentity: 'None' + tags: null + } + dependsOn: [ + container + ] +} + +// The blob service is a singleton named 'default' under the storage account +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2023-05-01' existing = { + parent: storageAccount + name: 'default' +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2023-05-01' = { + parent: blobService + name: 'datacontainer' + properties: { + publicAccess: 'None' + } +} diff --git a/settings/remarks/microsoft.machinelearningservices/samples/workspaces/main.bicep b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/main.bicep new file mode 100644 index 00000000..2dc36480 --- /dev/null +++ b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/main.bicep @@ -0,0 +1,108 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [ + { + objectId: '45a2d1ea-488a-44b0-bb2e-3cd8e485ebef' + permissions: { + certificates: [ + 'all' + ] + keys: [ + 'all' + ] + secrets: [ + 'all' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enablePurgeProtection: true + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource workspace 'Microsoft.MachineLearningServices/workspaces@2022-05-01' = { + name: resourceName + location: location + properties: { + applicationInsights: component.id + keyVault: vault.id + publicNetworkAccess: 'Disabled' + storageAccount: storageAccount.id + v1LegacyMode: false + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} diff --git a/settings/remarks/microsoft.maintenance/samples/configurationassignments/main.bicep b/settings/remarks/microsoft.maintenance/samples/configurationassignments/main.bicep new file mode 100644 index 00000000..c0374d0f --- /dev/null +++ b/settings/remarks/microsoft.maintenance/samples/configurationassignments/main.bicep @@ -0,0 +1,145 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource configurationAssignment 'Microsoft.Maintenance/configurationAssignments@2022-07-01-preview' = { + scope: virtualMachine + name: resourceName + location: 'westeurope' + properties: { + maintenanceConfigurationId: maintenanceConfiguration.id + resourceId: virtualMachine.id + } +} + +resource maintenanceConfiguration 'Microsoft.Maintenance/maintenanceConfigurations@2022-07-01-preview' = { + name: resourceName + location: location + properties: { + extensionProperties: {} + maintenanceScope: 'SQLDB' + namespace: 'Microsoft.Maintenance' + visibility: 'Custom' + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.maintenance/samples/maintenanceconfigurations/main.bicep b/settings/remarks/microsoft.maintenance/samples/maintenanceconfigurations/main.bicep new file mode 100644 index 00000000..78ee5514 --- /dev/null +++ b/settings/remarks/microsoft.maintenance/samples/maintenanceconfigurations/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource maintenanceConfiguration 'Microsoft.Maintenance/maintenanceConfigurations@2022-07-01-preview' = { + name: resourceName + location: location + properties: { + extensionProperties: {} + maintenanceScope: 'SQLDB' + namespace: 'Microsoft.Maintenance' + visibility: 'Custom' + } +} diff --git a/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/federatedidentitycredentials/main.bicep b/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/federatedidentitycredentials/main.bicep new file mode 100644 index 00000000..d0743e9a --- /dev/null +++ b/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/federatedidentitycredentials/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName + location: location +} + +resource federatedIdentityCredential 'Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials@2022-01-31-preview' = { + parent: userAssignedIdentity + name: resourceName + location: location + properties: { + audiences: [ + 'foo' + ] + issuer: 'https://foo' + subject: 'foo' + } +} diff --git a/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/main.bicep b/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/main.bicep new file mode 100644 index 00000000..68c0ec1c --- /dev/null +++ b/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.maps/samples/accounts/creators/main.bicep b/settings/remarks/microsoft.maps/samples/accounts/creators/main.bicep new file mode 100644 index 00000000..9f4e2ea5 --- /dev/null +++ b/settings/remarks/microsoft.maps/samples/accounts/creators/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.Maps/accounts@2021-02-01' = { + name: resourceName + location: 'global' + sku: { + name: 'G2' + } +} + +resource creator 'Microsoft.Maps/accounts/creators@2021-02-01' = { + parent: account + name: resourceName + location: location + properties: { + storageUnits: 1 + } +} diff --git a/settings/remarks/microsoft.maps/samples/accounts/main.bicep b/settings/remarks/microsoft.maps/samples/accounts/main.bicep new file mode 100644 index 00000000..8aa8bc3f --- /dev/null +++ b/settings/remarks/microsoft.maps/samples/accounts/main.bicep @@ -0,0 +1,9 @@ +param resourceName string = 'acctest0001' + +resource account 'Microsoft.Maps/accounts@2021-02-01' = { + name: resourceName + location: 'global' + sku: { + name: 'G2' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/accountfilters/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/accountfilters/main.bicep new file mode 100644 index 00000000..7bfbd1a0 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/accountfilters/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource accountFilter 'Microsoft.Media/mediaServices/accountFilters@2022-08-01' = { + parent: mediaService + name: 'Filter-1' + properties: { + tracks: [] + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/assets/assetfilters/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/assets/assetfilters/main.bicep new file mode 100644 index 00000000..370f9233 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/assets/assetfilters/main.bicep @@ -0,0 +1,70 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource asset 'Microsoft.Media/mediaServices/assets@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + description: '' + } +} + +resource assetFilter 'Microsoft.Media/mediaServices/assets/assetFilters@2022-08-01' = { + parent: asset + name: resourceName + properties: { + firstQuality: { + bitrate: 0 + } + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/assets/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/assets/main.bicep new file mode 100644 index 00000000..d3113e8f --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/assets/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource asset 'Microsoft.Media/mediaServices/assets@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + description: '' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/contentkeypolicies/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/contentkeypolicies/main.bicep new file mode 100644 index 00000000..ff8c4df1 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/contentkeypolicies/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource contentKeyPolicy 'Microsoft.Media/mediaServices/contentKeyPolicies@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + description: 'My Policy Description' + options: [ + { + configuration: { + '@odata.type': '#Microsoft.Media.ContentKeyPolicyClearKeyConfiguration' + } + name: 'ClearKeyOption' + restriction: { + '@odata.type': '#Microsoft.Media.ContentKeyPolicyTokenRestriction' + audience: 'urn:audience' + issuer: 'urn:issuer' + primaryVerificationKey: { + '@odata.type': '#Microsoft.Media.ContentKeyPolicySymmetricTokenKey' + keyValue: 'AAAAAAAAAAAAAAAAAAAAAA==' + } + requiredClaims: [] + restrictionTokenType: 'Swt' + } + } + ] + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/liveevents/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/liveevents/main.bicep new file mode 100644 index 00000000..d7b6c81c --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/liveevents/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + sku: { + name: 'Standard_GRS' + } +} + +resource liveEvent 'Microsoft.Media/mediaServices/liveEvents@2022-08-01' = { + parent: mediaService + name: resourceName + location: location + properties: { + input: { + accessControl: { + ip: { + allow: [ + { + address: '0.0.0.0' + name: 'AllowAll' + subnetPrefixLength: 0 + } + ] + } + } + keyFrameIntervalDuration: 'PT6S' + streamingProtocol: 'RTMP' + } + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/main.bicep new file mode 100644 index 00000000..a042e3e7 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/streamingendpoints/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/streamingendpoints/main.bicep new file mode 100644 index 00000000..bb91f091 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/streamingendpoints/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource streamingEndpoint 'Microsoft.Media/mediaServices/streamingEndpoints@2022-08-01' = { + parent: mediaService + name: resourceName + location: location + properties: { + scaleUnits: 1 + } + tags: { + env: 'test' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/streaminglocators/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/streaminglocators/main.bicep new file mode 100644 index 00000000..1c928f50 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/streaminglocators/main.bicep @@ -0,0 +1,69 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource asset 'Microsoft.Media/mediaServices/assets@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + description: '' + } +} + +resource streamingLocator 'Microsoft.Media/mediaServices/streamingLocators@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + assetName: asset.name + streamingPolicyName: 'Predefined_ClearStreamingOnly' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/streamingpolicies/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/streamingpolicies/main.bicep new file mode 100644 index 00000000..523fcedf --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/streamingpolicies/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource streamingPolicy 'Microsoft.Media/mediaServices/streamingPolicies@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + noEncryption: { + enabledProtocols: { + dash: true + download: true + hls: true + smoothStreaming: true + } + } + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/transforms/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/transforms/main.bicep new file mode 100644 index 00000000..98dd85b2 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/transforms/main.bicep @@ -0,0 +1,70 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource transform 'Microsoft.Media/mediaServices/transforms@2022-07-01' = { + parent: mediaService + name: resourceName + properties: { + description: '' + outputs: [ + { + onError: 'ContinueJob' + preset: { + '@odata.type': '#Microsoft.Media.BuiltInStandardEncoderPreset' + presetName: 'AACGoodQualityAudio' + } + relativePriority: 'Normal' + } + ] + } +} diff --git a/settings/remarks/microsoft.migrate/samples/migrateprojects/main.bicep b/settings/remarks/microsoft.migrate/samples/migrateprojects/main.bicep new file mode 100644 index 00000000..abc2b611 --- /dev/null +++ b/settings/remarks/microsoft.migrate/samples/migrateprojects/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource project 'Microsoft.Migrate/migrateProjects@2020-05-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + utilityStorageAccountId: storageAccount.id + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.migrate/samples/migrateprojects/solutions/main.bicep b/settings/remarks/microsoft.migrate/samples/migrateprojects/solutions/main.bicep new file mode 100644 index 00000000..0e8f74a8 --- /dev/null +++ b/settings/remarks/microsoft.migrate/samples/migrateprojects/solutions/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource project 'Microsoft.Migrate/migrateProjects@2020-05-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + utilityStorageAccountId: storageAccount.id + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource solution 'Microsoft.Migrate/migrateProjects/solutions@2018-09-01-preview' = { + parent: project + name: resourceName + properties: { + summary: { + instanceType: 'Servers' + migratedCount: 0 + } + } +} diff --git a/settings/remarks/microsoft.mixedreality/samples/spatialanchorsaccounts/main.bicep b/settings/remarks/microsoft.mixedreality/samples/spatialanchorsaccounts/main.bicep new file mode 100644 index 00000000..195aee0e --- /dev/null +++ b/settings/remarks/microsoft.mixedreality/samples/spatialanchorsaccounts/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spatialAnchorsAccount 'Microsoft.MixedReality/spatialAnchorsAccounts@2021-01-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/datanetworks/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/datanetworks/main.bicep new file mode 100644 index 00000000..ec6d2ae5 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/datanetworks/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource dataNetwork 'Microsoft.MobileNetwork/mobileNetworks/dataNetworks@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/main.bicep new file mode 100644 index 00000000..b02701ae --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/services/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/services/main.bicep new file mode 100644 index 00000000..15eeb4fe --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/services/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource service 'Microsoft.MobileNetwork/mobileNetworks/services@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + pccRules: [ + { + ruleName: 'default-rule' + rulePrecedence: 1 + serviceDataFlowTemplates: [ + { + direction: 'Uplink' + ports: [] + protocol: [ + 'ip' + ] + remoteIpList: [ + '10.3.4.0/24' + ] + templateName: 'IP-to-server' + } + ] + trafficControl: 'Enabled' + } + ] + servicePrecedence: 0 + } +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/simpolicies/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/simpolicies/main.bicep new file mode 100644 index 00000000..f2a66712 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/simpolicies/main.bicep @@ -0,0 +1,112 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource dataNetwork 'Microsoft.MobileNetwork/mobileNetworks/dataNetworks@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} + +resource service 'Microsoft.MobileNetwork/mobileNetworks/services@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + pccRules: [ + { + ruleName: 'default-rule' + rulePrecedence: 1 + serviceDataFlowTemplates: [ + { + direction: 'Uplink' + ports: [] + protocol: [ + 'ip' + ] + remoteIpList: [ + '10.3.4.0/24' + ] + templateName: 'IP-to-server' + } + ] + trafficControl: 'Enabled' + } + ] + servicePrecedence: 0 + } +} + +resource simPolicy 'Microsoft.MobileNetwork/mobileNetworks/simPolicies@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + defaultSlice: { + id: slice.id + } + registrationTimer: 3240 + sliceConfigurations: [ + { + dataNetworkConfigurations: [ + { + '5qi': 9 + additionalAllowedSessionTypes: null + allocationAndRetentionPriorityLevel: 9 + allowedServices: [ + { + id: service.id + } + ] + dataNetwork: { + id: dataNetwork.id + } + defaultSessionType: 'IPv4' + maximumNumberOfBufferedPackets: 10 + preemptionCapability: 'NotPreempt' + preemptionVulnerability: 'Preemptable' + sessionAmbr: { + downlink: '1 Gbps' + uplink: '500 Mbps' + } + } + ] + defaultDataNetwork: { + id: dataNetwork.id + } + slice: { + id: slice.id + } + } + ] + ueAmbr: { + downlink: '1 Gbps' + uplink: '500 Mbps' + } + } + tags: { + key: 'value' + } +} + +resource slice 'Microsoft.MobileNetwork/mobileNetworks/slices@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + snssai: { + sst: 1 + } + } +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/sites/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/sites/main.bicep new file mode 100644 index 00000000..41648948 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/sites/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource site 'Microsoft.MobileNetwork/mobileNetworks/sites@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/slices/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/slices/main.bicep new file mode 100644 index 00000000..dd8ad036 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/slices/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource slice 'Microsoft.MobileNetwork/mobileNetworks/slices@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + snssai: { + sst: 1 + } + } +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/main.bicep new file mode 100644 index 00000000..8a727b34 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource dataBoxEdgeDevice 'Microsoft.DataBoxEdge/dataBoxEdgeDevices@2022-03-01' = { + name: resourceName + location: location + sku: { + name: 'EdgeP_Base' + tier: 'Standard' + } +} + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource packetCoreControlPlane 'Microsoft.MobileNetwork/packetCoreControlPlanes@2022-11-01' = { + name: resourceName + location: location + properties: { + controlPlaneAccessInterface: {} + localDiagnosticsAccess: { + authenticationType: 'AAD' + } + platform: { + azureStackEdgeDevice: { + id: dataBoxEdgeDevice.id + } + type: 'AKS-HCI' + } + sites: [ + { + id: site.id + } + ] + sku: 'G0' + ueMtu: 1440 + } +} + +resource site 'Microsoft.MobileNetwork/mobileNetworks/sites@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/packetcoredataplanes/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/packetcoredataplanes/main.bicep new file mode 100644 index 00000000..8d46b641 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/packetcoredataplanes/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource dataBoxEdgeDevice 'Microsoft.DataBoxEdge/dataBoxEdgeDevices@2022-03-01' = { + name: resourceName + location: location + sku: { + name: 'EdgeP_Base' + tier: 'Standard' + } +} + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource packetCoreControlPlane 'Microsoft.MobileNetwork/packetCoreControlPlanes@2022-11-01' = { + name: resourceName + location: location + properties: { + controlPlaneAccessInterface: {} + localDiagnosticsAccess: { + authenticationType: 'AAD' + } + platform: { + azureStackEdgeDevice: { + id: dataBoxEdgeDevice.id + } + type: 'AKS-HCI' + } + sites: [ + { + id: site.id + } + ] + sku: 'G0' + ueMtu: 1440 + } +} + +resource packetCoreDataPlane 'Microsoft.MobileNetwork/packetCoreControlPlanes/packetCoreDataPlanes@2022-11-01' = { + parent: packetCoreControlPlane + name: resourceName + location: location + properties: { + userPlaneAccessInterface: {} + } +} + +resource site 'Microsoft.MobileNetwork/mobileNetworks/sites@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/simgroups/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/simgroups/main.bicep new file mode 100644 index 00000000..2e9533b7 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/simgroups/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource simGroup 'Microsoft.MobileNetwork/simGroups@2022-11-01' = { + name: resourceName + location: location + properties: { + mobileNetwork: { + id: mobileNetwork.id + } + } +} diff --git a/settings/remarks/microsoft.monitor/samples/accounts/main.bicep b/settings/remarks/microsoft.monitor/samples/accounts/main.bicep new file mode 100644 index 00000000..feaac301 --- /dev/null +++ b/settings/remarks/microsoft.monitor/samples/accounts/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.Monitor/accounts@2023-04-03' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.monitor/samples/accounts/privateendpointconnections/main.bicep b/settings/remarks/microsoft.monitor/samples/accounts/privateendpointconnections/main.bicep new file mode 100644 index 00000000..0c9d0885 --- /dev/null +++ b/settings/remarks/microsoft.monitor/samples/accounts/privateendpointconnections/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource account 'Microsoft.Monitor/accounts@2023-04-03' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Disabled' + } +} + +resource grafana 'Microsoft.Dashboard/grafana@2023-09-01' = { + name: resourceName + location: location + identity: { + type: 'None' + userAssignedIdentities: null + } + properties: { + apiKey: 'Disabled' + autoGeneratedDomainNameLabelScope: 'TenantReuse' + deterministicOutboundIP: 'Disabled' + grafanaIntegrations: { + azureMonitorWorkspaceIntegrations: [ + { + azureMonitorWorkspaceResourceId: account.id + } + ] + } + publicNetworkAccess: 'Disabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + } +} + +resource grafanaManagedPrivateEndpointConnectionApproval 'Microsoft.Monitor/accounts/privateEndpointConnections@2023-04-03' = { + parent: account + name: 'account.properties.privateEndpointConnections[0].name' + properties: { + privateLinkServiceConnectionState: { + actionsRequired: 'None' + description: 'Approved via Terraform' + status: 'Approved' + } + } + dependsOn: [ + managedPrivateEndpoint + ] +} + +resource managedPrivateEndpoint 'Microsoft.Dashboard/grafana/managedPrivateEndpoints@2023-09-01' = { + parent: grafana + name: resourceName + location: location + properties: { + groupIds: [ + 'prometheusMetrics' + ] + privateLinkResourceId: account.id + privateLinkResourceRegion: 'eastus' + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/backuppolicies/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/backuppolicies/main.bicep new file mode 100644 index 00000000..0a338a03 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/backuppolicies/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2025-01-01' = { + name: resourceName + location: location + properties: {} +} + +resource backupPolicy 'Microsoft.NetApp/netAppAccounts/backupPolicies@2025-01-01' = { + parent: netAppAccount + name: '${resourceName}-policy' + location: location + properties: { + dailyBackupsToKeep: 2 + enabled: true + monthlyBackupsToKeep: 1 + weeklyBackupsToKeep: 1 + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/backupvaults/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/backupvaults/main.bicep new file mode 100644 index 00000000..edd441bd --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/backupvaults/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2025-01-01' = { + name: resourceName + location: location + properties: {} +} + +resource backupVault 'Microsoft.NetApp/netAppAccounts/backupVaults@2025-01-01' = { + parent: netAppAccount + name: '${resourceName}-backupvault' + location: location +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/main.bicep new file mode 100644 index 00000000..39beab5f --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource capacityPool 'Microsoft.NetApp/netAppAccounts/capacityPools@2022-05-01' = { + parent: netAppAccount + name: resourceName + location: location + properties: { + serviceLevel: 'Standard' + size: 4398046511104 + } + tags: { + SkipASMAzSecPack: 'true' + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/main.bicep new file mode 100644 index 00000000..18cd550e --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/main.bicep @@ -0,0 +1,116 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.6.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource capacityPool 'Microsoft.NetApp/netAppAccounts/capacityPools@2022-05-01' = { + parent: netAppAccount + name: resourceName + location: location + properties: { + serviceLevel: 'Standard' + size: 4398046511104 + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'GatewaySubnet' + properties: { + addressPrefix: '10.6.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource subnet2 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.6.2.0/24' + delegations: [ + { + name: 'testdelegation' + properties: { + serviceName: 'Microsoft.Netapp/volumes' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource volume 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2022-05-01' = { + parent: capacityPool + name: resourceName + location: location + properties: { + avsDataStore: 'Enabled' + creationToken: 'my-unique-file-path-230630034120103726' + dataProtection: {} + exportPolicy: { + rules: [ + { + allowedClients: '0.0.0.0/0' + cifs: false + hasRootAccess: true + nfsv3: true + nfsv41: false + ruleIndex: 1 + unixReadOnly: false + unixReadWrite: true + } + ] + } + networkFeatures: 'Basic' + protocolTypes: [ + 'NFSv3' + ] + serviceLevel: 'Standard' + snapshotDirectoryVisible: true + subnetId: subnet2.id + usageThreshold: 107374182400 + volumeType: '' + } + tags: { + SkipASMAzSecPack: 'true' + } + zones: [] +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/snapshots/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/snapshots/main.bicep new file mode 100644 index 00000000..e44656a4 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/snapshots/main.bicep @@ -0,0 +1,88 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource capacityPool 'Microsoft.NetApp/netAppAccounts/capacityPools@2022-05-01' = { + parent: netAppAccount + name: resourceName + location: location + properties: { + serviceLevel: 'Premium' + size: 4398046511104 + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [ + { + name: 'netapp' + properties: { + serviceName: 'Microsoft.Netapp/volumes' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource volume 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2022-05-01' = { + parent: capacityPool + name: resourceName + location: location + properties: { + avsDataStore: 'Disabled' + creationToken: 'my-unique-file-path-230630033642692134' + dataProtection: {} + exportPolicy: { + rules: [] + } + networkFeatures: 'Basic' + protocolTypes: [ + 'NFSv3' + ] + securityStyle: 'Unix' + serviceLevel: 'Premium' + snapshotDirectoryVisible: false + snapshotId: '' + subnetId: subnet.id + usageThreshold: 107374182400 + volumeType: '' + } + zones: [] +} + +resource snapshot 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes/snapshots@2022-05-01' = { + parent: volume + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/volumequotarules/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/volumequotarules/main.bicep new file mode 100644 index 00000000..7c333bc5 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/volumequotarules/main.bicep @@ -0,0 +1,98 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2025-01-01' = { + name: '${resourceName}-acct' + location: location + properties: {} +} + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2024-05-01' = { + name: '${resourceName}-nsg' + location: location + properties: { + securityRules: [] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.88.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource capacityPool 'Microsoft.NetApp/netAppAccounts/capacityPools@2025-01-01' = { + parent: netAppAccount + name: '${resourceName}-pool' + location: location + properties: { + coolAccess: false + encryptionType: 'Single' + qosType: 'Auto' + serviceLevel: 'Standard' + size: 4398046511104 + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.88.2.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'netapp-delegation' + properties: { + serviceName: 'Microsoft.NetApp/volumes' + } + } + ] + networkSecurityGroup: { + id: networkSecurityGroup.id + } + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource volume 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2025-01-01' = { + parent: capacityPool + name: '${resourceName}-vol' + location: location + properties: { + creationToken: 'acctest0001-path' + dataProtection: {} + exportPolicy: { + rules: [] + } + protocolTypes: [ + 'NFSv3' + ] + serviceLevel: 'Standard' + subnetId: subnet.id + usageThreshold: 107374182400 + } +} + +resource volumeQuotaRule 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes/volumeQuotaRules@2025-01-01' = { + parent: volume + name: '${resourceName}-quota' + location: location + properties: { + quotaSizeInKiBs: 2048 + quotaType: 'DefaultGroupQuota' + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/main.bicep new file mode 100644 index 00000000..850f5955 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/snapshotpolicies/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/snapshotpolicies/main.bicep new file mode 100644 index 00000000..dcdd13a9 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/snapshotpolicies/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } +} + +resource snapshotPolicy 'Microsoft.NetApp/netAppAccounts/snapshotPolicies@2022-05-01' = { + parent: netAppAccount + name: resourceName + location: location + properties: { + dailySchedule: { + hour: 22 + minute: 15 + snapshotsToKeep: 1 + } + enabled: true + hourlySchedule: { + minute: 15 + snapshotsToKeep: 1 + } + monthlySchedule: { + daysOfMonth: '30,15,1' + hour: 5 + minute: 0 + snapshotsToKeep: 1 + } + weeklySchedule: { + day: 'Monday,Friday' + hour: 23 + minute: 0 + snapshotsToKeep: 1 + } + } +} diff --git a/settings/remarks/microsoft.network/samples/applicationgateways/main.bicep b/settings/remarks/microsoft.network/samples/applicationgateways/main.bicep new file mode 100644 index 00000000..b3e58842 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/applicationgateways/main.bicep @@ -0,0 +1,179 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource applicationGateway 'Microsoft.Network/applicationGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + authenticationCertificates: [] + backendAddressPools: [ + { + name: '\'${virtualNetwork.name}-beap\'' + properties: { + backendAddresses: [] + } + } + ] + backendHttpSettingsCollection: [ + { + name: '\'${virtualNetwork.name}-be-htst\'' + properties: { + authenticationCertificates: [] + cookieBasedAffinity: 'Disabled' + path: '' + pickHostNameFromBackendAddress: false + port: 80 + protocol: 'Http' + requestTimeout: 1 + trustedRootCertificates: [] + } + } + ] + customErrorConfigurations: [] + enableHttp2: false + frontendIPConfigurations: [ + { + name: '\'${virtualNetwork.name}-feip\'' + properties: { + privateIPAllocationMethod: 'Dynamic' + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + frontendPorts: [ + { + name: '\'${virtualNetwork.name}-feport\'' + properties: { + port: 80 + } + } + ] + gatewayIPConfigurations: [ + { + name: 'my-gateway-ip-configuration' + properties: { + subnet: { + id: subnet.id + } + } + } + ] + httpListeners: [ + { + name: '\'${virtualNetwork.name}-httplstn\'' + properties: { + customErrorConfigurations: [] + frontendIPConfiguration: { + id: resourceId( + 'Microsoft.Network/applicationGateways/frontendIPConfigurations', + resourceName, + '${virtualNetwork.name}-feip' + ) + } + frontendPort: { + id: resourceId( + 'Microsoft.Network/applicationGateways/frontendPorts', + resourceName, + '${virtualNetwork.name}-feport' + ) + } + protocol: 'Http' + requireServerNameIndication: false + } + } + ] + privateLinkConfigurations: [] + probes: [] + redirectConfigurations: [] + requestRoutingRules: [ + { + name: '${virtualNetwork.name}-rqrt' + properties: { + backendAddressPool: { + id: resourceId( + 'Microsoft.Network/applicationGateways/backendAddressPools', + resourceName, + '${virtualNetwork.name}-beap' + ) + } + backendHttpSettings: { + id: resourceId( + 'Microsoft.Network/applicationGateways/backendHttpSettingsCollection', + resourceName, + '${virtualNetwork.name}-be-htst' + ) + } + httpListener: { + id: resourceId( + 'Microsoft.Network/applicationGateways/httpListeners', + resourceName, + '${virtualNetwork.name}-httplstn' + ) + } + priority: 10 + ruleType: 'Basic' + } + } + ] + rewriteRuleSets: [] + sku: { + capacity: 2 + name: 'Standard_v2' + tier: 'Standard_v2' + } + sslCertificates: [] + sslPolicy: {} + sslProfiles: [] + trustedClientCertificates: [] + trustedRootCertificates: [] + urlPathMaps: [] + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'subnet-230630033653837171' + properties: { + addressPrefix: '10.0.0.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Disabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/applicationgatewaywebapplicationfirewallpolicies/main.bicep b/settings/remarks/microsoft.network/samples/applicationgatewaywebapplicationfirewallpolicies/main.bicep new file mode 100644 index 00000000..7ed3be50 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/applicationgatewaywebapplicationfirewallpolicies/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource applicationgatewaywebapplicationfirewallpolicy 'Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies@2022-07-01' = { + name: resourceName + location: location + properties: { + customRules: [] + managedRules: { + exclusions: [] + managedRuleSets: [ + { + ruleGroupOverrides: [] + ruleSetType: 'OWASP' + ruleSetVersion: '3.1' + } + ] + } + policySettings: { + fileUploadLimitInMb: 100 + maxRequestBodySizeInKb: 128 + mode: 'Detection' + requestBodyCheck: true + state: 'Enabled' + } + } +} diff --git a/settings/remarks/microsoft.network/samples/applicationsecuritygroups/main.bicep b/settings/remarks/microsoft.network/samples/applicationsecuritygroups/main.bicep new file mode 100644 index 00000000..06c73f8b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/applicationsecuritygroups/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2022-09-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.network/samples/azurefirewalls/main.bicep b/settings/remarks/microsoft.network/samples/azurefirewalls/main.bicep new file mode 100644 index 00000000..8fecc621 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/azurefirewalls/main.bicep @@ -0,0 +1,74 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource azureFirewall 'Microsoft.Network/azureFirewalls@2022-07-01' = { + name: resourceName + location: location + properties: { + additionalProperties: {} + ipConfigurations: [ + { + name: 'configuration' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + } + ] + sku: { + name: 'AZFW_VNet' + tier: 'Standard' + } + threatIntelMode: 'Deny' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'AzureFirewallSubnet' + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/bastionhosts/main.bicep b/settings/remarks/microsoft.network/samples/bastionhosts/main.bicep new file mode 100644 index 00000000..df88de04 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/bastionhosts/main.bicep @@ -0,0 +1,77 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource bastionHost 'Microsoft.Network/bastionHosts@2022-07-01' = { + name: resourceName + location: location + properties: { + disableCopyPaste: false + enableFileCopy: false + enableIpConnect: false + enableShareableLink: false + enableTunneling: false + ipConfigurations: [ + { + name: 'ip-configuration' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + } + ] + scaleUnits: 2 + } + sku: { + name: 'Basic' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '192.168.1.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'AzureBastionSubnet' + properties: { + addressPrefix: '192.168.1.224/27' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/ddosprotectionplans/main.bicep b/settings/remarks/microsoft.network/samples/ddosprotectionplans/main.bicep new file mode 100644 index 00000000..bc42ef13 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/ddosprotectionplans/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2022-07-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/forwardingrules/main.bicep b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/forwardingrules/main.bicep new file mode 100644 index 00000000..73629779 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/forwardingrules/main.bicep @@ -0,0 +1,87 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsForwardingRuleset 'Microsoft.Network/dnsForwardingRulesets@2022-07-01' = { + name: resourceName + location: location + properties: { + dnsResolverOutboundEndpoints: [ + { + id: outboundEndpoint.id + } + ] + } +} + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource forwardingRule 'Microsoft.Network/dnsForwardingRulesets/forwardingRules@2022-07-01' = { + parent: dnsForwardingRuleset + name: resourceName + properties: { + domainName: 'onprem.local.' + forwardingRuleState: 'Enabled' + metadata: null + targetDnsServers: [ + { + ipAddress: '10.10.0.1' + port: 53 + } + ] + } +} + +resource outboundEndpoint 'Microsoft.Network/dnsResolvers/outboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'outbounddns' + properties: { + addressPrefix: '10.0.0.64/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/main.bicep b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/main.bicep new file mode 100644 index 00000000..ffcab7f1 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/main.bicep @@ -0,0 +1,71 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsForwardingRuleset 'Microsoft.Network/dnsForwardingRulesets@2022-07-01' = { + name: resourceName + location: location + properties: { + dnsResolverOutboundEndpoints: [ + { + id: outboundEndpoint.id + } + ] + } +} + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource outboundEndpoint 'Microsoft.Network/dnsResolvers/outboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'outbounddns' + properties: { + addressPrefix: '10.0.0.64/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/virtualnetworklinks/main.bicep b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/virtualnetworklinks/main.bicep new file mode 100644 index 00000000..77846a11 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/virtualnetworklinks/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsForwardingRuleset 'Microsoft.Network/dnsForwardingRulesets@2022-07-01' = { + name: resourceName + location: location + properties: { + dnsResolverOutboundEndpoints: [ + { + id: outboundEndpoint.id + } + ] + } +} + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource outboundEndpoint 'Microsoft.Network/dnsResolvers/outboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'outbounddns' + properties: { + addressPrefix: '10.0.0.64/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource virtualNetworkLink 'Microsoft.Network/dnsForwardingRulesets/virtualNetworkLinks@2022-07-01' = { + parent: dnsForwardingRuleset + name: resourceName + properties: { + metadata: null + virtualNetwork: { + id: virtualNetwork.id + } + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsresolvers/inboundendpoints/main.bicep b/settings/remarks/microsoft.network/samples/dnsresolvers/inboundendpoints/main.bicep new file mode 100644 index 00000000..09f716be --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsresolvers/inboundendpoints/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource inboundEndpoint 'Microsoft.Network/dnsResolvers/inboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + ipConfigurations: [ + { + privateIpAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + ] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'inbounddns' + properties: { + addressPrefix: '10.0.0.0/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsresolvers/main.bicep b/settings/remarks/microsoft.network/samples/dnsresolvers/main.bicep new file mode 100644 index 00000000..3b5fa7ee --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsresolvers/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsresolvers/outboundendpoints/main.bicep b/settings/remarks/microsoft.network/samples/dnsresolvers/outboundendpoints/main.bicep new file mode 100644 index 00000000..296a2511 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsresolvers/outboundendpoints/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource outboundEndpoint 'Microsoft.Network/dnsResolvers/outboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'outbounddns' + properties: { + addressPrefix: '10.0.0.64/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/a/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/a/main.bicep new file mode 100644 index 00000000..5e37ee0f --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/a/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource a 'Microsoft.Network/dnsZones/A@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + ARecords: [ + { + ipv4Address: '1.2.4.5' + } + { + ipv4Address: '1.2.3.4' + } + ] + TTL: 300 + metadata: {} + targetResource: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/aaaa/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/aaaa/main.bicep new file mode 100644 index 00000000..7ef00918 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/aaaa/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource aaaa 'Microsoft.Network/dnsZones/AAAA@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + AAAARecords: [ + { + ipv6Address: '2607:f8b0:4009:1803::1005' + } + { + ipv6Address: '2607:f8b0:4009:1803::1006' + } + ] + TTL: 300 + metadata: {} + targetResource: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/caa/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/caa/main.bicep new file mode 100644 index 00000000..7e7dee80 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/caa/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource caa 'Microsoft.Network/dnsZones/CAA@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + TTL: 300 + caaRecords: [ + { + flags: 1 + tag: 'issuewild' + value: ';' + } + { + flags: 0 + tag: 'iodef' + value: 'mailto:terraform@nonexist.tld' + } + { + flags: 0 + tag: 'issue' + value: 'example.com' + } + { + flags: 0 + tag: 'issue' + value: 'example.net' + } + ] + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/cname/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/cname/main.bicep new file mode 100644 index 00000000..9b298cce --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/cname/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource cname 'Microsoft.Network/dnsZones/CNAME@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + CNAMERecord: { + cname: 'acctest0001.webpubsub.azure.com' + } + TTL: 3600 + metadata: {} + targetResource: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/main.bicep new file mode 100644 index 00000000..c679cccb --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/main.bicep @@ -0,0 +1,6 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/mx/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/mx/main.bicep new file mode 100644 index 00000000..9fa632a5 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/mx/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource mx 'Microsoft.Network/dnsZones/MX@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + MXRecords: [ + { + exchange: 'mail2.contoso.com' + preference: 20 + } + { + exchange: 'mail1.contoso.com' + preference: 10 + } + ] + TTL: 300 + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/ns/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/ns/main.bicep new file mode 100644 index 00000000..7ae8039a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/ns/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource n 'Microsoft.Network/dnsZones/NS@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + NSRecords: [ + { + nsdname: 'ns1.contoso.com' + } + { + nsdname: 'ns2.contoso.com' + } + ] + TTL: 300 + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/ptr/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/ptr/main.bicep new file mode 100644 index 00000000..fe68c394 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/ptr/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource ptr 'Microsoft.Network/dnsZones/PTR@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + PTRRecords: [ + { + ptrdname: 'hashicorp.com' + } + { + ptrdname: 'microsoft.com' + } + ] + TTL: 300 + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/srv/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/srv/main.bicep new file mode 100644 index 00000000..474da0d2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/srv/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource srv 'Microsoft.Network/dnsZones/SRV@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + SRVRecords: [ + { + port: 8080 + priority: 2 + target: 'target2.contoso.com' + weight: 25 + } + { + port: 8080 + priority: 1 + target: 'target1.contoso.com' + weight: 5 + } + ] + TTL: 300 + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/txt/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/txt/main.bicep new file mode 100644 index 00000000..9a5392d9 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/txt/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource txt 'Microsoft.Network/dnsZones/TXT@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + TTL: 300 + TXTRecords: [ + { + value: [ + 'Quick brown fox' + ] + } + { + value: [ + 'A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text.....' + '.A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text....' + '..A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......' + ] + } + ] + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutecircuits/authorizations/main.bicep b/settings/remarks/microsoft.network/samples/expressroutecircuits/authorizations/main.bicep new file mode 100644 index 00000000..26e91aaf --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutecircuits/authorizations/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + serviceProviderProperties: { + bandwidthInMbps: 50 + peeringLocation: 'Silicon Valley' + serviceProviderName: 'Equinix' + } + } + sku: { + family: 'MeteredData' + name: 'Standard_MeteredData' + tier: 'Standard' + } + tags: { + Environment: 'production' + Purpose: 'AcceptanceTests' + } +} + +resource authorization 'Microsoft.Network/expressRouteCircuits/authorizations@2022-07-01' = { + parent: expressRouteCircuit + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/expressroutecircuits/main.bicep b/settings/remarks/microsoft.network/samples/expressroutecircuits/main.bicep new file mode 100644 index 00000000..a23d01ca --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutecircuits/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'CDC-Canberra' + } +} + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport.id + } + } + sku: { + family: 'MeteredData' + name: 'Premium_MeteredData' + tier: 'Premium' + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/connections/main.bicep b/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/connections/main.bicep new file mode 100644 index 00000000..7d22f90e --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/connections/main.bicep @@ -0,0 +1,105 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The shared key for the Express Route circuit peering connections') +param expressRouteConnectionSharedKey string + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'Airtel-Chennai2-CLS' + } +} + +resource expressrouteport2 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'CDC-Canberra' + } +} + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport.id + } + } + sku: { + family: 'MeteredData' + name: 'Standard_MeteredData' + tier: 'Standard' + } +} + +resource expressRouteCircuit2 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport2.id + } + } + sku: { + family: 'MeteredData' + name: 'Standard_MeteredData' + tier: 'Standard' + } +} + +resource peering 'Microsoft.Network/expressRouteCircuits/peerings@2022-07-01' = { + parent: expressRouteCircuit + name: 'AzurePrivatePeering' + properties: { + azureASN: 12076 + gatewayManagerEtag: '' + peerASN: 100 + peeringType: 'AzurePrivatePeering' + primaryPeerAddressPrefix: '192.168.1.0/30' + secondaryPeerAddressPrefix: '192.168.1.0/30' + sharedKey: null + state: 'Enabled' + vlanId: 100 + } +} + +resource peering2 'Microsoft.Network/expressRouteCircuits/peerings@2022-07-01' = { + parent: expressRouteCircuit2 + name: 'AzurePrivatePeering' + properties: { + azureASN: 12076 + gatewayManagerEtag: '' + peerASN: 100 + peeringType: 'AzurePrivatePeering' + primaryPeerAddressPrefix: '192.168.1.0/30' + secondaryPeerAddressPrefix: '192.168.1.0/30' + sharedKey: null + state: 'Enabled' + vlanId: 100 + } +} + +resource connection 'Microsoft.Network/expressRouteCircuits/peerings/connections@2022-07-01' = { + parent: peering + name: resourceName + properties: { + addressPrefix: '192.169.8.0/29' + expressRouteCircuitPeering: { + id: peering.id + } + peerExpressRouteCircuitPeering: { + id: peering2.id + } + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/main.bicep b/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/main.bicep new file mode 100644 index 00000000..a5a2ac9e --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The shared key for the Express Route circuit peering') +param expressRouteSharedKey string + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'CDC-Canberra' + } +} + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport.id + } + } + sku: { + family: 'MeteredData' + name: 'Premium_MeteredData' + tier: 'Premium' + } +} + +resource peering 'Microsoft.Network/expressRouteCircuits/peerings@2022-07-01' = { + parent: expressRouteCircuit + name: 'AzurePrivatePeering' + properties: { + azureASN: 12076 + gatewayManagerEtag: '' + peerASN: 100 + peeringType: 'AzurePrivatePeering' + primaryPeerAddressPrefix: '192.168.1.0/30' + secondaryPeerAddressPrefix: '192.168.2.0/30' + sharedKey: null + state: 'Enabled' + vlanId: 100 + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutegateways/expressrouteconnections/main.bicep b/settings/remarks/microsoft.network/samples/expressroutegateways/expressrouteconnections/main.bicep new file mode 100644 index 00000000..28ecfe4b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutegateways/expressrouteconnections/main.bicep @@ -0,0 +1,104 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The shared key for the ExpressRoute connection') +param sharedKey string + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'CDC-Canberra' + } +} + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport.id + } + } + sku: { + family: 'MeteredData' + name: 'Premium_MeteredData' + tier: 'Premium' + } +} + +resource expressRouteGateway 'Microsoft.Network/expressRouteGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + allowNonVirtualWanTraffic: false + autoScaleConfiguration: { + bounds: { + min: 1 + } + } + virtualHub: { + id: virtualHub.id + } + } +} + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.1.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource expressRouteConnection 'Microsoft.Network/expressRouteGateways/expressRouteConnections@2022-07-01' = { + parent: expressRouteGateway + name: resourceName + properties: { + enableInternetSecurity: false + expressRouteCircuitPeering: { + id: peering.id + } + expressRouteGatewayBypass: false + routingConfiguration: {} + routingWeight: 0 + } +} + +resource peering 'Microsoft.Network/expressRouteCircuits/peerings@2022-07-01' = { + parent: expressRouteCircuit + name: 'AzurePrivatePeering' + properties: { + azureASN: 12076 + gatewayManagerEtag: '' + peerASN: 100 + peeringType: 'AzurePrivatePeering' + primaryPeerAddressPrefix: '192.168.1.0/30' + secondaryPeerAddressPrefix: '192.168.2.0/30' + sharedKey: null + state: 'Enabled' + vlanId: 100 + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutegateways/main.bicep b/settings/remarks/microsoft.network/samples/expressroutegateways/main.bicep new file mode 100644 index 00000000..4cafea75 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutegateways/main.bicep @@ -0,0 +1,44 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressRouteGateway 'Microsoft.Network/expressRouteGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + allowNonVirtualWanTraffic: false + autoScaleConfiguration: { + bounds: { + min: 1 + } + } + virtualHub: { + id: virtualHub.id + } + } +} + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.1.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} diff --git a/settings/remarks/microsoft.network/samples/expressrouteports/authorizations/main.bicep b/settings/remarks/microsoft.network/samples/expressrouteports/authorizations/main.bicep new file mode 100644 index 00000000..478a50c6 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressrouteports/authorizations/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + billingType: 'MeteredData' + encapsulation: 'Dot1Q' + peeringLocation: 'Airtel-Chennai2-CLS' + } + tags: { + ENV: 'Test' + } +} + +resource authorization 'Microsoft.Network/expressRoutePorts/authorizations@2022-07-01' = { + parent: expressrouteport + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/expressrouteports/main.bicep b/settings/remarks/microsoft.network/samples/expressrouteports/main.bicep new file mode 100644 index 00000000..9d7e723e --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressrouteports/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + billingType: 'MeteredData' + encapsulation: 'Dot1Q' + peeringLocation: 'Airtel-Chennai2-CLS' + } + tags: { + ENV: 'Test' + } +} diff --git a/settings/remarks/microsoft.network/samples/firewallpolicies/main.bicep b/settings/remarks/microsoft.network/samples/firewallpolicies/main.bicep new file mode 100644 index 00000000..1bccefe4 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/firewallpolicies/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource firewallPolicy 'Microsoft.Network/firewallPolicies@2022-07-01' = { + name: resourceName + location: location + properties: { + threatIntelMode: 'Alert' + } +} diff --git a/settings/remarks/microsoft.network/samples/firewallpolicies/rulecollectiongroups/main.bicep b/settings/remarks/microsoft.network/samples/firewallpolicies/rulecollectiongroups/main.bicep new file mode 100644 index 00000000..98a2a5c8 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/firewallpolicies/rulecollectiongroups/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource firewallPolicy 'Microsoft.Network/firewallPolicies@2022-07-01' = { + name: resourceName + location: location + properties: { + threatIntelMode: 'Alert' + } +} + +resource ruleCollectionGroup 'Microsoft.Network/firewallPolicies/ruleCollectionGroups@2022-07-01' = { + parent: firewallPolicy + name: resourceName + properties: { + priority: 500 + ruleCollections: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/frontdoorwebapplicationfirewallpolicies/main.bicep b/settings/remarks/microsoft.network/samples/frontdoorwebapplicationfirewallpolicies/main.bicep new file mode 100644 index 00000000..dc42f543 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/frontdoorwebapplicationfirewallpolicies/main.bicep @@ -0,0 +1,68 @@ +param resourceName string = 'acctest0001' + +resource frontdoorwebapplicationfirewallpolicy 'Microsoft.Network/FrontDoorWebApplicationFirewallPolicies@2020-11-01' = { + name: resourceName + location: 'global' + properties: { + customRules: { + rules: [ + { + action: 'Block' + enabledState: 'Enabled' + matchConditions: [ + { + matchValue: [ + '192.168.1.0/24' + '10.0.0.0/24' + ] + matchVariable: 'RemoteAddr' + negateCondition: false + operator: 'IPMatch' + } + ] + name: 'Rule1' + priority: 1 + rateLimitDurationInMinutes: 1 + rateLimitThreshold: 10 + ruleType: 'MatchRule' + } + ] + } + managedRules: { + managedRuleSets: [ + { + ruleGroupOverrides: [ + { + ruleGroupName: 'PHP' + rules: [ + { + action: 'Block' + enabledState: 'Disabled' + ruleId: '933111' + } + ] + } + ] + ruleSetAction: 'Block' + ruleSetType: 'DefaultRuleSet' + ruleSetVersion: 'preview-0.1' + } + { + ruleSetAction: 'Block' + ruleSetType: 'BotProtection' + ruleSetVersion: 'preview-0.1' + } + ] + } + policySettings: { + customBlockResponseBody: 'PGh0bWw+CjxoZWFkZXI+PHRpdGxlPkhlbGxvPC90aXRsZT48L2hlYWRlcj4KPGJvZHk+CkhlbGxvIHdvcmxkCjwvYm9keT4KPC9odG1sPg==' + customBlockResponseStatusCode: 403 + enabledState: 'Enabled' + mode: 'Prevention' + redirectUrl: 'https://www.fabrikam.com' + } + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} diff --git a/settings/remarks/microsoft.network/samples/ipgroups/main.bicep b/settings/remarks/microsoft.network/samples/ipgroups/main.bicep new file mode 100644 index 00000000..6c99633a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/ipgroups/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource ipGroup 'Microsoft.Network/ipGroups@2022-07-01' = { + name: resourceName + location: location + properties: { + ipAddresses: [] + } + tags: { + env: 'prod' + } +} diff --git a/settings/remarks/microsoft.network/samples/loadbalancers/backendaddresspools/main.bicep b/settings/remarks/microsoft.network/samples/loadbalancers/backendaddresspools/main.bicep new file mode 100644 index 00000000..fee10c46 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/loadbalancers/backendaddresspools/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadBalancer 'Microsoft.Network/loadBalancers@2022-07-01' = { + name: resourceName + location: location + properties: { + frontendIPConfigurations: [ + { + name: 'internal' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource backendAddressPool 'Microsoft.Network/loadBalancers/backendAddressPools@2022-07-01' = { + parent: loadBalancer + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/loadbalancers/main.bicep b/settings/remarks/microsoft.network/samples/loadbalancers/main.bicep new file mode 100644 index 00000000..7801264f --- /dev/null +++ b/settings/remarks/microsoft.network/samples/loadbalancers/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadBalancer 'Microsoft.Network/loadBalancers@2022-07-01' = { + name: resourceName + location: location + properties: { + frontendIPConfigurations: [ + { + name: 'acctest0001' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} diff --git a/settings/remarks/microsoft.network/samples/localnetworkgateways/main.bicep b/settings/remarks/microsoft.network/samples/localnetworkgateways/main.bicep new file mode 100644 index 00000000..2fa2ca78 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/localnetworkgateways/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + gatewayIpAddress: '168.62.225.23' + localNetworkAddressSpace: { + addressPrefixes: [ + '10.1.1.0/24' + ] + } + } +} diff --git a/settings/remarks/microsoft.network/samples/natgateways/main.bicep b/settings/remarks/microsoft.network/samples/natgateways/main.bicep new file mode 100644 index 00000000..f4e9e9ed --- /dev/null +++ b/settings/remarks/microsoft.network/samples/natgateways/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource natGateway 'Microsoft.Network/natGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + idleTimeoutInMinutes: 10 + } + sku: { + name: 'Standard' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkinterfaces/main.bicep b/settings/remarks/microsoft.network/samples/networkinterfaces/main.bicep new file mode 100644 index 00000000..0411f1b8 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkinterfaces/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/connectivityconfigurations/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/connectivityconfigurations/main.bicep new file mode 100644 index 00000000..0a397dfa --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/connectivityconfigurations/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + 'Connectivity' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + flowTimeoutInMinutes: 10 + subnets: [] + } +} + +resource connectivityConfiguration 'Microsoft.Network/networkManagers/connectivityConfigurations@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + appliesToGroups: [ + { + groupConnectivity: 'None' + isGlobal: 'False' + networkGroupId: networkGroup.id + useHubGateway: 'False' + } + ] + connectivityTopology: 'HubAndSpoke' + deleteExistingPeering: 'False' + hubs: [ + { + resourceId: virtualNetwork.id + resourceType: virtualNetwork.properties.type + } + ] + isGlobal: 'False' + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2022-09-01' = { + parent: networkManager + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/main.bicep new file mode 100644 index 00000000..587710f5 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource ipamPool 'Microsoft.Network/networkManagers/ipamPools@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + description: 'Test description.' + displayName: 'testDisplayName' + parentPoolName: '' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/staticcidr/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/staticcidr/main.bicep new file mode 100644 index 00000000..22d1ace2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/staticcidr/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource ipamPool 'Microsoft.Network/networkManagers/ipamPools@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + description: 'Test description.' + displayName: 'testDisplayName' + parentPoolName: '' + } +} + +resource staticCidr 'Microsoft.Network/networkManagers/ipamPools/staticCidrs@2024-01-01-preview' = { + parent: ipamPool + name: resourceName + properties: { + addressPrefixes: [ + '10.0.0.0/25' + ] + description: 'test description' + numberOfIPAddressesToAllocate: '' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/main.bicep new file mode 100644 index 00000000..86adb528 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/main.bicep new file mode 100644 index 00000000..da16b09b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2024-10-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'Routing' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2024-10-01' = { + parent: networkManager + name: resourceName + properties: { + description: 'example network group' + memberType: 'VirtualNetwork' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/staticmembers/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/staticmembers/main.bicep new file mode 100644 index 00000000..7ae3f2df --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/staticmembers/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2024-10-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'Routing' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-10-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/22' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2024-10-01' = { + parent: networkManager + name: resourceName + properties: {} +} + +resource networkGroupForSubnet 'Microsoft.Network/networkManagers/networkGroups@2024-10-01' = { + parent: networkManager + name: '${resourceName}-subnet' + properties: { + description: 'example network group' + memberType: 'Subnet' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-10-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + } +} + +resource staticMember 'Microsoft.Network/networkManagers/networkGroups/staticMembers@2024-10-01' = { + parent: networkGroup + name: resourceName + properties: { + resourceId: virtualNetwork.id + } +} + +resource staticMemberForSubnet 'Microsoft.Network/networkManagers/networkGroups/staticMembers@2024-10-01' = { + parent: networkGroupForSubnet + name: '${resourceName}-subnet' + properties: { + resourceId: subnet.id + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/scopeconnections/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/scopeconnections/main.bicep new file mode 100644 index 00000000..a0170ea0 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/scopeconnections/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource scopeConnection 'Microsoft.Network/networkManagers/scopeConnections@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + resourceId: subscription().id + tenantId: tenant().tenantId + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/main.bicep new file mode 100644 index 00000000..f8699de4 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource securityAdminConfiguration 'Microsoft.Network/networkManagers/securityAdminConfigurations@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + applyOnNetworkIntentPolicyBasedServices: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/main.bicep new file mode 100644 index 00000000..b519e9f1 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2022-09-01' = { + parent: networkManager + name: resourceName + properties: {} +} + +resource securityAdminConfiguration 'Microsoft.Network/networkManagers/securityAdminConfigurations@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + applyOnNetworkIntentPolicyBasedServices: [] + } +} + +resource ruleCollection 'Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections@2022-09-01' = { + parent: securityAdminConfiguration + name: resourceName + properties: { + appliesToGroups: [ + { + networkGroupId: networkGroup.id + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.bicep new file mode 100644 index 00000000..d0a631b8 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.bicep @@ -0,0 +1,61 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2022-09-01' = { + parent: networkManager + name: resourceName + properties: {} +} + +resource securityAdminConfiguration 'Microsoft.Network/networkManagers/securityAdminConfigurations@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + applyOnNetworkIntentPolicyBasedServices: [] + } +} + +resource ruleCollection 'Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections@2022-09-01' = { + parent: securityAdminConfiguration + name: resourceName + properties: { + appliesToGroups: [ + { + networkGroupId: networkGroup.id + } + ] + } +} + +resource rule 'Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules@2022-09-01' = { + parent: ruleCollection + name: resourceName + kind: 'Custom' + properties: { + access: 'Deny' + destinationPortRanges: [] + destinations: [] + direction: 'Outbound' + priority: 1 + protocol: 'Tcp' + sourcePortRanges: [] + sources: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/main.bicep new file mode 100644 index 00000000..4c463ad7 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource verifierWorkspace 'Microsoft.Network/networkManagers/verifierWorkspaces@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + description: 'A sample workspace' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.bicep new file mode 100644 index 00000000..4f07bad5 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.bicep @@ -0,0 +1,162 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The admin username for the virtual machine') +param adminUsername string +@secure() +@description('The admin password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: null + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: 'myosdisk1' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource verifierWorkspace 'Microsoft.Network/networkManagers/verifierWorkspaces@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + description: 'A sample workspace' + } +} + +resource reachabilityAnalysisIntent 'Microsoft.Network/networkManagers/verifierWorkspaces/reachabilityAnalysisIntents@2024-01-01-preview' = { + parent: verifierWorkspace + name: resourceName + properties: { + description: 'A sample reachability analysis intent' + destinationResourceId: virtualMachine.id + ipTraffic: { + destinationIps: [ + '10.4.0.1' + ] + destinationPorts: [ + '0' + ] + protocols: [ + 'Any' + ] + sourceIps: [ + '10.4.0.0' + ] + sourcePorts: [ + '0' + ] + } + sourceResourceId: virtualMachine.id + } +} + +resource reachabilityAnalysisRun 'Microsoft.Network/networkManagers/verifierWorkspaces/reachabilityAnalysisRuns@2024-01-01-preview' = { + parent: verifierWorkspace + name: resourceName + properties: { + description: 'A sample reachability analysis run' + intentId: reachabilityAnalysisIntent.id + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.bicep new file mode 100644 index 00000000..f2927748 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.bicep @@ -0,0 +1,151 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param vmAdminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: 'myosdisk1' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource verifierWorkspace 'Microsoft.Network/networkManagers/verifierWorkspaces@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + description: 'A sample workspace' + } +} + +resource reachabilityAnalysisIntent 'Microsoft.Network/networkManagers/verifierWorkspaces/reachabilityAnalysisIntents@2024-01-01-preview' = { + parent: verifierWorkspace + name: resourceName + properties: { + description: 'A sample reachability analysis intent' + destinationResourceId: virtualMachine.id + ipTraffic: { + destinationIps: [ + '10.4.0.1' + ] + destinationPorts: [ + '0' + ] + protocols: [ + 'Any' + ] + sourceIps: [ + '10.4.0.0' + ] + sourcePorts: [ + '0' + ] + } + sourceResourceId: virtualMachine.id + } +} diff --git a/settings/remarks/microsoft.network/samples/networkprofiles/main.bicep b/settings/remarks/microsoft.network/samples/networkprofiles/main.bicep new file mode 100644 index 00000000..d379f646 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkprofiles/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkProfile 'Microsoft.Network/networkProfiles@2022-07-01' = { + name: resourceName + location: location + properties: { + containerNetworkInterfaceConfigurations: [ + { + name: 'acctesteth-230630033653886950' + properties: { + ipConfigurations: [ + { + name: 'acctestipconfig-230630033653886950' + properties: { + subnet: { + id: subnet.id + } + } + } + ] + } + } + ] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.1.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.1.0.0/24' + delegations: [ + { + name: 'acctestdelegation-230630033653886950' + properties: { + serviceName: 'Microsoft.ContainerInstance/containerGroups' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networksecuritygroups/main.bicep b/settings/remarks/microsoft.network/samples/networksecuritygroups/main.bicep new file mode 100644 index 00000000..d3af0a1a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networksecuritygroups/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2022-07-01' = { + name: resourceName + location: location + properties: { + securityRules: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networksecuritygroups/securityrules/main.bicep b/settings/remarks/microsoft.network/samples/networksecuritygroups/securityrules/main.bicep new file mode 100644 index 00000000..320ba3a8 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networksecuritygroups/securityrules/main.bicep @@ -0,0 +1,31 @@ +param location string = 'westeurope' + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2022-07-01' = { + name: 'mi-security-group1-230630034008554952' + location: location + properties: { + securityRules: [] + } +} + +resource securityRule 'Microsoft.Network/networkSecurityGroups/securityRules@2022-09-01' = { + parent: networkSecurityGroup + name: 'allow_management_inbound' + properties: { + access: 'Allow' + destinationAddressPrefix: '*' + destinationPortRange: '' + destinationPortRanges: [ + '9000' + '1438' + '1440' + '9003' + '1452' + ] + direction: 'Inbound' + priority: 106 + protocol: 'Tcp' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkwatchers/flowlogs/main.bicep b/settings/remarks/microsoft.network/samples/networkwatchers/flowlogs/main.bicep new file mode 100644 index 00000000..cdd8bc20 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkwatchers/flowlogs/main.bicep @@ -0,0 +1,84 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2' + +resource networkWatchers 'Microsoft.Network/networkWatchers@2023-11-01' = { + name: resourceName + location: location + properties: {} +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource flowLog 'Microsoft.Network/networkWatchers/flowLogs@2023-11-01' = { + parent: networkWatchers + name: resourceName + location: location + properties: { + enabled: true + flowAnalyticsConfiguration: { + networkWatcherFlowAnalyticsConfiguration: { + enabled: false + } + } + format: { + type: 'JSON' + version: 2 + } + retentionPolicy: { + days: 7 + enabled: true + } + storageId: storageAccount.id + targetResourceId: virtualNetwork.id + } +} diff --git a/settings/remarks/microsoft.network/samples/networkwatchers/packetcaptures/main.bicep b/settings/remarks/microsoft.network/samples/networkwatchers/packetcaptures/main.bicep new file mode 100644 index 00000000..44ec5cb2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkwatchers/packetcaptures/main.bicep @@ -0,0 +1,136 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: '${resourceName}-nic' + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'ipconfig1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource networkWatcher 'Microsoft.Network/networkWatchers@2024-05-01' = { + name: '${resourceName}-nw' + location: location +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-03-01' = { + name: '${resourceName}-vm' + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_B1s' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + computerName: 'acctest0001-vm' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: '0001-com-ubuntu-server-jammy' + publisher: 'Canonical' + sku: '22_04-lts' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + name: 'acctest0001-osdisk' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + } +} + +resource extension 'Microsoft.Compute/virtualMachines/extensions@2024-03-01' = { + parent: virtualMachine + name: 'network-watcher' + location: location + properties: { + autoUpgradeMinorVersion: true + enableAutomaticUpgrade: false + publisher: 'Microsoft.Azure.NetworkWatcher' + suppressFailures: false + type: 'NetworkWatcherAgentLinux' + typeHandlerVersion: '1.4' + } +} + +resource packetCapture 'Microsoft.Network/networkWatchers/packetCaptures@2024-05-01' = { + parent: networkWatcher + name: '${resourceName}-pc' + properties: { + bytesToCapturePerPacket: 0 + storageLocation: { + filePath: '/var/captures/packet.cap' + } + target: virtualMachine.id + targetType: 'AzureVM' + timeLimitInSeconds: 18000 + totalBytesPerSession: 1073741824 + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/p2svpngateways/main.bicep b/settings/remarks/microsoft.network/samples/p2svpngateways/main.bicep new file mode 100644 index 00000000..e984562a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/p2svpngateways/main.bicep @@ -0,0 +1,98 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource p2svpnGateway 'Microsoft.Network/p2svpnGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + isRoutingPreferenceInternet: false + p2SConnectionConfigurations: [ + { + name: 'first' + properties: { + enableInternetSecurity: false + vpnClientAddressPool: { + addressPrefixes: [ + '172.100.0.0/14' + ] + } + } + } + ] + virtualHub: { + id: virtualHub.id + } + vpnGatewayScaleUnit: 1 + vpnServerConfiguration: { + id: vpnServerConfiguration.id + } + } +} + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.1.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnServerConfiguration 'Microsoft.Network/vpnServerConfigurations@2022-07-01' = { + name: resourceName + location: location + properties: { + vpnAuthenticationTypes: [ + 'Certificate' + ] + vpnClientIpsecPolicies: [] + vpnClientRevokedCertificates: [] + vpnClientRootCertificates: [ + { + name: 'DigiCert-Federated-ID-Root-CA' + publicCertData: '''MIIDuzCCAqOgAwIBAgIQCHTZWCM+IlfFIRXIvyKSrjANBgkqhkiG9w0BAQsFADBn +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSYwJAYDVQQDEx1EaWdpQ2VydCBGZWRlcmF0ZWQgSUQg +Um9vdCBDQTAeFw0xMzAxMTUxMjAwMDBaFw0zMzAxMTUxMjAwMDBaMGcxCzAJBgNV +BAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdp +Y2VydC5jb20xJjAkBgNVBAMTHURpZ2lDZXJ0IEZlZGVyYXRlZCBJRCBSb290IENB +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvAEB4pcCqnNNOWE6Ur5j +QPUH+1y1F9KdHTRSza6k5iDlXq1kGS1qAkuKtw9JsiNRrjltmFnzMZRBbX8Tlfl8 +zAhBmb6dDduDGED01kBsTkgywYPxXVTKec0WxYEEF0oMn4wSYNl0lt2eJAKHXjNf +GTwiibdP8CUR2ghSM2sUTI8Nt1Omfc4SMHhGhYD64uJMbX98THQ/4LMGuYegou+d +GTiahfHtjn7AboSEknwAMJHCh5RlYZZ6B1O4QbKJ+34Q0eKgnI3X6Vc9u0zf6DH8 +Dk+4zQDYRRTqTnVO3VT8jzqDlCRuNtq6YvryOWN74/dq8LQhUnXHvFyrsdMaE1X2 +DwIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNV +HQ4EFgQUGRdkFnbGt1EWjKwbUne+5OaZvRYwHwYDVR0jBBgwFoAUGRdkFnbGt1EW +jKwbUne+5OaZvRYwDQYJKoZIhvcNAQELBQADggEBAHcqsHkrjpESqfuVTRiptJfP +9JbdtWqRTmOf6uJi2c8YVqI6XlKXsD8C1dUUaaHKLUJzvKiazibVuBwMIT84AyqR +QELn3e0BtgEymEygMU569b01ZPxoFSnNXc7qDZBDef8WfqAV/sxkTi8L9BkmFYfL +uGLOhRJOFprPdoDIUBB+tmCl3oDcBy3vnUeOEioz8zAkprcb3GHwHAK+vHmmfgcn +WsfMLH4JCLa/tRYL+Rw/N3ybCkDp00s0WUZ+AoDywSl0Q/ZEnNY0MsFiw6LyIdbq +M/s/1JRtO3bDSzD9TazRVzn2oBqzSa8VgIo5C1nOnoAKJTlsClJKvIhnRlaLQqk= +''' + } + ] + vpnProtocols: [ + 'OpenVPN' + 'IkeV2' + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/a/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/a/main.bicep new file mode 100644 index 00000000..7bb08d43 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/a/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource a 'Microsoft.Network/privateDnsZones/A@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + aRecords: [ + { + ipv4Address: '1.2.4.5' + } + { + ipv4Address: '1.2.3.4' + } + ] + metadata: {} + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/aaaa/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/aaaa/main.bicep new file mode 100644 index 00000000..99fc0e37 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/aaaa/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource aaaa 'Microsoft.Network/privateDnsZones/AAAA@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + aaaaRecords: [ + { + ipv6Address: 'fd5d:70bc:930e:d008:0000:0000:0000:7334' + } + { + ipv6Address: 'fd5d:70bc:930e:d008::7335' + } + ] + metadata: {} + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/cname/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/cname/main.bicep new file mode 100644 index 00000000..65cbb0f0 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/cname/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource cname 'Microsoft.Network/privateDnsZones/CNAME@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + cnameRecord: { + cname: 'contoso.com' + } + metadata: {} + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/main.bicep new file mode 100644 index 00000000..99dce4b2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/main.bicep @@ -0,0 +1,6 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/mx/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/mx/main.bicep new file mode 100644 index 00000000..b05473d2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/mx/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource mx 'Microsoft.Network/privateDnsZones/MX@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + metadata: {} + mxRecords: [ + { + exchange: 'mx1.contoso.com' + preference: 10 + } + { + exchange: 'mx2.contoso.com' + preference: 10 + } + ] + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/ptr/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/ptr/main.bicep new file mode 100644 index 00000000..8ecd0b9d --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/ptr/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '230630033756174960.0.10.in-addr.arpa' + location: 'global' +} + +resource ptr 'Microsoft.Network/privateDnsZones/PTR@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + metadata: {} + ptrRecords: [ + { + ptrdname: 'test2.contoso.com' + } + { + ptrdname: 'test.contoso.com' + } + ] + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/srv/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/srv/main.bicep new file mode 100644 index 00000000..87ccaa37 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/srv/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource srv 'Microsoft.Network/privateDnsZones/SRV@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + metadata: {} + srvRecords: [ + { + port: 8080 + priority: 10 + target: 'target2.contoso.com' + weight: 10 + } + { + port: 8080 + priority: 1 + target: 'target1.contoso.com' + weight: 5 + } + ] + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/txt/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/txt/main.bicep new file mode 100644 index 00000000..7aa2e867 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/txt/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource txt 'Microsoft.Network/privateDnsZones/TXT@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + metadata: {} + ttl: 300 + txtRecords: [ + { + value: [ + 'Quick brown fox' + ] + } + { + value: [ + 'A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text.....' + '.A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text....' + '..A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......' + ] + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/virtualnetworklinks/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/virtualnetworklinks/main.bicep new file mode 100644 index 00000000..7ab26db9 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/virtualnetworklinks/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [ + { + name: 'subnet1' + properties: { + addressPrefix: '10.0.1.0/24' + } + } + ] + } +} + +resource virtualNetworkLink 'Microsoft.Network/privateDnsZones/virtualNetworkLinks@2018-09-01' = { + parent: privateDnsZone + name: resourceName + location: 'global' + properties: { + registrationEnabled: false + virtualNetwork: { + id: virtualNetwork.id + } + } +} diff --git a/settings/remarks/microsoft.network/samples/privateendpoints/main.bicep b/settings/remarks/microsoft.network/samples/privateendpoints/main.bicep new file mode 100644 index 00000000..5b34231c --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privateendpoints/main.bicep @@ -0,0 +1,121 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadBalancer 'Microsoft.Network/loadBalancers@2022-07-01' = { + name: resourceName + location: location + properties: { + frontendIPConfigurations: [ + { + name: 'acctest0001' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource privateEndpoint 'Microsoft.Network/privateEndpoints@2022-07-01' = { + name: resourceName + location: location + properties: { + privateLinkServiceConnections: [ + { + name: privateLinkService.name + properties: { + privateLinkServiceId: privateLinkService.id + } + } + ] + subnet: { + id: subnet.id + } + } +} + +resource privateLinkService 'Microsoft.Network/privateLinkServices@2022-07-01' = { + name: resourceName + location: location + properties: { + autoApproval: { + subscriptions: [] + } + enableProxyProtocol: false + fqdns: [] + ipConfigurations: [ + { + name: 'primaryIpConfiguration-230630033653892379' + properties: { + primary: true + privateIPAddress: '' + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + loadBalancerFrontendIpConfigurations: [ + { + id: loadBalancer.properties.frontendIPConfigurations[0].id + } + ] + visibility: { + subscriptions: [] + } + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.5.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.5.4.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Disabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/privatelinkservices/main.bicep b/settings/remarks/microsoft.network/samples/privatelinkservices/main.bicep new file mode 100644 index 00000000..c7599831 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatelinkservices/main.bicep @@ -0,0 +1,103 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadBalancer 'Microsoft.Network/loadBalancers@2022-07-01' = { + name: resourceName + location: location + properties: { + frontendIPConfigurations: [ + { + name: 'acctest0001' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource privateLinkService 'Microsoft.Network/privateLinkServices@2022-07-01' = { + name: resourceName + location: location + properties: { + autoApproval: { + subscriptions: [] + } + enableProxyProtocol: false + fqdns: [] + ipConfigurations: [ + { + name: 'primaryIpConfiguration-230630033653892379' + properties: { + primary: true + privateIPAddress: '' + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + loadBalancerFrontendIpConfigurations: [ + { + id: loadBalancer.properties.frontendIPConfigurations[0].id + } + ] + visibility: { + subscriptions: [] + } + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.5.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.5.4.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Disabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/publicipaddresses/main.bicep b/settings/remarks/microsoft.network/samples/publicipaddresses/main.bicep new file mode 100644 index 00000000..29e4848b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/publicipaddresses/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} diff --git a/settings/remarks/microsoft.network/samples/publicipprefixes/main.bicep b/settings/remarks/microsoft.network/samples/publicipprefixes/main.bicep new file mode 100644 index 00000000..0dd39432 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/publicipprefixes/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource publicIPPrefix 'Microsoft.Network/publicIPPrefixes@2022-07-01' = { + name: resourceName + location: location + properties: { + prefixLength: 30 + publicIPAddressVersion: 'IPv4' + } + sku: { + name: 'Standard' + } + zones: [ + '1' + ] +} diff --git a/settings/remarks/microsoft.network/samples/routefilters/main.bicep b/settings/remarks/microsoft.network/samples/routefilters/main.bicep new file mode 100644 index 00000000..7fa79b76 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/routefilters/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource routeFilter 'Microsoft.Network/routeFilters@2022-09-01' = { + name: resourceName + location: location + properties: { + rules: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/routetables/main.bicep b/settings/remarks/microsoft.network/samples/routetables/main.bicep new file mode 100644 index 00000000..c17b7426 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/routetables/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource routeTable 'Microsoft.Network/routeTables@2022-09-01' = { + name: resourceName + location: location + properties: { + disableBgpRoutePropagation: false + routes: [ + { + name: 'first' + properties: { + addressPrefix: '10.100.0.0/14' + nextHopIpAddress: '10.10.1.1' + nextHopType: 'VirtualAppliance' + } + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/routetables/routes/main.bicep b/settings/remarks/microsoft.network/samples/routetables/routes/main.bicep new file mode 100644 index 00000000..fbbc0620 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/routetables/routes/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource routeTable 'Microsoft.Network/routeTables@2022-09-01' = { + name: resourceName + location: location + properties: { + disableBgpRoutePropagation: false + } +} + +resource route 'Microsoft.Network/routeTables/routes@2022-09-01' = { + parent: routeTable + name: resourceName + properties: { + addressPrefix: '10.1.0.0/16' + nextHopType: 'VnetLocal' + } +} diff --git a/settings/remarks/microsoft.network/samples/securitypartnerproviders/main.bicep b/settings/remarks/microsoft.network/samples/securitypartnerproviders/main.bicep new file mode 100644 index 00000000..067ac732 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/securitypartnerproviders/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource securityPartnerProvider 'Microsoft.Network/securityPartnerProviders@2022-07-01' = { + name: resourceName + location: location + properties: { + securityProviderName: 'ZScaler' + } +} diff --git a/settings/remarks/microsoft.network/samples/serviceendpointpolicies/main.bicep b/settings/remarks/microsoft.network/samples/serviceendpointpolicies/main.bicep new file mode 100644 index 00000000..82823612 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/serviceendpointpolicies/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serviceEndpointPolicy 'Microsoft.Network/serviceEndpointPolicies@2022-07-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/azureendpoints/main.bicep b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/azureendpoints/main.bicep new file mode 100644 index 00000000..70fa6158 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/azureendpoints/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + dnsSettings: { + domainNameLabel: 'acctestpublicip-230630034107607730' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Basic' + tier: 'Regional' + } +} + +resource trafficManagerProfile 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctest-tmp-230630034107607730' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Weighted' + } +} + +resource azureendpoint 'Microsoft.Network/trafficManagerProfiles/AzureEndpoints@2018-08-01' = { + parent: trafficManagerProfile + name: resourceName + properties: { + customHeaders: [] + endpointStatus: 'Enabled' + subnets: [] + targetResourceId: publicIPAddress.id + weight: 3 + } +} diff --git a/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/externalendpoints/main.bicep b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/externalendpoints/main.bicep new file mode 100644 index 00000000..c36d8655 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/externalendpoints/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' + +resource trafficManagerProfile 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctest-tmp-230630034107608613' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Weighted' + } +} + +resource externalendpoint 'Microsoft.Network/trafficManagerProfiles/ExternalEndpoints@2018-08-01' = { + parent: trafficManagerProfile + name: resourceName + properties: { + customHeaders: [] + endpointStatus: 'Enabled' + subnets: [] + target: 'www.example.com' + weight: 3 + } +} diff --git a/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/main.bicep b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/main.bicep new file mode 100644 index 00000000..949706d6 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' + +resource trafficManagerProfile 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctest-tmp-230630034107605443' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Weighted' + } +} diff --git a/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/nestedendpoints/main.bicep b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/nestedendpoints/main.bicep new file mode 100644 index 00000000..d212ad08 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/nestedendpoints/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' + +resource trafficManagerProfile 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctest-tmp-230630034107605443' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Weighted' + } +} + +resource trafficManagerProfile2 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctesttmpchild230630034107605443' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Priority' + } +} + +resource nestedendpoint 'Microsoft.Network/trafficManagerProfiles/NestedEndpoints@2018-08-01' = { + parent: trafficManagerProfile + name: resourceName + properties: { + customHeaders: [] + endpointStatus: 'Enabled' + minChildEndpoints: 5 + subnets: [] + targetResourceId: trafficManagerProfile2.id + weight: 3 + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualhubs/hubvirtualnetworkconnections/main.bicep b/settings/remarks/microsoft.network/samples/virtualhubs/hubvirtualnetworkconnections/main.bicep new file mode 100644 index 00000000..7a49570d --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualhubs/hubvirtualnetworkconnections/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.2.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.5.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource hubVirtualNetworkConnection 'Microsoft.Network/virtualHubs/hubVirtualNetworkConnections@2022-07-01' = { + parent: virtualHub + name: resourceName + properties: { + enableInternetSecurity: false + remoteVirtualNetwork: { + id: virtualNetwork.id + } + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualhubs/ipconfigurations/main.bicep b/settings/remarks/microsoft.network/samples/virtualhubs/ipconfigurations/main.bicep new file mode 100644 index 00000000..253cb161 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualhubs/ipconfigurations/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + hubRoutingPreference: 'ExpressRoute' + sku: 'Standard' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.5.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource ipConfiguration 'Microsoft.Network/virtualHubs/ipConfigurations@2022-07-01' = { + parent: virtualHub + name: resourceName + properties: { + privateIPAddress: '10.5.1.18' + privateIPAllocationMethod: 'Static' + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'RouteServerSubnet' + properties: { + addressPrefix: '10.5.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualhubs/main.bicep b/settings/remarks/microsoft.network/samples/virtualhubs/main.bicep new file mode 100644 index 00000000..db3e41d4 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualhubs/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.0.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworkgateways/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworkgateways/main.bicep new file mode 100644 index 00000000..0700cc08 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworkgateways/main.bicep @@ -0,0 +1,81 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.6.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + activeActive: false + enableBgp: false + enablePrivateIpAddress: false + gatewayType: 'ExpressRoute' + ipConfigurations: [ + { + name: 'vnetGatewayConfig' + properties: { + privateIPAllocationMethod: 'Dynamic' + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + } + ] + sku: { + name: 'Standard' + tier: 'Standard' + } + vpnType: 'RouteBased' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'GatewaySubnet' + properties: { + addressPrefix: '10.6.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworkgateways/natrules/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworkgateways/natrules/main.bicep new file mode 100644 index 00000000..04af3a1b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworkgateways/natrules/main.bicep @@ -0,0 +1,97 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Dynamic' + } + sku: { + name: 'Basic' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + activeActive: false + enableBgp: false + enablePrivateIpAddress: false + gatewayType: 'Vpn' + ipConfigurations: [ + { + name: 'vnetGatewayConfig' + properties: { + privateIPAllocationMethod: 'Dynamic' + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + } + ] + sku: { + name: 'Basic' + tier: 'Basic' + } + vpnType: 'RouteBased' + } +} + +resource natRule 'Microsoft.Network/virtualNetworkGateways/natRules@2022-07-01' = { + parent: virtualNetworkGateway + name: resourceName + properties: { + externalMappings: [ + { + addressSpace: '10.1.0.0/26' + } + ] + internalMappings: [ + { + addressSpace: '10.3.0.0/26' + } + ] + mode: 'EgressSnat' + type: 'Static' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'GatewaySubnet' + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/main.bicep new file mode 100644 index 00000000..18df0706 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/main.bicep new file mode 100644 index 00000000..0e4b671a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/withipampool/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/withipampool/main.bicep new file mode 100644 index 00000000..2b635d67 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/withipampool/main.bicep @@ -0,0 +1,63 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2024-05-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource vnetWithipam 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + ipamPoolPrefixAllocations: [ + { + numberOfIpAddresses: '100' + pool: { + id: ipamPool.id + } + } + ] + } + } +} + +resource ipamPool 'Microsoft.Network/networkManagers/ipamPools@2024-05-01' = { + parent: networkManager + name: resourceName + location: location + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + description: 'Test description.' + displayName: 'testDisplayName' + parentPoolName: '' + } +} + +resource subnetWithipam 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: vnetWithipam + name: resourceName + properties: { + ipamPoolPrefixAllocations: [ + { + numberOfIpAddresses: '100' + pool: { + id: ipamPool.id + } + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/virtualnetworkpeerings/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/virtualnetworkpeerings/main.bicep new file mode 100644 index 00000000..47562156 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/virtualnetworkpeerings/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource workspace 'Microsoft.Databricks/workspaces@2023-02-01' = { + name: resourceName + location: location + properties: { + managedResourceGroupId: resourceId('Microsoft.Resources/resourceGroups', 'databricks-rg-${resourceName}') + parameters: { + prepareEncryption: { + value: false + } + requireInfrastructureEncryption: { + value: false + } + } + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'standard' + } +} + +resource virtualNetworkPeering 'Microsoft.Databricks/workspaces/virtualNetworkPeerings@2023-02-01' = { + parent: workspace + name: resourceName + properties: { + allowForwardedTraffic: false + allowGatewayTransit: false + allowVirtualNetworkAccess: true + databricksAddressSpace: { + addressPrefixes: [ + '10.139.0.0/16' + ] + } + remoteAddressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + remoteVirtualNetwork: { + id: virtualNetwork.id + } + useRemoteGateways: false + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/withipampool/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/withipampool/main.bicep new file mode 100644 index 00000000..e4b6953c --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/withipampool/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2024-05-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource vnetWithipam 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + ipamPoolPrefixAllocations: [ + { + numberOfIpAddresses: '100' + pool: { + id: ipamPool.id + } + } + ] + } + } +} + +resource ipamPool 'Microsoft.Network/networkManagers/ipamPools@2024-05-01' = { + parent: networkManager + name: resourceName + location: location + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + description: 'Test description.' + displayName: 'testDisplayName' + parentPoolName: '' + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualwans/main.bicep b/settings/remarks/microsoft.network/samples/virtualwans/main.bicep new file mode 100644 index 00000000..8552f4bf --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualwans/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} diff --git a/settings/remarks/microsoft.network/samples/vpngateways/main.bicep b/settings/remarks/microsoft.network/samples/vpngateways/main.bicep new file mode 100644 index 00000000..dc050d57 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpngateways/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.0.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnGateway 'Microsoft.Network/vpnGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + enableBgpRouteTranslationForNat: false + isRoutingPreferenceInternet: false + virtualHub: { + id: virtualHub.id + } + vpnGatewayScaleUnit: 1 + } +} diff --git a/settings/remarks/microsoft.network/samples/vpngateways/natrules/main.bicep b/settings/remarks/microsoft.network/samples/vpngateways/natrules/main.bicep new file mode 100644 index 00000000..64be60e1 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpngateways/natrules/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.0.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnGateway 'Microsoft.Network/vpnGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + enableBgpRouteTranslationForNat: false + isRoutingPreferenceInternet: false + virtualHub: { + id: virtualHub.id + } + vpnGatewayScaleUnit: 1 + } +} + +resource natRule 'Microsoft.Network/vpnGateways/natRules@2022-07-01' = { + parent: vpnGateway + name: resourceName + properties: { + externalMappings: [ + { + addressSpace: '192.168.21.0/26' + } + ] + internalMappings: [ + { + addressSpace: '10.4.0.0/26' + } + ] + mode: 'EgressSnat' + type: 'Static' + } +} diff --git a/settings/remarks/microsoft.network/samples/vpngateways/vpnconnections/main.bicep b/settings/remarks/microsoft.network/samples/vpngateways/vpnconnections/main.bicep new file mode 100644 index 00000000..df767738 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpngateways/vpnconnections/main.bicep @@ -0,0 +1,127 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.0.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnGateway 'Microsoft.Network/vpnGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + enableBgpRouteTranslationForNat: false + isRoutingPreferenceInternet: false + virtualHub: { + id: virtualHub.id + } + vpnGatewayScaleUnit: 1 + } +} + +resource vpnSite 'Microsoft.Network/vpnSites@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + virtualWan: { + id: virtualWan.id + } + vpnSiteLinks: [ + { + name: 'link1' + properties: { + fqdn: '' + ipAddress: '10.0.1.1' + linkProperties: { + linkProviderName: '' + linkSpeedInMbps: 0 + } + } + } + { + name: 'link2' + properties: { + fqdn: '' + ipAddress: '10.0.1.2' + linkProperties: { + linkProviderName: '' + linkSpeedInMbps: 0 + } + } + } + ] + } +} + +resource vpnConnection 'Microsoft.Network/vpnGateways/vpnConnections@2022-07-01' = { + parent: vpnGateway + name: resourceName + properties: { + enableInternetSecurity: false + remoteVpnSite: { + id: vpnSite.id + } + vpnLinkConnections: [ + { + name: 'link1' + properties: { + connectionBandwidth: 10 + enableBgp: false + enableRateLimiting: false + routingWeight: 0 + useLocalAzureIpAddress: false + usePolicyBasedTrafficSelectors: false + vpnConnectionProtocolType: 'IKEv2' + vpnGatewayCustomBgpAddresses: [] + vpnLinkConnectionMode: 'Default' + vpnSiteLink: { + id: resourceId('Microsoft.Network/vpnSites/vpnSiteLinks', vpnSite.name, 'link1') + } + } + } + { + name: 'link2' + properties: { + connectionBandwidth: 10 + enableBgp: false + enableRateLimiting: false + routingWeight: 0 + useLocalAzureIpAddress: false + usePolicyBasedTrafficSelectors: false + vpnConnectionProtocolType: 'IKEv2' + vpnGatewayCustomBgpAddresses: [] + vpnLinkConnectionMode: 'Default' + vpnSiteLink: { + id: resourceId('Microsoft.Network/vpnSites/vpnSiteLinks', vpnSite.name, 'link2') + } + } + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/vpnserverconfigurations/configurationpolicygroups/main.bicep b/settings/remarks/microsoft.network/samples/vpnserverconfigurations/configurationpolicygroups/main.bicep new file mode 100644 index 00000000..0d5158ba --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpnserverconfigurations/configurationpolicygroups/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The RADIUS server secret for VPN authentication') +param radiusServerSecret string + +resource vpnServerConfiguration 'Microsoft.Network/vpnServerConfigurations@2022-07-01' = { + name: resourceName + location: location + properties: { + radiusClientRootCertificates: [] + radiusServerAddress: '' + radiusServerRootCertificates: [] + radiusServerSecret: '' + radiusServers: [ + { + radiusServerAddress: '10.105.1.1' + radiusServerScore: 15 + radiusServerSecret: null + } + ] + vpnAuthenticationTypes: [ + 'Radius' + ] + vpnClientIpsecPolicies: [] + vpnClientRevokedCertificates: [] + vpnClientRootCertificates: [] + vpnProtocols: [ + 'OpenVPN' + 'IkeV2' + ] + } +} + +resource configurationPolicyGroup 'Microsoft.Network/vpnServerConfigurations/configurationPolicyGroups@2022-07-01' = { + parent: vpnServerConfiguration + name: resourceName + properties: { + isDefault: false + policyMembers: [ + { + attributeType: 'RadiusAzureGroupId' + attributeValue: '6ad1bd08' + name: 'policy1' + } + ] + priority: 0 + } +} diff --git a/settings/remarks/microsoft.network/samples/vpnserverconfigurations/main.bicep b/settings/remarks/microsoft.network/samples/vpnserverconfigurations/main.bicep new file mode 100644 index 00000000..74eefeea --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpnserverconfigurations/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The RADIUS server secret for VPN server configuration') +param radiusServerSecret string + +resource vpnServerConfiguration 'Microsoft.Network/vpnServerConfigurations@2022-07-01' = { + name: resourceName + location: location + properties: { + radiusClientRootCertificates: [] + radiusServerAddress: '' + radiusServerRootCertificates: [] + radiusServerSecret: null + radiusServers: [ + { + radiusServerAddress: '10.105.1.1' + radiusServerScore: 15 + radiusServerSecret: null + } + ] + vpnAuthenticationTypes: [ + 'Radius' + ] + vpnClientIpsecPolicies: [] + vpnClientRevokedCertificates: [] + vpnClientRootCertificates: [] + vpnProtocols: [ + 'OpenVPN' + 'IkeV2' + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/vpnsites/main.bicep b/settings/remarks/microsoft.network/samples/vpnsites/main.bicep new file mode 100644 index 00000000..088159a6 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpnsites/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnSite 'Microsoft.Network/vpnSites@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + virtualWan: { + id: virtualWan.id + } + vpnSiteLinks: [ + { + name: 'link1' + properties: { + fqdn: '' + ipAddress: '10.0.1.1' + linkProperties: { + linkProviderName: '' + linkSpeedInMbps: 0 + } + } + } + { + name: 'link2' + properties: { + fqdn: '' + ipAddress: '10.0.1.2' + linkProperties: { + linkProviderName: '' + linkSpeedInMbps: 0 + } + } + } + ] + } +} diff --git a/settings/remarks/microsoft.networkfunction/samples/azuretrafficcollectors/main.bicep b/settings/remarks/microsoft.networkfunction/samples/azuretrafficcollectors/main.bicep new file mode 100644 index 00000000..58a64dd3 --- /dev/null +++ b/settings/remarks/microsoft.networkfunction/samples/azuretrafficcollectors/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource azureTrafficCollector 'Microsoft.NetworkFunction/azureTrafficCollectors@2022-11-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.notificationhubs/samples/namespaces/main.bicep b/settings/remarks/microsoft.notificationhubs/samples/namespaces/main.bicep new file mode 100644 index 00000000..0f5e42f9 --- /dev/null +++ b/settings/remarks/microsoft.notificationhubs/samples/namespaces/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.NotificationHubs/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: { + enabled: true + namespaceType: 'NotificationHub' + region: 'westeurope' + } + sku: { + name: 'Free' + } +} diff --git a/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/authorizationrules/main.bicep b/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/authorizationrules/main.bicep new file mode 100644 index 00000000..a0ecd04f --- /dev/null +++ b/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/authorizationrules/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.NotificationHubs/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: { + enabled: true + namespaceType: 'NotificationHub' + region: 'westeurope' + } + sku: { + name: 'Free' + } +} + +resource notificationHub 'Microsoft.NotificationHubs/namespaces/notificationHubs@2017-04-01' = { + parent: namespace + name: resourceName + location: location + properties: {} +} + +resource authorizationRule 'Microsoft.NotificationHubs/namespaces/notificationHubs/authorizationRules@2017-04-01' = { + parent: notificationHub + name: resourceName + properties: { + rights: [ + 'Listen' + ] + } +} diff --git a/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/main.bicep b/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/main.bicep new file mode 100644 index 00000000..a64a6b66 --- /dev/null +++ b/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.NotificationHubs/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: { + enabled: true + namespaceType: 'NotificationHub' + region: 'westeurope' + } + sku: { + name: 'Free' + } +} + +resource notificationHub 'Microsoft.NotificationHubs/namespaces/notificationHubs@2017-04-01' = { + parent: namespace + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/clusters/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/clusters/main.bicep new file mode 100644 index 00000000..1accf041 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/clusters/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.OperationalInsights/clusters@2020-08-01' = { + name: resourceName + location: location + sku: { + capacity: 1000 + name: 'CapacityReservation' + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/querypacks/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/querypacks/main.bicep new file mode 100644 index 00000000..6000b7c6 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/querypacks/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource queryPack 'Microsoft.OperationalInsights/queryPacks@2019-09-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/querypacks/queries/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/querypacks/queries/main.bicep new file mode 100644 index 00000000..45473f5d --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/querypacks/queries/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource queryPack 'Microsoft.OperationalInsights/queryPacks@2019-09-01' = { + name: resourceName + location: location + properties: {} +} + +resource query 'Microsoft.OperationalInsights/queryPacks/queries@2019-09-01' = { + parent: queryPack + name: 'aca50e92-d3e6-8f7d-1f70-2ec7adc1a926' + properties: { + body: ''' let newExceptionsTimeRange = 1d; + let timeRangeToCheckBefore = 7d; + exceptions + | where timestamp < ago(timeRangeToCheckBefore) + | summarize count() by problemId + | join kind= rightanti ( + exceptions + | where timestamp >= ago(newExceptionsTimeRange) + | extend stack = tostring(details[0].rawStack) + | summarize count(), dcount(user_AuthenticatedId), min(timestamp), max(timestamp), any(stack) by problemId + ) on problemId + | order by count_ desc +''' + displayName: 'Exceptions - New in the last 24 hours' + related: {} + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/dataexports/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/dataexports/main.bicep new file mode 100644 index 00000000..c2af68a5 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/dataexports/main.bicep @@ -0,0 +1,72 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource dataExport 'Microsoft.OperationalInsights/workspaces/dataExports@2020-08-01' = { + parent: workspace + name: resourceName + properties: { + destination: { + resourceId: storageAccount.id + } + enable: false + tableNames: [ + 'Heartbeat' + ] + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/datasources/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/datasources/main.bicep new file mode 100644 index 00000000..5ba8c4da --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/datasources/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource dataSource 'Microsoft.OperationalInsights/workspaces/dataSources@2020-08-01' = { + parent: workspace + name: resourceName + kind: 'WindowsPerformanceCounter' + properties: { + counterName: 'CPU' + instanceName: '*' + intervalSeconds: 10 + objectName: 'CPU' + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedservices/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedservices/main.bicep new file mode 100644 index 00000000..c25e31ac --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedservices/main.bicep @@ -0,0 +1,44 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource linkedService 'Microsoft.OperationalInsights/workspaces/linkedServices@2020-08-01' = { + parent: workspace + name: 'Automation' + properties: { + resourceId: automationAccount.id + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedstorageaccounts/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedstorageaccounts/main.bicep new file mode 100644 index 00000000..05d122f7 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedstorageaccounts/main.bicep @@ -0,0 +1,68 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource linkedStorageAccount 'Microsoft.OperationalInsights/workspaces/linkedStorageAccounts@2020-08-01' = { + parent: workspace + name: 'CustomLogs' + properties: { + storageAccountIds: [ + storageAccount.id + ] + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/main.bicep new file mode 100644 index 00000000..9079a531 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/savedsearches/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/savedsearches/main.bicep new file mode 100644 index 00000000..f51a1484 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/savedsearches/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource savedSearch 'Microsoft.OperationalInsights/workspaces/savedSearches@2020-08-01' = { + parent: workspace + name: resourceName + properties: { + category: 'Saved Search Test Category' + displayName: 'Create or Update Saved Search Test' + functionAlias: '' + query: 'Heartbeat | summarize Count() by Computer | take a' + tags: [] + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/storageinsightconfigs/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/storageinsightconfigs/main.bicep new file mode 100644 index 00000000..d1e20186 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/storageinsightconfigs/main.bicep @@ -0,0 +1,69 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource storageInsightConfig 'Microsoft.OperationalInsights/workspaces/storageInsightConfigs@2020-08-01' = { + parent: workspace + name: resourceName + properties: { + storageAccount: { + id: storageAccount.id + key: storageAccount.listKeys().keys[0].value + } + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/auditlog/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/auditlog/main.bicep new file mode 100644 index 00000000..c12edf51 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/auditlog/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +var auditLogTableName = 'AuditLog_CL' +var auditLogColumns = {} // TODO: Complex type needs manual conversion + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource table 'Microsoft.OperationalInsights/workspaces/tables@2022-10-01' = { + parent: workspace + name: auditLogTableName + properties: { + schema: { + name: auditLogTableName + columns: auditLogColumns + } + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/basic/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/basic/main.bicep new file mode 100644 index 00000000..3625aa63 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/basic/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +var sentinelTiAlertsTableName = 'SentinelTIAlerts_CL' +var sentinelTiAlertsColumns = {} // TODO: Complex type needs manual conversion + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource table 'Microsoft.OperationalInsights/workspaces/tables@2022-10-01' = { + parent: workspace + name: sentinelTiAlertsTableName + properties: { + schema: { + name: sentinelTiAlertsTableName + columns: sentinelTiAlertsColumns + } + retentionInDays: 30 + totalRetentionInDays: 30 + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/datacollectionlogs/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/datacollectionlogs/main.bicep new file mode 100644 index 00000000..28eb2695 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/datacollectionlogs/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +var dataCollectionLogColumns = {} // TODO: Complex type needs manual conversion +var dataCollectionLogTableName = 'DataCollectionLog_CL' + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource table 'Microsoft.OperationalInsights/workspaces/tables@2022-10-01' = { + parent: workspace + name: dataCollectionLogTableName + properties: { + schema: { + name: dataCollectionLogTableName + columns: dataCollectionLogColumns + } + } +} diff --git a/settings/remarks/microsoft.operationsmanagement/samples/solutions/main.bicep b/settings/remarks/microsoft.operationsmanagement/samples/solutions/main.bicep new file mode 100644 index 00000000..d2fa20f2 --- /dev/null +++ b/settings/remarks/microsoft.operationsmanagement/samples/solutions/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource solution 'Microsoft.OperationsManagement/solutions@2015-11-01-preview' = { + name: 'ContainerInsights(${resourceName})' + location: location + plan: { + name: 'ContainerInsights(acctest0001)' + product: 'OMSGallery/ContainerInsights' + promotionCode: '' + publisher: 'Microsoft' + } + properties: { + workspaceResourceId: workspace.id + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + sku: { + name: 'PerGB2018' + } + } +} diff --git a/settings/remarks/microsoft.orbital/samples/spacecrafts/main.bicep b/settings/remarks/microsoft.orbital/samples/spacecrafts/main.bicep new file mode 100644 index 00000000..9fea2ed7 --- /dev/null +++ b/settings/remarks/microsoft.orbital/samples/spacecrafts/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource spacecraft 'Microsoft.Orbital/spacecrafts@2022-11-01' = { + name: resourceName + location: location + properties: { + links: [ + { + bandwidthMHz: 100 + centerFrequencyMHz: 101 + direction: 'Uplink' + name: 'linkname' + polarization: 'LHCP' + } + ] + noradId: '12345' + titleLine: 'AQUA' + tleLine1: '1 23455U 94089A 97320.90946019 .00000140 00000-0 10191-3 0 2621' + tleLine2: '2 23455 99.0090 272.6745 0008546 223.1686 136.8816 14.11711747148495' + } +} diff --git a/settings/remarks/microsoft.policyinsights/samples/remediations/main.bicep b/settings/remarks/microsoft.policyinsights/samples/remediations/main.bicep new file mode 100644 index 00000000..416c116c --- /dev/null +++ b/settings/remarks/microsoft.policyinsights/samples/remediations/main.bicep @@ -0,0 +1,34 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyAssignment 'Microsoft.Authorization/policyAssignments@2022-06-01' = { + name: resourceName + properties: { + displayName: '' + enforcementMode: 'Default' + parameters: { + listOfAllowedLocations: { + value: [ + 'West Europe' + 'West US 2' + 'East US 2' + ] + } + } + policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/e56962a6-4747-49cd-b67b-bf8b01975c4c' + scope: subscription().id + } +} + +resource remediation 'Microsoft.PolicyInsights/remediations@2021-10-01' = { + name: resourceName + properties: { + filters: { + locations: [] + } + policyAssignmentId: policyAssignment.id + policyDefinitionReferenceId: '' + resourceDiscoveryMode: 'ExistingNonCompliant' + } +} diff --git a/settings/remarks/microsoft.portal/samples/dashboards/main.bicep b/settings/remarks/microsoft.portal/samples/dashboards/main.bicep new file mode 100644 index 00000000..18c8f0ca --- /dev/null +++ b/settings/remarks/microsoft.portal/samples/dashboards/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dashboard 'Microsoft.Portal/dashboards@2019-01-01-preview' = { + name: resourceName + location: location + properties: { + lenses: {} + } +} diff --git a/settings/remarks/microsoft.powerbidedicated/samples/capacities/main.bicep b/settings/remarks/microsoft.powerbidedicated/samples/capacities/main.bicep new file mode 100644 index 00000000..f9f6c53c --- /dev/null +++ b/settings/remarks/microsoft.powerbidedicated/samples/capacities/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource capacity 'Microsoft.PowerBIDedicated/capacities@2021-01-01' = { + name: resourceName + location: location + properties: { + administration: { + members: [ + deployer().objectId + ] + } + mode: 'Gen2' + } + sku: { + name: 'A1' + } +} diff --git a/settings/remarks/microsoft.purview/samples/accounts/main.bicep b/settings/remarks/microsoft.purview/samples/accounts/main.bicep new file mode 100644 index 00000000..0f6843fe --- /dev/null +++ b/settings/remarks/microsoft.purview/samples/accounts/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.Purview/accounts@2021-07-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/backupconfig/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupconfig/main.bicep new file mode 100644 index 00000000..da8cea45 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupconfig/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2024-04-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource softDeleteRetentionPeriodInDays 'Microsoft.RecoveryServices/vaults/backupconfig@2024-04-01' = { + parent: vault + name: 'vaultconfig' + properties: { + softDeleteRetentionPeriodInDays: 14 + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/backuppolicies/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/backuppolicies/main.bicep new file mode 100644 index 00000000..7401e9df --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/backuppolicies/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource backupPolicy 'Microsoft.RecoveryServices/vaults/backupPolicies@2023-02-01' = { + parent: vault + name: resourceName + properties: { + backupManagementType: 'AzureStorage' + retentionPolicy: { + dailySchedule: { + retentionDuration: { + count: 10 + durationType: 'Days' + } + retentionTimes: [ + '2018-07-30T23:00:00Z' + ] + } + retentionPolicyType: 'LongTermRetentionPolicy' + } + schedulePolicy: { + schedulePolicyType: 'SimpleSchedulePolicy' + scheduleRunFrequency: 'Daily' + scheduleRunTimes: [ + '2018-07-30T23:00:00Z' + ] + } + timeZone: 'UTC' + workLoadType: 'AzureFileShare' + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/backupresourceguardproxies/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupresourceguardproxies/main.bicep new file mode 100644 index 00000000..376afd38 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupresourceguardproxies/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource resourceGuard 'Microsoft.DataProtection/resourceGuards@2022-04-01' = { + name: resourceName + location: location + properties: { + vaultCriticalOperationExclusionList: [] + } +} + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource backupResourceGuardProxy 'Microsoft.RecoveryServices/vaults/backupResourceGuardProxies@2023-02-01' = { + parent: vault + name: resourceName + properties: { + resourceGuardResourceId: resourceGuard.id + } + type: 'Microsoft.RecoveryServices/vaults/backupResourceGuardProxies' +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/backupstorageconfig/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupstorageconfig/main.bicep new file mode 100644 index 00000000..8e5323d9 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupstorageconfig/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource backupStorageConfig 'Microsoft.RecoveryServices/vaults/backupStorageConfig@2023-02-01' = { + parent: vault + name: 'vaultstorageconfig' + properties: { + crossRegionRestoreFlag: false + storageModelType: 'GeoRedundant' + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/main.bicep new file mode 100644 index 00000000..002b46b9 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/main.bicep new file mode 100644 index 00000000..66e5d2b2 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westus2' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource replicationFabric2 'Microsoft.RecoveryServices/vaults/replicationFabrics@2022-10-01' = { + parent: vault + name: resourceName + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westus2' + } + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.bicep new file mode 100644 index 00000000..a692b184 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.bicep @@ -0,0 +1,91 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource vault 'Microsoft.RecoveryServices/vaults@2024-01-01' = { + name: '${resourceName}-rsv' + location: location + properties: { + publicNetworkAccess: 'Enabled' + redundancySettings: { + crossRegionRestore: 'Disabled' + standardTierStorageRedundancy: 'GeoRedundant' + } + } + sku: { + name: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet1' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '192.168.1.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource virtualnetwork1 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet2' + properties: { + addressSpace: { + addressPrefixes: [ + '192.168.2.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource replicationFabric 'Microsoft.RecoveryServices/vaults/replicationFabrics@2024-04-01' = { + parent: vault + name: '${resourceName}-fabric1' + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westus' + } + } +} + +resource replicationfabric1 'Microsoft.RecoveryServices/vaults/replicationFabrics@2024-04-01' = { + parent: vault + name: '${resourceName}-fabric2' + properties: { + customDetails: { + instanceType: 'Azure' + location: 'centralus' + } + } +} + +// The replication network is an intermediate resource under the replication fabric +resource replicationNetwork 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks@2024-04-01' existing = { + parent: replicationFabric + name: virtualNetwork.name +} + +resource replicationNetworkMapping 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings@2024-04-01' = { + parent: replicationNetwork + name: '${resourceName}-mapping' + properties: { + fabricSpecificDetails: { + instanceType: 'AzureToAzure' + primaryNetworkId: virtualNetwork.id + } + recoveryFabricName: replicationfabric1.name + recoveryNetworkId: virtualnetwork1.id + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/main.bicep new file mode 100644 index 00000000..042f4c10 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource replicationFabric 'Microsoft.RecoveryServices/vaults/replicationFabrics@2022-10-01' = { + parent: vault + name: resourceName + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westeurope' + } + } +} + +resource replicationProtectionContainer 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers@2022-10-01' = { + parent: replicationFabric + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.bicep new file mode 100644 index 00000000..5d719654 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.bicep @@ -0,0 +1,75 @@ +param location string = 'westus' + +resource vault 'Microsoft.RecoveryServices/vaults@2024-01-01' = { + name: 'acctest-vault-250703130022502990' + location: location + properties: { + publicNetworkAccess: 'Enabled' + redundancySettings: { + crossRegionRestore: 'Disabled' + standardTierStorageRedundancy: 'GeoRedundant' + } + } + sku: { + name: 'Standard' + } +} + +resource replicationFabric 'Microsoft.RecoveryServices/vaults/replicationFabrics@2024-04-01' = { + parent: vault + name: 'acctest-fabric1-250703130022502990' + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westeurope' + } + } +} + +resource replicationfabric1 'Microsoft.RecoveryServices/vaults/replicationFabrics@2024-04-01' = { + parent: vault + name: 'acctest-fabric2b-250703130022502990' + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westus2' + } + } +} + +resource replicationPolicy 'Microsoft.RecoveryServices/vaults/replicationPolicies@2024-04-01' = { + parent: vault + name: 'acctest-policy-250703130022502990' + properties: { + providerSpecificInput: { + appConsistentFrequencyInMinutes: 240 + instanceType: 'A2A' + multiVmSyncStatus: 'Enable' + recoveryPointHistory: 1440 + } + } +} + +resource replicationProtectionContainer 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers@2024-04-01' = { + parent: replicationFabric + name: 'acctest-protection-cont1-250703130022502990' + properties: {} +} + +resource replicationprotectioncontainer1 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers@2024-04-01' = { + parent: replicationfabric1 + name: 'acctest-protection-cont2-250703130022502990' + properties: {} +} + +resource replicationProtectionContainerMapping 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings@2024-04-01' = { + parent: replicationProtectionContainer + name: 'mapping-250703130022502990' + properties: { + policyId: replicationPolicy.id + providerSpecificInput: { + instanceType: 'A2A' + } + targetProtectionContainerId: replicationprotectioncontainer1.id + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationpolicies/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationpolicies/main.bicep new file mode 100644 index 00000000..11adf063 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationpolicies/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource replicationPolicy 'Microsoft.RecoveryServices/vaults/replicationPolicies@2022-10-01' = { + parent: vault + name: resourceName + properties: { + providerSpecificInput: { + appConsistentFrequencyInMinutes: 240 + crashConsistentFrequencyInMinutes: 10 + enableMultiVmSync: 'True' + instanceType: 'InMageRcm' + recoveryPointHistoryInMinutes: 1440 + } + } +} diff --git a/settings/remarks/microsoft.relay/samples/namespaces/authorizationrules/main.bicep b/settings/remarks/microsoft.relay/samples/namespaces/authorizationrules/main.bicep new file mode 100644 index 00000000..030dcb85 --- /dev/null +++ b/settings/remarks/microsoft.relay/samples/namespaces/authorizationrules/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.Relay/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource authorizationRule 'Microsoft.Relay/namespaces/authorizationRules@2017-04-01' = { + parent: namespace + name: resourceName + properties: { + rights: [ + 'Listen' + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/authorizationrules/main.bicep b/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/authorizationrules/main.bicep new file mode 100644 index 00000000..517463c3 --- /dev/null +++ b/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/authorizationrules/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.Relay/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource hybridConnection 'Microsoft.Relay/namespaces/hybridConnections@2017-04-01' = { + parent: namespace + name: resourceName + properties: { + requiresClientAuthorization: true + userMetadata: '' + } +} + +resource authorizationRule 'Microsoft.Relay/namespaces/hybridConnections/authorizationRules@2017-04-01' = { + parent: hybridConnection + name: resourceName + properties: { + rights: [ + 'Listen' + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/main.bicep b/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/main.bicep new file mode 100644 index 00000000..0be00b55 --- /dev/null +++ b/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.Relay/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource hybridConnection 'Microsoft.Relay/namespaces/hybridConnections@2017-04-01' = { + parent: namespace + name: resourceName + properties: { + requiresClientAuthorization: true + userMetadata: 'metadatatest' + } +} diff --git a/settings/remarks/microsoft.relay/samples/namespaces/main.bicep b/settings/remarks/microsoft.relay/samples/namespaces/main.bicep new file mode 100644 index 00000000..1abbe644 --- /dev/null +++ b/settings/remarks/microsoft.relay/samples/namespaces/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.Relay/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.resourceconnector/samples/appliances/main.bicep b/settings/remarks/microsoft.resourceconnector/samples/appliances/main.bicep new file mode 100644 index 00000000..cbe8ac53 --- /dev/null +++ b/settings/remarks/microsoft.resourceconnector/samples/appliances/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource appliance 'Microsoft.ResourceConnector/appliances@2022-10-27' = { + name: '${resourceName}-appliance' + location: location + properties: { + distro: 'AKSEdge' + infrastructureConfig: { + provider: 'VMWare' + } + } +} diff --git a/settings/remarks/microsoft.resources/samples/deploymentscripts/main.bicep b/settings/remarks/microsoft.resources/samples/deploymentscripts/main.bicep new file mode 100644 index 00000000..88cf13d0 --- /dev/null +++ b/settings/remarks/microsoft.resources/samples/deploymentscripts/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource deploymentScript 'Microsoft.Resources/deploymentScripts@2020-10-01' = { + name: resourceName + location: location + kind: 'AzurePowerShell' + properties: { + azPowerShellVersion: '8.3' + cleanupPreference: 'Always' + environmentVariables: null + retentionInterval: 'P1D' + scriptContent: ''' $output = ''Hello'' + Write-Output $output + $DeploymentScriptOutputs = @{} + $DeploymentScriptOutputs[''text''] = $output +''' + supportingScriptUris: null + timeout: 'P1D' + } +} diff --git a/settings/remarks/microsoft.resources/samples/resourceGroups/main.bicep b/settings/remarks/microsoft.resources/samples/resourceGroups/main.bicep new file mode 100644 index 00000000..e9189e3f --- /dev/null +++ b/settings/remarks/microsoft.resources/samples/resourceGroups/main.bicep @@ -0,0 +1,9 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource resourceGroup 'Microsoft.Resources/resourceGroups@2020-06-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.search/samples/searchservices/main.bicep b/settings/remarks/microsoft.search/samples/searchservices/main.bicep new file mode 100644 index 00000000..4cba26a1 --- /dev/null +++ b/settings/remarks/microsoft.search/samples/searchservices/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource searchService 'Microsoft.Search/searchServices@2022-09-01' = { + name: resourceName + location: location + properties: { + authOptions: { + apiKeyOnly: {} + } + disableLocalAuth: false + encryptionWithCmk: { + enforcement: 'Disabled' + } + hostingMode: 'default' + networkRuleSet: { + ipRules: [] + } + partitionCount: 1 + publicNetworkAccess: 'Enabled' + replicaCount: 1 + } + sku: { + name: 'standard' + } + tags: { + environment: 'staging' + } +} diff --git a/settings/remarks/microsoft.search/samples/searchservices/sharedprivatelinkresources/main.bicep b/settings/remarks/microsoft.search/samples/searchservices/sharedprivatelinkresources/main.bicep new file mode 100644 index 00000000..49098a5c --- /dev/null +++ b/settings/remarks/microsoft.search/samples/searchservices/sharedprivatelinkresources/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource searchService 'Microsoft.Search/searchServices@2022-09-01' = { + name: resourceName + location: location + properties: { + authOptions: { + apiKeyOnly: {} + } + disableLocalAuth: false + encryptionWithCmk: { + enforcement: 'Disabled' + } + hostingMode: 'default' + networkRuleSet: { + ipRules: [] + } + partitionCount: 1 + publicNetworkAccess: 'Enabled' + replicaCount: 1 + } + sku: { + name: 'standard' + } + tags: { + environment: 'staging' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource sharedPrivateLinkResource 'Microsoft.Search/searchServices/sharedPrivateLinkResources@2022-09-01' = { + parent: searchService + name: resourceName + properties: { + groupId: 'blob' + privateLinkResourceId: storageAccount.id + requestMessage: 'please approve' + } +} diff --git a/settings/remarks/microsoft.security/samples/advancedthreatprotectionsettings/main.bicep b/settings/remarks/microsoft.security/samples/advancedthreatprotectionsettings/main.bicep new file mode 100644 index 00000000..34547249 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/advancedthreatprotectionsettings/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0002' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } + tags: { + environment: 'production' + } +} + +resource updateAdvancedthreatprotectionsetting 'Microsoft.Security/advancedThreatProtectionSettings@2019-01-01' = { + scope: storageAccount + name: 'current' + properties: { + isEnabled: true + } +} diff --git a/settings/remarks/microsoft.security/samples/assessmentmetadata/main.bicep b/settings/remarks/microsoft.security/samples/assessmentmetadata/main.bicep new file mode 100644 index 00000000..e1df1985 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/assessmentmetadata/main.bicep @@ -0,0 +1,11 @@ +targetScope = 'subscription' + +resource assessmentMetadatum 'Microsoft.Security/assessmentMetadata@2020-01-01' = { + name: '95c7a001-d595-43af-9754-1310c740d34c' + properties: { + assessmentType: 'CustomerManaged' + description: 'Test Description' + displayName: 'Test Display Name' + severity: 'Medium' + } +} diff --git a/settings/remarks/microsoft.security/samples/automations/main.bicep b/settings/remarks/microsoft.security/samples/automations/main.bicep new file mode 100644 index 00000000..2124cda6 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/automations/main.bicep @@ -0,0 +1,142 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automation 'Microsoft.Security/automations@2019-01-01-preview' = { + name: 'ExportToWorkspace' + properties: { + actions: [ + { + actionType: 'Workspace' + workspaceResourceId: workspace.id + } + ] + isEnabled: true + scopes: [ + { + description: 'Security Export for the subscription' + scopePath: resourceGroup().id + } + ] + sources: [ + { + eventSource: 'Assessments' + ruleSets: [ + { + rules: [ + { + expectedValue: 'Microsoft.Security/assessments' + operator: 'Contains' + propertyJPath: 'type' + propertyType: 'String' + } + ] + } + ] + } + { + eventSource: 'AssessmentsSnapshot' + ruleSets: [ + { + rules: [ + { + expectedValue: 'Microsoft.Security/assessments' + operator: 'Contains' + propertyJPath: 'type' + propertyType: 'String' + } + ] + } + ] + } + { + eventSource: 'SubAssessments' + } + { + eventSource: 'SubAssessmentsSnapshot' + } + { + eventSource: 'Alerts' + ruleSets: [ + { + rules: [ + { + expectedValue: 'low' + operator: 'Equals' + propertyJPath: 'Severity' + propertyType: 'String' + } + ] + } + { + rules: [ + { + expectedValue: 'medium' + operator: 'Equals' + propertyJPath: 'Severity' + propertyType: 'String' + } + ] + } + { + rules: [ + { + expectedValue: 'high' + operator: 'Equals' + propertyJPath: 'Severity' + propertyType: 'String' + } + ] + } + { + rules: [ + { + expectedValue: 'informational' + operator: 'Equals' + propertyJPath: 'Severity' + propertyType: 'String' + } + ] + } + ] + } + { + eventSource: 'SecureScores' + } + { + eventSource: 'SecureScoresSnapshot' + } + { + eventSource: 'SecureScoreControls' + } + { + eventSource: 'SecureScoreControlsSnapshot' + } + { + eventSource: 'RegulatoryComplianceAssessment' + } + { + eventSource: 'RegulatoryComplianceAssessmentSnapshot' + } + ] + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.security/samples/defenderforstoragesettings/main.bicep b/settings/remarks/microsoft.security/samples/defenderforstoragesettings/main.bicep new file mode 100644 index 00000000..9dbe3c19 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/defenderforstoragesettings/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource defenderForStorageSetting 'Microsoft.Security/defenderForStorageSettings@2022-12-01-preview' = { + scope: storageAccount + name: 'current' + properties: { + isEnabled: true + malwareScanning: { + onUpload: { + capGBPerMonth: 5000 + isEnabled: true + } + } + overrideSubscriptionLevelSettings: true + sensitiveDataDiscovery: { + isEnabled: true + } + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.security/samples/iotsecuritysolutions/main.bicep b/settings/remarks/microsoft.security/samples/iotsecuritysolutions/main.bicep new file mode 100644 index 00000000..57985dc0 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/iotsecuritysolutions/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource iotSecuritySolution 'Microsoft.Security/iotSecuritySolutions@2019-08-01' = { + name: resourceName + location: location + properties: { + displayName: 'Iot Security Solution' + iotHubs: [ + iothub.id + ] + status: 'Enabled' + unmaskedIpLoggingStatus: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.security/samples/securitycontacts/main.bicep b/settings/remarks/microsoft.security/samples/securitycontacts/main.bicep new file mode 100644 index 00000000..0251d4a3 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/securitycontacts/main.bicep @@ -0,0 +1,13 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource securityContact 'Microsoft.Security/securityContacts@2017-08-01-preview' = { + name: resourceName + properties: { + alertNotifications: 'On' + alertsToAdmins: 'On' + email: 'basic@example.com' + phone: '+1-555-555-5555' + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/alertrules/main.bicep b/settings/remarks/microsoft.securityinsights/samples/alertrules/main.bicep new file mode 100644 index 00000000..dd9d4787 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/alertrules/main.bicep @@ -0,0 +1,54 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource alertRule 'Microsoft.SecurityInsights/alertRules@2022-10-01-preview' = { + scope: workspace + name: resourceName + kind: 'NRT' + properties: { + description: '' + displayName: 'Some Rule' + enabled: true + query: '''AzureActivity | + where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment" | + where ActivityStatus == "Succeeded" | + make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller +''' + severity: 'High' + suppressionDuration: 'PT5H' + suppressionEnabled: false + tactics: [] + techniques: [] + } + dependsOn: [ + onboardingState + ] +} + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2023-06-01-preview' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/automationrules/main.bicep b/settings/remarks/microsoft.securityinsights/samples/automationrules/main.bicep new file mode 100644 index 00000000..cf9fc9b2 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/automationrules/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationRule 'Microsoft.SecurityInsights/automationRules@2022-10-01-preview' = { + scope: workspace + name: '3b862818-ad7b-409e-83be-8812f2a06d37' + properties: { + actions: [ + { + actionConfiguration: { + classification: '' + classificationComment: '' + classificationReason: '' + severity: '' + status: 'Active' + } + actionType: 'ModifyProperties' + order: 1 + } + ] + displayName: 'acctest-SentinelAutoRule-230630033910945846' + order: 1 + triggeringLogic: { + isEnabled: true + triggersOn: 'Incidents' + triggersWhen: 'Created' + } + } + dependsOn: [ + onboardingState + ] +} + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2023-06-01-preview' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/dataconnectors/main.bicep b/settings/remarks/microsoft.securityinsights/samples/dataconnectors/main.bicep new file mode 100644 index 00000000..88cc042e --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/dataconnectors/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dataConnector 'Microsoft.SecurityInsights/dataConnectors@2022-10-01-preview' = { + scope: workspace + name: resourceName + kind: 'MicrosoftThreatIntelligence' + properties: { + dataTypes: { + bingSafetyPhishingURL: { + lookbackPeriod: '' + state: 'Disabled' + } + microsoftEmergingThreatFeed: { + lookbackPeriod: '1970-01-01T00:00:00Z' + state: 'enabled' + } + } + tenantId: deployer().tenantId + } + dependsOn: [ + onboardingState + ] +} + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2023-06-01-preview' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/metadata/main.bicep b/settings/remarks/microsoft.securityinsights/samples/metadata/main.bicep new file mode 100644 index 00000000..22d4ad0a --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/metadata/main.bicep @@ -0,0 +1,65 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource alertRule 'Microsoft.SecurityInsights/alertRules@2022-10-01-preview' = { + scope: workspace + name: resourceName + kind: 'NRT' + properties: { + description: '' + displayName: 'Some Rule' + enabled: true + query: '''AzureActivity | + where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment" | + where ActivityStatus == "Succeeded" | + make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller +''' + severity: 'High' + suppressionDuration: 'PT5H' + suppressionEnabled: false + tactics: [] + techniques: [] + } + dependsOn: [ + onboardingState + ] +} + +resource metadata 'Microsoft.SecurityInsights/metadata@2022-10-01-preview' = { + scope: workspace + name: resourceName + properties: { + contentId: 'acctest0001' + contentSchemaVersion: '2.0' + kind: 'AnalyticsRule' + parentId: alertRule.id + } +} + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2023-06-01-preview' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/onboardingstates/main.bicep b/settings/remarks/microsoft.securityinsights/samples/onboardingstates/main.bicep new file mode 100644 index 00000000..d37e2336 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/onboardingstates/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2022-11-01' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/watchlists/main.bicep b/settings/remarks/microsoft.securityinsights/samples/watchlists/main.bicep new file mode 100644 index 00000000..670b0966 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/watchlists/main.bicep @@ -0,0 +1,44 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2022-11-01' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource watchlist 'Microsoft.SecurityInsights/watchlists@2022-11-01' = { + scope: workspace + name: resourceName + properties: { + displayName: 'test' + itemsSearchKey: 'k1' + provider: 'Microsoft' + source: '' + } + dependsOn: [ + onboardingState + ] +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/watchlists/watchlistitems/main.bicep b/settings/remarks/microsoft.securityinsights/samples/watchlists/watchlistitems/main.bicep new file mode 100644 index 00000000..9c412d24 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/watchlists/watchlistitems/main.bicep @@ -0,0 +1,54 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2022-11-01' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource watchlist 'Microsoft.SecurityInsights/watchlists@2022-11-01' = { + scope: workspace + name: resourceName + properties: { + displayName: 'test' + itemsSearchKey: 'k1' + provider: 'Microsoft' + source: '' + } + dependsOn: [ + onboardingState + ] +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource watchlistItem 'Microsoft.SecurityInsights/watchlists/watchlistItems@2022-11-01' = { + parent: watchlist + name: '196abd06-eb4e-4322-9c70-37c32e1a588a' + properties: { + itemsKeyValue: { + k1: 'v1' + } + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/authorizationrules/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/authorizationrules/main.bicep new file mode 100644 index 00000000..1eb0d005 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/authorizationrules/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource authorizationRule 'Microsoft.ServiceBus/namespaces/authorizationRules@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + rights: [ + 'Listen' + ] + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/main.bicep new file mode 100644 index 00000000..6ce84253 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/queues/authorizationrules/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/queues/authorizationrules/main.bicep new file mode 100644 index 00000000..27597805 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/queues/authorizationrules/main.bicep @@ -0,0 +1,43 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource queue 'Microsoft.ServiceBus/namespaces/queues@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + deadLetteringOnMessageExpiration: false + enableBatchedOperations: true + enableExpress: false + enablePartitioning: true + maxDeliveryCount: 10 + maxSizeInMegabytes: 81920 + requiresDuplicateDetection: false + requiresSession: false + status: 'Active' + } +} + +resource authorizationRule 'Microsoft.ServiceBus/namespaces/queues/authorizationRules@2021-06-01-preview' = { + parent: queue + name: resourceName + properties: { + rights: [ + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/queues/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/queues/main.bicep new file mode 100644 index 00000000..bf7f1a65 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/queues/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource queue 'Microsoft.ServiceBus/namespaces/queues@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + deadLetteringOnMessageExpiration: false + enableBatchedOperations: true + enableExpress: false + enablePartitioning: true + maxDeliveryCount: 10 + maxSizeInMegabytes: 81920 + requiresDuplicateDetection: false + requiresSession: false + status: 'Active' + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/topics/authorizationrules/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/authorizationrules/main.bicep new file mode 100644 index 00000000..186d84d2 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/authorizationrules/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: false + maxSizeInMegabytes: 5120 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} + +resource authorizationRule 'Microsoft.ServiceBus/namespaces/topics/authorizationRules@2021-06-01-preview' = { + parent: topic + name: resourceName + properties: { + rights: [ + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/topics/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/main.bicep new file mode 100644 index 00000000..402630bf --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: true + maxSizeInMegabytes: 81920 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/main.bicep new file mode 100644 index 00000000..21d9fb63 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: false + maxSizeInMegabytes: 5120 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} + +resource subscription 'Microsoft.ServiceBus/namespaces/topics/subscriptions@2021-06-01-preview' = { + parent: topic + name: resourceName + properties: { + clientAffineProperties: {} + deadLetteringOnFilterEvaluationExceptions: true + deadLetteringOnMessageExpiration: false + enableBatchedOperations: false + isClientAffine: false + maxDeliveryCount: 10 + requiresSession: false + status: 'Active' + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/rules/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/rules/main.bicep new file mode 100644 index 00000000..1175d8a0 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/rules/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: false + maxSizeInMegabytes: 5120 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} + +resource subscription 'Microsoft.ServiceBus/namespaces/topics/subscriptions@2021-06-01-preview' = { + parent: topic + name: resourceName + properties: { + clientAffineProperties: {} + deadLetteringOnFilterEvaluationExceptions: true + deadLetteringOnMessageExpiration: false + enableBatchedOperations: false + isClientAffine: false + maxDeliveryCount: 10 + requiresSession: false + status: 'Active' + } +} + +resource rule 'Microsoft.ServiceBus/namespaces/topics/subscriptions/rules@2021-06-01-preview' = { + parent: subscription + name: resourceName + properties: { + correlationFilter: { + contentType: 'test_content_type' + correlationId: 'test_correlation_id' + label: 'test_label' + messageId: 'test_message_id' + replyTo: 'test_reply_to' + replyToSessionId: 'test_reply_to_session_id' + sessionId: 'test_session_id' + to: 'test_to' + } + filterType: 'CorrelationFilter' + } +} diff --git a/settings/remarks/microsoft.servicefabric/samples/clusters/main.bicep b/settings/remarks/microsoft.servicefabric/samples/clusters/main.bicep new file mode 100644 index 00000000..de2f7d17 --- /dev/null +++ b/settings/remarks/microsoft.servicefabric/samples/clusters/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.ServiceFabric/clusters@2021-06-01' = { + name: resourceName + location: location + properties: { + addOnFeatures: [] + fabricSettings: [] + managementEndpoint: 'http://example:80' + nodeTypes: [ + { + capacities: {} + clientConnectionEndpointPort: 2020 + durabilityLevel: 'Bronze' + httpGatewayEndpointPort: 80 + isPrimary: true + isStateless: false + multipleAvailabilityZones: false + name: 'first' + placementProperties: {} + vmInstanceCount: 3 + } + ] + reliabilityLevel: 'Bronze' + upgradeMode: 'Automatic' + vmImage: 'Windows' + } +} diff --git a/settings/remarks/microsoft.servicefabric/samples/managedclusters/main.bicep b/settings/remarks/microsoft.servicefabric/samples/managedclusters/main.bicep new file mode 100644 index 00000000..ddf6bc1b --- /dev/null +++ b/settings/remarks/microsoft.servicefabric/samples/managedclusters/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the Service Fabric managed cluster') +param adminUsername string +@secure() +@description('The administrator password for the Service Fabric managed cluster') +param adminPassword string + +resource managedCluster 'Microsoft.ServiceFabric/managedClusters@2021-05-01' = { + name: resourceName + location: location + properties: { + addonFeatures: [ + 'DnsService' + ] + adminPassword: null + adminUserName: null + clientConnectionPort: 12345 + clusterUpgradeCadence: 'Wave0' + dnsName: 'acctest0001' + httpGatewayConnectionPort: 23456 + loadBalancingRules: [ + { + backendPort: 8000 + frontendPort: 443 + probeProtocol: 'http' + probeRequestPath: '/' + protocol: 'tcp' + } + ] + networkSecurityRules: [ + { + access: 'allow' + destinationAddressPrefixes: [ + '0.0.0.0/0' + ] + destinationPortRanges: [ + '443' + ] + direction: 'inbound' + name: 'rule443-allow-fe' + priority: 1000 + protocol: 'tcp' + sourceAddressPrefixes: [ + '0.0.0.0/0' + ] + sourcePortRanges: [ + '1-65535' + ] + } + ] + } + sku: { + name: 'Standard' + } + tags: { + Test: 'value' + } +} diff --git a/settings/remarks/microsoft.servicefabric/samples/managedclusters/nodetypes/main.bicep b/settings/remarks/microsoft.servicefabric/samples/managedclusters/nodetypes/main.bicep new file mode 100644 index 00000000..9eb60689 --- /dev/null +++ b/settings/remarks/microsoft.servicefabric/samples/managedclusters/nodetypes/main.bicep @@ -0,0 +1,88 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the Service Fabric managed cluster') +param adminUsername string +@secure() +@description('The administrator password for the Service Fabric managed cluster') +param adminPassword string + +resource managedCluster 'Microsoft.ServiceFabric/managedClusters@2021-05-01' = { + name: resourceName + location: location + properties: { + addonFeatures: [ + 'DnsService' + ] + adminPassword: null + adminUserName: null + clientConnectionPort: 12345 + clusterUpgradeCadence: 'Wave0' + dnsName: 'acctest0001' + httpGatewayConnectionPort: 23456 + loadBalancingRules: [ + { + backendPort: 8000 + frontendPort: 443 + probeProtocol: 'http' + probeRequestPath: '/' + protocol: 'tcp' + } + ] + networkSecurityRules: [ + { + access: 'allow' + destinationAddressPrefixes: [ + '0.0.0.0/0' + ] + destinationPortRanges: [ + '443' + ] + direction: 'inbound' + name: 'rule443-allow-fe' + priority: 1000 + protocol: 'tcp' + sourceAddressPrefixes: [ + '0.0.0.0/0' + ] + sourcePortRanges: [ + '1-65535' + ] + } + ] + } + sku: { + name: 'Standard' + } + tags: { + Test: 'value' + } +} + +resource nodeType 'Microsoft.ServiceFabric/managedClusters/nodeTypes@2021-05-01' = { + parent: managedCluster + name: resourceName + properties: { + applicationPorts: { + endPort: 9000 + startPort: 7000 + } + capacities: {} + dataDiskSizeGB: 130 + dataDiskType: 'Standard_LRS' + ephemeralPorts: { + endPort: 20000 + startPort: 10000 + } + isPrimary: true + isStateless: false + multiplePlacementGroups: false + placementProperties: {} + vmImageOffer: 'WindowsServer' + vmImagePublisher: 'MicrosoftWindowsServer' + vmImageSku: '2016-Datacenter' + vmImageVersion: 'latest' + vmInstanceCount: 5 + vmSecrets: [] + vmSize: 'Standard_DS2_v2' + } +} diff --git a/settings/remarks/microsoft.servicelinker/samples/linkers/main.bicep b/settings/remarks/microsoft.servicelinker/samples/linkers/main.bicep new file mode 100644 index 00000000..e5fa0c24 --- /dev/null +++ b/settings/remarks/microsoft.servicelinker/samples/linkers/main.bicep @@ -0,0 +1,113 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 10 + maxStalenessPrefix: 200 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource linker 'Microsoft.ServiceLinker/linkers@2022-05-01' = { + scope: deployment + name: resourceName + properties: { + authInfo: { + authType: 'systemAssignedIdentity' + } + clientType: 'none' + targetService: { + id: sqlDatabase.id + resourceProperties: null + type: 'AzureResource' + } + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: { + throughput: 400 + } + resource: { + id: 'acctest0001' + } + } +} + +resource deployment 'Microsoft.AppPlatform/Spring/apps/deployments@2023-05-01-preview' = { + parent: app + name: 'deploy-q4uff' + properties: { + deploymentSettings: { + environmentVariables: {} + resourceRequests: { + cpu: '1' + memory: '1Gi' + } + } + source: { + jvmOptions: '' + relativePath: '' + runtimeVersion: 'Java_8' + type: 'Jar' + } + } + sku: { + capacity: 1 + name: 'S0' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/associations/main.bicep b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/associations/main.bicep new file mode 100644 index 00000000..1b9932b2 --- /dev/null +++ b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/associations/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource trafficController 'Microsoft.ServiceNetworking/trafficControllers@2023-11-01' = { + name: '${resourceName}-tc' + location: location +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource association 'Microsoft.ServiceNetworking/trafficControllers/associations@2023-11-01' = { + parent: trafficController + name: '${resourceName}-assoc' + location: location + properties: { + associationType: 'subnets' + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.1.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + serviceName: 'Microsoft.ServiceNetworking/trafficControllers' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/frontends/main.bicep b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/frontends/main.bicep new file mode 100644 index 00000000..1d959084 --- /dev/null +++ b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/frontends/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource trafficController 'Microsoft.ServiceNetworking/trafficControllers@2023-11-01' = { + name: resourceName + location: location +} + +resource frontend 'Microsoft.ServiceNetworking/trafficControllers/frontends@2023-11-01' = { + parent: trafficController + name: '${resourceName}-frontend' + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/main.bicep b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/main.bicep new file mode 100644 index 00000000..d64277a2 --- /dev/null +++ b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource trafficController 'Microsoft.ServiceNetworking/trafficControllers@2023-11-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.signalrservice/samples/signalr/main.bicep b/settings/remarks/microsoft.signalrservice/samples/signalr/main.bicep new file mode 100644 index 00000000..cf280b4f --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/signalr/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource signalR 'Microsoft.SignalRService/signalR@2023-02-01' = { + name: resourceName + location: location + properties: { + cors: {} + disableAadAuth: false + disableLocalAuth: false + features: [ + { + flag: 'ServiceMode' + value: 'Default' + } + { + flag: 'EnableConnectivityLogs' + value: 'False' + } + { + flag: 'EnableMessagingLogs' + value: 'False' + } + { + flag: 'EnableLiveTrace' + value: 'False' + } + ] + publicNetworkAccess: 'Enabled' + resourceLogConfiguration: { + categories: [ + { + enabled: 'false' + name: 'MessagingLogs' + } + { + enabled: 'false' + name: 'ConnectivityLogs' + } + { + enabled: 'false' + name: 'HttpRequestLogs' + } + ] + } + serverless: { + connectionTimeoutInSeconds: 30 + } + tls: { + clientCertEnabled: false + } + upstream: { + templates: [] + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} diff --git a/settings/remarks/microsoft.signalrservice/samples/signalr/sharedprivatelinkresources/main.bicep b/settings/remarks/microsoft.signalrservice/samples/signalr/sharedprivatelinkresources/main.bicep new file mode 100644 index 00000000..8e2ebab2 --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/signalr/sharedprivatelinkresources/main.bicep @@ -0,0 +1,108 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource signalR 'Microsoft.SignalRService/signalR@2023-02-01' = { + name: resourceName + location: location + properties: { + cors: {} + disableAadAuth: false + disableLocalAuth: false + features: [ + { + flag: 'ServiceMode' + value: 'Default' + } + { + flag: 'EnableConnectivityLogs' + value: 'False' + } + { + flag: 'EnableMessagingLogs' + value: 'False' + } + { + flag: 'EnableLiveTrace' + value: 'False' + } + ] + publicNetworkAccess: 'Enabled' + resourceLogConfiguration: { + categories: [ + { + enabled: 'false' + name: 'MessagingLogs' + } + { + enabled: 'false' + name: 'ConnectivityLogs' + } + { + enabled: 'false' + name: 'HttpRequestLogs' + } + ] + } + serverless: { + connectionTimeoutInSeconds: 30 + } + tls: { + clientCertEnabled: false + } + upstream: { + templates: [] + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Create' + ] + secrets: [ + 'Set' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} + +resource sharedPrivateLinkResource 'Microsoft.SignalRService/signalR/sharedPrivateLinkResources@2023-02-01' = { + parent: signalR + name: resourceName + properties: { + groupId: 'vault' + privateLinkResourceId: vault.id + requestMessage: 'please approve' + } +} diff --git a/settings/remarks/microsoft.signalrservice/samples/webpubsub/hubs/main.bicep b/settings/remarks/microsoft.signalrservice/samples/webpubsub/hubs/main.bicep new file mode 100644 index 00000000..fe288f3f --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/webpubsub/hubs/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource webPubSub 'Microsoft.SignalRService/webPubSub@2023-02-01' = { + name: resourceName + location: location + properties: { + disableAadAuth: false + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + tls: { + clientCertEnabled: false + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} + +resource hub 'Microsoft.SignalRService/webPubSub/hubs@2023-02-01' = { + parent: webPubSub + name: resourceName + properties: { + anonymousConnectPolicy: 'Deny' + eventListeners: [] + } +} diff --git a/settings/remarks/microsoft.signalrservice/samples/webpubsub/main.bicep b/settings/remarks/microsoft.signalrservice/samples/webpubsub/main.bicep new file mode 100644 index 00000000..9e647d23 --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/webpubsub/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource webPubSub 'Microsoft.SignalRService/webPubSub@2023-02-01' = { + name: resourceName + location: location + properties: { + disableAadAuth: false + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + tls: { + clientCertEnabled: false + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} diff --git a/settings/remarks/microsoft.signalrservice/samples/webpubsub/sharedprivatelinkresources/main.bicep b/settings/remarks/microsoft.signalrservice/samples/webpubsub/sharedprivatelinkresources/main.bicep new file mode 100644 index 00000000..054ee992 --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/webpubsub/sharedprivatelinkresources/main.bicep @@ -0,0 +1,66 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Create' + ] + secrets: [ + 'Set' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} + +resource webPubSub 'Microsoft.SignalRService/webPubSub@2023-02-01' = { + name: resourceName + location: location + properties: { + disableAadAuth: false + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + tls: { + clientCertEnabled: false + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} + +resource sharedPrivateLinkResource 'Microsoft.SignalRService/webPubSub/sharedPrivateLinkResources@2023-02-01' = { + parent: webPubSub + name: resourceName + properties: { + groupId: 'vault' + privateLinkResourceId: vault.id + } +} diff --git a/settings/remarks/microsoft.solutions/samples/applications/main.bicep b/settings/remarks/microsoft.solutions/samples/applications/main.bicep new file mode 100644 index 00000000..70a405e6 --- /dev/null +++ b/settings/remarks/microsoft.solutions/samples/applications/main.bicep @@ -0,0 +1,129 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource application 'Microsoft.Solutions/applications@2021-07-01' = { + name: '${resourceName}-app' + location: location + kind: 'ServiceCatalog' + properties: { + applicationDefinitionId: applicationDefinition.id + managedResourceGroupId: '/subscriptions/subscription().subscriptionId/resourceGroups/acctest0001-infragroup' + parameters: { + arrayParameter: { + value: [ + 'value_1' + 'value_2' + ] + } + boolParameter: { + value: true + } + intParameter: { + value: 100 + } + objectParameter: { + value: { + nested_array: [ + 'value_1' + 'value_2' + ] + nested_bool: true + nested_object: { + key_0: 0 + } + } + } + secureStringParameter: { + value: '' + } + stringParameter: { + value: 'value_1' + } + } + } +} + +resource applicationDefinition 'Microsoft.Solutions/applicationDefinitions@2021-07-01' = { + name: '${resourceName}-appdef' + location: location + properties: { + authorizations: [ + { + principalId: deployer().objectId + roleDefinitionId: 'b24988ac-6180-42a0-ab88-20f7382dd24c' + } + ] + createUiDefinition: ''' { + "$schema": "https://schema.management.azure.com/schemas/0.1.2-preview/CreateUIDefinition.MultiVm.json#", + "handler": "Microsoft.Azure.CreateUIDef", + "version": "0.1.2-preview", + "parameters": { + "basics": [], + "steps": [], + "outputs": {} + } + } +''' + description: 'Test Managed App Definition' + displayName: 'TestManagedAppDefinition' + isEnabled: true + lockLevel: 'ReadOnly' + mainTemplate: ''' { + "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "parameters": { + + "boolParameter": { + "type": "bool" + }, + "intParameter": { + "type": "int" + }, + "stringParameter": { + "type": "string" + }, + "secureStringParameter": { + "type": "secureString" + }, + "objectParameter": { + "type": "object" + }, + "arrayParameter": { + "type": "array" + } + + }, + "variables": {}, + "resources": [], + "outputs": { + "boolOutput": { + "type": "bool", + "value": true + }, + "intOutput": { + "type": "int", + "value": 100 + }, + "stringOutput": { + "type": "string", + "value": "stringOutputValue" + }, + "objectOutput": { + "type": "object", + "value": { + "nested_bool": true, + "nested_array": ["value_1", "value_2"], + "nested_object": { + "key_0": 0 + } + } + }, + "arrayOutput": { + "type": "array", + "value": ["value_1", "value_2"] + } + } + } +''' + } +} diff --git a/settings/remarks/microsoft.sql/samples/instancepools/main.bicep b/settings/remarks/microsoft.sql/samples/instancepools/main.bicep new file mode 100644 index 00000000..b18f9384 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/instancepools/main.bicep @@ -0,0 +1,186 @@ +param resourceName string = 'acctest0001' + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2023-04-01' existing = { + parent: virtualNetwork + name: resourceName +} + +resource instancePool 'Microsoft.Sql/instancePools@2022-05-01-preview' = { + name: resourceName + properties: { + licenseType: 'LicenseIncluded' + subnetId: subnet.id + vCores: 8 + } + sku: { + family: 'Gen5' + name: 'GP_Gen5' + tier: 'GeneralPurpose' + } +} + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2023-04-01' = { + name: resourceName + properties: { + securityRules: [ + { + name: 'allow_tds_inbound' + properties: { + access: 'Allow' + description: 'Allow access to data' + destinationAddressPrefix: '*' + destinationPortRange: '1433' + direction: 'Inbound' + priority: 1000 + protocol: 'TCP' + sourceAddressPrefix: 'VirtualNetwork' + sourcePortRange: '*' + } + } + { + name: 'allow_redirect_inbound' + properties: { + access: 'Allow' + description: 'Allow inbound redirect traffic to Managed Instance inside the virtual network' + destinationAddressPrefix: '*' + destinationPortRange: '11000-11999' + direction: 'Inbound' + priority: 1100 + protocol: 'Tcp' + sourceAddressPrefix: 'VirtualNetwork' + sourcePortRange: '*' + } + } + { + name: 'allow_geodr_inbound' + properties: { + access: 'Allow' + description: 'Allow inbound geodr traffic inside the virtual network' + destinationAddressPrefix: '*' + destinationPortRange: '5022' + direction: 'Inbound' + priority: 1200 + protocol: 'Tcp' + sourceAddressPrefix: 'VirtualNetwork' + sourcePortRange: '*' + } + } + { + name: 'deny_all_inbound' + properties: { + access: 'Deny' + description: 'Deny all other inbound traffic' + destinationAddressPrefix: '*' + destinationPortRange: '*' + direction: 'Inbound' + priority: 4096 + protocol: '*' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + { + name: 'allow_linkedserver_outbound' + properties: { + access: 'Allow' + description: 'Allow outbound linkedserver traffic inside the virtual network' + destinationAddressPrefix: 'VirtualNetwork' + destinationPortRange: '1433' + direction: 'Outbound' + priority: 1000 + protocol: 'Tcp' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + { + name: 'allow_redirect_outbound' + properties: { + access: 'Allow' + description: 'Allow outbound redirect traffic to Managed Instance inside the virtual network' + destinationAddressPrefix: 'VirtualNetwork' + destinationPortRange: '11000-11999' + direction: 'Outbound' + priority: 1100 + protocol: 'Tcp' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + { + name: 'allow_geodr_outbound' + properties: { + access: 'Allow' + description: 'Allow outbound geodr traffic inside the virtual network' + destinationAddressPrefix: 'VirtualNetwork' + destinationPortRange: '5022' + direction: 'Outbound' + priority: 1200 + protocol: 'Tcp' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + { + name: 'deny_all_outbound' + properties: { + access: 'Deny' + description: 'Deny all other outbound traffic' + destinationAddressPrefix: '*' + destinationPortRange: '*' + direction: 'Outbound' + priority: 4096 + protocol: '*' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + ] + } +} + +resource routeTable 'Microsoft.Network/routeTables@2023-04-01' = { + name: resourceName + properties: { + disableBgpRoutePropagation: false + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2023-04-01' = { + name: resourceName + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + subnets: [ + { + name: 'Default' + properties: { + addressPrefix: '10.0.0.0/24' + } + } + { + name: 'acctest0001' + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [ + { + name: 'miDelegation' + properties: { + serviceName: 'Microsoft.Sql/managedInstances' + } + } + ] + networkSecurityGroup: { + id: networkSecurityGroup.id + } + routeTable: { + id: routeTable.id + } + } + } + ] + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/administrators/main.bicep b/settings/remarks/microsoft.sql/samples/servers/administrators/main.bicep new file mode 100644 index 00000000..ebcec94e --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/administrators/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2015-05-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + version: '12.0' + } +} + +resource administrator 'Microsoft.Sql/servers/administrators@2020-11-01-preview' = { + parent: server + name: 'ActiveDirectory' + properties: { + administratorType: 'ActiveDirectory' + login: 'sqladmin' + sid: deployer().objectId + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/auditingsettings/main.bicep b/settings/remarks/microsoft.sql/samples/servers/auditingsettings/main.bicep new file mode 100644 index 00000000..b8a48ccd --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/auditingsettings/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2022-05-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource auditingSettings 'Microsoft.Sql/servers/auditingSettings@2022-05-01-preview' = { + parent: server + name: 'default' + properties: { + auditActionsAndGroups: [ + 'FAILED_DATABASE_AUTHENTICATION_GROUP' + 'SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP' + ] + isAzureMonitorTargetEnabled: true + state: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/connectionpolicies/main.bicep b/settings/remarks/microsoft.sql/samples/servers/connectionpolicies/main.bicep new file mode 100644 index 00000000..80a772ec --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/connectionpolicies/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the SQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource connectionPolicy 'Microsoft.Sql/servers/connectionPolicies@2014-04-01' = { + parent: server + name: 'default' + properties: { + connectionType: 'Default' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/databases/main.bicep b/settings/remarks/microsoft.sql/samples/servers/databases/main.bicep new file mode 100644 index 00000000..b6fb2f83 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/databases/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: 'LicenseIncluded' + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/databases/securityalertpolicies/main.bicep b/settings/remarks/microsoft.sql/samples/servers/databases/securityalertpolicies/main.bicep new file mode 100644 index 00000000..3250298c --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/databases/securityalertpolicies/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: 'LicenseIncluded' + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} + +resource securityAlertPolicy 'Microsoft.Sql/servers/databases/securityAlertPolicies@2020-11-01-preview' = { + parent: database + name: 'default' + properties: { + state: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/databases/transparentdataencryption/main.bicep b/settings/remarks/microsoft.sql/samples/servers/databases/transparentdataencryption/main.bicep new file mode 100644 index 00000000..a2dfb33b --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/databases/transparentdataencryption/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: 'LicenseIncluded' + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} + +resource transparentDataEncryption 'Microsoft.Sql/servers/databases/transparentDataEncryption@2014-04-01' = { + parent: database + name: 'current' + properties: { + status: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/dnsaliases/main.bicep b/settings/remarks/microsoft.sql/samples/servers/dnsaliases/main.bicep new file mode 100644 index 00000000..6401087e --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/dnsaliases/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the SQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource dnsAlias 'Microsoft.Sql/servers/dnsAliases@2020-11-01-preview' = { + parent: server + name: resourceName +} diff --git a/settings/remarks/microsoft.sql/samples/servers/elasticpools/main.bicep b/settings/remarks/microsoft.sql/samples/servers/elasticpools/main.bicep new file mode 100644 index 00000000..9051a2ab --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/elasticpools/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: '4dm1n157r470r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource elasticPool 'Microsoft.Sql/servers/elasticPools@2020-11-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + maxSizeBytes: 5242880000 + perDatabaseSettings: { + maxCapacity: 5 + minCapacity: 0 + } + zoneRedundant: false + } + sku: { + capacity: 50 + family: '' + name: 'BasicPool' + tier: 'Basic' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/encryptionprotector/main.bicep b/settings/remarks/microsoft.sql/samples/servers/encryptionprotector/main.bicep new file mode 100644 index 00000000..15f96329 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/encryptionprotector/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource encryptionProtector 'Microsoft.Sql/servers/encryptionProtector@2023-08-01-preview' = { + parent: server + name: 'current' + properties: { + autoRotationEnabled: false + serverKeyName: '' + serverKeyType: 'ServiceManaged' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/failovergroups/main.bicep b/settings/remarks/microsoft.sql/samples/servers/failovergroups/main.bicep new file mode 100644 index 00000000..c7a6ba1c --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/failovergroups/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +param secondaryLocation string = 'eastus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: '${resourceName}-primary' + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource server1 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: '${resourceName}-secondary' + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2023-08-01-preview' = { + parent: server + name: '${resourceName}-db' + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + encryptionProtectorAutoRotation: false + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: '' + maxSizeBytes: 214748364800 + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + sampleName: '' + secondaryType: '' + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource failoverGroup 'Microsoft.Sql/servers/failoverGroups@2023-08-01-preview' = { + parent: server + name: '${resourceName}-fg' + properties: { + databases: [ + database.id + ] + partnerServers: [ + { + id: server1.id + } + ] + readOnlyEndpoint: { + failoverPolicy: 'Disabled' + } + readWriteEndpoint: { + failoverPolicy: 'Automatic' + failoverWithDataLossGracePeriodMinutes: 60 + } + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/firewallrules/main.bicep b/settings/remarks/microsoft.sql/samples/servers/firewallrules/main.bicep new file mode 100644 index 00000000..aa411a36 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/firewallrules/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'msincredible' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource firewallRule 'Microsoft.Sql/servers/firewallRules@2020-11-01-preview' = { + parent: server + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/jobagents/credentials/main.bicep b/settings/remarks/microsoft.sql/samples/servers/jobagents/credentials/main.bicep new file mode 100644 index 00000000..1520d8b1 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/jobagents/credentials/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the SQL server credential') +param sqlAdminUsername string +@secure() +@description('The administrator password for the SQL server credential') +param sqlAdminPassword string +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: '4dministr4t0r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} + +resource jobAgent 'Microsoft.Sql/servers/jobAgents@2020-11-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + databaseId: database.id + } +} + +resource credential 'Microsoft.Sql/servers/jobAgents/credentials@2020-11-01-preview' = { + parent: jobAgent + name: resourceName + properties: { + password: null + username: null + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/jobagents/jobs/main.bicep b/settings/remarks/microsoft.sql/samples/servers/jobagents/jobs/main.bicep new file mode 100644 index 00000000..67bbb970 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/jobagents/jobs/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: '${resourceName}-server' + location: location + properties: { + administratorLogin: '4dm1n157r470r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2023-08-01-preview' = { + parent: server + name: '${resourceName}-db' + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + encryptionProtectorAutoRotation: false + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: '' + maintenanceConfigurationId: '/subscriptions/subscription().subscriptionId/providers/Microsoft.Maintenance/publicMaintenanceConfigurations/SQL_Default' + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + sampleName: '' + secondaryType: '' + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource jobAgent 'Microsoft.Sql/servers/jobAgents@2023-08-01-preview' = { + parent: server + name: '${resourceName}-job-agent' + location: location + properties: { + databaseId: database.id + } + sku: { + name: 'JA100' + } +} + +resource job 'Microsoft.Sql/servers/jobAgents/jobs@2023-08-01-preview' = { + parent: jobAgent + name: '${resourceName}-job' + properties: { + description: '' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/jobagents/main.bicep b/settings/remarks/microsoft.sql/samples/servers/jobagents/main.bicep new file mode 100644 index 00000000..a30fcdd9 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/jobagents/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the SQL server') +param sqlAdministratorPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: '4dministr4t0r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} + +resource jobAgent 'Microsoft.Sql/servers/jobAgents@2020-11-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + databaseId: database.id + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/jobagents/targetgroups/main.bicep b/settings/remarks/microsoft.sql/samples/servers/jobagents/targetgroups/main.bicep new file mode 100644 index 00000000..008aa16c --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/jobagents/targetgroups/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string +@secure() +@description('The password for the SQL job credential') +param jobCredentialPassword string + +resource server 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: '${resourceName}-server' + location: location + properties: { + administratorLogin: '4dm1n157r470r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2023-08-01-preview' = { + parent: server + name: '${resourceName}-db' + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + encryptionProtectorAutoRotation: false + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: '' + maintenanceConfigurationId: '/subscriptions/subscription().subscriptionId/providers/Microsoft.Maintenance/publicMaintenanceConfigurations/SQL_Default' + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + sampleName: '' + secondaryType: '' + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource jobAgent 'Microsoft.Sql/servers/jobAgents@2023-08-01-preview' = { + parent: server + name: '${resourceName}-job-agent' + location: location + properties: { + databaseId: database.id + } + sku: { + name: 'JA100' + } +} + +resource credential 'Microsoft.Sql/servers/jobAgents/credentials@2023-08-01-preview' = { + parent: jobAgent + name: '${resourceName}-job-credential' + properties: { + password: null + username: 'testusername' + } +} + +resource targetGroup 'Microsoft.Sql/servers/jobAgents/targetGroups@2023-08-01-preview' = { + parent: jobAgent + name: '${resourceName}-target-group' + properties: { + members: [] + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/main.bicep b/settings/remarks/microsoft.sql/samples/servers/main.bicep new file mode 100644 index 00000000..2df7ea10 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the SQL server') +param sqlAdministratorPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/outboundfirewallrules/main.bicep b/settings/remarks/microsoft.sql/samples/servers/outboundfirewallrules/main.bicep new file mode 100644 index 00000000..9e3d5381 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/outboundfirewallrules/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('Admin password for the database') +param adminPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'msincredible' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Enabled' + version: '12.0' + } +} + +resource outboundFirewallRule 'Microsoft.Sql/servers/outboundFirewallRules@2021-02-01-preview' = { + parent: server + name: 'sql230630033612934212.database.windows.net' + properties: {} +} diff --git a/settings/remarks/microsoft.sql/samples/servers/securityalertpolicies/main.bicep b/settings/remarks/microsoft.sql/samples/servers/securityalertpolicies/main.bicep new file mode 100644 index 00000000..e63e42f1 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/securityalertpolicies/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the SQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2015-05-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + version: '12.0' + } +} + +resource securityAlertPolicy 'Microsoft.Sql/servers/securityAlertPolicies@2017-03-01-preview' = { + parent: server + name: 'Default' + properties: { + state: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/sqlvulnerabilityassessments/main.bicep b/settings/remarks/microsoft.sql/samples/servers/sqlvulnerabilityassessments/main.bicep new file mode 100644 index 00000000..ba2ba40a --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/sqlvulnerabilityassessments/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2022-05-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource sqlVulnerabilityAssessments 'Microsoft.Sql/servers/sqlVulnerabilityAssessments@2022-05-01-preview' = { + parent: server + name: 'default' + properties: { + state: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/virtualnetworkrules/main.bicep b/settings/remarks/microsoft.sql/samples/servers/virtualnetworkrules/main.bicep new file mode 100644 index 00000000..9cab05b5 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/virtualnetworkrules/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the SQL server') +param sqlAdministratorPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'missadmin' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.7.28.0/23' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.7.28.0/25' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [ + { + service: 'Microsoft.Sql' + } + ] + } +} + +resource virtualNetworkRule 'Microsoft.Sql/servers/virtualNetworkRules@2020-11-01-preview' = { + parent: server + name: resourceName + properties: { + ignoreMissingVnetServiceEndpoint: false + virtualNetworkSubnetId: subnet.id + } +} diff --git a/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachinegroups/main.bicep b/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachinegroups/main.bicep new file mode 100644 index 00000000..386b1a28 --- /dev/null +++ b/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachinegroups/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource sqlVirtualMachineGroup 'Microsoft.SqlVirtualMachine/sqlVirtualMachineGroups@2023-10-01' = { + name: resourceName + location: location + properties: { + sqlImageOffer: 'SQL2017-WS2016' + sqlImageSku: 'Developer' + wsfcDomainProfile: { + clusterBootstrapAccount: '' + clusterOperatorAccount: '' + clusterSubnetType: 'SingleSubnet' + domainFqdn: 'testdomain.com' + ouPath: '' + sqlServiceAccount: '' + storageAccountPrimaryKey: '' + storageAccountUrl: '' + } + } +} diff --git a/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachines/basic/main.bicep b/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachines/basic/main.bicep new file mode 100644 index 00000000..dc0fcf1d --- /dev/null +++ b/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachines/basic/main.bicep @@ -0,0 +1,172 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the SQL virtual machine') +param vmAdminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: resourceName + properties: { + auxiliaryMode: 'None' + auxiliarySku: 'None' + disableTcpStateTracking: false + dnsSettings: { + dnsServers: [] + } + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddress: '10.0.0.4' + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + type: 'Microsoft.Network/networkInterfaces/ipConfigurations' + } + ] + nicType: 'Standard' + } +} + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2024-05-01' = { + name: resourceName + properties: { + securityRules: [ + { + name: 'MSSQLRule' + properties: { + access: 'Allow' + destinationAddressPrefix: '*' + destinationAddressPrefixes: [] + destinationPortRange: '1433' + destinationPortRanges: [] + direction: 'Inbound' + priority: 1001 + protocol: 'Tcp' + sourceAddressPrefix: '167.220.255.0/25' + sourceAddressPrefixes: [] + sourcePortRange: '*' + sourcePortRanges: [] + } + } + ] + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2024-05-01' = { + name: resourceName + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + ipTags: [] + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Dynamic' + } + sku: { + name: 'Basic' + tier: 'Regional' + } +} + +resource sqlvirtualMachine 'Microsoft.SqlVirtualMachine/sqlVirtualMachines@2023-10-01' = { + name: 'virtualMachine.name' + properties: { + enableAutomaticUpgrade: true + leastPrivilegeMode: 'Enabled' + sqlImageOffer: 'SQL2017-WS2016' + sqlImageSku: 'Developer' + sqlManagement: 'Full' + sqlServerLicenseType: 'PAYG' + virtualMachineResourceId: virtualMachine.id + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-07-01' = { + name: resourceName + properties: { + hardwareProfile: { + vmSize: 'Standard_F2s' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + allowExtensionOperations: true + computerName: 'winhost01' + secrets: [] + windowsConfiguration: { + enableAutomaticUpdates: true + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'AutomaticByOS' + } + provisionVMAgent: true + timeZone: 'Pacific Standard Time' + } + } + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'SQL2017-WS2016' + publisher: 'MicrosoftSQLServer' + sku: 'SQLDEV' + version: 'latest' + } + osDisk: { + caching: 'ReadOnly' + createOption: 'FromImage' + deleteOption: 'Detach' + diskSizeGB: 127 + managedDisk: { + storageAccountType: 'Premium_LRS' + } + name: 'acctvm-250116171212663925OSDisk' + osType: 'Windows' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.0.0/24' + networkSecurityGroup: { + id: networkSecurityGroup.id + } + } +} diff --git a/settings/remarks/microsoft.standbypool/samples/standbycontainergrouppools/basic/main.bicep b/settings/remarks/microsoft.standbypool/samples/standbycontainergrouppools/basic/main.bicep new file mode 100644 index 00000000..05908b4d --- /dev/null +++ b/settings/remarks/microsoft.standbypool/samples/standbycontainergrouppools/basic/main.bicep @@ -0,0 +1,98 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource containerGroupProfile 'Microsoft.ContainerInstance/containerGroupProfiles@2024-05-01-preview' = { + name: '${resourceName}-contianerGroup' + location: location + properties: { + containers: [ + { + name: 'mycontainergroupprofile' + properties: { + command: [] + environmentVariables: [] + image: 'mcr.microsoft.com/azuredocs/aci-helloworld:latest' + ports: [ + { + port: 8000 + } + ] + resources: { + requests: { + cpu: 1 + memoryInGB: any('1.5') + } + } + } + } + ] + imageRegistryCredentials: [] + ipAddress: { + ports: [ + { + port: 8000 + protocol: 'TCP' + } + ] + type: 'Public' + } + osType: 'Linux' + sku: 'Standard' + } +} + +resource standbyContainerGroupPool 'Microsoft.StandbyPool/standbyContainerGroupPools@2025-03-01' = { + name: '${resourceName}-CGPool' + location: 'eastus' + properties: { + containerGroupProperties: { + containerGroupProfile: { + id: containerGroupProfile.id + revision: 1 + } + subnetIds: [ + { + id: subnet.id + } + ] + } + elasticityProfile: { + maxReadyCapacity: 5 + refillPolicy: 'always' + } + zones: [ + '1' + '2' + '3' + ] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/basic/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/basic/main.bicep new file mode 100644 index 00000000..5c7e206f --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/basic/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.bicep new file mode 100644 index 00000000..c7c59b53 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} + +resource immutabilityPolicy 'Microsoft.Storage/storageAccounts/blobServices/containers/immutabilityPolicies@2023-05-01' = { + parent: container + name: 'default' + properties: { + allowProtectedAppendWrites: false + immutabilityPeriodSinceCreationInDays: 4 + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/main.bicep new file mode 100644 index 00000000..4efc6c29 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/main.bicep new file mode 100644 index 00000000..e53e1805 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2021-09-01' = { + parent: storageAccount + name: 'default' + properties: { + changeFeed: { + enabled: true + } + containerDeleteRetentionPolicy: { + enabled: false + } + cors: {} + deleteRetentionPolicy: { + enabled: false + } + isVersioningEnabled: true + lastAccessTimeTrackingPolicy: { + enable: false + } + restorePolicy: { + enabled: false + } + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/fileservices/shares/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/fileservices/shares/main.bicep new file mode 100644 index 00000000..0ba2cdcb --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/fileservices/shares/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource fileService 'Microsoft.Storage/storageAccounts/fileServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource share 'Microsoft.Storage/storageAccounts/fileServices/shares@2022-09-01' = { + parent: fileService + name: resourceName + properties: { + accessTier: 'Cool' + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/localusers/basic/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/localusers/basic/main.bicep new file mode 100644 index 00000000..3575fd63 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/localusers/basic/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource localUser 'Microsoft.Storage/storageAccounts/localUsers@2021-09-01' = { + parent: storageAccount + name: resourceName + properties: { + hasSharedKey: true + hasSshKey: false + hasSshPassword: false + homeDirectory: 'containername/' + permissionScopes: [ + { + permissions: 'cwl' + resourceName: 'containername' + service: 'blob' + } + ] + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/managementpolicies/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/managementpolicies/main.bicep new file mode 100644 index 00000000..7464c6f1 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/managementpolicies/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'BlobStorage' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource managementPolicy 'Microsoft.Storage/storageAccounts/managementPolicies@2021-09-01' = { + parent: storageAccount + name: 'default' + properties: { + policy: { + rules: [ + { + definition: { + actions: { + baseBlob: { + delete: { + daysAfterModificationGreaterThan: 100 + } + tierToArchive: { + daysAfterModificationGreaterThan: 50 + } + tierToCool: { + daysAfterModificationGreaterThan: 10 + } + } + snapshot: { + delete: { + daysAfterCreationGreaterThan: 30 + } + } + } + filters: { + blobTypes: [ + 'blockBlob' + ] + prefixMatch: [ + 'container1/prefix1' + ] + } + } + enabled: true + name: 'rule-1' + type: 'Lifecycle' + } + ] + } + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/queueservices/queues/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/queueservices/queues/main.bicep new file mode 100644 index 00000000..4a063a33 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/queueservices/queues/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource queueService 'Microsoft.Storage/storageAccounts/queueServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource queue 'Microsoft.Storage/storageAccounts/queueServices/queues@2022-09-01' = { + parent: queueService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/tableservices/tables/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/tableservices/tables/main.bicep new file mode 100644 index 00000000..a5e05ede --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/tableservices/tables/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource tableService 'Microsoft.Storage/storageAccounts/tableServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource table 'Microsoft.Storage/storageAccounts/tableServices/tables@2022-09-01' = { + parent: tableService + name: resourceName + properties: { + signedIdentifiers: [] + } +} diff --git a/settings/remarks/microsoft.storagecache/samples/amlfilesystems/main.bicep b/settings/remarks/microsoft.storagecache/samples/amlfilesystems/main.bicep new file mode 100644 index 00000000..6eb0dde6 --- /dev/null +++ b/settings/remarks/microsoft.storagecache/samples/amlfilesystems/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource amlFilesystem 'Microsoft.StorageCache/amlFilesystems@2024-07-01' = { + name: '${resourceName}-amlfs' + location: location + properties: { + filesystemSubnet: subnet.id + maintenanceWindow: { + dayOfWeek: 'Friday' + timeOfDayUTC: '22:00' + } + storageCapacityTiB: 8 + } + sku: { + name: 'AMLFS-Durable-Premium-250' + } + zones: [ + '1' + ] +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.storagecache/samples/caches/main.bicep b/settings/remarks/microsoft.storagecache/samples/caches/main.bicep new file mode 100644 index 00000000..459e9c0d --- /dev/null +++ b/settings/remarks/microsoft.storagecache/samples/caches/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cach 'Microsoft.StorageCache/caches@2023-01-01' = { + name: resourceName + location: location + properties: { + cacheSizeGB: 3072 + networkSettings: { + mtu: 1500 + ntpServer: 'time.windows.com' + } + subnet: subnet.id + } + sku: { + name: 'Standard_2G' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.storagemover/samples/storagemovers/endpoints/main.bicep b/settings/remarks/microsoft.storagemover/samples/storagemovers/endpoints/main.bicep new file mode 100644 index 00000000..7163200e --- /dev/null +++ b/settings/remarks/microsoft.storagemover/samples/storagemovers/endpoints/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource storageMover 'Microsoft.StorageMover/storageMovers@2023-03-01' = { + name: resourceName + location: location + properties: {} +} + +resource endpoint 'Microsoft.StorageMover/storageMovers/endpoints@2023-03-01' = { + parent: storageMover + name: resourceName + properties: { + endpointType: 'NfsMount' + export: '' + host: '192.168.0.1' + nfsVersion: 'NFSauto' + } +} diff --git a/settings/remarks/microsoft.storagemover/samples/storagemovers/main.bicep b/settings/remarks/microsoft.storagemover/samples/storagemovers/main.bicep new file mode 100644 index 00000000..1fdd4632 --- /dev/null +++ b/settings/remarks/microsoft.storagemover/samples/storagemovers/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource storageMover 'Microsoft.StorageMover/storageMovers@2023-03-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.storagemover/samples/storagemovers/projects/main.bicep b/settings/remarks/microsoft.storagemover/samples/storagemovers/projects/main.bicep new file mode 100644 index 00000000..f621af83 --- /dev/null +++ b/settings/remarks/microsoft.storagemover/samples/storagemovers/projects/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource storageMover 'Microsoft.StorageMover/storageMovers@2023-03-01' = { + name: resourceName + location: location + properties: {} +} + +resource project 'Microsoft.StorageMover/storageMovers/projects@2023-03-01' = { + parent: storageMover + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.storagesync/samples/storagesyncservices/main.bicep b/settings/remarks/microsoft.storagesync/samples/storagesyncservices/main.bicep new file mode 100644 index 00000000..e808c55f --- /dev/null +++ b/settings/remarks/microsoft.storagesync/samples/storagesyncservices/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageSyncService 'Microsoft.StorageSync/storageSyncServices@2020-03-01' = { + name: resourceName + location: location + properties: { + incomingTrafficPolicy: 'AllowAllTraffic' + } +} diff --git a/settings/remarks/microsoft.storagesync/samples/storagesyncservices/syncgroups/main.bicep b/settings/remarks/microsoft.storagesync/samples/storagesyncservices/syncgroups/main.bicep new file mode 100644 index 00000000..cc582be8 --- /dev/null +++ b/settings/remarks/microsoft.storagesync/samples/storagesyncservices/syncgroups/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageSyncService 'Microsoft.StorageSync/storageSyncServices@2020-03-01' = { + name: resourceName + location: location + properties: { + incomingTrafficPolicy: 'AllowAllTraffic' + } +} + +resource syncGroup 'Microsoft.StorageSync/storageSyncServices/syncGroups@2020-03-01' = { + parent: storageSyncService + name: resourceName +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/clusters/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/clusters/main.bicep new file mode 100644 index 00000000..4dd506c0 --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/clusters/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.StreamAnalytics/clusters@2020-03-01' = { + name: resourceName + location: location + sku: { + capacity: 36 + name: 'Default' + } +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/functions/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/functions/main.bicep new file mode 100644 index 00000000..1e464e7a --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/functions/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource streamingJob 'Microsoft.StreamAnalytics/streamingJobs@2020-03-01' = { + name: resourceName + location: location + properties: { + cluster: {} + compatibilityLevel: '1.0' + contentStoragePolicy: 'SystemAccount' + dataLocale: 'en-GB' + eventsLateArrivalMaxDelayInSeconds: 60 + eventsOutOfOrderMaxDelayInSeconds: 50 + eventsOutOfOrderPolicy: 'Adjust' + jobType: 'Cloud' + outputErrorPolicy: 'Drop' + sku: { + name: 'Standard' + } + transformation: { + name: 'main' + properties: { + query: ''' SELECT * + INTO [YourOutputAlias] + FROM [YourInputAlias] +''' + streamingUnits: 3 + } + } + } +} + +resource function 'Microsoft.StreamAnalytics/streamingJobs/functions@2020-03-01' = { + parent: streamingJob + name: resourceName + properties: { + properties: { + binding: { + properties: { + script: '''function getRandomNumber(in) { + return in; +} +''' + } + type: 'Microsoft.StreamAnalytics/JavascriptUdf' + } + inputs: [ + { + dataType: 'bigint' + isConfigurationParameter: false + } + ] + output: { + dataType: 'bigint' + } + } + type: 'Scalar' + } +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/inputs/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/inputs/main.bicep new file mode 100644 index 00000000..444d70e6 --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/inputs/main.bicep @@ -0,0 +1,78 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource streamingJob 'Microsoft.StreamAnalytics/streamingJobs@2020-03-01' = { + name: resourceName + location: location + properties: { + cluster: {} + compatibilityLevel: '1.0' + contentStoragePolicy: 'SystemAccount' + dataLocale: 'en-GB' + eventsLateArrivalMaxDelayInSeconds: 60 + eventsOutOfOrderMaxDelayInSeconds: 50 + eventsOutOfOrderPolicy: 'Adjust' + jobType: 'Cloud' + outputErrorPolicy: 'Drop' + sku: { + name: 'Standard' + } + transformation: { + name: 'main' + properties: { + query: ''' SELECT * + INTO [YourOutputAlias] + FROM [YourInputAlias] +''' + streamingUnits: 3 + } + } + } +} + +resource input 'Microsoft.StreamAnalytics/streamingJobs/inputs@2020-03-01' = { + parent: streamingJob + name: resourceName + properties: { + datasource: { + properties: { + consumerGroupName: '$Default' + endpoint: 'messages/events' + iotHubNamespace: iothub.name + sharedAccessPolicyKey: iothub.listkeys().value[0].primaryKey + sharedAccessPolicyName: 'iothubowner' + } + type: 'Microsoft.Devices/IotHubs' + } + serialization: { + properties: {} + type: 'Avro' + } + type: 'Stream' + } +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/main.bicep new file mode 100644 index 00000000..d84d889c --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource streamingJob 'Microsoft.StreamAnalytics/streamingJobs@2020-03-01' = { + name: resourceName + location: location + properties: { + cluster: {} + compatibilityLevel: '1.0' + contentStoragePolicy: 'SystemAccount' + dataLocale: 'en-GB' + eventsLateArrivalMaxDelayInSeconds: 60 + eventsOutOfOrderMaxDelayInSeconds: 50 + eventsOutOfOrderPolicy: 'Adjust' + jobType: 'Cloud' + outputErrorPolicy: 'Drop' + sku: { + name: 'Standard' + } + transformation: { + name: 'main' + properties: { + query: ''' SELECT * + INTO [YourOutputAlias] + FROM [YourInputAlias] +''' + streamingUnits: 3 + } + } + } +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/outputs/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/outputs/main.bicep new file mode 100644 index 00000000..a164e7d9 --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/outputs/main.bicep @@ -0,0 +1,86 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource streamingJob 'Microsoft.StreamAnalytics/streamingJobs@2020-03-01' = { + name: resourceName + location: location + properties: { + cluster: {} + compatibilityLevel: '1.0' + contentStoragePolicy: 'SystemAccount' + dataLocale: 'en-GB' + eventsLateArrivalMaxDelayInSeconds: 60 + eventsOutOfOrderMaxDelayInSeconds: 50 + eventsOutOfOrderPolicy: 'Adjust' + jobType: 'Cloud' + outputErrorPolicy: 'Drop' + sku: { + name: 'Standard' + } + transformation: { + name: 'main' + properties: { + query: ''' SELECT * + INTO [YourOutputAlias] + FROM [YourInputAlias] +''' + streamingUnits: 3 + } + } + } +} + +resource output 'Microsoft.StreamAnalytics/streamingJobs/outputs@2021-10-01-preview' = { + parent: streamingJob + name: resourceName + properties: { + datasource: { + properties: { + accountKey: storageAccount.listKeys().keys[0].value + accountName: storageAccount.name + batchSize: 100 + partitionKey: 'foo' + rowKey: 'bar' + table: 'foobar' + } + type: 'Microsoft.Storage/Table' + } + serialization: null + } +} diff --git a/settings/remarks/microsoft.synapse/samples/privatelinkhubs/main.bicep b/settings/remarks/microsoft.synapse/samples/privatelinkhubs/main.bicep new file mode 100644 index 00000000..8670b092 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/privatelinkhubs/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource privateLinkHub 'Microsoft.Synapse/privateLinkHubs@2021-06-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/azureadonlyauthentications/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/azureadonlyauthentications/main.bicep new file mode 100644 index 00000000..9c13441c --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/azureadonlyauthentications/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource synapseAzureadOnlyAuthentication 'Microsoft.Synapse/workspaces/azureADOnlyAuthentications@2021-06-01-preview' = { + parent: workspace + name: 'default' + properties: { + azureADOnlyAuthentication: true + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/bigdatapools/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/bigdatapools/main.bicep new file mode 100644 index 00000000..8414c368 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/bigdatapools/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource bigDataPool 'Microsoft.Synapse/workspaces/bigDataPools@2021-06-01-preview' = { + parent: workspace + name: resourceName + location: location + properties: { + autoPause: { + enabled: false + } + autoScale: { + enabled: false + } + cacheSize: 0 + defaultSparkLogFolder: '/logs' + dynamicExecutorAllocation: { + enabled: false + maxExecutors: 0 + minExecutors: 0 + } + isComputeIsolationEnabled: false + nodeCount: 3 + nodeSize: 'Small' + nodeSizeFamily: 'MemoryOptimized' + sessionLevelPackagesEnabled: false + sparkEventsFolder: '/events' + sparkVersion: '2.4' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/firewallrules/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/firewallrules/main.bicep new file mode 100644 index 00000000..b556f446 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/firewallrules/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource firewallRule 'Microsoft.Synapse/workspaces/firewallRules@2021-06-01' = { + parent: workspace + name: 'AllowAll' + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/integrationruntimes/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/integrationruntimes/main.bicep new file mode 100644 index 00000000..32629f13 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/integrationruntimes/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: 'default' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource integrationRuntime 'Microsoft.Synapse/workspaces/integrationRuntimes@2021-06-01-preview' = { + parent: workspace + name: resourceName + properties: { + description: 'test' + type: 'SelfHosted' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/main.bicep new file mode 100644 index 00000000..63bdfeb2 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login name for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/managedidentitysqlcontrolsettings/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/managedidentitysqlcontrolsettings/main.bicep new file mode 100644 index 00000000..2b54ab6d --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/managedidentitysqlcontrolsettings/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login name for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource managedIdentitySqlControlSetting 'Microsoft.Synapse/workspaces/managedIdentitySqlControlSettings@2021-06-01' = { + parent: workspace + name: 'default' + properties: { + grantSqlControlToManagedIdentity: { + desiredState: 'Disabled' + } + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/securityalertpolicies/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/securityalertpolicies/main.bicep new file mode 100644 index 00000000..2a327d4b --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/securityalertpolicies/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login name for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource securityAlertPolicy 'Microsoft.Synapse/workspaces/securityAlertPolicies@2021-06-01' = { + parent: workspace + name: 'Default' + properties: { + state: 'Enabled' + storageAccountAccessKey: storageAccount.listKeys().keys[0].value + storageEndpoint: storageAccount.properties.primaryEndpoints.blob + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/main.bicep new file mode 100644 index 00000000..b6f07408 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login name for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource sqlPool 'Microsoft.Synapse/workspaces/sqlPools@2021-06-01' = { + parent: workspace + name: resourceName + location: location + properties: { + createMode: 'Default' + } + sku: { + name: 'DW100c' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/vulnerabilityassessments/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/vulnerabilityassessments/main.bicep new file mode 100644 index 00000000..efbceb15 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/vulnerabilityassessments/main.bicep @@ -0,0 +1,68 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource sqlPool 'Microsoft.Synapse/workspaces/sqlPools@2021-06-01' = { + parent: workspace + name: resourceName + location: location + properties: { + createMode: 'Default' + } + sku: { + name: 'DW100c' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} + +resource vulnerabilityAssessment 'Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments@2021-06-01' = { + parent: sqlPool + name: 'default' + properties: { + storageAccountAccessKey: storageAccount.listKeys().keys[0].value + storageContainerPath: 'https://${storageAccount.name}.blob.core.windows.net/${container.name}/' + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/main.bicep new file mode 100644 index 00000000..b92ed4a2 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/main.bicep @@ -0,0 +1,71 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource sqlPool 'Microsoft.Synapse/workspaces/sqlPools@2021-06-01' = { + parent: workspace + name: resourceName + location: location + properties: { + createMode: 'Default' + } + sku: { + name: 'DW100c' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} + +resource workloadGroup 'Microsoft.Synapse/workspaces/sqlPools/workloadGroups@2021-06-01' = { + parent: sqlPool + name: resourceName + properties: { + importance: 'normal' + maxResourcePercent: 100 + maxResourcePercentPerRequest: 3 + minResourcePercent: 0 + minResourcePercentPerRequest: 3 + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.bicep new file mode 100644 index 00000000..54aadcb8 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.bicep @@ -0,0 +1,80 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource sqlPool 'Microsoft.Synapse/workspaces/sqlPools@2021-06-01' = { + parent: workspace + name: resourceName + location: location + properties: { + createMode: 'Default' + } + sku: { + name: 'DW100c' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} + +resource workloadGroup 'Microsoft.Synapse/workspaces/sqlPools/workloadGroups@2021-06-01' = { + parent: sqlPool + name: resourceName + properties: { + importance: 'normal' + maxResourcePercent: 100 + maxResourcePercentPerRequest: 3 + minResourcePercent: 0 + minResourcePercentPerRequest: 3 + } +} + +resource workloadClassifier 'Microsoft.Synapse/workspaces/sqlPools/workloadGroups/workloadClassifiers@2021-06-01' = { + parent: workloadGroup + name: resourceName + properties: { + memberName: 'dbo' + } +} diff --git a/settings/remarks/microsoft.timeseriesinsights/samples/environments/accesspolicies/main.bicep b/settings/remarks/microsoft.timeseriesinsights/samples/environments/accesspolicies/main.bicep new file mode 100644 index 00000000..da33ae18 --- /dev/null +++ b/settings/remarks/microsoft.timeseriesinsights/samples/environments/accesspolicies/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource environment 'Microsoft.TimeSeriesInsights/environments@2020-05-15' = { + name: resourceName + location: location + kind: 'Gen1' + properties: { + dataRetentionTime: 'P30D' + storageLimitExceededBehavior: 'PurgeOldData' + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource accessPolicy 'Microsoft.TimeSeriesInsights/environments/accessPolicies@2020-05-15' = { + parent: environment + name: resourceName + properties: { + description: '' + principalObjectId: 'aGUID' + roles: [ + 'Reader' + ] + } +} diff --git a/settings/remarks/microsoft.timeseriesinsights/samples/environments/eventsources/main.bicep b/settings/remarks/microsoft.timeseriesinsights/samples/environments/eventsources/main.bicep new file mode 100644 index 00000000..9d649fbb --- /dev/null +++ b/settings/remarks/microsoft.timeseriesinsights/samples/environments/eventsources/main.bicep @@ -0,0 +1,103 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'B1' + } + tags: { + purpose: 'testing' + } +} + +resource environment 'Microsoft.TimeSeriesInsights/environments@2020-05-15' = { + name: resourceName + location: location + kind: 'Gen2' + properties: { + storageConfiguration: { + accountName: storageAccount.name + managementKey: storageAccount.listKeys().keys[0].value + } + timeSeriesIdProperties: [ + { + name: 'id' + type: 'String' + } + ] + } + sku: { + capacity: 1 + name: 'L1' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource eventSource 'Microsoft.TimeSeriesInsights/environments/eventSources@2020-05-15' = { + parent: environment + name: resourceName + location: location + kind: 'Microsoft.IoTHub' + properties: { + consumerGroupName: 'test' + eventSourceResourceId: iothub.id + iotHubName: iothub.name + keyName: 'iothubowner' + sharedAccessKey: iothub.listkeys().value[0].primaryKey + timestampPropertyName: '' + } +} diff --git a/settings/remarks/microsoft.timeseriesinsights/samples/environments/main.bicep b/settings/remarks/microsoft.timeseriesinsights/samples/environments/main.bicep new file mode 100644 index 00000000..773185ef --- /dev/null +++ b/settings/remarks/microsoft.timeseriesinsights/samples/environments/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource environment 'Microsoft.TimeSeriesInsights/environments@2020-05-15' = { + name: resourceName + location: location + kind: 'Gen1' + properties: { + dataRetentionTime: 'P30D' + storageLimitExceededBehavior: 'PurgeOldData' + } + sku: { + capacity: 1 + name: 'S1' + } +} diff --git a/settings/remarks/microsoft.timeseriesinsights/samples/environments/referencedatasets/main.bicep b/settings/remarks/microsoft.timeseriesinsights/samples/environments/referencedatasets/main.bicep new file mode 100644 index 00000000..f7bf257f --- /dev/null +++ b/settings/remarks/microsoft.timeseriesinsights/samples/environments/referencedatasets/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource environment 'Microsoft.TimeSeriesInsights/environments@2020-05-15' = { + name: resourceName + location: location + kind: 'Gen1' + properties: { + dataRetentionTime: 'P30D' + storageLimitExceededBehavior: 'PurgeOldData' + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource referenceDataSet 'Microsoft.TimeSeriesInsights/environments/referenceDataSets@2020-05-15' = { + parent: environment + name: resourceName + location: location + properties: { + dataStringComparisonBehavior: 'Ordinal' + keyProperties: [ + { + name: 'keyProperty1' + type: 'String' + } + ] + } +} diff --git a/settings/remarks/microsoft.videoindexer/samples/accounts/main.bicep b/settings/remarks/microsoft.videoindexer/samples/accounts/main.bicep new file mode 100644 index 00000000..305a02af --- /dev/null +++ b/settings/remarks/microsoft.videoindexer/samples/accounts/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource account 'Microsoft.VideoIndexer/accounts@2025-04-01' = { + name: '${resourceName}-vi' + location: location + properties: { + storageServices: { + resourceId: storageAccount.id + userAssignedIdentity: '' + } + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: '${replace(resourceName, '-', '')}sa' + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-identity' + location: location +} diff --git a/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/main.bicep b/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/main.bicep new file mode 100644 index 00000000..259c0806 --- /dev/null +++ b/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2euap' + +resource communicationsGateway 'Microsoft.VoiceServices/communicationsGateways@2023-01-31' = { + name: resourceName + location: location + properties: { + autoGeneratedDomainNameLabelScope: 'NoReuse' + codecs: [ + 'PCMA' + ] + connectivity: 'PublicAddress' + e911Type: 'Standard' + platforms: [ + 'OperatorConnect' + ] + serviceLocations: [ + { + name: 'useast' + primaryRegionProperties: { + allowedMediaSourceAddressPrefixes: [ + '10.1.2.0/24' + ] + allowedSignalingSourceAddressPrefixes: [ + '10.1.1.0/24' + ] + operatorAddresses: [ + '198.51.100.1' + ] + } + } + { + name: 'useast2' + primaryRegionProperties: { + allowedMediaSourceAddressPrefixes: [ + '10.2.2.0/24' + ] + allowedSignalingSourceAddressPrefixes: [ + '10.2.1.0/24' + ] + operatorAddresses: [ + '198.51.100.2' + ] + } + } + ] + teamsVoicemailPilotNumber: '1234567890' + } +} diff --git a/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/testlines/main.bicep b/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/testlines/main.bicep new file mode 100644 index 00000000..66d475f3 --- /dev/null +++ b/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/testlines/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2euap' + +resource communicationsGateway 'Microsoft.VoiceServices/communicationsGateways@2023-01-31' = { + name: resourceName + location: location + properties: { + autoGeneratedDomainNameLabelScope: 'NoReuse' + codecs: [ + 'PCMA' + ] + connectivity: 'PublicAddress' + e911Type: 'Standard' + platforms: [ + 'OperatorConnect' + ] + serviceLocations: [ + { + name: 'useast' + primaryRegionProperties: { + allowedMediaSourceAddressPrefixes: [ + '10.1.2.0/24' + ] + allowedSignalingSourceAddressPrefixes: [ + '10.1.1.0/24' + ] + operatorAddresses: [ + '198.51.100.1' + ] + } + } + { + name: 'useast2' + primaryRegionProperties: { + allowedMediaSourceAddressPrefixes: [ + '10.2.2.0/24' + ] + allowedSignalingSourceAddressPrefixes: [ + '10.2.1.0/24' + ] + operatorAddresses: [ + '198.51.100.2' + ] + } + } + ] + teamsVoicemailPilotNumber: '1234567890' + } +} + +resource testline 'Microsoft.VoiceServices/communicationsGateways/testLines@2023-01-31' = { + parent: communicationsGateway + name: resourceName + location: location + properties: { + phoneNumber: '123456789' + purpose: 'Automated' + } +} diff --git a/settings/remarks/microsoft.web/samples/serverfarms/main.bicep b/settings/remarks/microsoft.web/samples/serverfarms/main.bicep new file mode 100644 index 00000000..ac77f6af --- /dev/null +++ b/settings/remarks/microsoft.web/samples/serverfarms/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} diff --git a/settings/remarks/microsoft.web/samples/sites/config/main.bicep b/settings/remarks/microsoft.web/samples/sites/config/main.bicep new file mode 100644 index 00000000..bdfaa837 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/config/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource config 'Microsoft.Web/sites/config@2022-09-01' = { + parent: site + name: 'azurestorageaccounts' + properties: {} +} diff --git a/settings/remarks/microsoft.web/samples/sites/main.bicep b/settings/remarks/microsoft.web/samples/sites/main.bicep new file mode 100644 index 00000000..84754e11 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} diff --git a/settings/remarks/microsoft.web/samples/sites/publiccertificates/main.bicep b/settings/remarks/microsoft.web/samples/sites/publiccertificates/main.bicep new file mode 100644 index 00000000..b98d9d7a --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/publiccertificates/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2021-02-01' = { + name: resourceName + location: location + kind: 'Windows' + properties: { + isXenon: false + } + sku: { + capacity: 1 + name: 'S1' + size: 'S1' + tier: 'Standard' + } +} + +resource site 'Microsoft.Web/sites@2021-02-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + enabled: true + httpsOnly: false + serverFarmId: serverfarm.id + siteConfig: {} + } +} + +resource publicCertificate 'Microsoft.Web/sites/publicCertificates@2022-09-01' = { + parent: site + name: resourceName + properties: { + blob: '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' + publicCertificateLocation: 'Unknown' + } +} diff --git a/settings/remarks/microsoft.web/samples/sites/siteextensions/main.bicep b/settings/remarks/microsoft.web/samples/sites/siteextensions/main.bicep new file mode 100644 index 00000000..94f2c216 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/siteextensions/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param resourceSiteName string = 'acctestsite0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceSiteName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource dynatraceSiteExtension 'Microsoft.Web/sites/siteextensions@2022-09-01' = { + parent: site + name: 'Dynatrace' + location: location +} diff --git a/settings/remarks/microsoft.web/samples/sites/slots/config/main.bicep b/settings/remarks/microsoft.web/samples/sites/slots/config/main.bicep new file mode 100644 index 00000000..a261a10d --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/slots/config/main.bicep @@ -0,0 +1,92 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource slot 'Microsoft.Web/sites/slots@2022-09-01' = { + parent: site + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertExclusionPaths: '' + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: false + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource config 'Microsoft.Web/sites/slots/config@2022-09-01' = { + parent: slot + name: 'azurestorageaccounts' + properties: {} +} diff --git a/settings/remarks/microsoft.web/samples/sites/slots/main.bicep b/settings/remarks/microsoft.web/samples/sites/slots/main.bicep new file mode 100644 index 00000000..a38c7b91 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/slots/main.bicep @@ -0,0 +1,86 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource slot 'Microsoft.Web/sites/slots@2022-09-01' = { + parent: site + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertExclusionPaths: '' + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: false + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} diff --git a/settings/remarks/microsoft.web/samples/staticsites/customdomains/main.bicep b/settings/remarks/microsoft.web/samples/staticsites/customdomains/main.bicep new file mode 100644 index 00000000..a9b765ba --- /dev/null +++ b/settings/remarks/microsoft.web/samples/staticsites/customdomains/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource staticSite 'Microsoft.Web/staticSites@2021-02-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Free' + } +} + +resource customDomain 'Microsoft.Web/staticSites/customDomains@2021-02-01' = { + parent: staticSite + name: '${resourceName}.contoso.com' + properties: { + validationMethod: 'dns-txt-token' + } +} diff --git a/settings/remarks/microsoft.web/samples/staticsites/main.bicep b/settings/remarks/microsoft.web/samples/staticsites/main.bicep new file mode 100644 index 00000000..722c6511 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/staticsites/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource staticSite 'Microsoft.Web/staticSites@2021-02-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Free' + tier: 'Free' + } +} diff --git a/settings/remarks/nginx.nginxplus/samples/nginxdeployments/configurations/main.bicep b/settings/remarks/nginx.nginxplus/samples/nginxdeployments/configurations/main.bicep new file mode 100644 index 00000000..ea30bb24 --- /dev/null +++ b/settings/remarks/nginx.nginxplus/samples/nginxdeployments/configurations/main.bicep @@ -0,0 +1,105 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource nginxDeployment 'Nginx.NginxPlus/nginxDeployments@2024-11-01-preview' = { + name: '${resourceName}-nginx' + location: location + properties: { + autoUpgradeProfile: { + upgradeChannel: 'stable' + } + enableDiagnosticsSupport: false + networkProfile: { + frontEndIPConfiguration: { + publicIPAddresses: [ + { + id: publicIPAddress.id + } + ] + } + networkInterfaceConfiguration: { + subnetId: subnet.id + } + } + scalingProperties: { + capacity: 10 + } + } + sku: { + name: 'standardv2_Monthly' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2024-05-01' = { + name: '${resourceName}-pip' + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource configuration 'Nginx.NginxPlus/nginxDeployments/configurations@2024-11-01-preview' = { + parent: nginxDeployment + name: 'default' + properties: { + files: [ + { + content: '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' + virtualPath: '/etc/nginx/nginx.conf' + } + ] + protectedFiles: [ + { + content: 'dXNlcjokYXByMSRWZVVBNWt0LiRJampSay8vOG1pUnhEc1p2RDRkYUYxCg==' + virtualPath: '/opt/.htpasswd' + } + ] + rootFile: '/etc/nginx/nginx.conf' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + serviceName: 'NGINX.NGINXPLUS/nginxDeployments' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/nginx.nginxplus/samples/nginxdeployments/main.bicep b/settings/remarks/nginx.nginxplus/samples/nginxdeployments/main.bicep new file mode 100644 index 00000000..21aa7c31 --- /dev/null +++ b/settings/remarks/nginx.nginxplus/samples/nginxdeployments/main.bicep @@ -0,0 +1,137 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource nginxDeployment 'Nginx.NginxPlus/nginxDeployments@2024-11-01-preview' = { + name: '${resourceName}-nginx' + location: location + properties: { + autoUpgradeProfile: { + upgradeChannel: 'stable' + } + enableDiagnosticsSupport: false + networkProfile: { + frontEndIPConfiguration: { + publicIPAddresses: [ + { + id: publicIPAddress.id + } + ] + } + networkInterfaceConfiguration: { + subnetId: subnet.id + } + } + scalingProperties: { + autoScaleSettings: { + profiles: [ + { + capacity: { + max: 30 + min: 10 + } + name: 'test' + } + ] + } + } + userProfile: { + preferredEmail: 'test@test.com' + } + } + sku: { + name: 'standardv2_Monthly' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2024-05-01' = { + name: '${resourceName}-pip' + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource publicipaddress1 'Microsoft.Network/publicIPAddresses@2024-05-01' = { + name: '${resourceName}-pip2' + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + serviceName: 'NGINX.NGINXPLUS/nginxDeployments' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource subnet1 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet2' + properties: { + addressPrefix: '10.0.3.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + serviceName: 'NGINX.NGINXPLUS/nginxDeployments' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/qumulo.storage/samples/filesystems/main.bicep b/settings/remarks/qumulo.storage/samples/filesystems/main.bicep new file mode 100644 index 00000000..526a60f7 --- /dev/null +++ b/settings/remarks/qumulo.storage/samples/filesystems/main.bicep @@ -0,0 +1,61 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrative password for the Qumulo file system') +param qumuloPassword string + +resource qumuloFileSystem 'Qumulo.Storage/fileSystems@2024-06-19' = { + name: resourceName + location: location + properties: { + adminPassword: null + availabilityZone: '1' + delegatedSubnetId: subnet.id + marketplaceDetails: { + offerId: 'qumulo-saas-mpp' + planId: 'azure-native-qumulo-v3' + publisherId: 'qumulo1584033880660' + } + storageSku: 'Cold_LRS' + userDetails: { + email: 'test@test.com' + } + } +} + +resource vnet 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: vnet + name: resourceName + location: location + properties: { + addressPrefix: '10.0.1.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + actions: [ + 'Microsoft.Network/virtualNetworks/subnets/join/action' + ] + serviceName: 'Qumulo.Storage/fileSystems' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + } +}