diff --git a/settings/remarks/microsoft.alertsmanagement/remarks.json b/settings/remarks/microsoft.alertsmanagement/remarks.json index 8de5df3d..96838d4a 100644 --- a/settings/remarks/microsoft.alertsmanagement/remarks.json +++ b/settings/remarks/microsoft.alertsmanagement/remarks.json @@ -1,28 +1,45 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "For guidance on deploying monitoring solutions, see [Create monitoring resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-monitoring).", - "ResourceTypes": [ - "microsoft.alertsmanagement/smartdetectoralertrules" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.AlertsManagement/actionRules", - "Path": "samples/actionrules/main.tf", - "Description": "A basic example of deploying Alert Processing Rule which apply action group." - }, - { - "ResourceType": "Microsoft.AlertsManagement/prometheusRuleGroups", - "Path": "samples/prometheusrulegroups/main.tf", - "Description": "A basic example of deploying Alert Management Prometheus Rule Group." - }, - { - "ResourceType": "Microsoft.AlertsManagement/smartDetectorAlertRules", - "Path": "samples/smartdetectoralertrules/main.tf", - "Description": "A basic example of deploying Monitor Smart Detector Alert Rule." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "For guidance on deploying monitoring solutions, see [Create monitoring resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-monitoring).", + "ResourceTypes": [ + "microsoft.alertsmanagement/smartdetectoralertrules" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.AlertsManagement/actionRules", + "Path": "samples/actionrules/main.tf", + "Description": "A basic example of deploying Alert Processing Rule which apply action group." + }, + { + "ResourceType": "Microsoft.AlertsManagement/prometheusRuleGroups", + "Path": "samples/prometheusrulegroups/main.tf", + "Description": "A basic example of deploying Alert Management Prometheus Rule Group." + }, + { + "ResourceType": "Microsoft.AlertsManagement/smartDetectorAlertRules", + "Path": "samples/smartdetectoralertrules/main.tf", + "Description": "A basic example of deploying Monitor Smart Detector Alert Rule." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.AlertsManagement/actionRules", + "Path": "samples/actionrules/main.bicep", + "Description": "A basic example of deploying Alert Processing Rule which apply action group." + }, + { + "ResourceType": "Microsoft.AlertsManagement/prometheusRuleGroups", + "Path": "samples/prometheusrulegroups/main.bicep", + "Description": "A basic example of deploying Alert Management Prometheus Rule Group." + }, + { + "ResourceType": "Microsoft.AlertsManagement/smartDetectorAlertRules", + "Path": "samples/smartdetectoralertrules/main.bicep", + "Description": "A basic example of deploying Monitor Smart Detector Alert Rule." + } + ] +} diff --git a/settings/remarks/microsoft.alertsmanagement/samples/actionrules/main.bicep b/settings/remarks/microsoft.alertsmanagement/samples/actionrules/main.bicep new file mode 100644 index 00000000..c6fba9b9 --- /dev/null +++ b/settings/remarks/microsoft.alertsmanagement/samples/actionrules/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' + +resource actionRule 'Microsoft.AlertsManagement/actionRules@2021-08-08' = { + name: resourceName + location: 'global' + properties: { + actions: [ + { + actionType: 'RemoveAllActionGroups' + } + ] + description: '' + enabled: true + scopes: [ + resourceGroup().id + ] + } +} diff --git a/settings/remarks/microsoft.alertsmanagement/samples/prometheusrulegroups/main.bicep b/settings/remarks/microsoft.alertsmanagement/samples/prometheusrulegroups/main.bicep new file mode 100644 index 00000000..3ef991c6 --- /dev/null +++ b/settings/remarks/microsoft.alertsmanagement/samples/prometheusrulegroups/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.Monitor/accounts@2023-04-03' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} + +resource prometheusRuleGroup 'Microsoft.AlertsManagement/prometheusRuleGroups@2023-03-01' = { + name: resourceName + location: location + properties: { + clusterName: '' + description: '' + enabled: false + rules: [ + { + enabled: false + expression: '''histogram_quantile(0.99, sum(rate(jobs_duration_seconds_bucket{service="billing-processing"}[5m])) by (job_type)) +''' + labels: { + team: 'prod' + } + record: 'job_type:billing_jobs_duration_seconds:99p5m' + } + ] + scopes: [ + account.id + ] + } +} diff --git a/settings/remarks/microsoft.alertsmanagement/samples/smartdetectoralertrules/main.bicep b/settings/remarks/microsoft.alertsmanagement/samples/smartdetectoralertrules/main.bicep new file mode 100644 index 00000000..7c2efcf8 --- /dev/null +++ b/settings/remarks/microsoft.alertsmanagement/samples/smartdetectoralertrules/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource actionGroup 'Microsoft.Insights/actionGroups@2023-01-01' = { + name: resourceName + location: 'global' + properties: { + armRoleReceivers: [] + automationRunbookReceivers: [] + azureAppPushReceivers: [] + azureFunctionReceivers: [] + emailReceivers: [] + enabled: true + eventHubReceivers: [] + groupShortName: 'acctestag' + itsmReceivers: [] + logicAppReceivers: [] + smsReceivers: [] + voiceReceivers: [] + webhookReceivers: [] + } +} + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource smartDetectorAlertRule 'microsoft.alertsManagement/smartDetectorAlertRules@2019-06-01' = { + name: resourceName + location: 'global' + properties: { + actionGroups: { + customEmailSubject: '' + customWebhookPayload: '' + groupIds: [ + actionGroup.id + ] + } + description: '' + detector: { + id: 'FailureAnomaliesDetector' + } + frequency: 'PT1M' + scope: [ + component.id + ] + severity: 'Sev0' + state: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.analysisservices/remarks.json b/settings/remarks/microsoft.analysisservices/remarks.json index 16c5e89e..92f9f1e9 100644 --- a/settings/remarks/microsoft.analysisservices/remarks.json +++ b/settings/remarks/microsoft.analysisservices/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.AnalysisServices/servers", - "Path": "samples/servers/main.tf", - "Description": "A basic example of deploying Analysis Services Server." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.AnalysisServices/servers", + "Path": "samples/servers/main.tf", + "Description": "A basic example of deploying Analysis Services Server." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.AnalysisServices/servers", + "Path": "samples/servers/main.bicep", + "Description": "A basic example of deploying Analysis Services Server." + } + ] +} diff --git a/settings/remarks/microsoft.analysisservices/samples/servers/main.bicep b/settings/remarks/microsoft.analysisservices/samples/servers/main.bicep new file mode 100644 index 00000000..828a8406 --- /dev/null +++ b/settings/remarks/microsoft.analysisservices/samples/servers/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource server 'Microsoft.AnalysisServices/servers@2017-08-01' = { + name: resourceName + location: location + properties: { + asAdministrators: { + members: [] + } + ipV4FirewallSettings: { + enablePowerBIService: false + firewallRules: [] + } + } + sku: { + name: 'B1' + } +} diff --git a/settings/remarks/microsoft.apimanagement/remarks.json b/settings/remarks/microsoft.apimanagement/remarks.json index 8a9f84c8..635a3ff6 100644 --- a/settings/remarks/microsoft.apimanagement/remarks.json +++ b/settings/remarks/microsoft.apimanagement/remarks.json @@ -1,170 +1,327 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ApiManagement/service", - "Path": "samples/service/main.tf", - "Description": "A basic example of deploying API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apiVersionSets", - "Path": "samples/service/apiversionsets/main.tf", - "Description": "A basic example of deploying API Version Set within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apis", - "Path": "samples/service/apis/main.tf", - "Description": "A basic example of deploying API within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apis/diagnostics", - "Path": "samples/service/apis/diagnostics/main.tf", - "Description": "A basic example of deploying API Management Service API Diagnostics Logs." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apis/operations", - "Path": "samples/service/apis/operations/main.tf", - "Description": "A basic example of deploying API Operation within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apis/policies", - "Path": "samples/service/apis/policies/main.tf", - "Description": "A basic example of deploying API Management Service APIs Policies." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apis/releases", - "Path": "samples/service/apis/releases/main.tf", - "Description": "A basic example of deploying API Management API Release." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apis/schemas", - "Path": "samples/service/apis/schemas/main.tf", - "Description": "A basic example of deploying API Schema within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apis/tagDescriptions", - "Path": "samples/service/apis/tagdescriptions/main.tf", - "Description": "A basic example of deploying API Tag Description within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/apis/tags", - "Path": "samples/service/apis/tags/main.tf", - "Description": "A basic example of deploying API Management API Tag." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/authorizationServers", - "Path": "samples/service/authorizationservers/main.tf", - "Description": "A basic example of deploying Authorization Server within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/backends", - "Path": "samples/service/backends/main.tf", - "Description": "A basic example of deploying backend within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/caches", - "Path": "samples/service/caches/main.tf", - "Description": "A basic example of deploying API Management Redis Cache." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/certificates", - "Path": "samples/service/certificates/main.tf", - "Description": "A basic example of deploying Certificate within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/diagnostics", - "Path": "samples/service/diagnostics/main.tf", - "Description": "A basic example of deploying API Management Service Diagnostic." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/gateways", - "Path": "samples/service/gateways/main.tf", - "Description": "A basic example of deploying API Management Gateway." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/gateways/certificateAuthorities", - "Path": "samples/service/gateways/certificateauthorities/main.tf", - "Description": "A basic example of deploying API Management Gateway Certificate Authority." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/gateways/hostnameConfigurations", - "Path": "samples/service/gateways/hostnameconfigurations/main.tf", - "Description": "A basic example of deploying API Management Gateway Host Name Configuration." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/groups", - "Path": "samples/service/groups/main.tf", - "Description": "A basic example of deploying API Management Group." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/identityProviders", - "Path": "samples/service/identityproviders/main.tf", - "Description": "A basic example of deploying API Management Identity Provider." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/loggers", - "Path": "samples/service/loggers/main.tf", - "Description": "A basic example of deploying Logger within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/namedValues", - "Path": "samples/service/namedvalues/main.tf", - "Description": "A basic example of deploying API Management Named Value." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/openidConnectProviders", - "Path": "samples/service/openidconnectproviders/main.tf", - "Description": "A basic example of deploying OpenID Connect Provider within a API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/policyFragments", - "Path": "samples/service/policyfragments/main.tf", - "Description": "A basic example of deploying API Management Service Policy Fragments." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/portalsettings", - "Path": "samples/service/portalsettings/main.tf", - "Description": "A basic example of deploying API Management Service Portal Settings." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/products", - "Path": "samples/service/products/main.tf", - "Description": "A basic example of deploying API Management Product." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/products/policies", - "Path": "samples/service/products/policies/main.tf", - "Description": "A basic example of deploying API Management Service Products Policies." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/products/tags", - "Path": "samples/service/products/tags/main.tf", - "Description": "A basic example of deploying API Management Product tag." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/schemas", - "Path": "samples/service/schemas/main.tf", - "Description": "A basic example of deploying Global Schema within an API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/subscriptions", - "Path": "samples/service/subscriptions/main.tf", - "Description": "A basic example of deploying Subscription within a API Management Service." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/tags", - "Path": "samples/service/tags/main.tf", - "Description": "A basic example of deploying API Management Tag." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/templates", - "Path": "samples/service/templates/main.tf", - "Description": "A basic example of deploying API Management Service Templates." - }, - { - "ResourceType": "Microsoft.ApiManagement/service/users", - "Path": "samples/service/users/main.tf", - "Description": "A basic example of deploying API Management User." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ApiManagement/service", + "Path": "samples/service/main.tf", + "Description": "A basic example of deploying API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apiVersionSets", + "Path": "samples/service/apiversionsets/main.tf", + "Description": "A basic example of deploying API Version Set within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis", + "Path": "samples/service/apis/main.tf", + "Description": "A basic example of deploying API within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/diagnostics", + "Path": "samples/service/apis/diagnostics/main.tf", + "Description": "A basic example of deploying API Management Service API Diagnostics Logs." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/operations", + "Path": "samples/service/apis/operations/main.tf", + "Description": "A basic example of deploying API Operation within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/policies", + "Path": "samples/service/apis/policies/main.tf", + "Description": "A basic example of deploying API Management Service APIs Policies." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/releases", + "Path": "samples/service/apis/releases/main.tf", + "Description": "A basic example of deploying API Management API Release." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/schemas", + "Path": "samples/service/apis/schemas/main.tf", + "Description": "A basic example of deploying API Schema within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/tagDescriptions", + "Path": "samples/service/apis/tagdescriptions/main.tf", + "Description": "A basic example of deploying API Tag Description within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/tags", + "Path": "samples/service/apis/tags/main.tf", + "Description": "A basic example of deploying API Management API Tag." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/authorizationServers", + "Path": "samples/service/authorizationservers/main.tf", + "Description": "A basic example of deploying Authorization Server within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/backends", + "Path": "samples/service/backends/main.tf", + "Description": "A basic example of deploying backend within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/caches", + "Path": "samples/service/caches/main.tf", + "Description": "A basic example of deploying API Management Redis Cache." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/certificates", + "Path": "samples/service/certificates/main.tf", + "Description": "A basic example of deploying Certificate within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/diagnostics", + "Path": "samples/service/diagnostics/main.tf", + "Description": "A basic example of deploying API Management Service Diagnostic." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/gateways", + "Path": "samples/service/gateways/main.tf", + "Description": "A basic example of deploying API Management Gateway." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/gateways/certificateAuthorities", + "Path": "samples/service/gateways/certificateauthorities/main.tf", + "Description": "A basic example of deploying API Management Gateway Certificate Authority." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/gateways/hostnameConfigurations", + "Path": "samples/service/gateways/hostnameconfigurations/main.tf", + "Description": "A basic example of deploying API Management Gateway Host Name Configuration." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/groups", + "Path": "samples/service/groups/main.tf", + "Description": "A basic example of deploying API Management Group." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/identityProviders", + "Path": "samples/service/identityproviders/main.tf", + "Description": "A basic example of deploying API Management Identity Provider." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/loggers", + "Path": "samples/service/loggers/main.tf", + "Description": "A basic example of deploying Logger within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/namedValues", + "Path": "samples/service/namedvalues/main.tf", + "Description": "A basic example of deploying API Management Named Value." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/openidConnectProviders", + "Path": "samples/service/openidconnectproviders/main.tf", + "Description": "A basic example of deploying OpenID Connect Provider within a API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/policyFragments", + "Path": "samples/service/policyfragments/main.tf", + "Description": "A basic example of deploying API Management Service Policy Fragments." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/portalsettings", + "Path": "samples/service/portalsettings/main.tf", + "Description": "A basic example of deploying API Management Service Portal Settings." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/products", + "Path": "samples/service/products/main.tf", + "Description": "A basic example of deploying API Management Product." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/products/policies", + "Path": "samples/service/products/policies/main.tf", + "Description": "A basic example of deploying API Management Service Products Policies." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/products/tags", + "Path": "samples/service/products/tags/main.tf", + "Description": "A basic example of deploying API Management Product tag." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/schemas", + "Path": "samples/service/schemas/main.tf", + "Description": "A basic example of deploying Global Schema within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/subscriptions", + "Path": "samples/service/subscriptions/main.tf", + "Description": "A basic example of deploying Subscription within a API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/tags", + "Path": "samples/service/tags/main.tf", + "Description": "A basic example of deploying API Management Tag." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/templates", + "Path": "samples/service/templates/main.tf", + "Description": "A basic example of deploying API Management Service Templates." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/users", + "Path": "samples/service/users/main.tf", + "Description": "A basic example of deploying API Management User." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ApiManagement/service", + "Path": "samples/service/main.bicep", + "Description": "A basic example of deploying API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apiVersionSets", + "Path": "samples/service/apiversionsets/main.bicep", + "Description": "A basic example of deploying API Version Set within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis", + "Path": "samples/service/apis/main.bicep", + "Description": "A basic example of deploying API within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/diagnostics", + "Path": "samples/service/apis/diagnostics/main.bicep", + "Description": "A basic example of deploying API Management Service API Diagnostics Logs." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/operations", + "Path": "samples/service/apis/operations/main.bicep", + "Description": "A basic example of deploying API Operation within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/policies", + "Path": "samples/service/apis/policies/main.bicep", + "Description": "A basic example of deploying API Management Service APIs Policies." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/schemas", + "Path": "samples/service/apis/schemas/main.bicep", + "Description": "A basic example of deploying API Schema within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/tagDescriptions", + "Path": "samples/service/apis/tagdescriptions/main.bicep", + "Description": "A basic example of deploying API Tag Description within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/apis/tags", + "Path": "samples/service/apis/tags/main.bicep", + "Description": "A basic example of deploying API Management API Tag." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/authorizationServers", + "Path": "samples/service/authorizationservers/main.bicep", + "Description": "A basic example of deploying Authorization Server within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/backends", + "Path": "samples/service/backends/main.bicep", + "Description": "A basic example of deploying backend within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/caches", + "Path": "samples/service/caches/main.bicep", + "Description": "A basic example of deploying API Management Redis Cache." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/certificates", + "Path": "samples/service/certificates/main.bicep", + "Description": "A basic example of deploying Certificate within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/diagnostics", + "Path": "samples/service/diagnostics/main.bicep", + "Description": "A basic example of deploying API Management Service Diagnostic." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/gateways", + "Path": "samples/service/gateways/main.bicep", + "Description": "A basic example of deploying API Management Gateway." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/gateways/certificateAuthorities", + "Path": "samples/service/gateways/certificateauthorities/main.bicep", + "Description": "A basic example of deploying API Management Gateway Certificate Authority." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/gateways/hostnameConfigurations", + "Path": "samples/service/gateways/hostnameconfigurations/main.bicep", + "Description": "A basic example of deploying API Management Gateway Host Name Configuration." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/groups", + "Path": "samples/service/groups/main.bicep", + "Description": "A basic example of deploying API Management Group." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/identityProviders", + "Path": "samples/service/identityproviders/main.bicep", + "Description": "A basic example of deploying API Management Identity Provider." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/loggers", + "Path": "samples/service/loggers/main.bicep", + "Description": "A basic example of deploying Logger within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/namedValues", + "Path": "samples/service/namedvalues/main.bicep", + "Description": "A basic example of deploying API Management Named Value." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/openidConnectProviders", + "Path": "samples/service/openidconnectproviders/main.bicep", + "Description": "A basic example of deploying OpenID Connect Provider within a API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/policyFragments", + "Path": "samples/service/policyfragments/main.bicep", + "Description": "A basic example of deploying API Management Service Policy Fragments." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/portalsettings", + "Path": "samples/service/portalsettings/main.bicep", + "Description": "A basic example of deploying API Management Service Portal Settings." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/products", + "Path": "samples/service/products/main.bicep", + "Description": "A basic example of deploying API Management Product." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/products/policies", + "Path": "samples/service/products/policies/main.bicep", + "Description": "A basic example of deploying API Management Service Products Policies." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/products/tags", + "Path": "samples/service/products/tags/main.bicep", + "Description": "A basic example of deploying API Management Product tag." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/schemas", + "Path": "samples/service/schemas/main.bicep", + "Description": "A basic example of deploying Global Schema within an API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/subscriptions", + "Path": "samples/service/subscriptions/main.bicep", + "Description": "A basic example of deploying Subscription within a API Management Service." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/tags", + "Path": "samples/service/tags/main.bicep", + "Description": "A basic example of deploying API Management Tag." + }, + { + "ResourceType": "Microsoft.ApiManagement/service/users", + "Path": "samples/service/users/main.bicep", + "Description": "A basic example of deploying API Management User." + } + ] +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/diagnostics/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/diagnostics/main.bicep new file mode 100644 index 00000000..6e6d91b8 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/diagnostics/main.bicep @@ -0,0 +1,77 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = { + parent: service + name: '${resourceName};rev=1' + properties: { + apiType: 'http' + apiVersion: '' + format: 'swagger-link-json' + path: 'test' + type: 'http' + value: 'http://conferenceapi.azurewebsites.net/?format=json' + } +} + +resource logger 'Microsoft.ApiManagement/service/loggers@2021-08-01' = { + parent: service + name: resourceName + properties: { + credentials: { + instrumentationKey: component.properties.InstrumentationKey + } + description: '' + isBuffered: true + loggerType: 'applicationInsights' + } +} + +resource diagnostic 'Microsoft.ApiManagement/service/apis/diagnostics@2021-08-01' = { + parent: api + name: 'applicationinsights' + properties: { + loggerId: logger.id + operationNameFormat: 'Name' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/main.bicep new file mode 100644 index 00000000..c15f73f6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = { + parent: service + name: '${resourceName};rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersion: '' + apiVersionDescription: '' + authenticationSettings: {} + description: '' + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + serviceUrl: '' + subscriptionRequired: true + type: 'http' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/operations/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/operations/main.bicep new file mode 100644 index 00000000..28df9ff6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/operations/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource service 'Microsoft.ApiManagement/service@2022-08-01' = { + name: '${resourceName}-am' + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2022-08-01' = { + parent: service + name: '${resourceName}-api;rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersionDescription: '' + authenticationSettings: {} + description: 'What is my purpose? You parse butter.' + displayName: 'Butter Parser' + path: 'butter-parser' + protocols: [ + 'http' + 'https' + ] + serviceUrl: 'https://example.com/foo/bar' + subscriptionKeyParameterNames: { + header: 'X-Butter-Robot-API-Key' + query: 'location' + } + subscriptionRequired: true + type: 'http' + } +} + +resource operation 'Microsoft.ApiManagement/service/apis/operations@2022-08-01' = { + parent: api + name: '${resourceName}-operation' + properties: { + description: '' + displayName: 'DELETE Resource' + method: 'DELETE' + responses: [] + templateParameters: [] + urlTemplate: '/resource' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/policies/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/policies/main.bicep new file mode 100644 index 00000000..181e1961 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/policies/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = { + parent: service + name: '${resourceName};rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersion: '' + apiVersionDescription: '' + authenticationSettings: {} + description: '' + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + serviceUrl: '' + subscriptionRequired: true + type: 'http' + } +} + +resource policy 'Microsoft.ApiManagement/service/apis/policies@2021-08-01' = { + parent: api + name: 'policy' + properties: { + format: 'xml' + value: ''' + + + + + +''' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/schemas/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/schemas/main.bicep new file mode 100644 index 00000000..e62d1103 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/schemas/main.bicep @@ -0,0 +1,63 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = { + parent: service + name: '${resourceName};rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersion: '' + apiVersionDescription: '' + authenticationSettings: {} + description: '' + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + serviceUrl: '' + subscriptionRequired: true + type: 'http' + } +} + +resource schema 'Microsoft.ApiManagement/service/apis/schemas@2021-08-01' = { + parent: api + name: resourceName + properties: { + contentType: 'application/vnd.ms-azure-apim.xsd+xml' + document: { + value: ''' + + ''' + } + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/tagdescriptions/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/tagdescriptions/main.bicep new file mode 100644 index 00000000..4f4c4267 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/tagdescriptions/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource service 'Microsoft.ApiManagement/service@2022-08-01' = { + name: '${resourceName}-service' + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2022-08-01' = { + parent: service + name: '${resourceName}-api;rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersionDescription: '' + authenticationSettings: {} + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + subscriptionRequired: true + type: 'http' + } +} + +resource tag 'Microsoft.ApiManagement/service/tags@2022-08-01' = { + parent: service + name: '${resourceName}-tag' + properties: { + displayName: 'acctest0001-tag' + } +} + +resource tagDescription 'Microsoft.ApiManagement/service/apis/tagDescriptions@2022-08-01' = { + parent: api + name: '${resourceName}-tag' + properties: { + description: 'tag description' + externalDocsDescription: 'external tag description' + externalDocsUrl: 'https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs' + } +} + +resource tag1 'Microsoft.ApiManagement/service/apis/tags@2022-08-01' = { + parent: api + name: '${resourceName}-tag' +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apis/tags/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apis/tags/main.bicep new file mode 100644 index 00000000..9263f2e8 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apis/tags/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource service 'Microsoft.ApiManagement/service@2022-08-01' = { + name: '${resourceName}-service' + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource api 'Microsoft.ApiManagement/service/apis@2022-08-01' = { + parent: service + name: '${resourceName}-api;rev=1' + properties: { + apiRevisionDescription: '' + apiType: 'http' + apiVersionDescription: '' + authenticationSettings: {} + displayName: 'api1' + path: 'api1' + protocols: [ + 'https' + ] + subscriptionRequired: true + type: 'http' + } +} + +resource tag 'Microsoft.ApiManagement/service/tags@2022-08-01' = { + parent: service + name: '${resourceName}-tag' + properties: { + displayName: 'acctest0001-tag' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/apiversionsets/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/apiversionsets/main.bicep new file mode 100644 index 00000000..079e3fb3 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/apiversionsets/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource apiVersionSet 'Microsoft.ApiManagement/service/apiVersionSets@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: 'TestDescription1' + displayName: 'TestApiVersionSet1230630032559674766' + versioningScheme: 'Segment' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/authorizationservers/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/authorizationservers/main.bicep new file mode 100644 index 00000000..244a30d9 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/authorizationservers/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The OAuth client ID for the authorization server') +param oauthClientId string +@secure() +@description('The OAuth client secret for the authorization server') +param oauthClientSecret string + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource authorizationServer 'Microsoft.ApiManagement/service/authorizationServers@2021-08-01' = { + parent: service + name: resourceName + properties: { + authorizationEndpoint: 'https://azacceptance.hashicorptest.com/client/authorize' + authorizationMethods: [ + 'GET' + ] + clientAuthenticationMethod: [] + clientId: null + clientRegistrationEndpoint: 'https://azacceptance.hashicorptest.com/client/register' + clientSecret: null + defaultScope: '' + description: '' + displayName: 'Test Group' + grantTypes: [ + 'implicit' + ] + resourceOwnerPassword: '' + resourceOwnerUsername: '' + supportState: false + tokenBodyParameters: [] + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/backends/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/backends/main.bicep new file mode 100644 index 00000000..aa963401 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/backends/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource backend 'Microsoft.ApiManagement/service/backends@2021-08-01' = { + parent: service + name: resourceName + properties: { + protocol: 'http' + url: 'https://acctest' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/caches/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/caches/main.bicep new file mode 100644 index 00000000..63f1096f --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/caches/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource redis 'Microsoft.Cache/redis@2023-04-01' = { + name: resourceName + properties: { + enableNonSslPort: true + minimumTlsVersion: '1.2' + sku: { + capacity: 2 + family: 'C' + name: 'Standard' + } + } +} + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource cache 'Microsoft.ApiManagement/service/caches@2021-08-01' = { + parent: service + name: resourceName + properties: { + connectionString: '${redis.name}.redis.cache.windows.net:6380,password=redis.listKeys().primaryKey,ssl=true,abortConnect=False' + useFromLocation: 'default' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/certificates/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/certificates/main.bicep new file mode 100644 index 00000000..9fa37d0f --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/certificates/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource certificate 'Microsoft.ApiManagement/service/certificates@2021-08-01' = { + parent: service + name: resourceName + properties: { + data: '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' + password: '' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/diagnostics/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/diagnostics/main.bicep new file mode 100644 index 00000000..247cece4 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/diagnostics/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource diagnostic 'Microsoft.ApiManagement/service/diagnostics@2021-08-01' = { + parent: service + name: 'applicationinsights' + properties: { + loggerId: logger.id + operationNameFormat: 'Name' + } +} + +resource logger 'Microsoft.ApiManagement/service/loggers@2021-08-01' = { + parent: service + name: resourceName + properties: { + credentials: { + instrumentationKey: component.properties.InstrumentationKey + } + description: '' + isBuffered: true + loggerType: 'applicationInsights' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/gateways/certificateauthorities/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/gateways/certificateauthorities/main.bicep new file mode 100644 index 00000000..d400e9d2 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/gateways/certificateauthorities/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The base64-encoded certificate data') +param certificateData string +@secure() +@description('The password for the certificate') +param certificatePassword string + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource certificate 'Microsoft.ApiManagement/service/certificates@2021-08-01' = { + parent: service + name: resourceName + properties: { + data: null + password: null + } +} + +resource gateway 'Microsoft.ApiManagement/service/gateways@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + locationData: { + city: '' + countryOrRegion: '' + district: '' + name: 'test' + } + } +} + +resource certificateAuthority 'Microsoft.ApiManagement/service/gateways/certificateAuthorities@2021-08-01' = { + parent: gateway + name: 'certificate.name' + properties: { + isTrusted: false + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/gateways/hostnameconfigurations/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/gateways/hostnameconfigurations/main.bicep new file mode 100644 index 00000000..30472942 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/gateways/hostnameconfigurations/main.bicep @@ -0,0 +1,74 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource certificate 'Microsoft.ApiManagement/service/certificates@2021-08-01' = { + parent: service + name: resourceName + properties: { + data: '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' + password: '' + } +} + +resource gateway 'Microsoft.ApiManagement/service/gateways@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + locationData: { + city: '' + countryOrRegion: '' + district: '' + name: 'test' + } + } +} + +resource hostnameConfiguration 'Microsoft.ApiManagement/service/gateways/hostnameConfigurations@2021-08-01' = { + parent: gateway + name: resourceName + properties: { + certificateId: certificate.id + hostname: 'host-name-230630032559671742' + http2Enabled: true + negotiateClientCertificate: false + tls10Enabled: false + tls11Enabled: false + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/gateways/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/gateways/main.bicep new file mode 100644 index 00000000..e8c528a7 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/gateways/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource gateway 'Microsoft.ApiManagement/service/gateways@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + locationData: { + city: '' + countryOrRegion: '' + district: '' + name: 'test' + } + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/groups/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/groups/main.bicep new file mode 100644 index 00000000..dd41d7a0 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/groups/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource group 'Microsoft.ApiManagement/service/groups@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Group' + externalId: '' + type: 'custom' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/identityproviders/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/identityproviders/main.bicep new file mode 100644 index 00000000..53ae60d6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/identityproviders/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The client ID for the Twitter identity provider') +param identityProviderClientId string +@secure() +@description('The client secret for the Twitter identity provider') +param identityProviderClientSecret string + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource identityProvider 'Microsoft.ApiManagement/service/identityProviders@2021-08-01' = { + parent: service + name: 'twitter' + properties: { + clientId: null + clientSecret: null + type: 'twitter' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/loggers/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/loggers/main.bicep new file mode 100644 index 00000000..5c044a15 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/loggers/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource logger 'Microsoft.ApiManagement/service/loggers@2021-08-01' = { + parent: service + name: resourceName + properties: { + credentials: { + instrumentationKey: component.properties.InstrumentationKey + } + description: '' + isBuffered: true + loggerType: 'applicationInsights' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/main.bicep new file mode 100644 index 00000000..6d40bf73 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/namedvalues/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/namedvalues/main.bicep new file mode 100644 index 00000000..872f016c --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/namedvalues/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource namedValue 'Microsoft.ApiManagement/service/namedValues@2021-08-01' = { + parent: service + name: resourceName + properties: { + displayName: 'TestProperty230630032559683679' + secret: false + tags: [ + 'tag1' + 'tag2' + ] + value: 'Test Value' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/openidconnectproviders/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/openidconnectproviders/main.bicep new file mode 100644 index 00000000..5ca9141b --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/openidconnectproviders/main.bicep @@ -0,0 +1,43 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The client ID for the OpenID Connect provider') +param openidClientId string +@secure() +@description('The client secret for the OpenID Connect provider') +param openidClientSecret string + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource openidConnectProvider 'Microsoft.ApiManagement/service/openidConnectProviders@2021-08-01' = { + parent: service + name: resourceName + properties: { + clientId: null + clientSecret: null + description: '' + displayName: 'Initial Name' + metadataEndpoint: 'https://azacceptance.hashicorptest.com/example/foo' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/policyfragments/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/policyfragments/main.bicep new file mode 100644 index 00000000..b0ee6500 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/policyfragments/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource policyFragment 'Microsoft.ApiManagement/service/policyFragments@2021-12-01-preview' = { + parent: service + name: 'error-handler' + properties: { + description: 'Fragment for Error Handling' + format: 'xml' + value: ''' + + + +''' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/portalsettings/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/portalsettings/main.bicep new file mode 100644 index 00000000..5b803d1a --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/portalsettings/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource portalsetting 'Microsoft.ApiManagement/service/portalsettings@2021-08-01' = { + parent: service + name: 'signup' + properties: { + enabled: false + termsOfService: { + consentRequired: false + enabled: false + text: '' + } + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/products/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/products/main.bicep new file mode 100644 index 00000000..f85e8ff6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/products/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource product 'Microsoft.ApiManagement/service/products@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Product' + state: 'notPublished' + subscriptionRequired: false + terms: '' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/products/policies/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/products/policies/main.bicep new file mode 100644 index 00000000..3fdf411f --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/products/policies/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource product 'Microsoft.ApiManagement/service/products@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Product' + state: 'notPublished' + subscriptionRequired: false + terms: '' + } +} + +resource policy2 'Microsoft.ApiManagement/service/products/policies@2021-08-01' = { + parent: product + name: 'policy' + properties: { + format: 'rawxml-link' + value: 'https://gist.githubusercontent.com/riordanp/ca22f8113afae0eb38cc12d718fd048d/raw/d6ac89a2f35a6881a7729f8cb4883179dc88eea1/example.xml' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/products/tags/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/products/tags/main.bicep new file mode 100644 index 00000000..b7bc916b --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/products/tags/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource product 'Microsoft.ApiManagement/service/products@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Product' + state: 'notPublished' + subscriptionRequired: false + terms: '' + } +} + +resource serviceTag 'Microsoft.ApiManagement/service/tags@2021-08-01' = { + parent: service + name: resourceName + properties: { + displayName: 'acctest0001' + } +} + +resource tag 'Microsoft.ApiManagement/service/products/tags@2021-08-01' = { + parent: product + name: 'service_tag.name' +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/schemas/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/schemas/main.bicep new file mode 100644 index 00000000..beda098c --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/schemas/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource schema 'Microsoft.ApiManagement/service/schemas@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + schemaType: 'xml' + value: ''' + + + + + + + + + + + + + + + + + + + +''' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/subscriptions/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/subscriptions/main.bicep new file mode 100644 index 00000000..bd723fb6 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/subscriptions/main.bicep @@ -0,0 +1,72 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource product 'Microsoft.ApiManagement/service/products@2021-08-01' = { + parent: service + name: resourceName + properties: { + description: '' + displayName: 'Test Product' + state: 'published' + subscriptionRequired: true + terms: '' + } +} + +resource subscription 'Microsoft.ApiManagement/service/subscriptions@2021-08-01' = { + parent: service + name: '0f393927-8f2d-499d-906f-c03943328d31' + properties: { + allowTracing: true + displayName: 'Butter Parser API Enterprise Edition' + ownerId: user.id + scope: product.id + state: 'submitted' + } +} + +resource user 'Microsoft.ApiManagement/service/users@2021-08-01' = { + parent: service + name: resourceName + properties: { + email: 'azure-acctest230630032559695401@example.com' + firstName: 'Acceptance' + lastName: 'Test' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/tags/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/tags/main.bicep new file mode 100644 index 00000000..bcdae209 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/tags/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 0 + name: 'Consumption' + } +} + +resource tag 'Microsoft.ApiManagement/service/tags@2021-08-01' = { + parent: service + name: resourceName + properties: { + displayName: 'acctest0001' + } +} diff --git a/settings/remarks/microsoft.apimanagement/samples/service/users/main.bicep b/settings/remarks/microsoft.apimanagement/samples/service/users/main.bicep new file mode 100644 index 00000000..cbb54ba1 --- /dev/null +++ b/settings/remarks/microsoft.apimanagement/samples/service/users/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.ApiManagement/service@2021-08-01' = { + name: resourceName + location: location + properties: { + certificates: [] + customProperties: { + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_128_GCM_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_CBC_SHA256': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TLS_RSA_WITH_AES_256_GCM_SHA384': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Ciphers.TripleDes168': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Ssl30': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false' + 'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false' + } + disableGateway: false + publicNetworkAccess: 'Enabled' + publisherEmail: 'pub1@email.com' + publisherName: 'pub1' + virtualNetworkType: 'None' + } + sku: { + capacity: 1 + name: 'Developer' + } +} + +resource user 'Microsoft.ApiManagement/service/users@2021-08-01' = { + parent: service + name: resourceName + properties: { + email: 'azure-acctest230630032559695401@example.com' + firstName: 'Acceptance' + lastName: 'Test' + } +} diff --git a/settings/remarks/microsoft.app/remarks.json b/settings/remarks/microsoft.app/remarks.json index c703cfab..874f528f 100644 --- a/settings/remarks/microsoft.app/remarks.json +++ b/settings/remarks/microsoft.app/remarks.json @@ -1,45 +1,82 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.App/containerApps", - "Path": "samples/containerapps/main.tf", - "Description": "A basic example of deploying Container App." - }, - { - "ResourceType": "Microsoft.App/jobs", - "Path": "samples/jobs/main.tf", - "Description": "A basic example of deploying Container App Job." - }, - { - "ResourceType": "Microsoft.App/managedEnvironments", - "Path": "samples/managedenvironments/main.tf", - "Description": "A basic example of deploying Container App Environment." - }, - { - "ResourceType": "Microsoft.App/managedEnvironments/certificates", - "Path": "samples/managedenvironments/certificates/main.tf", - "Description": "A basic example of deploying Container App Environment Certificate." - }, - { - "ResourceType": "Microsoft.App/managedEnvironments/daprComponents", - "Path": "samples/managedenvironments/daprcomponents/main.tf", - "Description": "A basic example of deploying Dapr Component for a Container App Environment." - }, - { - "ResourceType": "Microsoft.App/managedEnvironments/dotNetComponents", - "Path": "samples/managedenvironments/dotnetcomponents/main.tf", - "Description": "A basic example of deploying App Managed Environments .NET Components." - }, - { - "ResourceType": "Microsoft.App/managedEnvironments/privateEndpointConnections", - "Path": "samples/managedenvironments/privateendpointconnections/main.tf", - "Description": "A basic example of deploying Container App Environment Private Endpoint Connection." - }, - { - "ResourceType": "Microsoft.App/managedEnvironments/storages", - "Path": "samples/managedenvironments/storages/main.tf", - "Description": "A basic example of deploying Container App Environment Storage." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.App/containerApps", + "Path": "samples/containerapps/main.tf", + "Description": "A basic example of deploying Container App." + }, + { + "ResourceType": "Microsoft.App/jobs", + "Path": "samples/jobs/main.tf", + "Description": "A basic example of deploying Container App Job." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments", + "Path": "samples/managedenvironments/main.tf", + "Description": "A basic example of deploying Container App Environment." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/certificates", + "Path": "samples/managedenvironments/certificates/main.tf", + "Description": "A basic example of deploying Container App Environment Certificate." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/daprComponents", + "Path": "samples/managedenvironments/daprcomponents/main.tf", + "Description": "A basic example of deploying Dapr Component for a Container App Environment." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/dotNetComponents", + "Path": "samples/managedenvironments/dotnetcomponents/main.tf", + "Description": "A basic example of deploying App Managed Environments .NET Components." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/privateEndpointConnections", + "Path": "samples/managedenvironments/privateendpointconnections/main.tf", + "Description": "A basic example of deploying Container App Environment Private Endpoint Connection." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/storages", + "Path": "samples/managedenvironments/storages/main.tf", + "Description": "A basic example of deploying Container App Environment Storage." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.App/containerApps", + "Path": "samples/containerapps/main.bicep", + "Description": "A basic example of deploying Container App." + }, + { + "ResourceType": "Microsoft.App/jobs", + "Path": "samples/jobs/main.bicep", + "Description": "A basic example of deploying Container App Job." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments", + "Path": "samples/managedenvironments/main.bicep", + "Description": "A basic example of deploying Container App Environment." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/certificates", + "Path": "samples/managedenvironments/certificates/main.bicep", + "Description": "A basic example of deploying Container App Environment Certificate." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/daprComponents", + "Path": "samples/managedenvironments/daprcomponents/main.bicep", + "Description": "A basic example of deploying Dapr Component for a Container App Environment." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/dotNetComponents", + "Path": "samples/managedenvironments/dotnetcomponents/main.bicep", + "Description": "A basic example of deploying App Managed Environments .NET Components." + }, + { + "ResourceType": "Microsoft.App/managedEnvironments/storages", + "Path": "samples/managedenvironments/storages/main.bicep", + "Description": "A basic example of deploying Container App Environment Storage." + } + ] +} diff --git a/settings/remarks/microsoft.app/samples/containerapps/main.bicep b/settings/remarks/microsoft.app/samples/containerapps/main.bicep new file mode 100644 index 00000000..91f538b1 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/containerapps/main.bicep @@ -0,0 +1,68 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource containerApp 'Microsoft.App/containerApps@2022-03-01' = { + name: resourceName + location: location + properties: { + configuration: { + activeRevisionsMode: 'Single' + } + managedEnvironmentId: managedEnvironment.id + template: { + containers: [ + { + env: [] + image: 'jackofallops/azure-containerapps-python-acctest:v0.0.1' + name: 'acctest-cont-230630032906865620' + probes: [] + resources: { + cpu: any('0.25') + ephemeralStorage: '1Gi' + memory: '0.5Gi' + } + volumeMounts: [] + } + ] + scale: { + maxReplicas: 10 + } + volumes: [] + } + } +} + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.app/samples/jobs/main.bicep b/settings/remarks/microsoft.app/samples/jobs/main.bicep new file mode 100644 index 00000000..890a500a --- /dev/null +++ b/settings/remarks/microsoft.app/samples/jobs/main.bicep @@ -0,0 +1,61 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource job 'Microsoft.App/jobs@2025-01-01' = { + name: '${resourceName}-cajob' + location: location + properties: { + configuration: { + manualTriggerConfig: { + parallelism: 4 + replicaCompletionCount: 1 + } + replicaRetryLimit: 10 + replicaTimeout: 10 + triggerType: 'Manual' + } + environmentId: managedEnvironment.id + template: { + containers: [ + { + env: [] + image: 'jackofallops/azure-containerapps-python-acctest:v0.0.1' + name: 'testcontainerappsjob0' + probes: [] + resources: { + cpu: any('0.5') + memory: '1Gi' + } + volumeMounts: [] + } + ] + initContainers: [] + volumes: [] + } + } +} + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2025-01-01' = { + name: '${resourceName}-env' + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2023-09-01' = { + name: '${resourceName}-law' + location: location + properties: { + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/certificates/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/certificates/main.bicep new file mode 100644 index 00000000..eb160a33 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/certificates/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the certificate used in the managed environment') +param certificatePassword string + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource certificate 'Microsoft.App/managedEnvironments/certificates@2022-03-01' = { + parent: managedEnvironment + name: resourceName + location: location + properties: { + password: null + value: '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' + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/daprcomponents/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/daprcomponents/main.bicep new file mode 100644 index 00000000..225e48b5 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/daprcomponents/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource daprComponent 'Microsoft.App/managedEnvironments/daprComponents@2022-03-01' = { + parent: managedEnvironment + name: resourceName + properties: { + componentType: 'state.azure.blobstorage' + ignoreErrors: false + initTimeout: '5s' + scopes: null + version: 'v1' + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/dotnetcomponents/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/dotnetcomponents/main.bicep new file mode 100644 index 00000000..9e0a93f6 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/dotnetcomponents/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource aspireDashboard 'Microsoft.App/managedEnvironments/dotNetComponents@2024-10-02-preview' = { + parent: managedEnvironment + name: resourceName + properties: { + componentType: 'AspireDashboard' + configurations: [] + serviceBinds: [] + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/main.bicep new file mode 100644 index 00000000..88753ea0 --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.app/samples/managedenvironments/storages/main.bicep b/settings/remarks/microsoft.app/samples/managedenvironments/storages/main.bicep new file mode 100644 index 00000000..c819d4ca --- /dev/null +++ b/settings/remarks/microsoft.app/samples/managedenvironments/storages/main.bicep @@ -0,0 +1,89 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = { + name: resourceName + location: location + properties: { + appLogsConfiguration: { + destination: 'log-analytics' + logAnalyticsConfiguration: { + customerId: workspace.properties.customerId + sharedKey: workspace.listKeys().primarySharedKey + } + } + vnetConfiguration: {} + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } + tags: { + environment: 'accTest' + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource storage 'Microsoft.App/managedEnvironments/storages@2022-03-01' = { + parent: managedEnvironment + name: resourceName + properties: { + azureFile: { + accessMode: 'ReadWrite' + accountKey: storageAccount.listKeys().keys[0].value + accountName: storageAccount.properties.name + shareName: 'testsharehkez7' + } + } +} diff --git a/settings/remarks/microsoft.appconfiguration/remarks.json b/settings/remarks/microsoft.appconfiguration/remarks.json index f71266a7..640afff8 100644 --- a/settings/remarks/microsoft.appconfiguration/remarks.json +++ b/settings/remarks/microsoft.appconfiguration/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.AppConfiguration/configurationStores", - "Path": "samples/configurationstores/main.tf", - "Description": "A basic example of deploying Azure App Configuration." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.AppConfiguration/configurationStores", + "Path": "samples/configurationstores/main.tf", + "Description": "A basic example of deploying Azure App Configuration." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.AppConfiguration/configurationStores", + "Path": "samples/configurationstores/main.bicep", + "Description": "A basic example of deploying Azure App Configuration." + } + ] +} diff --git a/settings/remarks/microsoft.appconfiguration/samples/configurationstores/main.bicep b/settings/remarks/microsoft.appconfiguration/samples/configurationstores/main.bicep new file mode 100644 index 00000000..e443bc1f --- /dev/null +++ b/settings/remarks/microsoft.appconfiguration/samples/configurationstores/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource configurationStore 'Microsoft.AppConfiguration/configurationStores@2023-03-01' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + enablePurgeProtection: false + } + sku: { + name: 'standard' + } +} diff --git a/settings/remarks/microsoft.appplatform/remarks.json b/settings/remarks/microsoft.appplatform/remarks.json index e6232f4d..16980c2d 100644 --- a/settings/remarks/microsoft.appplatform/remarks.json +++ b/settings/remarks/microsoft.appplatform/remarks.json @@ -1,227 +1,324 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "Note: Azure Spring Apps (Microsoft.AppPlatform/Spring) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring" - ] - }, - { - "Description": "Note: Azure Spring Apps API Portals (Microsoft.AppPlatform/Spring/apiPortals) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/apiportals" - ] - }, - { - "Description": "Note: Azure Spring Apps API Portal Domains (Microsoft.AppPlatform/Spring/apiPortals/domains) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/apiportals/domains" - ] - }, - { - "Description": "Note: Azure Spring Apps Application Accelerators (Microsoft.AppPlatform/Spring/applicationAccelerators) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/applicationaccelerators" - ] - }, - { - "Description": "Note: Azure Spring Apps Customized Accelerators (Microsoft.AppPlatform/Spring/applicationAccelerators/customizedAccelerators) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/applicationaccelerators/customizedaccelerators" - ] - }, - { - "Description": "Note: Azure Spring Apps Application Live Views (Microsoft.AppPlatform/Spring/applicationLiveViews) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/applicationliveviews" - ] - }, - { - "Description": "Note: Azure Spring Apps Applications (Microsoft.AppPlatform/Spring/apps) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/apps" - ] - }, - { - "Description": "Note: Azure Spring Apps Application Bindings (Microsoft.AppPlatform/Spring/apps/bindings) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/apps/bindings" - ] - }, - { - "Description": "Note: Azure Spring Apps Application Deployments (Microsoft.AppPlatform/Spring/apps/deployments) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/apps/deployments" - ] - }, - { - "Description": "Note: Azure Spring Apps Build Services (Microsoft.AppPlatform/Spring/buildServices) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/buildservices" - ] - }, - { - "Description": "Note: Azure Spring Apps Build Service Builders (Microsoft.AppPlatform/Spring/buildServices/builders) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/buildservices/builders" - ] - }, - { - "Description": "Note: Azure Spring Apps Buildpack Bindings (Microsoft.AppPlatform/Spring/buildServices/builders/buildpackBindings) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/buildservices/builders/buildpackbindings" - ] - }, - { - "Description": "Note: Azure Spring Apps Config Servers (Microsoft.AppPlatform/Spring/configServers) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/configservers" - ] - }, - { - "Description": "Note: Azure Spring Apps Configuration Services (Microsoft.AppPlatform/Spring/configurationServices) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/configurationservices" - ] - }, - { - "Description": "Note: Azure Spring Apps Dev Tool Portals (Microsoft.AppPlatform/Spring/DevToolPortals) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/devtoolportals" - ] - }, - { - "Description": "Note: Azure Spring Apps Gateways (Microsoft.AppPlatform/Spring/gateways) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/gateways" - ] - }, - { - "Description": "Note: Azure Spring Apps Gateway Domains (Microsoft.AppPlatform/Spring/gateways/domains) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/gateways/domains" - ] - }, - { - "Description": "Note: Azure Spring Apps Gateway Route Configs (Microsoft.AppPlatform/Spring/gateways/routeConfigs) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/gateways/routeconfigs" - ] - }, - { - "Description": "Note: Azure Spring Apps Monitoring Settings (Microsoft.AppPlatform/Spring/monitoringSettings) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/monitoringsettings" - ] - }, - { - "Description": "Note: Azure Spring Apps Storages (Microsoft.AppPlatform/Spring/storages) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", - "ResourceTypes": [ - "microsoft.appplatform/spring/storages" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.AppPlatform/Spring", - "Path": "samples/spring/main.tf", - "Description": "A basic example of deploying Azure Spring Cloud Service." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/DevToolPortals", - "Path": "samples/spring/devtoolportals/main.tf", - "Description": "A basic example of deploying Spring Cloud Dev Tool Portal." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/apiPortals", - "Path": "samples/spring/apiportals/main.tf", - "Description": "A basic example of deploying Spring Cloud API Portal." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/apiPortals/domains", - "Path": "samples/spring/apiportals/domains/main.tf", - "Description": "A basic example of deploying Spring Cloud API Portal Domain." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/applicationAccelerators", - "Path": "samples/spring/applicationaccelerators/main.tf", - "Description": "A basic example of deploying Spring Cloud Accelerator." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/applicationAccelerators/customizedAccelerators", - "Path": "samples/spring/applicationaccelerators/customizedaccelerators/main.tf", - "Description": "A basic example of deploying Spring Cloud Customized Accelerator." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/applicationLiveViews", - "Path": "samples/spring/applicationliveviews/main.tf", - "Description": "A basic example of deploying Spring Cloud Application Live View." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/apps", - "Path": "samples/spring/apps/main.tf", - "Description": "A basic example of deploying an Azure Spring Cloud Application." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/apps/bindings", - "Path": "samples/spring/apps/bindings/main.tf", - "Description": "A basic example of deploying Associates a Spring Cloud Application with a resource." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/apps/deployments", - "Path": "samples/spring/apps/deployments/main.tf", - "Description": "A basic example of deploying Spring Cloud Deployment." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/buildServices", - "Path": "samples/spring/buildservices/main.tf", - "Description": "A basic example of deploying Spring Cloud Build Service." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/buildServices/builders", - "Path": "samples/spring/buildservices/builders/main.tf", - "Description": "A basic example of deploying Spring Cloud Builder." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/buildServices/builders/buildpackBindings", - "Path": "samples/spring/buildservices/builders/buildpackbindings/main.tf", - "Description": "A basic example of deploying Spring Cloud Build Pack Binding." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/configServers", - "Path": "samples/spring/configservers/main.tf", - "Description": "A basic example of deploying Spring Cloud Config Server." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/configurationServices", - "Path": "samples/spring/configurationservices/main.tf", - "Description": "A basic example of deploying Spring Cloud Configuration Service." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/gateways", - "Path": "samples/spring/gateways/main.tf", - "Description": "A basic example of deploying Spring Cloud Gateway." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/gateways/domains", - "Path": "samples/spring/gateways/domains/main.tf", - "Description": "A basic example of deploying Spring Cloud Gateway Custom Domain." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/gateways/routeConfigs", - "Path": "samples/spring/gateways/routeconfigs/main.tf", - "Description": "A basic example of deploying Spring Cloud Gateway Route Config." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/monitoringSettings", - "Path": "samples/spring/monitoringsettings/main.tf", - "Description": "A basic example of deploying Spring Cloud Monitoring Settings." - }, - { - "ResourceType": "Microsoft.AppPlatform/Spring/storages", - "Path": "samples/spring/storages/main.tf", - "Description": "A basic example of deploying Spring Cloud Storage." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "Note: Azure Spring Apps (Microsoft.AppPlatform/Spring) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring" + ] + }, + { + "Description": "Note: Azure Spring Apps API Portals (Microsoft.AppPlatform/Spring/apiPortals) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/apiportals" + ] + }, + { + "Description": "Note: Azure Spring Apps API Portal Domains (Microsoft.AppPlatform/Spring/apiPortals/domains) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/apiportals/domains" + ] + }, + { + "Description": "Note: Azure Spring Apps Application Accelerators (Microsoft.AppPlatform/Spring/applicationAccelerators) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/applicationaccelerators" + ] + }, + { + "Description": "Note: Azure Spring Apps Customized Accelerators (Microsoft.AppPlatform/Spring/applicationAccelerators/customizedAccelerators) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/applicationaccelerators/customizedaccelerators" + ] + }, + { + "Description": "Note: Azure Spring Apps Application Live Views (Microsoft.AppPlatform/Spring/applicationLiveViews) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/applicationliveviews" + ] + }, + { + "Description": "Note: Azure Spring Apps Applications (Microsoft.AppPlatform/Spring/apps) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/apps" + ] + }, + { + "Description": "Note: Azure Spring Apps Application Bindings (Microsoft.AppPlatform/Spring/apps/bindings) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/apps/bindings" + ] + }, + { + "Description": "Note: Azure Spring Apps Application Deployments (Microsoft.AppPlatform/Spring/apps/deployments) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/apps/deployments" + ] + }, + { + "Description": "Note: Azure Spring Apps Build Services (Microsoft.AppPlatform/Spring/buildServices) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/buildservices" + ] + }, + { + "Description": "Note: Azure Spring Apps Build Service Builders (Microsoft.AppPlatform/Spring/buildServices/builders) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/buildservices/builders" + ] + }, + { + "Description": "Note: Azure Spring Apps Buildpack Bindings (Microsoft.AppPlatform/Spring/buildServices/builders/buildpackBindings) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/buildservices/builders/buildpackbindings" + ] + }, + { + "Description": "Note: Azure Spring Apps Config Servers (Microsoft.AppPlatform/Spring/configServers) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/configservers" + ] + }, + { + "Description": "Note: Azure Spring Apps Configuration Services (Microsoft.AppPlatform/Spring/configurationServices) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/configurationservices" + ] + }, + { + "Description": "Note: Azure Spring Apps Dev Tool Portals (Microsoft.AppPlatform/Spring/DevToolPortals) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/devtoolportals" + ] + }, + { + "Description": "Note: Azure Spring Apps Gateways (Microsoft.AppPlatform/Spring/gateways) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/gateways" + ] + }, + { + "Description": "Note: Azure Spring Apps Gateway Domains (Microsoft.AppPlatform/Spring/gateways/domains) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/gateways/domains" + ] + }, + { + "Description": "Note: Azure Spring Apps Gateway Route Configs (Microsoft.AppPlatform/Spring/gateways/routeConfigs) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/gateways/routeconfigs" + ] + }, + { + "Description": "Note: Azure Spring Apps Monitoring Settings (Microsoft.AppPlatform/Spring/monitoringSettings) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/monitoringsettings" + ] + }, + { + "Description": "Note: Azure Spring Apps Storages (Microsoft.AppPlatform/Spring/storages) is now deprecated and will be retired on 2028-05-31. See https://aka.ms/asaretirement for more information.", + "ResourceTypes": [ + "microsoft.appplatform/spring/storages" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.AppPlatform/Spring", + "Path": "samples/spring/main.tf", + "Description": "A basic example of deploying Azure Spring Cloud Service." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/DevToolPortals", + "Path": "samples/spring/devtoolportals/main.tf", + "Description": "A basic example of deploying Spring Cloud Dev Tool Portal." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apiPortals", + "Path": "samples/spring/apiportals/main.tf", + "Description": "A basic example of deploying Spring Cloud API Portal." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apiPortals/domains", + "Path": "samples/spring/apiportals/domains/main.tf", + "Description": "A basic example of deploying Spring Cloud API Portal Domain." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/applicationAccelerators", + "Path": "samples/spring/applicationaccelerators/main.tf", + "Description": "A basic example of deploying Spring Cloud Accelerator." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/applicationAccelerators/customizedAccelerators", + "Path": "samples/spring/applicationaccelerators/customizedaccelerators/main.tf", + "Description": "A basic example of deploying Spring Cloud Customized Accelerator." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/applicationLiveViews", + "Path": "samples/spring/applicationliveviews/main.tf", + "Description": "A basic example of deploying Spring Cloud Application Live View." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apps", + "Path": "samples/spring/apps/main.tf", + "Description": "A basic example of deploying an Azure Spring Cloud Application." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apps/bindings", + "Path": "samples/spring/apps/bindings/main.tf", + "Description": "A basic example of deploying Associates a Spring Cloud Application with a resource." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apps/deployments", + "Path": "samples/spring/apps/deployments/main.tf", + "Description": "A basic example of deploying Spring Cloud Deployment." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/buildServices", + "Path": "samples/spring/buildservices/main.tf", + "Description": "A basic example of deploying Spring Cloud Build Service." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/buildServices/builders", + "Path": "samples/spring/buildservices/builders/main.tf", + "Description": "A basic example of deploying Spring Cloud Builder." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/buildServices/builders/buildpackBindings", + "Path": "samples/spring/buildservices/builders/buildpackbindings/main.tf", + "Description": "A basic example of deploying Spring Cloud Build Pack Binding." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/configServers", + "Path": "samples/spring/configservers/main.tf", + "Description": "A basic example of deploying Spring Cloud Config Server." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/configurationServices", + "Path": "samples/spring/configurationservices/main.tf", + "Description": "A basic example of deploying Spring Cloud Configuration Service." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/gateways", + "Path": "samples/spring/gateways/main.tf", + "Description": "A basic example of deploying Spring Cloud Gateway." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/gateways/domains", + "Path": "samples/spring/gateways/domains/main.tf", + "Description": "A basic example of deploying Spring Cloud Gateway Custom Domain." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/gateways/routeConfigs", + "Path": "samples/spring/gateways/routeconfigs/main.tf", + "Description": "A basic example of deploying Spring Cloud Gateway Route Config." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/monitoringSettings", + "Path": "samples/spring/monitoringsettings/main.tf", + "Description": "A basic example of deploying Spring Cloud Monitoring Settings." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/storages", + "Path": "samples/spring/storages/main.tf", + "Description": "A basic example of deploying Spring Cloud Storage." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.AppPlatform/Spring", + "Path": "samples/spring/main.bicep", + "Description": "A basic example of deploying Azure Spring Cloud Service." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/DevToolPortals", + "Path": "samples/spring/devtoolportals/main.bicep", + "Description": "A basic example of deploying Spring Cloud Dev Tool Portal." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apiPortals", + "Path": "samples/spring/apiportals/main.bicep", + "Description": "A basic example of deploying Spring Cloud API Portal." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apiPortals/domains", + "Path": "samples/spring/apiportals/domains/main.bicep", + "Description": "A basic example of deploying Spring Cloud API Portal Domain." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/applicationAccelerators", + "Path": "samples/spring/applicationaccelerators/main.bicep", + "Description": "A basic example of deploying Spring Cloud Accelerator." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/applicationAccelerators/customizedAccelerators", + "Path": "samples/spring/applicationaccelerators/customizedaccelerators/main.bicep", + "Description": "A basic example of deploying Spring Cloud Customized Accelerator." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/applicationLiveViews", + "Path": "samples/spring/applicationliveviews/main.bicep", + "Description": "A basic example of deploying Spring Cloud Application Live View." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apps", + "Path": "samples/spring/apps/main.bicep", + "Description": "A basic example of deploying an Azure Spring Cloud Application." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apps/bindings", + "Path": "samples/spring/apps/bindings/main.bicep", + "Description": "A basic example of deploying Associates a Spring Cloud Application with a resource." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/apps/deployments", + "Path": "samples/spring/apps/deployments/main.bicep", + "Description": "A basic example of deploying Spring Cloud Deployment." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/buildServices/builders", + "Path": "samples/spring/buildservices/builders/main.bicep", + "Description": "A basic example of deploying Spring Cloud Builder." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/buildServices/builders/buildpackBindings", + "Path": "samples/spring/buildservices/builders/buildpackbindings/main.bicep", + "Description": "A basic example of deploying Spring Cloud Build Pack Binding." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/configServers", + "Path": "samples/spring/configservers/main.bicep", + "Description": "A basic example of deploying Spring Cloud Config Server." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/configurationServices", + "Path": "samples/spring/configurationservices/main.bicep", + "Description": "A basic example of deploying Spring Cloud Configuration Service." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/gateways", + "Path": "samples/spring/gateways/main.bicep", + "Description": "A basic example of deploying Spring Cloud Gateway." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/gateways/domains", + "Path": "samples/spring/gateways/domains/main.bicep", + "Description": "A basic example of deploying Spring Cloud Gateway Custom Domain." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/gateways/routeConfigs", + "Path": "samples/spring/gateways/routeconfigs/main.bicep", + "Description": "A basic example of deploying Spring Cloud Gateway Route Config." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/monitoringSettings", + "Path": "samples/spring/monitoringsettings/main.bicep", + "Description": "A basic example of deploying Spring Cloud Monitoring Settings." + }, + { + "ResourceType": "Microsoft.AppPlatform/Spring/storages", + "Path": "samples/spring/storages/main.bicep", + "Description": "A basic example of deploying Spring Cloud Storage." + } + ] +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apiportals/domains/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apiportals/domains/main.bicep new file mode 100644 index 00000000..f7d61a68 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apiportals/domains/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource apiPortal 'Microsoft.AppPlatform/Spring/apiPortals@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + gatewayIds: [] + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} + +resource domain 'Microsoft.AppPlatform/Spring/apiPortals/domains@2023-05-01-preview' = { + parent: apiPortal + name: '${resourceName}.azuremicroservices.io' + properties: { + thumbprint: '' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apiportals/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apiportals/main.bicep new file mode 100644 index 00000000..8397c83d --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apiportals/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource apiPortal 'Microsoft.AppPlatform/Spring/apiPortals@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + gatewayIds: [] + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/customizedaccelerators/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/customizedaccelerators/main.bicep new file mode 100644 index 00000000..cae0847c --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/customizedaccelerators/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource applicationAccelerator 'Microsoft.AppPlatform/Spring/applicationAccelerators@2023-05-01-preview' = { + parent: spring + name: 'default' +} + +resource customizedAccelerator 'Microsoft.AppPlatform/Spring/applicationAccelerators/customizedAccelerators@2023-05-01-preview' = { + parent: applicationAccelerator + name: resourceName + properties: { + description: '' + displayName: '' + gitRepository: { + authSetting: { + authType: 'Public' + } + branch: 'master' + commit: '' + gitTag: '' + url: 'https://github.com/Azure-Samples/piggymetrics' + } + iconUrl: '' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/main.bicep new file mode 100644 index 00000000..63c0908a --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/applicationaccelerators/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource applicationAccelerator 'Microsoft.AppPlatform/Spring/applicationAccelerators@2023-05-01-preview' = { + parent: spring + name: 'default' +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/applicationliveviews/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/applicationliveviews/main.bicep new file mode 100644 index 00000000..bfd66a0c --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/applicationliveviews/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource applicationLiveView 'Microsoft.AppPlatform/Spring/applicationLiveViews@2023-05-01-preview' = { + parent: spring + name: 'default' +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apps/bindings/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apps/bindings/main.bicep new file mode 100644 index 00000000..f1b5e915 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apps/bindings/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource redis 'Microsoft.Cache/redis@2023-04-01' = { + name: resourceName + location: location + properties: { + enableNonSslPort: true + minimumTlsVersion: '1.2' + sku: { + capacity: 2 + family: 'C' + name: 'Standard' + } + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} + +resource binding 'Microsoft.AppPlatform/Spring/apps/bindings@2023-05-01-preview' = { + parent: app + name: resourceName + properties: { + bindingParameters: { + useSsl: 'true' + } + key: 'redis.listKeys().primaryKey' + resourceId: redis.id + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apps/deployments/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apps/deployments/main.bicep new file mode 100644 index 00000000..0d143257 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apps/deployments/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} + +resource deployment 'Microsoft.AppPlatform/Spring/apps/deployments@2023-05-01-preview' = { + parent: app + name: resourceName + properties: { + deploymentSettings: { + environmentVariables: {} + } + source: { + customContainer: { + args: [] + command: [] + containerImage: 'springio/gs-spring-boot-docker' + languageFramework: '' + server: 'docker.io' + } + type: 'Container' + } + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/apps/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/apps/main.bicep new file mode 100644 index 00000000..f0248f20 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/apps/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/buildpackbindings/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/buildpackbindings/main.bicep new file mode 100644 index 00000000..21a9abab --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/buildpackbindings/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource buildService 'Microsoft.AppPlatform/Spring/buildServices@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: {} +} + +resource builder 'Microsoft.AppPlatform/Spring/buildServices/builders@2023-05-01-preview' = { + name: resourceName + properties: { + buildpackGroups: [ + { + buildpacks: [ + { + id: 'tanzu-buildpacks/java-azure' + } + ] + name: 'mix' + } + ] + stack: { + id: 'io.buildpacks.stacks.bionic' + version: 'base' + } + } +} + +resource buildpackBinding 'Microsoft.AppPlatform/Spring/buildServices/builders/buildpackBindings@2023-05-01-preview' = { + parent: builder + name: resourceName + properties: { + bindingType: 'ApplicationInsights' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/main.bicep new file mode 100644 index 00000000..649a93ba --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/buildservices/builders/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource buildService 'Microsoft.AppPlatform/Spring/buildServices@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: {} +} + +resource builder 'Microsoft.AppPlatform/Spring/buildServices/builders@2023-05-01-preview' = { + name: resourceName + properties: { + buildpackGroups: [ + { + buildpacks: [ + { + id: 'tanzu-buildpacks/java-azure' + } + ] + name: 'mix' + } + ] + stack: { + id: 'io.buildpacks.stacks.bionic' + version: 'base' + } + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/configservers/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/configservers/main.bicep new file mode 100644 index 00000000..d683b9a9 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/configservers/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource configServer 'Microsoft.AppPlatform/Spring/configServers@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + configServer: {} + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/configurationservices/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/configurationservices/main.bicep new file mode 100644 index 00000000..9650fb4d --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/configurationservices/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource configurationService 'Microsoft.AppPlatform/Spring/configurationServices@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + settings: { + gitProperty: {} + } + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/devtoolportals/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/devtoolportals/main.bicep new file mode 100644 index 00000000..95f0bda9 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/devtoolportals/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource devtoolportal 'Microsoft.AppPlatform/Spring/DevToolPortals@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + features: { + applicationAccelerator: { + state: 'Disabled' + } + applicationLiveView: { + state: 'Disabled' + } + } + public: false + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/gateways/domains/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/gateways/domains/main.bicep new file mode 100644 index 00000000..e0e7e5ac --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/gateways/domains/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource gateway 'Microsoft.AppPlatform/Spring/gateways@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} + +resource domain 'Microsoft.AppPlatform/Spring/gateways/domains@2023-05-01-preview' = { + parent: gateway + name: '${resourceName}.azuremicroservices.io' + properties: { + thumbprint: '' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/gateways/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/gateways/main.bicep new file mode 100644 index 00000000..4d3c60fa --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/gateways/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource gateway 'Microsoft.AppPlatform/Spring/gateways@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/gateways/routeconfigs/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/gateways/routeconfigs/main.bicep new file mode 100644 index 00000000..dd36bcdb --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/gateways/routeconfigs/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'E0' + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} + +resource gateway 'Microsoft.AppPlatform/Spring/gateways@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + httpsOnly: false + public: false + } + sku: { + capacity: 1 + name: 'E0' + tier: 'Enterprise' + } +} + +resource routeConfig 'Microsoft.AppPlatform/Spring/gateways/routeConfigs@2023-05-01-preview' = { + parent: gateway + name: resourceName + properties: { + appResourceId: app.id + protocol: 'HTTP' + routes: [] + ssoEnabled: false + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/main.bicep new file mode 100644 index 00000000..0a56e401 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/monitoringsettings/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/monitoringsettings/main.bicep new file mode 100644 index 00000000..78031b28 --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/monitoringsettings/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource monitoringSetting 'Microsoft.AppPlatform/Spring/monitoringSettings@2023-05-01-preview' = { + parent: spring + name: 'default' + properties: { + traceEnabled: false + } +} diff --git a/settings/remarks/microsoft.appplatform/samples/spring/storages/main.bicep b/settings/remarks/microsoft.appplatform/samples/spring/storages/main.bicep new file mode 100644 index 00000000..caebb15d --- /dev/null +++ b/settings/remarks/microsoft.appplatform/samples/spring/storages/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource storage 'Microsoft.AppPlatform/Spring/storages@2023-05-01-preview' = { + parent: spring + name: resourceName + properties: { + accountKey: storageAccount.listKeys().keys[0].value + accountName: storageAccount.name + storageType: 'StorageAccount' + } +} diff --git a/settings/remarks/microsoft.attestation/remarks.json b/settings/remarks/microsoft.attestation/remarks.json index 7bc95a0b..0b545e60 100644 --- a/settings/remarks/microsoft.attestation/remarks.json +++ b/settings/remarks/microsoft.attestation/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Attestation/attestationProviders", - "Path": "samples/attestationproviders/main.tf", - "Description": "A basic example of deploying Attestation Provider." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Attestation/attestationProviders", + "Path": "samples/attestationproviders/main.tf", + "Description": "A basic example of deploying Attestation Provider." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Attestation/attestationProviders", + "Path": "samples/attestationproviders/main.bicep", + "Description": "A basic example of deploying Attestation Provider." + } + ] +} diff --git a/settings/remarks/microsoft.attestation/samples/attestationproviders/main.bicep b/settings/remarks/microsoft.attestation/samples/attestationproviders/main.bicep new file mode 100644 index 00000000..945985a0 --- /dev/null +++ b/settings/remarks/microsoft.attestation/samples/attestationproviders/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource attestationProvider 'Microsoft.Attestation/attestationProviders@2020-10-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.authorization/remarks.json b/settings/remarks/microsoft.authorization/remarks.json index c207fa30..776583f7 100644 --- a/settings/remarks/microsoft.authorization/remarks.json +++ b/settings/remarks/microsoft.authorization/remarks.json @@ -1,54 +1,91 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "For guidance on creating role assignments and definitions, see [Create Azure RBAC resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-rbac).", - "ResourceTypes": [ - "microsoft.authorization/roleassignments", - "microsoft.authorization/roledefinitions" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Authorization/locks", - "Path": "samples/locks/main.tf", - "Description": "A basic example of deploying Management Lock which is scoped to a Subscription, Resource Group or Resource." - }, - { - "ResourceType": "Microsoft.Authorization/policyAssignments", - "Path": "samples/policyassignments/main.tf", - "Description": "A basic example of deploying Policy Assignment." - }, - { - "ResourceType": "Microsoft.Authorization/policyDefinitions", - "Path": "samples/policydefinitions/main.tf", - "Description": "A basic example of deploying Authorization Policy Definitions." - }, - { - "ResourceType": "Microsoft.Authorization/policyExemptions", - "Path": "samples/policyexemptions/main.tf", - "Description": "A basic example of deploying Policy Exemption." - }, - { - "ResourceType": "Microsoft.Authorization/policySetDefinitions", - "Path": "samples/policysetdefinitions/main.tf", - "Description": "A basic example of deploying policy set definition." - }, - { - "ResourceType": "Microsoft.Authorization/resourceManagementPrivateLinks", - "Path": "samples/resourcemanagementprivatelinks/main.tf", - "Description": "A basic example of deploying Resource Management Private Link to restrict access for managing resources in the tenant." - }, - { - "ResourceType": "Microsoft.Authorization/roleAssignments", - "Path": "samples/roleassignments/main.tf", - "Description": "A basic example of deploying Assigns a given Principal (User or Group) to a given Role." - }, - { - "ResourceType": "Microsoft.Authorization/roleDefinitions", - "Path": "samples/roledefinitions/main.tf", - "Description": "A basic example of deploying custom Role Definition." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "For guidance on creating role assignments and definitions, see [Create Azure RBAC resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-rbac).", + "ResourceTypes": [ + "microsoft.authorization/roleassignments", + "microsoft.authorization/roledefinitions" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Authorization/locks", + "Path": "samples/locks/main.tf", + "Description": "A basic example of deploying Management Lock which is scoped to a Subscription, Resource Group or Resource." + }, + { + "ResourceType": "Microsoft.Authorization/policyAssignments", + "Path": "samples/policyassignments/main.tf", + "Description": "A basic example of deploying Policy Assignment." + }, + { + "ResourceType": "Microsoft.Authorization/policyDefinitions", + "Path": "samples/policydefinitions/main.tf", + "Description": "A basic example of deploying Authorization Policy Definitions." + }, + { + "ResourceType": "Microsoft.Authorization/policyExemptions", + "Path": "samples/policyexemptions/main.tf", + "Description": "A basic example of deploying Policy Exemption." + }, + { + "ResourceType": "Microsoft.Authorization/policySetDefinitions", + "Path": "samples/policysetdefinitions/main.tf", + "Description": "A basic example of deploying policy set definition." + }, + { + "ResourceType": "Microsoft.Authorization/resourceManagementPrivateLinks", + "Path": "samples/resourcemanagementprivatelinks/main.tf", + "Description": "A basic example of deploying Resource Management Private Link to restrict access for managing resources in the tenant." + }, + { + "ResourceType": "Microsoft.Authorization/roleAssignments", + "Path": "samples/roleassignments/main.tf", + "Description": "A basic example of deploying Assigns a given Principal (User or Group) to a given Role." + }, + { + "ResourceType": "Microsoft.Authorization/roleDefinitions", + "Path": "samples/roledefinitions/main.tf", + "Description": "A basic example of deploying custom Role Definition." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Authorization/locks", + "Path": "samples/locks/main.bicep", + "Description": "A basic example of deploying Management Lock which is scoped to a Subscription, Resource Group or Resource." + }, + { + "ResourceType": "Microsoft.Authorization/policyAssignments", + "Path": "samples/policyassignments/main.bicep", + "Description": "A basic example of deploying Policy Assignment." + }, + { + "ResourceType": "Microsoft.Authorization/policyDefinitions", + "Path": "samples/policydefinitions/main.bicep", + "Description": "A basic example of deploying Authorization Policy Definitions." + }, + { + "ResourceType": "Microsoft.Authorization/policyExemptions", + "Path": "samples/policyexemptions/main.bicep", + "Description": "A basic example of deploying Policy Exemption." + }, + { + "ResourceType": "Microsoft.Authorization/policySetDefinitions", + "Path": "samples/policysetdefinitions/main.bicep", + "Description": "A basic example of deploying policy set definition." + }, + { + "ResourceType": "Microsoft.Authorization/resourceManagementPrivateLinks", + "Path": "samples/resourcemanagementprivatelinks/main.bicep", + "Description": "A basic example of deploying Resource Management Private Link to restrict access for managing resources in the tenant." + }, + { + "ResourceType": "Microsoft.Authorization/roleDefinitions", + "Path": "samples/roledefinitions/main.bicep", + "Description": "A basic example of deploying custom Role Definition." + } + ] +} diff --git a/settings/remarks/microsoft.authorization/samples/locks/main.bicep b/settings/remarks/microsoft.authorization/samples/locks/main.bicep new file mode 100644 index 00000000..01847652 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/locks/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource lock 'Microsoft.Authorization/locks@2020-05-01' = { + scope: publicIPAddress + name: resourceName + properties: { + level: 'CanNotDelete' + notes: '' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 30 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Basic' + tier: 'Regional' + } +} diff --git a/settings/remarks/microsoft.authorization/samples/policyassignments/main.bicep b/settings/remarks/microsoft.authorization/samples/policyassignments/main.bicep new file mode 100644 index 00000000..13204f20 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/policyassignments/main.bicep @@ -0,0 +1,53 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyAssignment 'Microsoft.Authorization/policyAssignments@2022-06-01' = { + name: resourceName + properties: { + displayName: '' + enforcementMode: 'Default' + parameters: { + listOfAllowedLocations: { + value: [ + 'West Europe' + 'West US 2' + 'East US 2' + ] + } + } + policyDefinitionId: policyDefinition.id + scope: subscription().id + } +} + +resource policyDefinition 'Microsoft.Authorization/policyDefinitions@2021-06-01' = { + name: resourceName + properties: { + description: '' + displayName: 'my-policy-definition' + mode: 'All' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyRule: { + if: { + not: { + field: 'location' + in: '[parameters(\'allowedLocations\')]' + } + } + then: { + effect: 'audit' + } + } + policyType: 'Custom' + } +} diff --git a/settings/remarks/microsoft.authorization/samples/policydefinitions/main.bicep b/settings/remarks/microsoft.authorization/samples/policydefinitions/main.bicep new file mode 100644 index 00000000..e4cd4a97 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/policydefinitions/main.bicep @@ -0,0 +1,34 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyDefinition 'Microsoft.Authorization/policyDefinitions@2021-06-01' = { + name: resourceName + properties: { + description: '' + displayName: 'my-policy-definition' + mode: 'All' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyRule: { + if: { + not: { + field: 'location' + in: '[parameters(\'allowedLocations\')]' + } + } + then: { + effect: 'audit' + } + } + policyType: 'Custom' + } +} diff --git a/settings/remarks/microsoft.authorization/samples/policyexemptions/main.bicep b/settings/remarks/microsoft.authorization/samples/policyexemptions/main.bicep new file mode 100644 index 00000000..0b94be00 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/policyexemptions/main.bicep @@ -0,0 +1,53 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyAssignment 'Microsoft.Authorization/policyAssignments@2022-06-01' = { + name: resourceName + properties: { + displayName: '' + enforcementMode: 'Default' + policyDefinitionId: policyDefinition.id + scope: subscription().id + } +} + +resource policyDefinition 'Microsoft.Authorization/policyDefinitions@2021-06-01' = { + name: resourceName + properties: { + description: '' + displayName: 'my-policy-definition' + mode: 'All' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyRule: { + if: { + not: { + field: 'location' + in: '[parameters(\'allowedLocations\')]' + } + } + then: { + effect: 'audit' + } + } + policyType: 'Custom' + } +} + +resource policyExemption 'Microsoft.Authorization/policyExemptions@2020-07-01-preview' = { + name: resourceName + properties: { + exemptionCategory: 'Mitigated' + policyAssignmentId: policyAssignment.id + policyDefinitionReferenceIds: [] + } +} diff --git a/settings/remarks/microsoft.authorization/samples/policysetdefinitions/main.bicep b/settings/remarks/microsoft.authorization/samples/policysetdefinitions/main.bicep new file mode 100644 index 00000000..9dd7d3ef --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/policysetdefinitions/main.bicep @@ -0,0 +1,65 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyDefinition 'Microsoft.Authorization/policyDefinitions@2021-06-01' = { + name: resourceName + properties: { + description: '' + displayName: 'my-policy-definition' + mode: 'All' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyRule: { + if: { + not: { + field: 'location' + in: '[parameters(\'allowedLocations\')]' + } + } + then: { + effect: 'audit' + } + } + policyType: 'Custom' + } +} + +resource policySetDefinition 'Microsoft.Authorization/policySetDefinitions@2025-01-01' = { + name: 'acctestpolset-${resourceName}' + properties: { + description: '' + displayName: 'acctestpolset-acctest0001' + parameters: { + allowedLocations: { + metadata: { + description: 'The list of allowed locations for resources.' + displayName: 'Allowed locations' + strongType: 'location' + } + type: 'Array' + } + } + policyDefinitions: [ + { + groupNames: [] + parameters: { + listOfAllowedLocations: { + value: '[parameters(\'allowedLocations\')]' + } + } + policyDefinitionId: policyDefinition.id + policyDefinitionReferenceId: '' + } + ] + policyType: 'Custom' + } +} diff --git a/settings/remarks/microsoft.authorization/samples/resourcemanagementprivatelinks/main.bicep b/settings/remarks/microsoft.authorization/samples/resourcemanagementprivatelinks/main.bicep new file mode 100644 index 00000000..11d69aa8 --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/resourcemanagementprivatelinks/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource resourceManagementPrivateLink 'Microsoft.Authorization/resourceManagementPrivateLinks@2020-05-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.authorization/samples/roledefinitions/main.bicep b/settings/remarks/microsoft.authorization/samples/roledefinitions/main.bicep new file mode 100644 index 00000000..5f726a3e --- /dev/null +++ b/settings/remarks/microsoft.authorization/samples/roledefinitions/main.bicep @@ -0,0 +1,25 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource roleDefinition 'Microsoft.Authorization/roleDefinitions@2018-01-01-preview' = { + name: '6faae21a-0cd6-4536-8c23-a278823d12ed' + properties: { + assignableScopes: [ + subscription().id + ] + description: '' + permissions: [ + { + actions: [ + '*' + ] + dataActions: [] + notActions: [] + notDataActions: [] + } + ] + roleName: 'acctest0001' + type: 'CustomRole' + } +} diff --git a/settings/remarks/microsoft.automanage/remarks.json b/settings/remarks/microsoft.automanage/remarks.json index 6aa6d550..3f245d86 100644 --- a/settings/remarks/microsoft.automanage/remarks.json +++ b/settings/remarks/microsoft.automanage/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Automanage/configurationProfiles", - "Path": "samples/configurationprofiles/main.tf", - "Description": "A basic example of deploying Automanage Configuration." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Automanage/configurationProfiles", + "Path": "samples/configurationprofiles/main.tf", + "Description": "A basic example of deploying Automanage Configuration." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Automanage/configurationProfiles", + "Path": "samples/configurationprofiles/main.bicep", + "Description": "A basic example of deploying Automanage Configuration." + } + ] +} diff --git a/settings/remarks/microsoft.automanage/samples/configurationprofiles/main.bicep b/settings/remarks/microsoft.automanage/samples/configurationprofiles/main.bicep new file mode 100644 index 00000000..c9c9fb65 --- /dev/null +++ b/settings/remarks/microsoft.automanage/samples/configurationprofiles/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource configurationProfile 'Microsoft.Automanage/configurationProfiles@2022-05-04' = { + name: resourceName + location: location + properties: { + configuration: {} + } +} diff --git a/settings/remarks/microsoft.automation/remarks.json b/settings/remarks/microsoft.automation/remarks.json index 6041ba91..fd38ddbd 100644 --- a/settings/remarks/microsoft.automation/remarks.json +++ b/settings/remarks/microsoft.automation/remarks.json @@ -1,105 +1,192 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Automation/automationAccounts", - "Path": "samples/automationaccounts/main.tf", - "Description": "A basic example of deploying Automation Account." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/certificates", - "Path": "samples/automationaccounts/certificates/main.tf", - "Description": "A basic example of deploying Automation Certificate." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/configurations", - "Path": "samples/automationaccounts/configurations/main.tf", - "Description": "A basic example of deploying Automation DSC Configuration." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/connectionTypes", - "Path": "samples/automationaccounts/connectiontypes/main.tf", - "Description": "A basic example of deploying Automation Connection Type." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/connections", - "Path": "samples/automationaccounts/connections/main.tf", - "Description": "A basic example of deploying Automation Connection." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/credentials", - "Path": "samples/automationaccounts/credentials/main.tf", - "Description": "A basic example of deploying Automation Credential." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups", - "Path": "samples/automationaccounts/hybridrunbookworkergroups/main.tf", - "Description": "A basic example of deploying Automation Account Runbook Worker Group." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups/hybridRunbookWorkers", - "Path": "samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.tf", - "Description": "A basic example of deploying Automation." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/jobSchedules", - "Path": "samples/automationaccounts/jobschedules/main.tf", - "Description": "A basic example of deploying Automation Accounts Job Schedules." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/modules", - "Path": "samples/automationaccounts/modules/main.tf", - "Description": "A basic example of deploying Automation Module." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/powershell72Modules", - "Path": "samples/automationaccounts/powershell72modules/main.tf", - "Description": "A basic example of deploying Automation Powershell 7.2 Module." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/python3Packages", - "Path": "samples/automationaccounts/python3packages/main.tf", - "Description": "A basic example of deploying Automation Python3 Package." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/runbooks", - "Path": "samples/automationaccounts/runbooks/main.tf", - "Description": "A basic example of deploying Automation Runbook." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/runbooks/draft", - "Path": "samples/automationaccounts/runbooks/draft/main.tf", - "Description": "A basic example of deploying Automation Accounts Runbooks Draft." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/schedules", - "Path": "samples/automationaccounts/schedules/main.tf", - "Description": "A basic example of deploying Automation Schedule." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/softwareUpdateConfigurations", - "Path": "samples/automationaccounts/softwareupdateconfigurations/main.tf", - "Description": "A basic example of deploying Automation Software Update Configuration." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/sourceControls", - "Path": "samples/automationaccounts/sourcecontrols/main.tf", - "Description": "A basic example of deploying Automation Source Control." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/sourceControls/sourceControlSyncJobs", - "Path": "samples/automationaccounts/sourcecontrols/sourcecontrolsyncjobs/main.tf", - "Description": "A basic example of deploying Automation Accounts Source Control Sync Jobs." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/variables", - "Path": "samples/automationaccounts/variables/main.tf", - "Description": "A basic example of deploying variable in Azure Automation." - }, - { - "ResourceType": "Microsoft.Automation/automationAccounts/webHooks", - "Path": "samples/automationaccounts/webhooks/main.tf", - "Description": "A basic example of deploying Automation Runbook's Webhook." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Automation/automationAccounts", + "Path": "samples/automationaccounts/main.tf", + "Description": "A basic example of deploying Automation Account." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/certificates", + "Path": "samples/automationaccounts/certificates/main.tf", + "Description": "A basic example of deploying Automation Certificate." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/configurations", + "Path": "samples/automationaccounts/configurations/main.tf", + "Description": "A basic example of deploying Automation DSC Configuration." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/connectionTypes", + "Path": "samples/automationaccounts/connectiontypes/main.tf", + "Description": "A basic example of deploying Automation Connection Type." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/connections", + "Path": "samples/automationaccounts/connections/main.tf", + "Description": "A basic example of deploying Automation Connection." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/credentials", + "Path": "samples/automationaccounts/credentials/main.tf", + "Description": "A basic example of deploying Automation Credential." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups", + "Path": "samples/automationaccounts/hybridrunbookworkergroups/main.tf", + "Description": "A basic example of deploying Automation Account Runbook Worker Group." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups/hybridRunbookWorkers", + "Path": "samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.tf", + "Description": "A basic example of deploying Automation." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/jobSchedules", + "Path": "samples/automationaccounts/jobschedules/main.tf", + "Description": "A basic example of deploying Automation Accounts Job Schedules." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/modules", + "Path": "samples/automationaccounts/modules/main.tf", + "Description": "A basic example of deploying Automation Module." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/powershell72Modules", + "Path": "samples/automationaccounts/powershell72modules/main.tf", + "Description": "A basic example of deploying Automation Powershell 7.2 Module." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/python3Packages", + "Path": "samples/automationaccounts/python3packages/main.tf", + "Description": "A basic example of deploying Automation Python3 Package." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/runbooks", + "Path": "samples/automationaccounts/runbooks/main.tf", + "Description": "A basic example of deploying Automation Runbook." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/runbooks/draft", + "Path": "samples/automationaccounts/runbooks/draft/main.tf", + "Description": "A basic example of deploying Automation Accounts Runbooks Draft." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/schedules", + "Path": "samples/automationaccounts/schedules/main.tf", + "Description": "A basic example of deploying Automation Schedule." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/softwareUpdateConfigurations", + "Path": "samples/automationaccounts/softwareupdateconfigurations/main.tf", + "Description": "A basic example of deploying Automation Software Update Configuration." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/sourceControls", + "Path": "samples/automationaccounts/sourcecontrols/main.tf", + "Description": "A basic example of deploying Automation Source Control." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/sourceControls/sourceControlSyncJobs", + "Path": "samples/automationaccounts/sourcecontrols/sourcecontrolsyncjobs/main.tf", + "Description": "A basic example of deploying Automation Accounts Source Control Sync Jobs." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/variables", + "Path": "samples/automationaccounts/variables/main.tf", + "Description": "A basic example of deploying variable in Azure Automation." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/webHooks", + "Path": "samples/automationaccounts/webhooks/main.tf", + "Description": "A basic example of deploying Automation Runbook's Webhook." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Automation/automationAccounts", + "Path": "samples/automationaccounts/main.bicep", + "Description": "A basic example of deploying Automation Account." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/certificates", + "Path": "samples/automationaccounts/certificates/main.bicep", + "Description": "A basic example of deploying Automation Certificate." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/configurations", + "Path": "samples/automationaccounts/configurations/main.bicep", + "Description": "A basic example of deploying Automation DSC Configuration." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/connectionTypes", + "Path": "samples/automationaccounts/connectiontypes/main.bicep", + "Description": "A basic example of deploying Automation Connection Type." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/connections", + "Path": "samples/automationaccounts/connections/main.bicep", + "Description": "A basic example of deploying Automation Connection." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/credentials", + "Path": "samples/automationaccounts/credentials/main.bicep", + "Description": "A basic example of deploying Automation Credential." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups", + "Path": "samples/automationaccounts/hybridrunbookworkergroups/main.bicep", + "Description": "A basic example of deploying Automation Account Runbook Worker Group." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups/hybridRunbookWorkers", + "Path": "samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.bicep", + "Description": "A basic example of deploying Automation." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/modules", + "Path": "samples/automationaccounts/modules/main.bicep", + "Description": "A basic example of deploying Automation Module." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/powershell72Modules", + "Path": "samples/automationaccounts/powershell72modules/main.bicep", + "Description": "A basic example of deploying Automation Powershell 7.2 Module." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/python3Packages", + "Path": "samples/automationaccounts/python3packages/main.bicep", + "Description": "A basic example of deploying Automation Python3 Package." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/runbooks", + "Path": "samples/automationaccounts/runbooks/main.bicep", + "Description": "A basic example of deploying Automation Runbook." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/runbooks/draft", + "Path": "samples/automationaccounts/runbooks/draft/main.bicep", + "Description": "A basic example of deploying Automation Accounts Runbooks Draft." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/schedules", + "Path": "samples/automationaccounts/schedules/main.bicep", + "Description": "A basic example of deploying Automation Schedule." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/softwareUpdateConfigurations", + "Path": "samples/automationaccounts/softwareupdateconfigurations/main.bicep", + "Description": "A basic example of deploying Automation Software Update Configuration." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/sourceControls", + "Path": "samples/automationaccounts/sourcecontrols/main.bicep", + "Description": "A basic example of deploying Automation Source Control." + }, + { + "ResourceType": "Microsoft.Automation/automationAccounts/variables", + "Path": "samples/automationaccounts/variables/main.bicep", + "Description": "A basic example of deploying variable in Azure Automation." + } + ] +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/certificates/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/certificates/main.bicep new file mode 100644 index 00000000..e4863be0 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/certificates/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource certificate 'Microsoft.Automation/automationAccounts/certificates@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + base64Value: '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' + description: '' + isExportable: false + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/configurations/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/configurations/main.bicep new file mode 100644 index 00000000..bb8b1030 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/configurations/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource configuration 'Microsoft.Automation/automationAccounts/configurations@2022-08-08' = { + parent: automationAccount + name: resourceName + location: location + properties: { + description: 'test' + logVerbose: false + source: { + type: 'embeddedContent' + value: 'configuration acctest {}' + } + } + tags: { + ENV: 'prod' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/connections/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/connections/main.bicep new file mode 100644 index 00000000..d8df2325 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/connections/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The Application ID of the Azure service principal for the automation account connection') +param servicePrincipalApplicationId string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource connection 'Microsoft.Automation/automationAccounts/connections@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + connectionType: { + name: 'AzureServicePrincipal' + } + description: '' + fieldDefinitionValues: { + ApplicationId: null + CertificateThumbprint: '''AEB97B81A68E8988850972916A8B8B6CD8F39813 +''' + SubscriptionId: subscription().subscriptionId + TenantId: deployer().tenantId + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/connectiontypes/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/connectiontypes/main.bicep new file mode 100644 index 00000000..192e8d59 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/connectiontypes/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource connectionType 'Microsoft.Automation/automationAccounts/connectionTypes@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + fieldDefinitions: { + my_def: { + isEncrypted: false + isOptional: false + type: 'string' + } + } + isGlobal: false + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/credentials/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/credentials/main.bicep new file mode 100644 index 00000000..92ad0950 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/credentials/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the automation account credential') +param automationCredentialPassword string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource credential 'Microsoft.Automation/automationAccounts/credentials@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + password: null + userName: 'test_user' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.bicep new file mode 100644 index 00000000..7782f89a --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/hybridrunbookworkers/main.bicep @@ -0,0 +1,167 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the automation account hybrid runbook worker') +param automationWorkerPassword string +@secure() +@description('The administrator password for the virtual machine') +param vmAdminPassword string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_D2s_v3' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource credential 'Microsoft.Automation/automationAccounts/credentials@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + password: null + userName: 'test_user' + } +} + +resource hybridRunbookWorkerGroup 'Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups@2021-06-22' = { + parent: automationAccount + name: resourceName + credential: { + name: credential.name + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource hybridRunbookWorker 'Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups/hybridRunbookWorkers@2021-06-22' = { + parent: hybridRunbookWorkerGroup + name: 'c7714056-5ba8-4bbe-920e-2993171164eb' + properties: { + vmResourceId: virtualMachine.id + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/main.bicep new file mode 100644 index 00000000..07bf40b6 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/hybridrunbookworkergroups/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the automation account credential') +param credentialPassword string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource credential 'Microsoft.Automation/automationAccounts/credentials@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + password: null + userName: 'test_user' + } +} + +resource hybridRunbookWorkerGroup 'Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups@2021-06-22' = { + parent: automationAccount + name: resourceName + credential: { + name: credential.name + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/main.bicep new file mode 100644 index 00000000..a0e7dac9 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/modules/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/modules/main.bicep new file mode 100644 index 00000000..d664d2d8 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/modules/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource module 'Microsoft.Automation/automationAccounts/modules@2020-01-13-preview' = { + parent: automationAccount + name: 'xActiveDirectory' + properties: { + contentLink: { + uri: 'https://devopsgallerystorage.blob.core.windows.net/packages/xactivedirectory.2.19.0.nupkg' + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/powershell72modules/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/powershell72modules/main.bicep new file mode 100644 index 00000000..64a0d1b0 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/powershell72modules/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource powerShell72Module 'Microsoft.Automation/automationAccounts/powerShell72Modules@2020-01-13-preview' = { + parent: automationAccount + name: 'xActiveDirectory' + properties: { + contentLink: { + uri: 'https://devopsgallerystorage.blob.core.windows.net/packages/xactivedirectory.2.19.0.nupkg' + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/python3packages/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/python3packages/main.bicep new file mode 100644 index 00000000..656fe259 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/python3packages/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2023-11-01' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource python3Package 'Microsoft.Automation/automationAccounts/python3Packages@2023-11-01' = { + parent: automationAccount + name: resourceName + properties: { + contentLink: { + uri: 'https://files.pythonhosted.org/packages/py3/r/requests/requests-2.31.0-py3-none-any.whl' + version: '2.31.0' + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/draft/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/draft/main.bicep new file mode 100644 index 00000000..645c6422 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/draft/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource runbook 'Microsoft.Automation/automationAccounts/runbooks@2019-06-01' = { + parent: automationAccount + name: 'Get-AzureVMTutorial' + location: location + properties: { + description: 'This is a test runbook for terraform acceptance test' + draft: {} + logActivityTrace: 0 + logProgress: true + logVerbose: true + runbookType: 'PowerShell' + } +} + +resource draft 'Microsoft.Automation/automationAccounts/runbooks/draft@2018-06-30' = { + parent: runbook + name: 'content' +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/main.bicep new file mode 100644 index 00000000..3e84d9ce --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/runbooks/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource runbook 'Microsoft.Automation/automationAccounts/runbooks@2019-06-01' = { + parent: automationAccount + name: 'Get-AzureVMTutorial' + location: location + properties: { + description: 'This is a test runbook for terraform acceptance test' + draft: {} + logActivityTrace: 0 + logProgress: true + logVerbose: true + runbookType: 'PowerShell' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/schedules/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/schedules/main.bicep new file mode 100644 index 00000000..bf571ec0 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/schedules/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource schedule 'Microsoft.Automation/automationAccounts/schedules@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + frequency: 'OneTime' + startTime: '2024-07-05T08:51:00+00:00' + timeZone: 'Etc/UTC' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/softwareupdateconfigurations/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/softwareupdateconfigurations/main.bicep new file mode 100644 index 00000000..020e8583 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/softwareupdateconfigurations/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource softwareUpdateConfiguration 'Microsoft.Automation/automationAccounts/softwareUpdateConfigurations@2019-06-01' = { + parent: automationAccount + name: resourceName + properties: { + scheduleInfo: { + description: '' + expiryTimeOffsetMinutes: 0 + frequency: 'OneTime' + interval: 0 + isEnabled: true + nextRunOffsetMinutes: 0 + startTimeOffsetMinutes: 0 + timeZone: 'Etc/UTC' + } + updateConfiguration: { + duration: 'PT2H' + linux: { + excludedPackageNameMasks: [] + includedPackageClassifications: 'Security' + includedPackageNameMasks: [] + rebootSetting: 'IfRequired' + } + operatingSystem: 'Linux' + targets: { + azureQueries: [ + { + locations: [ + 'westeurope' + ] + scope: [ + resourceGroup().id + ] + } + ] + } + } + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/sourcecontrols/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/sourcecontrols/main.bicep new file mode 100644 index 00000000..5a18a7a3 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/sourcecontrols/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('GitHub Personal Access Token') +param pat string + +resource automationAccount 'Microsoft.Automation/automationAccounts@2023-11-01' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource sourceControl 'Microsoft.Automation/automationAccounts/sourceControls@2023-11-01' = { + parent: automationAccount + name: resourceName + properties: { + autoSync: false + branch: 'master' + folderPath: '/' + publishRunbook: false + repoUrl: 'https://github.com/Azure-Samples/acr-build-helloworld-node.git' + securityToken: { + accessToken: null + tokenType: 'PersonalAccessToken' + } + sourceType: 'GitHub' + } +} diff --git a/settings/remarks/microsoft.automation/samples/automationaccounts/variables/main.bicep b/settings/remarks/microsoft.automation/samples/automationaccounts/variables/main.bicep new file mode 100644 index 00000000..b64904b1 --- /dev/null +++ b/settings/remarks/microsoft.automation/samples/automationaccounts/variables/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource variable 'Microsoft.Automation/automationAccounts/variables@2020-01-13-preview' = { + parent: automationAccount + name: resourceName + properties: { + description: '' + isEncrypted: false + value: '"Hello, Terraform Basic Test."' + } +} diff --git a/settings/remarks/microsoft.avs/remarks.json b/settings/remarks/microsoft.avs/remarks.json index fd5a9d9f..6328e7a5 100644 --- a/settings/remarks/microsoft.avs/remarks.json +++ b/settings/remarks/microsoft.avs/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.AVS/privateClouds", - "Path": "samples/privateclouds/main.tf", - "Description": "A basic example of deploying Azure VMware Solution Private Cloud." - }, - { - "ResourceType": "Microsoft.AVS/privateClouds/authorizations", - "Path": "samples/privateclouds/authorizations/main.tf", - "Description": "A basic example of deploying Azure VMware Solution ExpressRoute Circuit Authorization." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.AVS/privateClouds", + "Path": "samples/privateclouds/main.tf", + "Description": "A basic example of deploying Azure VMware Solution Private Cloud." + }, + { + "ResourceType": "Microsoft.AVS/privateClouds/authorizations", + "Path": "samples/privateclouds/authorizations/main.tf", + "Description": "A basic example of deploying Azure VMware Solution ExpressRoute Circuit Authorization." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.AVS/privateClouds", + "Path": "samples/privateclouds/main.bicep", + "Description": "A basic example of deploying Azure VMware Solution Private Cloud." + }, + { + "ResourceType": "Microsoft.AVS/privateClouds/authorizations", + "Path": "samples/privateclouds/authorizations/main.bicep", + "Description": "A basic example of deploying Azure VMware Solution ExpressRoute Circuit Authorization." + } + ] +} diff --git a/settings/remarks/microsoft.avs/samples/privateclouds/authorizations/main.bicep b/settings/remarks/microsoft.avs/samples/privateclouds/authorizations/main.bicep new file mode 100644 index 00000000..afde51c0 --- /dev/null +++ b/settings/remarks/microsoft.avs/samples/privateclouds/authorizations/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource privateCloud 'Microsoft.AVS/privateClouds@2022-05-01' = { + name: resourceName + location: location + properties: { + internet: 'Disabled' + managementCluster: { + clusterSize: 3 + } + networkBlock: '192.168.48.0/22' + } + sku: { + name: 'av36' + } +} + +resource authorization 'Microsoft.AVS/privateClouds/authorizations@2022-05-01' = { + parent: privateCloud + name: resourceName +} diff --git a/settings/remarks/microsoft.avs/samples/privateclouds/main.bicep b/settings/remarks/microsoft.avs/samples/privateclouds/main.bicep new file mode 100644 index 00000000..96933b18 --- /dev/null +++ b/settings/remarks/microsoft.avs/samples/privateclouds/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource privateCloud 'Microsoft.AVS/privateClouds@2022-05-01' = { + name: resourceName + location: location + properties: { + internet: 'Disabled' + managementCluster: { + clusterSize: 3 + } + networkBlock: '192.168.48.0/22' + } + sku: { + name: 'av36' + } +} diff --git a/settings/remarks/microsoft.azureactivedirectory/remarks.json b/settings/remarks/microsoft.azureactivedirectory/remarks.json index 1c84cec4..4c6de153 100644 --- a/settings/remarks/microsoft.azureactivedirectory/remarks.json +++ b/settings/remarks/microsoft.azureactivedirectory/remarks.json @@ -1,18 +1,25 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "You can create a B2C tenant with an ARM template or Bicep file, but you can't update an existing B2C tenant. Also, you can't redeploy a template with the same tenant name. If you need to update a B2C tenant, use [B2C Tenants - Update](/rest/api/activedirectory/b2c-tenants/update).", - "ResourceTypes": [ - "microsoft.azureactivedirectory/b2cdirectories" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.AzureActiveDirectory/b2cDirectories", - "Path": "samples/b2cdirectories/main.tf", - "Description": "A basic example of deploying AAD B2C Directory." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "You can create a B2C tenant with an ARM template or Bicep file, but you can't update an existing B2C tenant. Also, you can't redeploy a template with the same tenant name. If you need to update a B2C tenant, use [B2C Tenants - Update](/rest/api/activedirectory/b2c-tenants/update).", + "ResourceTypes": [ + "microsoft.azureactivedirectory/b2cdirectories" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.AzureActiveDirectory/b2cDirectories", + "Path": "samples/b2cdirectories/main.tf", + "Description": "A basic example of deploying AAD B2C Directory." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.AzureActiveDirectory/b2cDirectories", + "Path": "samples/b2cdirectories/main.bicep", + "Description": "A basic example of deploying AAD B2C Directory." + } + ] +} diff --git a/settings/remarks/microsoft.azureactivedirectory/samples/b2cdirectories/main.bicep b/settings/remarks/microsoft.azureactivedirectory/samples/b2cdirectories/main.bicep new file mode 100644 index 00000000..5a6c877c --- /dev/null +++ b/settings/remarks/microsoft.azureactivedirectory/samples/b2cdirectories/main.bicep @@ -0,0 +1,24 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0003' +param location string = 'westeurope' + +resource resourceGroup 'Microsoft.Resources/resourceGroups@2020-06-01' = { + name: resourceName + location: location +} + +resource b2cDirectory 'Microsoft.AzureActiveDirectory/b2cDirectories@2021-04-01-preview' = { + name: '${resourceName}.onmicrosoft.com' + location: 'United States' + properties: { + createTenantProperties: { + countryCode: 'US' + displayName: 'acctest0003' + } + } + sku: { + name: 'PremiumP1' + tier: 'A0' + } +} diff --git a/settings/remarks/microsoft.batch/remarks.json b/settings/remarks/microsoft.batch/remarks.json index 48fd9f2d..942663aa 100644 --- a/settings/remarks/microsoft.batch/remarks.json +++ b/settings/remarks/microsoft.batch/remarks.json @@ -1,25 +1,47 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Batch/batchAccounts", - "Path": "samples/batchaccounts/main.tf", - "Description": "A basic example of deploying Azure Batch account." - }, - { - "ResourceType": "Microsoft.Batch/batchAccounts/applications", - "Path": "samples/batchaccounts/applications/main.tf", - "Description": "A basic example of deploying Azure Batch Application instance." - }, - { - "ResourceType": "Microsoft.Batch/batchAccounts/certificates", - "Path": "samples/batchaccounts/certificates/main.tf", - "Description": "A basic example of deploying certificate in an Azure Batch account." - }, - { - "ResourceType": "Microsoft.Batch/batchAccounts/pools", - "Path": "samples/batchaccounts/pools/main.tf", - "Description": "A basic example of deploying Azure Batch pool." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Batch/batchAccounts", + "Path": "samples/batchaccounts/main.tf", + "Description": "A basic example of deploying Azure Batch account." + }, + { + "ResourceType": "Microsoft.Batch/batchAccounts/applications", + "Path": "samples/batchaccounts/applications/main.tf", + "Description": "A basic example of deploying Azure Batch Application instance." + }, + { + "ResourceType": "Microsoft.Batch/batchAccounts/certificates", + "Path": "samples/batchaccounts/certificates/main.tf", + "Description": "A basic example of deploying certificate in an Azure Batch account." + }, + { + "ResourceType": "Microsoft.Batch/batchAccounts/pools", + "Path": "samples/batchaccounts/pools/main.tf", + "Description": "A basic example of deploying Azure Batch pool." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Batch/batchAccounts", + "Path": "samples/batchaccounts/main.bicep", + "Description": "A basic example of deploying Azure Batch account." + }, + { + "ResourceType": "Microsoft.Batch/batchAccounts/applications", + "Path": "samples/batchaccounts/applications/main.bicep", + "Description": "A basic example of deploying Azure Batch Application instance." + }, + { + "ResourceType": "Microsoft.Batch/batchAccounts/certificates", + "Path": "samples/batchaccounts/certificates/main.bicep", + "Description": "A basic example of deploying certificate in an Azure Batch account." + }, + { + "ResourceType": "Microsoft.Batch/batchAccounts/pools", + "Path": "samples/batchaccounts/pools/main.bicep", + "Description": "A basic example of deploying Azure Batch pool." + } + ] +} diff --git a/settings/remarks/microsoft.batch/samples/batchaccounts/applications/main.bicep b/settings/remarks/microsoft.batch/samples/batchaccounts/applications/main.bicep new file mode 100644 index 00000000..1ab86d68 --- /dev/null +++ b/settings/remarks/microsoft.batch/samples/batchaccounts/applications/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource batchAccount 'Microsoft.Batch/batchAccounts@2022-10-01' = { + name: resourceName + location: location + properties: { + autoStorage: { + authenticationMode: 'StorageKeys' + storageAccountId: storageAccount.id + } + encryption: { + keySource: 'Microsoft.Batch' + } + poolAllocationMode: 'BatchService' + publicNetworkAccess: 'Enabled' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource application 'Microsoft.Batch/batchAccounts/applications@2022-10-01' = { + parent: batchAccount + name: resourceName + properties: { + allowUpdates: true + defaultVersion: '' + displayName: '' + } +} diff --git a/settings/remarks/microsoft.batch/samples/batchaccounts/certificates/main.bicep b/settings/remarks/microsoft.batch/samples/batchaccounts/certificates/main.bicep new file mode 100644 index 00000000..52dc66f5 --- /dev/null +++ b/settings/remarks/microsoft.batch/samples/batchaccounts/certificates/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The base64-encoded certificate data') +param certificateData string +@description('The thumbprint of the certificate') +param certificateThumbprint string + +resource batchAccount 'Microsoft.Batch/batchAccounts@2022-10-01' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Batch' + } + poolAllocationMode: 'BatchService' + publicNetworkAccess: 'Enabled' + } +} + +resource certificate 'Microsoft.Batch/batchAccounts/certificates@2022-10-01' = { + parent: batchAccount + name: 'SHA1-${certificateThumbprint}' + properties: { + data: null + format: 'Cer' + thumbprint: null + thumbprintAlgorithm: 'sha1' + } +} diff --git a/settings/remarks/microsoft.batch/samples/batchaccounts/main.bicep b/settings/remarks/microsoft.batch/samples/batchaccounts/main.bicep new file mode 100644 index 00000000..7d5bccd0 --- /dev/null +++ b/settings/remarks/microsoft.batch/samples/batchaccounts/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource batchAccount 'Microsoft.Batch/batchAccounts@2022-10-01' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Batch' + } + poolAllocationMode: 'BatchService' + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.batch/samples/batchaccounts/pools/main.bicep b/settings/remarks/microsoft.batch/samples/batchaccounts/pools/main.bicep new file mode 100644 index 00000000..f4661451 --- /dev/null +++ b/settings/remarks/microsoft.batch/samples/batchaccounts/pools/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource batchAccount 'Microsoft.Batch/batchAccounts@2022-10-01' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Batch' + } + poolAllocationMode: 'BatchService' + publicNetworkAccess: 'Enabled' + } +} + +resource pool 'Microsoft.Batch/batchAccounts/pools@2022-10-01' = { + parent: batchAccount + name: resourceName + properties: { + certificates: null + deploymentConfiguration: { + virtualMachineConfiguration: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '18.04-lts' + version: 'latest' + } + nodeAgentSkuId: 'batch.node.ubuntu 18.04' + osDisk: { + ephemeralOSDiskSettings: { + placement: '' + } + } + } + } + displayName: '' + interNodeCommunication: 'Enabled' + metadata: [] + scaleSettings: { + fixedScale: { + nodeDeallocationOption: '' + resizeTimeout: 'PT15M' + targetDedicatedNodes: 1 + targetLowPriorityNodes: 0 + } + } + taskSlotsPerNode: 1 + vmSize: 'STANDARD_A1' + } +} diff --git a/settings/remarks/microsoft.botservice/remarks.json b/settings/remarks/microsoft.botservice/remarks.json index 5f614c30..17bfd9fa 100644 --- a/settings/remarks/microsoft.botservice/remarks.json +++ b/settings/remarks/microsoft.botservice/remarks.json @@ -1,20 +1,32 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.BotService/botServices", - "Path": "samples/botservices/main.tf", - "Description": "A basic example of deploying Azure Bot Service." - }, - { - "ResourceType": "Microsoft.BotService/botServices/channels", - "Path": "samples/botservices/channels/main.tf", - "Description": "A basic example of deploying integration for a Bot Channel." - }, - { - "ResourceType": "Microsoft.BotService/botServices/connections", - "Path": "samples/botservices/connections/main.tf", - "Description": "A basic example of deploying Bot Connection." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.BotService/botServices", + "Path": "samples/botservices/main.tf", + "Description": "A basic example of deploying Azure Bot Service." + }, + { + "ResourceType": "Microsoft.BotService/botServices/channels", + "Path": "samples/botservices/channels/main.tf", + "Description": "A basic example of deploying integration for a Bot Channel." + }, + { + "ResourceType": "Microsoft.BotService/botServices/connections", + "Path": "samples/botservices/connections/main.tf", + "Description": "A basic example of deploying Bot Connection." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.BotService/botServices", + "Path": "samples/botservices/main.bicep", + "Description": "A basic example of deploying Azure Bot Service." + }, + { + "ResourceType": "Microsoft.BotService/botServices/channels", + "Path": "samples/botservices/channels/main.bicep", + "Description": "A basic example of deploying integration for a Bot Channel." + } + ] +} diff --git a/settings/remarks/microsoft.botservice/samples/botservices/channels/main.bicep b/settings/remarks/microsoft.botservice/samples/botservices/channels/main.bicep new file mode 100644 index 00000000..2b1fa1b6 --- /dev/null +++ b/settings/remarks/microsoft.botservice/samples/botservices/channels/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource botService 'Microsoft.BotService/botServices@2021-05-01-preview' = { + name: resourceName + location: location + kind: 'bot' + properties: { + cmekKeyVaultUrl: '' + description: '' + developerAppInsightKey: '' + developerAppInsightsApiKey: '' + developerAppInsightsApplicationId: '' + displayName: 'acctest0001' + endpoint: '' + iconUrl: 'https://docs.botframework.com/static/devportal/client/images/bot-framework-default.png' + isCmekEnabled: false + isStreamingSupported: false + msaAppId: '12345678-1234-1234-1234-123456789012' + } + sku: { + name: 'F0' + } +} + +resource channel 'Microsoft.BotService/botServices/channels@2021-05-01-preview' = { + parent: botService + name: 'AlexaChannel' + location: location + kind: 'bot' + properties: { + channelName: 'AlexaChannel' + properties: { + alexaSkillId: 'amzn1.ask.skill.19126e57-867f-4553-b953-ad0a720dddec' + isEnabled: true + } + } +} diff --git a/settings/remarks/microsoft.botservice/samples/botservices/main.bicep b/settings/remarks/microsoft.botservice/samples/botservices/main.bicep new file mode 100644 index 00000000..f369a978 --- /dev/null +++ b/settings/remarks/microsoft.botservice/samples/botservices/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource botService 'Microsoft.BotService/botServices@2021-05-01-preview' = { + name: resourceName + location: 'global' + kind: 'sdk' + properties: { + developerAppInsightKey: '' + developerAppInsightsApiKey: '' + developerAppInsightsApplicationId: '' + displayName: 'acctest0001' + endpoint: '' + luisAppIds: [] + luisKey: '' + msaAppId: deployer().objectId + } + sku: { + name: 'F0' + } + tags: { + environment: 'production' + } +} diff --git a/settings/remarks/microsoft.cache/remarks.json b/settings/remarks/microsoft.cache/remarks.json index 45d6fa4f..e1824107 100644 --- a/settings/remarks/microsoft.cache/remarks.json +++ b/settings/remarks/microsoft.cache/remarks.json @@ -1,48 +1,80 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "Note: Redis Enterprise (Microsoft.Cache/redisEnterprise) is also known as Azure Managed Redis. It requires a Microsoft.Cache/redisEnterprise/databases child resource to function properly. See https://learn.microsoft.com/azure/redis/overview for more information.", - "ResourceTypes": [ - "microsoft.cache/redisenterprise" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Cache/redis", - "Path": "samples/redis/main.tf", - "Description": "A basic example of deploying Redis Cache." - }, - { - "ResourceType": "Microsoft.Cache/redis/accessPolicies", - "Path": "samples/redis/accesspolicies/main.tf", - "Description": "A basic example of deploying Redis Cache Access Policy." - }, - { - "ResourceType": "Microsoft.Cache/redis/accessPolicyAssignments", - "Path": "samples/redis/accesspolicyassignments/main.tf", - "Description": "A basic example of deploying Redis Cache Access Policy Assignment." - }, - { - "ResourceType": "Microsoft.Cache/redis/firewallRules", - "Path": "samples/redis/firewallrules/main.tf", - "Description": "A basic example of deploying Firewall Rule associated with a Redis Cache." - }, - { - "ResourceType": "Microsoft.Cache/redis/linkedServers", - "Path": "samples/redis/linkedservers/main.tf", - "Description": "A basic example of deploying Redis Linked Server." - }, - { - "ResourceType": "Microsoft.Cache/redisEnterprise", - "Path": "samples/redisenterprise/main.tf", - "Description": "A basic example of deploying Redis Enterprise Cluster." - }, - { - "ResourceType": "Microsoft.Cache/redisEnterprise/databases", - "Path": "samples/redisenterprise/databases/main.tf", - "Description": "A basic example of deploying Redis Enterprise Database." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "Note: Redis Enterprise (Microsoft.Cache/redisEnterprise) is also known as Azure Managed Redis. It requires a Microsoft.Cache/redisEnterprise/databases child resource to function properly. See https://learn.microsoft.com/azure/redis/overview for more information.", + "ResourceTypes": [ + "microsoft.cache/redisenterprise" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Cache/redis", + "Path": "samples/redis/main.tf", + "Description": "A basic example of deploying Redis Cache." + }, + { + "ResourceType": "Microsoft.Cache/redis/accessPolicies", + "Path": "samples/redis/accesspolicies/main.tf", + "Description": "A basic example of deploying Redis Cache Access Policy." + }, + { + "ResourceType": "Microsoft.Cache/redis/accessPolicyAssignments", + "Path": "samples/redis/accesspolicyassignments/main.tf", + "Description": "A basic example of deploying Redis Cache Access Policy Assignment." + }, + { + "ResourceType": "Microsoft.Cache/redis/firewallRules", + "Path": "samples/redis/firewallrules/main.tf", + "Description": "A basic example of deploying Firewall Rule associated with a Redis Cache." + }, + { + "ResourceType": "Microsoft.Cache/redis/linkedServers", + "Path": "samples/redis/linkedservers/main.tf", + "Description": "A basic example of deploying Redis Linked Server." + }, + { + "ResourceType": "Microsoft.Cache/redisEnterprise", + "Path": "samples/redisenterprise/main.tf", + "Description": "A basic example of deploying Redis Enterprise Cluster." + }, + { + "ResourceType": "Microsoft.Cache/redisEnterprise/databases", + "Path": "samples/redisenterprise/databases/main.tf", + "Description": "A basic example of deploying Redis Enterprise Database." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Cache/redis", + "Path": "samples/redis/main.bicep", + "Description": "A basic example of deploying Redis Cache." + }, + { + "ResourceType": "Microsoft.Cache/redis/accessPolicies", + "Path": "samples/redis/accesspolicies/main.bicep", + "Description": "A basic example of deploying Redis Cache Access Policy." + }, + { + "ResourceType": "Microsoft.Cache/redis/accessPolicyAssignments", + "Path": "samples/redis/accesspolicyassignments/main.bicep", + "Description": "A basic example of deploying Redis Cache Access Policy Assignment." + }, + { + "ResourceType": "Microsoft.Cache/redis/firewallRules", + "Path": "samples/redis/firewallrules/main.bicep", + "Description": "A basic example of deploying Firewall Rule associated with a Redis Cache." + }, + { + "ResourceType": "Microsoft.Cache/redisEnterprise", + "Path": "samples/redisenterprise/main.bicep", + "Description": "A basic example of deploying Redis Enterprise Cluster." + }, + { + "ResourceType": "Microsoft.Cache/redisEnterprise/databases", + "Path": "samples/redisenterprise/databases/main.bicep", + "Description": "A basic example of deploying Redis Enterprise Database." + } + ] +} diff --git a/settings/remarks/microsoft.cache/samples/redis/accesspolicies/main.bicep b/settings/remarks/microsoft.cache/samples/redis/accesspolicies/main.bicep new file mode 100644 index 00000000..81125cb5 --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redis/accesspolicies/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource redis 'Microsoft.Cache/redis@2024-11-01' = { + name: resourceName + location: location + properties: { + disableAccessKeyAuthentication: false + enableNonSslPort: true + minimumTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + redisConfiguration: { + 'maxmemory-policy': 'volatile-lru' + 'preferred-data-persistence-auth-method': '' + } + redisVersion: '6' + sku: { + capacity: 1 + family: 'C' + name: 'Basic' + } + } +} + +resource accessPolicy 'Microsoft.Cache/redis/accessPolicies@2024-11-01' = { + parent: redis + name: '${resourceName}-accessPolicy' + properties: { + permissions: '+@read +@connection +cluster|info allkeys' + } +} diff --git a/settings/remarks/microsoft.cache/samples/redis/accesspolicyassignments/main.bicep b/settings/remarks/microsoft.cache/samples/redis/accesspolicyassignments/main.bicep new file mode 100644 index 00000000..512d5360 --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redis/accesspolicyassignments/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource redis 'Microsoft.Cache/redis@2023-04-01' = { + name: resourceName + location: location + properties: { + enableNonSslPort: true + minimumTlsVersion: '1.2' + sku: { + capacity: 2 + family: 'C' + name: 'Standard' + } + } +} + +resource accessPolicyAssignment 'Microsoft.Cache/redis/accessPolicyAssignments@2024-03-01' = { + parent: redis + name: resourceName + properties: { + accessPolicyName: 'Data Contributor' + objectId: deployer().objectId + objectIdAlias: 'ServicePrincipal' + } +} diff --git a/settings/remarks/microsoft.cache/samples/redis/firewallrules/main.bicep b/settings/remarks/microsoft.cache/samples/redis/firewallrules/main.bicep new file mode 100644 index 00000000..7785eb12 --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redis/firewallrules/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource redis 'Microsoft.Cache/redis@2024-11-01' = { + name: resourceName + location: location + properties: { + disableAccessKeyAuthentication: false + enableNonSslPort: false + minimumTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + redisConfiguration: { + 'maxmemory-delta': '642' + 'maxmemory-policy': 'allkeys-lru' + 'maxmemory-reserved': '642' + 'preferred-data-persistence-auth-method': '' + } + redisVersion: '6.0' + sku: { + capacity: 1 + family: 'P' + name: 'Premium' + } + } +} + +resource firewallRule 'Microsoft.Cache/redis/firewallRules@2024-11-01' = { + parent: redis + name: '${resourceName}_fwrule' + properties: { + endIP: '2.3.4.5' + startIP: '1.2.3.4' + } +} diff --git a/settings/remarks/microsoft.cache/samples/redis/main.bicep b/settings/remarks/microsoft.cache/samples/redis/main.bicep new file mode 100644 index 00000000..b4171f1a --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redis/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource redis 'Microsoft.Cache/redis@2023-04-01' = { + name: resourceName + location: location + properties: { + enableNonSslPort: true + minimumTlsVersion: '1.2' + sku: { + capacity: 2 + family: 'C' + name: 'Standard' + } + } +} diff --git a/settings/remarks/microsoft.cache/samples/redisenterprise/databases/main.bicep b/settings/remarks/microsoft.cache/samples/redisenterprise/databases/main.bicep new file mode 100644 index 00000000..332151c3 --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redisenterprise/databases/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource redisEnterprise 'Microsoft.Cache/redisEnterprise@2025-04-01' = { + name: resourceName + location: location + properties: { + encryption: {} + highAvailability: 'Enabled' + minimumTlsVersion: '1.2' + } + sku: { + name: 'Balanced_B0' + } +} + +resource defaultDatabase 'Microsoft.Cache/redisEnterprise/databases@2025-04-01' = { + parent: redisEnterprise + name: 'default' + properties: { + clientProtocol: 'Encrypted' + clusteringPolicy: 'OSSCluster' + evictionPolicy: 'VolatileLRU' + modules: [] + port: 10000 + } +} diff --git a/settings/remarks/microsoft.cache/samples/redisenterprise/main.bicep b/settings/remarks/microsoft.cache/samples/redisenterprise/main.bicep new file mode 100644 index 00000000..1e337bec --- /dev/null +++ b/settings/remarks/microsoft.cache/samples/redisenterprise/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource redisEnterprise 'Microsoft.Cache/redisEnterprise@2025-04-01' = { + name: resourceName + location: location + properties: { + encryption: {} + highAvailability: 'Enabled' + minimumTlsVersion: '1.2' + } + sku: { + name: 'Balanced_B0' + } +} diff --git a/settings/remarks/microsoft.cdn/remarks.json b/settings/remarks/microsoft.cdn/remarks.json index 5c9f6b17..a11b3f6c 100644 --- a/settings/remarks/microsoft.cdn/remarks.json +++ b/settings/remarks/microsoft.cdn/remarks.json @@ -1,60 +1,112 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Cdn/profiles", - "Path": "samples/profiles/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Profile." - }, - { - "ResourceType": "Microsoft.Cdn/profiles", - "Path": "samples/profiles/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Profile." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/afdEndpoints", - "Path": "samples/profiles/afdendpoints/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Endpoint." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/afdEndpoints/routes", - "Path": "samples/profiles/afdendpoints/routes/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Route." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/customDomains", - "Path": "samples/profiles/customdomains/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Custom Domain." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/endpoints", - "Path": "samples/profiles/endpoints/main.tf", - "Description": "A basic example of deploying CDN Endpoint." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/originGroups", - "Path": "samples/profiles/origingroups/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Origin Group." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/originGroups/origins", - "Path": "samples/profiles/origingroups/origins/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Origin." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/ruleSets", - "Path": "samples/profiles/rulesets/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Rule Set." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/ruleSets/rules", - "Path": "samples/profiles/rulesets/rules/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Rule." - }, - { - "ResourceType": "Microsoft.Cdn/profiles/securityPolicies", - "Path": "samples/profiles/securitypolicies/main.tf", - "Description": "A basic example of deploying Front Door (standard/premium) Security Policy." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Cdn/profiles", + "Path": "samples/profiles/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Profile." + }, + { + "ResourceType": "Microsoft.Cdn/profiles", + "Path": "samples/profiles/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Profile." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/afdEndpoints", + "Path": "samples/profiles/afdendpoints/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Endpoint." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/afdEndpoints/routes", + "Path": "samples/profiles/afdendpoints/routes/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Route." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/customDomains", + "Path": "samples/profiles/customdomains/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Custom Domain." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/endpoints", + "Path": "samples/profiles/endpoints/main.tf", + "Description": "A basic example of deploying CDN Endpoint." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/originGroups", + "Path": "samples/profiles/origingroups/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Origin Group." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/originGroups/origins", + "Path": "samples/profiles/origingroups/origins/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Origin." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/ruleSets", + "Path": "samples/profiles/rulesets/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Rule Set." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/ruleSets/rules", + "Path": "samples/profiles/rulesets/rules/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Rule." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/securityPolicies", + "Path": "samples/profiles/securitypolicies/main.tf", + "Description": "A basic example of deploying Front Door (standard/premium) Security Policy." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Cdn/profiles", + "Path": "samples/profiles/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Profile." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/afdEndpoints", + "Path": "samples/profiles/afdendpoints/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Endpoint." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/afdEndpoints/routes", + "Path": "samples/profiles/afdendpoints/routes/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Route." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/customDomains", + "Path": "samples/profiles/customdomains/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Custom Domain." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/endpoints", + "Path": "samples/profiles/endpoints/main.bicep", + "Description": "A basic example of deploying CDN Endpoint." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/originGroups", + "Path": "samples/profiles/origingroups/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Origin Group." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/originGroups/origins", + "Path": "samples/profiles/origingroups/origins/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Origin." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/ruleSets", + "Path": "samples/profiles/rulesets/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Rule Set." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/ruleSets/rules", + "Path": "samples/profiles/rulesets/rules/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Rule." + }, + { + "ResourceType": "Microsoft.Cdn/profiles/securityPolicies", + "Path": "samples/profiles/securitypolicies/main.bicep", + "Description": "A basic example of deploying Front Door (standard/premium) Security Policy." + } + ] +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/main.bicep new file mode 100644 index 00000000..2e318bc4 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource afdEndpoint 'Microsoft.Cdn/profiles/afdEndpoints@2021-06-01' = { + parent: profile + name: resourceName + location: 'global' + properties: { + enabledState: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/routes/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/routes/main.bicep new file mode 100644 index 00000000..76b591ce --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/afdendpoints/routes/main.bicep @@ -0,0 +1,71 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource afdEndpoint 'Microsoft.Cdn/profiles/afdEndpoints@2021-06-01' = { + parent: profile + name: resourceName + location: 'global' + properties: { + enabledState: 'Enabled' + } +} + +resource originGroup 'Microsoft.Cdn/profiles/originGroups@2021-06-01' = { + parent: profile + name: resourceName + properties: { + loadBalancingSettings: { + additionalLatencyInMilliseconds: 0 + sampleSize: 16 + successfulSamplesRequired: 3 + } + sessionAffinityState: 'Enabled' + trafficRestorationTimeToHealedOrNewEndpointsInMinutes: 10 + } +} + +resource origin 'Microsoft.Cdn/profiles/originGroups/origins@2021-06-01' = { + parent: originGroup + name: resourceName + properties: { + enabledState: 'Enabled' + enforceCertificateNameCheck: false + hostName: 'contoso.com' + httpPort: 80 + httpsPort: 443 + originHostHeader: 'www.contoso.com' + priority: 1 + weight: 1 + } +} + +resource route 'Microsoft.Cdn/profiles/afdEndpoints/routes@2021-06-01' = { + parent: afdEndpoint + name: resourceName + properties: { + enabledState: 'Enabled' + forwardingProtocol: 'MatchRequest' + httpsRedirect: 'Enabled' + linkToDefaultDomain: 'Enabled' + originGroup: { + id: originGroup.id + } + patternsToMatch: [ + '/*' + ] + supportedProtocols: [ + 'Https' + 'Http' + ] + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/customdomains/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/customdomains/main.bicep new file mode 100644 index 00000000..96d9bbca --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/customdomains/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} + +resource customDomain 'Microsoft.Cdn/profiles/customDomains@2021-06-01' = { + parent: profile + name: resourceName + properties: { + azureDnsZone: { + id: dnsZone.id + } + hostName: 'fabrikam.acctest0001.com' + tlsSettings: { + certificateType: 'ManagedCertificate' + minimumTlsVersion: 'TLS12' + } + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/endpoints/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/endpoints/main.bicep new file mode 100644 index 00000000..572ff490 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/endpoints/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource profile 'Microsoft.Cdn/profiles@2020-09-01' = { + name: resourceName + location: location + sku: { + name: 'Standard_Verizon' + } +} + +resource endpoint 'Microsoft.Cdn/profiles/endpoints@2020-09-01' = { + parent: profile + name: resourceName + location: location + properties: { + isHttpAllowed: true + isHttpsAllowed: true + origins: [ + { + name: 'acceptanceTestCdnOrigin1' + properties: { + hostName: 'www.contoso.com' + httpPort: 80 + httpsPort: 443 + } + } + ] + queryStringCachingBehavior: 'IgnoreQueryString' + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/main.bicep new file mode 100644 index 00000000..dbd2929d --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/origingroups/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/origingroups/main.bicep new file mode 100644 index 00000000..4294b4ed --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/origingroups/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource originGroup 'Microsoft.Cdn/profiles/originGroups@2021-06-01' = { + parent: profile + name: resourceName + properties: { + loadBalancingSettings: { + additionalLatencyInMilliseconds: 0 + sampleSize: 16 + successfulSamplesRequired: 3 + } + sessionAffinityState: 'Enabled' + trafficRestorationTimeToHealedOrNewEndpointsInMinutes: 10 + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/origingroups/origins/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/origingroups/origins/main.bicep new file mode 100644 index 00000000..a76d00b7 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/origingroups/origins/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource originGroup 'Microsoft.Cdn/profiles/originGroups@2021-06-01' = { + parent: profile + name: resourceName + properties: { + loadBalancingSettings: { + additionalLatencyInMilliseconds: 0 + sampleSize: 16 + successfulSamplesRequired: 3 + } + sessionAffinityState: 'Enabled' + trafficRestorationTimeToHealedOrNewEndpointsInMinutes: 10 + } +} + +resource origin 'Microsoft.Cdn/profiles/originGroups/origins@2021-06-01' = { + parent: originGroup + name: resourceName + properties: { + enabledState: 'Enabled' + enforceCertificateNameCheck: false + hostName: 'contoso.com' + httpPort: 80 + httpsPort: 443 + originHostHeader: 'www.contoso.com' + priority: 1 + weight: 1 + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/rulesets/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/rulesets/main.bicep new file mode 100644 index 00000000..2ee48591 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/rulesets/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource ruleSet 'Microsoft.Cdn/profiles/ruleSets@2021-06-01' = { + parent: profile + name: resourceName +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/rulesets/rules/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/rulesets/rules/main.bicep new file mode 100644 index 00000000..7908e707 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/rulesets/rules/main.bicep @@ -0,0 +1,77 @@ +param resourceName string = 'acctest0001' +param cdnLocation string = 'global' + +resource profile 'Microsoft.Cdn/profiles@2024-09-01' = { + name: '${resourceName}-profile' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Standard_AzureFrontDoor' + } +} + +resource originGroup 'Microsoft.Cdn/profiles/originGroups@2024-09-01' = { + parent: profile + name: '${resourceName}-origingroup' + properties: { + loadBalancingSettings: { + additionalLatencyInMilliseconds: 0 + sampleSize: 16 + successfulSamplesRequired: 3 + } + sessionAffinityState: 'Enabled' + trafficRestorationTimeToHealedOrNewEndpointsInMinutes: 10 + } +} + +resource ruleSet 'Microsoft.Cdn/profiles/ruleSets@2024-09-01' = { + parent: profile + name: 'ruleSet${substring(resourceName, length(resourceName) - 4, 4)}' +} + +resource origin 'Microsoft.Cdn/profiles/originGroups/origins@2024-09-01' = { + parent: originGroup + name: '${resourceName}-origin' + properties: { + enabledState: 'Enabled' + enforceCertificateNameCheck: false + hostName: 'contoso.com' + httpPort: 80 + httpsPort: 443 + originHostHeader: 'www.contoso.com' + priority: 1 + weight: 1 + } +} + +resource rule 'Microsoft.Cdn/profiles/ruleSets/rules@2024-09-01' = { + parent: ruleSet + name: 'rule${substring(resourceName, length(resourceName) - 4, 4)}' + properties: { + actions: [ + { + name: 'RouteConfigurationOverride' + parameters: { + cacheConfiguration: { + cacheBehavior: 'OverrideIfOriginMissing' + cacheDuration: '23:59:59' + isCompressionEnabled: 'Disabled' + queryParameters: 'clientIp={client_ip}' + queryStringCachingBehavior: 'IgnoreSpecifiedQueryStrings' + } + originGroupOverride: { + forwardingProtocol: 'HttpsOnly' + originGroup: { + id: originGroup.id + } + } + typeName: 'DeliveryRuleRouteConfigurationOverrideActionParameters' + } + } + ] + conditions: [] + matchProcessingBehavior: 'Continue' + order: 1 + } +} diff --git a/settings/remarks/microsoft.cdn/samples/profiles/securitypolicies/main.bicep b/settings/remarks/microsoft.cdn/samples/profiles/securitypolicies/main.bicep new file mode 100644 index 00000000..59c3d517 --- /dev/null +++ b/settings/remarks/microsoft.cdn/samples/profiles/securitypolicies/main.bicep @@ -0,0 +1,124 @@ +param resourceName string = 'acctest0001' + +resource frontdoorwebapplicationfirewallpolicy 'Microsoft.Network/FrontDoorWebApplicationFirewallPolicies@2020-11-01' = { + name: resourceName + location: 'global' + properties: { + customRules: { + rules: [ + { + action: 'Block' + enabledState: 'Enabled' + matchConditions: [ + { + matchValue: [ + '192.168.1.0/24' + '10.0.0.0/24' + ] + matchVariable: 'RemoteAddr' + negateCondition: false + operator: 'IPMatch' + } + ] + name: 'Rule1' + priority: 1 + rateLimitDurationInMinutes: 1 + rateLimitThreshold: 10 + ruleType: 'MatchRule' + } + ] + } + managedRules: { + managedRuleSets: [ + { + ruleGroupOverrides: [ + { + ruleGroupName: 'PHP' + rules: [ + { + action: 'Block' + enabledState: 'Disabled' + ruleId: '933111' + } + ] + } + ] + ruleSetAction: 'Block' + ruleSetType: 'DefaultRuleSet' + ruleSetVersion: 'preview-0.1' + } + { + ruleSetAction: 'Block' + ruleSetType: 'BotProtection' + ruleSetVersion: 'preview-0.1' + } + ] + } + policySettings: { + customBlockResponseBody: 'PGh0bWw+CjxoZWFkZXI+PHRpdGxlPkhlbGxvPC90aXRsZT48L2hlYWRlcj4KPGJvZHk+CkhlbGxvIHdvcmxkCjwvYm9keT4KPC9odG1sPg==' + customBlockResponseStatusCode: 403 + enabledState: 'Enabled' + mode: 'Prevention' + redirectUrl: 'https://www.fabrikam.com' + } + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource profile 'Microsoft.Cdn/profiles@2021-06-01' = { + name: resourceName + location: 'global' + properties: { + originResponseTimeoutSeconds: 120 + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} + +resource customDomain 'Microsoft.Cdn/profiles/customDomains@2021-06-01' = { + parent: profile + name: resourceName + properties: { + azureDnsZone: { + id: dnsZone.id + } + hostName: 'fabrikam.acctest0001.com' + tlsSettings: { + certificateType: 'ManagedCertificate' + minimumTlsVersion: 'TLS12' + } + } +} + +resource securityPolicy 'Microsoft.Cdn/profiles/securityPolicies@2021-06-01' = { + parent: profile + name: resourceName + properties: { + parameters: { + associations: [ + { + domains: [ + { + id: customDomain.id + } + ] + patternsToMatch: [ + '/*' + ] + } + ] + type: 'WebApplicationFirewall' + wafPolicy: { + id: frontdoorwebapplicationfirewallpolicy.id + } + } + } +} diff --git a/settings/remarks/microsoft.certificateregistration/remarks.json b/settings/remarks/microsoft.certificateregistration/remarks.json index c69ce770..4fd35788 100644 --- a/settings/remarks/microsoft.certificateregistration/remarks.json +++ b/settings/remarks/microsoft.certificateregistration/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.CertificateRegistration/certificateOrders", - "Path": "samples/certificateorders/main.tf", - "Description": "A basic example of deploying App Service Certificate Order." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.CertificateRegistration/certificateOrders", + "Path": "samples/certificateorders/main.tf", + "Description": "A basic example of deploying App Service Certificate Order." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.CertificateRegistration/certificateOrders", + "Path": "samples/certificateorders/main.bicep", + "Description": "A basic example of deploying App Service Certificate Order." + } + ] +} diff --git a/settings/remarks/microsoft.certificateregistration/samples/certificateorders/main.bicep b/settings/remarks/microsoft.certificateregistration/samples/certificateorders/main.bicep new file mode 100644 index 00000000..9d9cd839 --- /dev/null +++ b/settings/remarks/microsoft.certificateregistration/samples/certificateorders/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' + +resource certificateOrder 'Microsoft.CertificateRegistration/certificateOrders@2021-02-01' = { + name: resourceName + location: 'global' + properties: { + autoRenew: true + distinguishedName: 'CN=example.com' + keySize: 2048 + productType: 'StandardDomainValidatedSsl' + validityInYears: 1 + } +} diff --git a/settings/remarks/microsoft.codesigning/remarks.json b/settings/remarks/microsoft.codesigning/remarks.json index b3b10cc1..5a73151d 100644 --- a/settings/remarks/microsoft.codesigning/remarks.json +++ b/settings/remarks/microsoft.codesigning/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.CodeSigning/codeSigningAccounts", - "Path": "samples/codesigningaccounts/main.tf", - "Description": "A basic example of deploying Trusted Signing Account." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.CodeSigning/codeSigningAccounts", + "Path": "samples/codesigningaccounts/main.tf", + "Description": "A basic example of deploying Trusted Signing Account." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.CodeSigning/codeSigningAccounts", + "Path": "samples/codesigningaccounts/main.bicep", + "Description": "A basic example of deploying Trusted Signing Account." + } + ] +} diff --git a/settings/remarks/microsoft.codesigning/samples/codesigningaccounts/main.bicep b/settings/remarks/microsoft.codesigning/samples/codesigningaccounts/main.bicep new file mode 100644 index 00000000..6fc40d4d --- /dev/null +++ b/settings/remarks/microsoft.codesigning/samples/codesigningaccounts/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource codeSigningAccount 'Microsoft.CodeSigning/codeSigningAccounts@2024-09-30-preview' = { + name: resourceName + location: location + properties: { + sku: { + name: 'Basic' + } + } +} diff --git a/settings/remarks/microsoft.cognitiveservices/remarks.json b/settings/remarks/microsoft.cognitiveservices/remarks.json index 9f79d9f6..ea078a05 100644 --- a/settings/remarks/microsoft.cognitiveservices/remarks.json +++ b/settings/remarks/microsoft.cognitiveservices/remarks.json @@ -1,35 +1,62 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.CognitiveServices/accounts", - "Path": "samples/accounts/main.tf", - "Description": "A basic example of deploying Cognitive Services Account." - }, - { - "ResourceType": "Microsoft.CognitiveServices/accounts/connections", - "Path": "samples/accounts/connections/main.tf", - "Description": "A basic example of deploying Cognitive Services Account Connection." - }, - { - "ResourceType": "Microsoft.CognitiveServices/accounts/deployments", - "Path": "samples/accounts/deployments/main.tf", - "Description": "A basic example of deploying Cognitive Services Account Deployment." - }, - { - "ResourceType": "Microsoft.CognitiveServices/accounts/projects", - "Path": "samples/accounts/projects/main.tf", - "Description": "A basic example of deploying Cognitive Services Account Project." - }, - { - "ResourceType": "Microsoft.CognitiveServices/accounts/raiBlocklists", - "Path": "samples/accounts/raiblocklists/main.tf", - "Description": "A basic example of deploying Cognitive Services Accounts Responsible AI Blocklists." - }, - { - "ResourceType": "Microsoft.CognitiveServices/accounts/raiPolicies", - "Path": "samples/accounts/raipolicies/main.tf", - "Description": "A basic example of deploying Cognitive Services Accounts Responsible AI Policies." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.CognitiveServices/accounts", + "Path": "samples/accounts/main.tf", + "Description": "A basic example of deploying Cognitive Services Account." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/connections", + "Path": "samples/accounts/connections/main.tf", + "Description": "A basic example of deploying Cognitive Services Account Connection." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/deployments", + "Path": "samples/accounts/deployments/main.tf", + "Description": "A basic example of deploying Cognitive Services Account Deployment." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/projects", + "Path": "samples/accounts/projects/main.tf", + "Description": "A basic example of deploying Cognitive Services Account Project." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/raiBlocklists", + "Path": "samples/accounts/raiblocklists/main.tf", + "Description": "A basic example of deploying Cognitive Services Accounts Responsible AI Blocklists." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/raiPolicies", + "Path": "samples/accounts/raipolicies/main.tf", + "Description": "A basic example of deploying Cognitive Services Accounts Responsible AI Policies." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.CognitiveServices/accounts", + "Path": "samples/accounts/main.bicep", + "Description": "A basic example of deploying Cognitive Services Account." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/deployments", + "Path": "samples/accounts/deployments/main.bicep", + "Description": "A basic example of deploying Cognitive Services Account Deployment." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/projects", + "Path": "samples/accounts/projects/main.bicep", + "Description": "A basic example of deploying Cognitive Services Account Project." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/raiBlocklists", + "Path": "samples/accounts/raiblocklists/main.bicep", + "Description": "A basic example of deploying Cognitive Services Accounts Responsible AI Blocklists." + }, + { + "ResourceType": "Microsoft.CognitiveServices/accounts/raiPolicies", + "Path": "samples/accounts/raipolicies/main.bicep", + "Description": "A basic example of deploying Cognitive Services Accounts Responsible AI Policies." + } + ] +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/deployments/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/deployments/main.bicep new file mode 100644 index 00000000..a8ce9a6c --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/deployments/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0003' +param location string = 'eastus' + +resource account 'Microsoft.CognitiveServices/accounts@2022-10-01' = { + name: resourceName + location: location + identity: { + type: 'None' + userAssignedIdentities: null + } + kind: 'OpenAI' + properties: { + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + } +} + +resource deployment 'Microsoft.CognitiveServices/accounts/deployments@2023-05-01' = { + parent: account + name: 'testdep' + properties: { + model: { + format: 'OpenAI' + name: 'text-embedding-ada-002' + } + } +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/main.bicep new file mode 100644 index 00000000..f5ae4140 --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westus2' + +resource account 'Microsoft.CognitiveServices/accounts@2022-10-01' = { + name: resourceName + location: location + kind: 'SpeechServices' + properties: { + allowedFqdnList: [] + apiProperties: {} + customSubDomainName: 'acctest-cogacc-230630032807723157' + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + tier: 'Standard' + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/projects/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/projects/main.bicep new file mode 100644 index 00000000..9c0ebd8c --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/projects/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westus2' + +resource account 'Microsoft.CognitiveServices/accounts@2025-06-01' = { + name: resourceName + location: location + kind: 'AIServices' + properties: { + allowProjectManagement: true + customSubDomainName: 'cog-acctest0001' + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + } +} + +resource project 'Microsoft.CognitiveServices/accounts/projects@2025-06-01' = { + parent: account + name: resourceName + location: location + properties: { + description: 'test project' + displayName: 'project-acctest0001' + } +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/raiblocklists/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/raiblocklists/main.bicep new file mode 100644 index 00000000..de03fb57 --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/raiblocklists/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource account 'Microsoft.CognitiveServices/accounts@2024-10-01' = { + name: '${resourceName}-ca' + location: location + kind: 'OpenAI' + properties: { + allowedFqdnList: [] + apiProperties: {} + customSubDomainName: '' + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + } +} + +resource raiBlocklist 'Microsoft.CognitiveServices/accounts/raiBlocklists@2024-10-01' = { + parent: account + name: '${resourceName}-crb' + properties: { + description: 'Acceptance test data new azurerm resource' + } +} diff --git a/settings/remarks/microsoft.cognitiveservices/samples/accounts/raipolicies/main.bicep b/settings/remarks/microsoft.cognitiveservices/samples/accounts/raipolicies/main.bicep new file mode 100644 index 00000000..8aba460d --- /dev/null +++ b/settings/remarks/microsoft.cognitiveservices/samples/accounts/raipolicies/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0003' +param location string = 'eastus' + +resource account 'Microsoft.CognitiveServices/accounts@2022-10-01' = { + name: resourceName + location: location + kind: 'OpenAI' + properties: { + disableLocalAuth: false + dynamicThrottlingEnabled: false + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: false + } + sku: { + name: 'S0' + } +} + +resource raiPolicy 'Microsoft.CognitiveServices/accounts/raiPolicies@2024-10-01' = { + parent: account + name: 'NoModerationPolicy' + properties: { + basePolicyName: 'Microsoft.Default' + contentFilters: [ + { + blocking: true + enabled: true + name: 'Hate' + severityThreshold: 'High' + source: 'Prompt' + } + ] + } +} diff --git a/settings/remarks/microsoft.communication/remarks.json b/settings/remarks/microsoft.communication/remarks.json index f56f13c2..67b3289e 100644 --- a/settings/remarks/microsoft.communication/remarks.json +++ b/settings/remarks/microsoft.communication/remarks.json @@ -1,25 +1,47 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Communication/communicationServices", - "Path": "samples/communicationservices/main.tf", - "Description": "A basic example of deploying Communication Service." - }, - { - "ResourceType": "Microsoft.Communication/emailServices", - "Path": "samples/emailservices/main.tf", - "Description": "A basic example of deploying Email Communication Service." - }, - { - "ResourceType": "Microsoft.Communication/emailServices/domains", - "Path": "samples/emailservices/domains/main.tf", - "Description": "A basic example of deploying Email Communication Service Domain." - }, - { - "ResourceType": "Microsoft.Communication/emailServices/domains/senderUsernames", - "Path": "samples/emailservices/domains/senderusernames/main.tf", - "Description": "A basic example of deploying Communication Email Services Domains Sender Usernames." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Communication/communicationServices", + "Path": "samples/communicationservices/main.tf", + "Description": "A basic example of deploying Communication Service." + }, + { + "ResourceType": "Microsoft.Communication/emailServices", + "Path": "samples/emailservices/main.tf", + "Description": "A basic example of deploying Email Communication Service." + }, + { + "ResourceType": "Microsoft.Communication/emailServices/domains", + "Path": "samples/emailservices/domains/main.tf", + "Description": "A basic example of deploying Email Communication Service Domain." + }, + { + "ResourceType": "Microsoft.Communication/emailServices/domains/senderUsernames", + "Path": "samples/emailservices/domains/senderusernames/main.tf", + "Description": "A basic example of deploying Communication Email Services Domains Sender Usernames." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Communication/communicationServices", + "Path": "samples/communicationservices/main.bicep", + "Description": "A basic example of deploying Communication Service." + }, + { + "ResourceType": "Microsoft.Communication/emailServices", + "Path": "samples/emailservices/main.bicep", + "Description": "A basic example of deploying Email Communication Service." + }, + { + "ResourceType": "Microsoft.Communication/emailServices/domains", + "Path": "samples/emailservices/domains/main.bicep", + "Description": "A basic example of deploying Email Communication Service Domain." + }, + { + "ResourceType": "Microsoft.Communication/emailServices/domains/senderUsernames", + "Path": "samples/emailservices/domains/senderusernames/main.bicep", + "Description": "A basic example of deploying Communication Email Services Domains Sender Usernames." + } + ] +} diff --git a/settings/remarks/microsoft.communication/samples/communicationservices/main.bicep b/settings/remarks/microsoft.communication/samples/communicationservices/main.bicep new file mode 100644 index 00000000..df28431d --- /dev/null +++ b/settings/remarks/microsoft.communication/samples/communicationservices/main.bicep @@ -0,0 +1,9 @@ +param resourceName string = 'acctest0001' + +resource communicationService 'Microsoft.Communication/communicationServices@2023-03-31' = { + name: resourceName + location: 'global' + properties: { + dataLocation: 'United States' + } +} diff --git a/settings/remarks/microsoft.communication/samples/emailservices/domains/main.bicep b/settings/remarks/microsoft.communication/samples/emailservices/domains/main.bicep new file mode 100644 index 00000000..f41783c0 --- /dev/null +++ b/settings/remarks/microsoft.communication/samples/emailservices/domains/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' + +resource emailService 'Microsoft.Communication/emailServices@2023-04-01-preview' = { + name: resourceName + location: 'global' + properties: { + dataLocation: 'United States' + } +} + +resource domain 'Microsoft.Communication/emailServices/domains@2023-04-01-preview' = { + parent: emailService + name: 'example.com' + location: 'global' + properties: { + domainManagement: 'CustomerManaged' + userEngagementTracking: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.communication/samples/emailservices/domains/senderusernames/main.bicep b/settings/remarks/microsoft.communication/samples/emailservices/domains/senderusernames/main.bicep new file mode 100644 index 00000000..f31ba812 --- /dev/null +++ b/settings/remarks/microsoft.communication/samples/emailservices/domains/senderusernames/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' + +resource emailService 'Microsoft.Communication/emailServices@2023-04-01-preview' = { + name: resourceName + location: 'global' + properties: { + dataLocation: 'United States' + } +} + +resource domain 'Microsoft.Communication/emailServices/domains@2023-04-01-preview' = { + parent: emailService + name: 'example.com' + location: 'global' + properties: { + domainManagement: 'CustomerManaged' + userEngagementTracking: 'Disabled' + } +} + +resource senderUsername 'Microsoft.Communication/emailServices/domains/senderUsernames@2023-04-01-preview' = { + parent: domain + name: 'TestSenderUserName' + properties: { + displayName: 'TestDisplayName' + username: 'TestSenderUserName' + } +} diff --git a/settings/remarks/microsoft.communication/samples/emailservices/main.bicep b/settings/remarks/microsoft.communication/samples/emailservices/main.bicep new file mode 100644 index 00000000..f1ddb214 --- /dev/null +++ b/settings/remarks/microsoft.communication/samples/emailservices/main.bicep @@ -0,0 +1,9 @@ +param resourceName string = 'acctest0001' + +resource emailService 'Microsoft.Communication/emailServices@2023-03-31' = { + name: resourceName + location: 'global' + properties: { + dataLocation: 'United States' + } +} diff --git a/settings/remarks/microsoft.compute/remarks.json b/settings/remarks/microsoft.compute/remarks.json index 0e2c137c..bf164a80 100644 --- a/settings/remarks/microsoft.compute/remarks.json +++ b/settings/remarks/microsoft.compute/remarks.json @@ -1,130 +1,252 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Compute/availabilitySets", - "Path": "samples/availabilitysets/main.tf", - "Description": "A basic example of deploying Availability Set for Virtual Machines." - }, - { - "ResourceType": "Microsoft.Compute/capacityReservationGroups", - "Path": "samples/capacityreservationgroups/main.tf", - "Description": "A basic example of deploying Capacity Reservation Group." - }, - { - "ResourceType": "Microsoft.Compute/capacityReservationGroups/capacityReservations", - "Path": "samples/capacityreservationgroups/capacityreservations/main.tf", - "Description": "A basic example of deploying Capacity Reservation within a Capacity Reservation Group." - }, - { - "ResourceType": "Microsoft.Compute/diskAccesses", - "Path": "samples/diskaccesses/main.tf", - "Description": "A basic example of deploying Disk Access." - }, - { - "ResourceType": "Microsoft.Compute/diskEncryptionSets", - "Path": "samples/diskencryptionsets/main.tf", - "Description": "A basic example of deploying Disk Encryption Set." - }, - { - "ResourceType": "Microsoft.Compute/disks", - "Path": "samples/disks/main.tf", - "Description": "A basic example of deploying Managed Disk." - }, - { - "ResourceType": "Microsoft.Compute/galleries", - "Path": "samples/galleries/main.tf", - "Description": "A basic example of deploying Shared Image Gallery." - }, - { - "ResourceType": "Microsoft.Compute/galleries/applications", - "Path": "samples/galleries/applications/main.tf", - "Description": "A basic example of deploying Gallery Application." - }, - { - "ResourceType": "Microsoft.Compute/galleries/applications/versions", - "Path": "samples/galleries/applications/versions/main.tf", - "Description": "A basic example of deploying Gallery Application Version." - }, - { - "ResourceType": "Microsoft.Compute/galleries/images", - "Path": "samples/galleries/images/main.tf", - "Description": "A basic example of deploying Shared Image within a Shared Image Gallery." - }, - { - "ResourceType": "Microsoft.Compute/hostGroups", - "Path": "samples/hostgroups/main.tf", - "Description": "A basic example of deploying Dedicated Host Group." - }, - { - "ResourceType": "Microsoft.Compute/hostGroups/hosts", - "Path": "samples/hostgroups/hosts/main.tf", - "Description": "A basic example of deploying Dedicated Host within a Dedicated Host Group." - }, - { - "ResourceType": "Microsoft.Compute/proximityPlacementGroups", - "Path": "samples/proximityplacementgroups/main.tf", - "Description": "A basic example of deploying proximity placement group for virtual machines, virtual machine scale sets and availability sets." - }, - { - "ResourceType": "Microsoft.Compute/restorePointCollections", - "Path": "samples/restorepointcollections/main.tf", - "Description": "A basic example of deploying Virtual Machine Restore Point Collection." - }, - { - "ResourceType": "Microsoft.Compute/restorePointCollections/restorePoints", - "Path": "samples/restorepointcollections/restorepoints/main.tf", - "Description": "A basic example of deploying Virtual Machine Restore Point." - }, - { - "ResourceType": "Microsoft.Compute/snapshots", - "Path": "samples/snapshots/main.tf", - "Description": "A basic example of deploying Disk Snapshot." - }, - { - "ResourceType": "Microsoft.Compute/sshPublicKeys", - "Path": "samples/sshpublickeys/main.tf", - "Description": "A basic example of deploying SSH Public Key." - }, - { - "ResourceType": "Microsoft.Compute/virtualMachineScaleSets", - "Path": "samples/virtualmachinescalesets/main.tf", - "Description": "A basic example of deploying Virtual Machine scale set." - }, - { - "ResourceType": "Microsoft.Compute/virtualMachineScaleSets/extensions", - "Path": "samples/virtualmachinescalesets/extensions/main.tf", - "Description": "A basic example of deploying Extension for a Virtual Machine Scale Set." - }, - { - "ResourceType": "Microsoft.Compute/virtualMachines", - "Path": "samples/virtualmachines/attachdatadisk/main.tf", - "Description": "A attachdatadisk example of deploying Virtual Machine." - }, - { - "ResourceType": "Microsoft.Compute/virtualMachines", - "Path": "samples/virtualmachines/attachosdisk/main.tf", - "Description": "A attachosdisk example of deploying Virtual Machine." - }, - { - "ResourceType": "Microsoft.Compute/virtualMachines", - "Path": "samples/virtualmachines/basic/main.tf", - "Description": "A basic example of deploying Virtual Machine." - }, - { - "ResourceType": "Microsoft.Compute/virtualMachines", - "Path": "samples/virtualmachines/tagosdisk/main.tf", - "Description": "A tagosdisk example of deploying Virtual Machine." - }, - { - "ResourceType": "Microsoft.Compute/virtualMachines/extensions", - "Path": "samples/virtualmachines/extensions/main.tf", - "Description": "A basic example of deploying Virtual Machine Extension to provide post deployment." - }, - { - "ResourceType": "Microsoft.Compute/virtualMachines/runCommands", - "Path": "samples/virtualmachines/runcommands/main.tf", - "Description": "A basic example of deploying Virtual Machine Run Command." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Compute/availabilitySets", + "Path": "samples/availabilitysets/main.tf", + "Description": "A basic example of deploying Availability Set for Virtual Machines." + }, + { + "ResourceType": "Microsoft.Compute/capacityReservationGroups", + "Path": "samples/capacityreservationgroups/main.tf", + "Description": "A basic example of deploying Capacity Reservation Group." + }, + { + "ResourceType": "Microsoft.Compute/capacityReservationGroups/capacityReservations", + "Path": "samples/capacityreservationgroups/capacityreservations/main.tf", + "Description": "A basic example of deploying Capacity Reservation within a Capacity Reservation Group." + }, + { + "ResourceType": "Microsoft.Compute/diskAccesses", + "Path": "samples/diskaccesses/main.tf", + "Description": "A basic example of deploying Disk Access." + }, + { + "ResourceType": "Microsoft.Compute/diskEncryptionSets", + "Path": "samples/diskencryptionsets/main.tf", + "Description": "A basic example of deploying Disk Encryption Set." + }, + { + "ResourceType": "Microsoft.Compute/disks", + "Path": "samples/disks/main.tf", + "Description": "A basic example of deploying Managed Disk." + }, + { + "ResourceType": "Microsoft.Compute/galleries", + "Path": "samples/galleries/main.tf", + "Description": "A basic example of deploying Shared Image Gallery." + }, + { + "ResourceType": "Microsoft.Compute/galleries/applications", + "Path": "samples/galleries/applications/main.tf", + "Description": "A basic example of deploying Gallery Application." + }, + { + "ResourceType": "Microsoft.Compute/galleries/applications/versions", + "Path": "samples/galleries/applications/versions/main.tf", + "Description": "A basic example of deploying Gallery Application Version." + }, + { + "ResourceType": "Microsoft.Compute/galleries/images", + "Path": "samples/galleries/images/main.tf", + "Description": "A basic example of deploying Shared Image within a Shared Image Gallery." + }, + { + "ResourceType": "Microsoft.Compute/hostGroups", + "Path": "samples/hostgroups/main.tf", + "Description": "A basic example of deploying Dedicated Host Group." + }, + { + "ResourceType": "Microsoft.Compute/hostGroups/hosts", + "Path": "samples/hostgroups/hosts/main.tf", + "Description": "A basic example of deploying Dedicated Host within a Dedicated Host Group." + }, + { + "ResourceType": "Microsoft.Compute/proximityPlacementGroups", + "Path": "samples/proximityplacementgroups/main.tf", + "Description": "A basic example of deploying proximity placement group for virtual machines, virtual machine scale sets and availability sets." + }, + { + "ResourceType": "Microsoft.Compute/restorePointCollections", + "Path": "samples/restorepointcollections/main.tf", + "Description": "A basic example of deploying Virtual Machine Restore Point Collection." + }, + { + "ResourceType": "Microsoft.Compute/restorePointCollections/restorePoints", + "Path": "samples/restorepointcollections/restorepoints/main.tf", + "Description": "A basic example of deploying Virtual Machine Restore Point." + }, + { + "ResourceType": "Microsoft.Compute/snapshots", + "Path": "samples/snapshots/main.tf", + "Description": "A basic example of deploying Disk Snapshot." + }, + { + "ResourceType": "Microsoft.Compute/sshPublicKeys", + "Path": "samples/sshpublickeys/main.tf", + "Description": "A basic example of deploying SSH Public Key." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachineScaleSets", + "Path": "samples/virtualmachinescalesets/main.tf", + "Description": "A basic example of deploying Virtual Machine scale set." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachineScaleSets/extensions", + "Path": "samples/virtualmachinescalesets/extensions/main.tf", + "Description": "A basic example of deploying Extension for a Virtual Machine Scale Set." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines", + "Path": "samples/virtualmachines/attachdatadisk/main.tf", + "Description": "A attachdatadisk example of deploying Virtual Machine." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines", + "Path": "samples/virtualmachines/attachosdisk/main.tf", + "Description": "A attachosdisk example of deploying Virtual Machine." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines", + "Path": "samples/virtualmachines/basic/main.tf", + "Description": "A basic example of deploying Virtual Machine." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines", + "Path": "samples/virtualmachines/tagosdisk/main.tf", + "Description": "A tagosdisk example of deploying Virtual Machine." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines/extensions", + "Path": "samples/virtualmachines/extensions/main.tf", + "Description": "A basic example of deploying Virtual Machine Extension to provide post deployment." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines/runCommands", + "Path": "samples/virtualmachines/runcommands/main.tf", + "Description": "A basic example of deploying Virtual Machine Run Command." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Compute/availabilitySets", + "Path": "samples/availabilitysets/main.bicep", + "Description": "A basic example of deploying Availability Set for Virtual Machines." + }, + { + "ResourceType": "Microsoft.Compute/capacityReservationGroups", + "Path": "samples/capacityreservationgroups/main.bicep", + "Description": "A basic example of deploying Capacity Reservation Group." + }, + { + "ResourceType": "Microsoft.Compute/capacityReservationGroups/capacityReservations", + "Path": "samples/capacityreservationgroups/capacityreservations/main.bicep", + "Description": "A basic example of deploying Capacity Reservation within a Capacity Reservation Group." + }, + { + "ResourceType": "Microsoft.Compute/diskAccesses", + "Path": "samples/diskaccesses/main.bicep", + "Description": "A basic example of deploying Disk Access." + }, + { + "ResourceType": "Microsoft.Compute/diskEncryptionSets", + "Path": "samples/diskencryptionsets/main.bicep", + "Description": "A basic example of deploying Disk Encryption Set." + }, + { + "ResourceType": "Microsoft.Compute/disks", + "Path": "samples/disks/main.bicep", + "Description": "A basic example of deploying Managed Disk." + }, + { + "ResourceType": "Microsoft.Compute/galleries", + "Path": "samples/galleries/main.bicep", + "Description": "A basic example of deploying Shared Image Gallery." + }, + { + "ResourceType": "Microsoft.Compute/galleries/applications", + "Path": "samples/galleries/applications/main.bicep", + "Description": "A basic example of deploying Gallery Application." + }, + { + "ResourceType": "Microsoft.Compute/galleries/applications/versions", + "Path": "samples/galleries/applications/versions/main.bicep", + "Description": "A basic example of deploying Gallery Application Version." + }, + { + "ResourceType": "Microsoft.Compute/galleries/images", + "Path": "samples/galleries/images/main.bicep", + "Description": "A basic example of deploying Shared Image within a Shared Image Gallery." + }, + { + "ResourceType": "Microsoft.Compute/hostGroups", + "Path": "samples/hostgroups/main.bicep", + "Description": "A basic example of deploying Dedicated Host Group." + }, + { + "ResourceType": "Microsoft.Compute/hostGroups/hosts", + "Path": "samples/hostgroups/hosts/main.bicep", + "Description": "A basic example of deploying Dedicated Host within a Dedicated Host Group." + }, + { + "ResourceType": "Microsoft.Compute/proximityPlacementGroups", + "Path": "samples/proximityplacementgroups/main.bicep", + "Description": "A basic example of deploying proximity placement group for virtual machines, virtual machine scale sets and availability sets." + }, + { + "ResourceType": "Microsoft.Compute/restorePointCollections", + "Path": "samples/restorepointcollections/main.bicep", + "Description": "A basic example of deploying Virtual Machine Restore Point Collection." + }, + { + "ResourceType": "Microsoft.Compute/restorePointCollections/restorePoints", + "Path": "samples/restorepointcollections/restorepoints/main.bicep", + "Description": "A basic example of deploying Virtual Machine Restore Point." + }, + { + "ResourceType": "Microsoft.Compute/snapshots", + "Path": "samples/snapshots/main.bicep", + "Description": "A basic example of deploying Disk Snapshot." + }, + { + "ResourceType": "Microsoft.Compute/sshPublicKeys", + "Path": "samples/sshpublickeys/main.bicep", + "Description": "A basic example of deploying SSH Public Key." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachineScaleSets", + "Path": "samples/virtualmachinescalesets/main.bicep", + "Description": "A basic example of deploying Virtual Machine scale set." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachineScaleSets/extensions", + "Path": "samples/virtualmachinescalesets/extensions/main.bicep", + "Description": "A basic example of deploying Extension for a Virtual Machine Scale Set." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines", + "Path": "samples/virtualmachines/attachdatadisk/main.bicep", + "Description": "A attachdatadisk example of deploying Virtual Machine." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines", + "Path": "samples/virtualmachines/attachosdisk/main.bicep", + "Description": "A attachosdisk example of deploying Virtual Machine." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines", + "Path": "samples/virtualmachines/basic/main.bicep", + "Description": "A basic example of deploying Virtual Machine." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines/extensions", + "Path": "samples/virtualmachines/extensions/main.bicep", + "Description": "A basic example of deploying Virtual Machine Extension to provide post deployment." + }, + { + "ResourceType": "Microsoft.Compute/virtualMachines/runCommands", + "Path": "samples/virtualmachines/runcommands/main.bicep", + "Description": "A basic example of deploying Virtual Machine Run Command." + } + ] +} diff --git a/settings/remarks/microsoft.compute/samples/availabilitysets/main.bicep b/settings/remarks/microsoft.compute/samples/availabilitysets/main.bicep new file mode 100644 index 00000000..52496255 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/availabilitysets/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource availabilitySet 'Microsoft.Compute/availabilitySets@2021-11-01' = { + name: resourceName + location: location + properties: { + platformFaultDomainCount: 3 + platformUpdateDomainCount: 5 + } + sku: { + name: 'Aligned' + } +} diff --git a/settings/remarks/microsoft.compute/samples/capacityreservationgroups/capacityreservations/main.bicep b/settings/remarks/microsoft.compute/samples/capacityreservationgroups/capacityreservations/main.bicep new file mode 100644 index 00000000..db2d3eeb --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/capacityreservationgroups/capacityreservations/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource capacityReservationGroup 'Microsoft.Compute/capacityReservationGroups@2022-03-01' = { + name: '${resourceName}-ccrg' + location: location +} + +resource capacityReservation 'Microsoft.Compute/capacityReservationGroups/capacityReservations@2022-03-01' = { + parent: capacityReservationGroup + name: '${resourceName}-ccr' + location: location + sku: { + capacity: 2 + name: 'Standard_F2' + } +} diff --git a/settings/remarks/microsoft.compute/samples/capacityreservationgroups/main.bicep b/settings/remarks/microsoft.compute/samples/capacityreservationgroups/main.bicep new file mode 100644 index 00000000..1a49be09 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/capacityreservationgroups/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource capacityReservationGroup 'Microsoft.Compute/capacityReservationGroups@2022-03-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.compute/samples/diskaccesses/main.bicep b/settings/remarks/microsoft.compute/samples/diskaccesses/main.bicep new file mode 100644 index 00000000..d194267d --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/diskaccesses/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource diskAccess 'Microsoft.Compute/diskAccesses@2022-03-02' = { + name: resourceName + location: location + tags: { + 'cost-center': 'ops' + environment: 'acctest' + } +} diff --git a/settings/remarks/microsoft.compute/samples/diskencryptionsets/main.bicep b/settings/remarks/microsoft.compute/samples/diskencryptionsets/main.bicep new file mode 100644 index 00000000..bcc6162e --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/diskencryptionsets/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource diskEncryptionSet 'Microsoft.Compute/diskEncryptionSets@2022-03-02' = { + name: resourceName + location: location + properties: { + activeKey: { + keyUrl: key.properties.keyUriWithVersion + sourceVault: { + id: vault.id + } + } + encryptionType: 'EncryptionAtRestWithCustomerKey' + rotationToLatestKeyVersionEnabled: false + } +} + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + enableSoftDelete: true + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource key 'Microsoft.KeyVault/vaults/keys@2023-02-01' = { + parent: vault + name: resourceName + properties: { + keyOps: [ + 'encrypt' + 'decrypt' + 'sign' + 'verify' + 'wrapKey' + 'unwrapKey' + ] + keySize: 2048 + kty: 'RSA' + } +} diff --git a/settings/remarks/microsoft.compute/samples/disks/main.bicep b/settings/remarks/microsoft.compute/samples/disks/main.bicep new file mode 100644 index 00000000..9da32a6f --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/disks/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource disk 'Microsoft.Compute/disks@2022-03-02' = { + name: resourceName + location: location + properties: { + creationData: { + createOption: 'Empty' + } + diskSizeGB: 10 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + networkAccessPolicy: 'AllowAll' + osType: '' + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.compute/samples/galleries/applications/main.bicep b/settings/remarks/microsoft.compute/samples/galleries/applications/main.bicep new file mode 100644 index 00000000..1f8ab269 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/galleries/applications/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource gallery 'Microsoft.Compute/galleries@2022-03-03' = { + name: resourceName + location: location + properties: { + description: '' + } +} + +resource application 'Microsoft.Compute/galleries/applications@2022-03-03' = { + parent: gallery + name: resourceName + location: location + properties: { + supportedOSType: 'Linux' + } +} diff --git a/settings/remarks/microsoft.compute/samples/galleries/applications/versions/main.bicep b/settings/remarks/microsoft.compute/samples/galleries/applications/versions/main.bicep new file mode 100644 index 00000000..cbc629ca --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/galleries/applications/versions/main.bicep @@ -0,0 +1,109 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource gallery 'Microsoft.Compute/galleries@2022-03-03' = { + name: '${resourceName}sig' + location: location + properties: { + description: '' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: '${resourceName}acc' + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource application 'Microsoft.Compute/galleries/applications@2022-03-03' = { + parent: gallery + name: '${resourceName}-app' + location: location + properties: { + supportedOSType: 'Linux' + } +} + +// The blob service is a singleton named 'default' under the storage account +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2023-05-01' existing = { + parent: storageAccount + name: 'default' +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2023-05-01' = { + parent: blobService + name: 'mycontainer' + properties: { + publicAccess: 'Blob' + } +} + +resource version 'Microsoft.Compute/galleries/applications/versions@2022-03-03' = { + parent: application + name: '0.0.1' + location: location + properties: { + publishingProfile: { + enableHealthCheck: false + excludeFromLatest: false + manageActions: { + install: '[install command]' + remove: '[remove command]' + update: '' + } + source: { + defaultConfigurationLink: '' + mediaLink: 'https://${storageAccount.name}.blob.core.windows.net/mycontainer/myblob' + } + targetRegions: [ + { + name: 'westus' + regionalReplicaCount: 1 + storageAccountType: 'Standard_LRS' + } + ] + } + safetyProfile: { + allowDeletionOfReplicatedLocations: true + } + } + dependsOn: [ + container + ] +} diff --git a/settings/remarks/microsoft.compute/samples/galleries/images/main.bicep b/settings/remarks/microsoft.compute/samples/galleries/images/main.bicep new file mode 100644 index 00000000..58285d6e --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/galleries/images/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource gallery 'Microsoft.Compute/galleries@2022-03-03' = { + name: resourceName + location: location + properties: { + description: '' + } +} + +resource image 'Microsoft.Compute/galleries/images@2022-03-03' = { + parent: gallery + name: resourceName + location: location + properties: { + architecture: 'x64' + description: '' + disallowed: { + diskTypes: [] + } + features: null + hyperVGeneration: 'V1' + identifier: { + offer: 'AccTesOffer230630032848825313' + publisher: 'AccTesPublisher230630032848825313' + sku: 'AccTesSku230630032848825313' + } + osState: 'Generalized' + osType: 'Linux' + privacyStatementUri: '' + recommended: { + memory: {} + vCPUs: {} + } + releaseNoteUri: '' + } +} diff --git a/settings/remarks/microsoft.compute/samples/galleries/main.bicep b/settings/remarks/microsoft.compute/samples/galleries/main.bicep new file mode 100644 index 00000000..af5d9fe9 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/galleries/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource gallery 'Microsoft.Compute/galleries@2022-03-03' = { + name: resourceName + location: location + properties: { + description: '' + } +} diff --git a/settings/remarks/microsoft.compute/samples/hostgroups/hosts/main.bicep b/settings/remarks/microsoft.compute/samples/hostgroups/hosts/main.bicep new file mode 100644 index 00000000..7d01a4fb --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/hostgroups/hosts/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource hostGroup 'Microsoft.Compute/hostGroups@2021-11-01' = { + name: resourceName + location: location + properties: { + platformFaultDomainCount: 2 + } +} + +resource host 'Microsoft.Compute/hostGroups/hosts@2021-11-01' = { + parent: hostGroup + name: resourceName + location: location + properties: { + autoReplaceOnFailure: true + licenseType: 'None' + platformFaultDomain: 1 + } + sku: { + name: 'DSv3-Type1' + } +} diff --git a/settings/remarks/microsoft.compute/samples/hostgroups/main.bicep b/settings/remarks/microsoft.compute/samples/hostgroups/main.bicep new file mode 100644 index 00000000..b9bf1dcc --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/hostgroups/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource hostGroup 'Microsoft.Compute/hostGroups@2021-11-01' = { + name: resourceName + location: location + properties: { + platformFaultDomainCount: 2 + } +} diff --git a/settings/remarks/microsoft.compute/samples/proximityplacementgroups/main.bicep b/settings/remarks/microsoft.compute/samples/proximityplacementgroups/main.bicep new file mode 100644 index 00000000..44d43f35 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/proximityplacementgroups/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource proximityPlacementGroup 'Microsoft.Compute/proximityPlacementGroups@2022-03-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.compute/samples/restorepointcollections/main.bicep b/settings/remarks/microsoft.compute/samples/restorepointcollections/main.bicep new file mode 100644 index 00000000..1963c586 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/restorepointcollections/main.bicep @@ -0,0 +1,137 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: false + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource restorePointCollection 'Microsoft.Compute/restorePointCollections@2024-03-01' = { + name: resourceName + location: location + properties: { + source: { + id: virtualMachine.id + } + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: true + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + path: '/home/adminuser/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: '0001-com-ubuntu-server-jammy' + publisher: 'Canonical' + sku: '22_04-lts' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.0.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/restorepointcollections/restorepoints/main.bicep b/settings/remarks/microsoft.compute/samples/restorepointcollections/restorepoints/main.bicep new file mode 100644 index 00000000..79442794 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/restorepointcollections/restorepoints/main.bicep @@ -0,0 +1,143 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: '${resourceName}-nic' + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: false + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource restorePointCollection 'Microsoft.Compute/restorePointCollections@2024-03-01' = { + name: '${resourceName}-rpc' + location: location + properties: { + source: { + id: virtualMachine.id + } + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-03-01' = { + name: '${resourceName}-vm' + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001-vm' + linuxConfiguration: { + disablePasswordAuthentication: true + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + path: '/home/adminuser/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: '0001-com-ubuntu-server-jammy' + publisher: 'Canonical' + sku: '22_04-lts' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource restorePoint 'Microsoft.Compute/restorePointCollections/restorePoints@2024-03-01' = { + parent: restorePointCollection + name: '${resourceName}-rp' + properties: {} +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.0.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/snapshots/main.bicep b/settings/remarks/microsoft.compute/samples/snapshots/main.bicep new file mode 100644 index 00000000..a79e0b2c --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/snapshots/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource disk 'Microsoft.Compute/disks@2023-04-02' = { + name: '${resourceName}disk' + location: location + properties: { + creationData: { + createOption: 'Empty' + performancePlus: false + } + diskSizeGB: 10 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + networkAccessPolicy: 'AllowAll' + optimizedForFrequentAttach: false + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard_LRS' + } +} + +resource snapshot 'Microsoft.Compute/snapshots@2022-03-02' = { + name: '${resourceName}snapshot' + location: location + properties: { + creationData: { + createOption: 'Copy' + sourceUri: disk.id + } + diskSizeGB: 20 + incremental: false + networkAccessPolicy: 'AllowAll' + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.compute/samples/sshpublickeys/main.bicep b/settings/remarks/microsoft.compute/samples/sshpublickeys/main.bicep new file mode 100644 index 00000000..b4259318 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/sshpublickeys/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource sshPublicKey 'Microsoft.Compute/sshPublicKeys@2021-11-01' = { + name: resourceName + location: location + properties: { + publicKey: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + } + tags: { + 'test-tag': 'test-value-230630032848837073' + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/attachdatadisk/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/attachdatadisk/main.bicep new file mode 100644 index 00000000..f176ad72 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/attachdatadisk/main.bicep @@ -0,0 +1,145 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the virtual machine') +param adminUsername string +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +var attachedDataDiskName = 'myattacheddatadisk1' +var osDiskName = 'myosdisk1' +var dataDiskName = 'mydatadisk1' + +resource attachedDisk 'Microsoft.Compute/disks@2022-03-02' = { + name: attachedDataDiskName + location: location + properties: { + creationData: { + createOption: 'Empty' + } + diskSizeGB: 1 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + networkAccessPolicy: 'AllowAll' + osType: 'Linux' + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard_LRS' + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: adminPassword + adminUsername: adminUsername + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: osDiskName + writeAcceleratorEnabled: false + } + dataDisks: [ + { + caching: 'ReadWrite' + createOption: 'Empty' + name: dataDiskName + diskSizeGB: 1 + lun: 1 + managedDisk: { + storageAccountType: 'Standard_LRS' + } + } + { + caching: 'ReadWrite' + createOption: 'Attach' + name: attachedDisk.name + lun: 2 + managedDisk: { + id: attachedDisk.id + } + } + ] + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/attachosdisk/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/attachosdisk/main.bicep new file mode 100644 index 00000000..f066b25c --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/attachosdisk/main.bicep @@ -0,0 +1,216 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the virtual machine') +param adminUsername string +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string +param attachedResourceName string = 'acctest0002' + +var osDiskName = 'myosdisk1' +var attachedOsDiskName = 'myosdisk2' + +resource managedDisk 'Microsoft.Compute/disks@2023-10-02' existing = { + name: osDiskName +} + +resource attachedManagedDisk 'Microsoft.Compute/disks@2023-10-02' = { + name: attachedOsDiskName + location: location + properties: { + creationData: { + createOption: 'Copy' + sourceResourceId: snapshot.id + } + diskSizeGB: 30 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + hyperVGeneration: 'V1' + networkAccessPolicy: 'AllowAll' + osType: 'Linux' + publicNetworkAccess: 'Enabled' + supportedCapabilities: { + architecture: 'x64' + } + } + sku: { + name: 'Standard_LRS' + } + zones: [ + '1' + ] +} + +resource attachedNetworkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: attachedResourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration2' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource attachedVirtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: attachedResourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: attachedNetworkInterface.id + properties: { + primary: false + } + } + ] + } + storageProfile: { + osDisk: { + caching: 'ReadWrite' + createOption: 'Attach' + name: attachedOsDiskName + osType: 'Linux' + writeAcceleratorEnabled: false + managedDisk: { + id: attachedManagedDisk.id + } + } + } + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource snapshot 'Microsoft.Compute/snapshots@2023-10-02' = { + name: resourceName + location: location + properties: { + creationData: { + createOption: 'Copy' + sourceResourceId: managedDisk.id + } + diskSizeGB: 30 + encryption: { + type: 'EncryptionAtRestWithPlatformKey' + } + hyperVGeneration: 'V1' + incremental: true + networkAccessPolicy: 'AllowAll' + osType: 'Linux' + publicNetworkAccess: 'Enabled' + supportedCapabilities: { + architecture: 'x64' + } + } + sku: { + name: 'Standard_ZRS' + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: adminPassword + adminUsername: adminUsername + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: osDiskName + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/basic/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/basic/main.bicep new file mode 100644 index 00000000..93a31595 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/basic/main.bicep @@ -0,0 +1,100 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the virtual machine') +param adminUsername string +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: null + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: 'myosdisk1' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/extensions/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/extensions/main.bicep new file mode 100644 index 00000000..1092716f --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/extensions/main.bicep @@ -0,0 +1,118 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param vmAdminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: 'myosdisk1' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource extension 'Microsoft.Compute/virtualMachines/extensions@2023-03-01' = { + parent: virtualMachine + name: resourceName + location: location + properties: { + autoUpgradeMinorVersion: false + enableAutomaticUpgrade: false + publisher: 'Microsoft.Azure.Extensions' + settings: { + commandToExecute: 'hostname' + } + suppressFailures: false + type: 'CustomScript' + typeHandlerVersion: '2.0' + } + tags: { + environment: 'Production' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachines/runcommands/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachines/runcommands/main.bicep new file mode 100644 index 00000000..7a26f542 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachines/runcommands/main.bicep @@ -0,0 +1,151 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: '${resourceName}-nic' + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: false + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-uai' + location: location +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-03-01' = { + name: '${resourceName}-vm' + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_B2s' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001-vm' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: '0001-com-ubuntu-server-jammy' + publisher: 'Canonical' + sku: '22_04-lts' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Premium_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource runCommand 'Microsoft.Compute/virtualMachines/runCommands@2023-03-01' = { + parent: virtualMachine + name: '${resourceName}-runcommand' + location: location + properties: { + asyncExecution: false + errorBlobUri: '' + outputBlobUri: '' + parameters: [] + protectedParameters: [] + runAsPassword: '' + runAsUser: '' + source: { + script: 'echo \'hello world\'' + } + timeoutInSeconds: 1200 + treatFailureAsDeploymentFailure: true + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/extensions/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/extensions/main.bicep new file mode 100644 index 00000000..7fd25e57 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/extensions/main.bicep @@ -0,0 +1,152 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualMachineScaleSet 'Microsoft.Compute/virtualMachineScaleSets@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + doNotRunExtensionsOnOverprovisionedVMs: false + orchestrationMode: 'Uniform' + overprovision: true + scaleInPolicy: { + forceDeletion: false + rules: [ + 'Default' + ] + } + singlePlacementGroup: true + upgradePolicy: { + mode: 'Manual' + } + virtualMachineProfile: { + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionProfile: { + extensionsTimeBudget: 'PT1H30M' + } + networkProfile: { + networkInterfaceConfigurations: [ + { + name: 'example' + properties: { + dnsSettings: { + dnsServers: [] + } + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + applicationGatewayBackendAddressPools: [] + applicationSecurityGroups: [] + loadBalancerBackendAddressPools: [] + loadBalancerInboundNatPools: [] + primary: true + privateIPAddressVersion: 'IPv4' + subnet: { + id: subnet.id + } + } + } + ] + primary: true + } + } + ] + } + osProfile: { + adminUsername: 'adminuser' + computerNamePrefix: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: true + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + path: '/home/adminuser/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } + } + sku: { + capacity: 1 + name: 'Standard_F2' + tier: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource extension 'Microsoft.Compute/virtualMachineScaleSets/extensions@2023-03-01' = { + parent: virtualMachineScaleSet + name: resourceName + properties: { + autoUpgradeMinorVersion: true + enableAutomaticUpgrade: false + provisionAfterExtensions: [] + publisher: 'Microsoft.Azure.Extensions' + settings: { + commandToExecute: 'echo $HOSTNAME' + } + suppressFailures: false + type: 'CustomScript' + typeHandlerVersion: '2.0' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/main.bicep b/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/main.bicep new file mode 100644 index 00000000..149cea35 --- /dev/null +++ b/settings/remarks/microsoft.compute/samples/virtualmachinescalesets/main.bicep @@ -0,0 +1,135 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualMachineScaleSet 'Microsoft.Compute/virtualMachineScaleSets@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + doNotRunExtensionsOnOverprovisionedVMs: false + orchestrationMode: 'Uniform' + overprovision: true + scaleInPolicy: { + forceDeletion: false + rules: [ + 'Default' + ] + } + singlePlacementGroup: true + upgradePolicy: { + mode: 'Manual' + } + virtualMachineProfile: { + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionProfile: { + extensionsTimeBudget: 'PT1H30M' + } + networkProfile: { + networkInterfaceConfigurations: [ + { + name: 'example' + properties: { + dnsSettings: { + dnsServers: [] + } + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + applicationGatewayBackendAddressPools: [] + applicationSecurityGroups: [] + loadBalancerBackendAddressPools: [] + loadBalancerInboundNatPools: [] + primary: true + privateIPAddressVersion: 'IPv4' + subnet: { + id: subnet.id + } + } + } + ] + primary: true + } + } + ] + } + osProfile: { + adminUsername: 'adminuser' + computerNamePrefix: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: true + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+wWK73dCr+jgQOAxNsHAnNNNMEMWOHYEccp6wJm2gotpr9katuF/ZAdou5AaW1C61slRkHRkpRRX9FA9CYBiitZgvCCz+3nWNN7l/Up54Zps/pHWGZLHNJZRYyAB6j5yVLMVHIHriY49d/GZTZVNB8GoJv9Gakwc/fuEZYYl4YDFiGMBP///TzlI4jhiJzjKnEvqPFki5p2ZRJqcbCiF4pJrxUQR/RXqVFQdbRLZgYfJ8xGB878RENq3yQ39d8dVOkq4edbkzwcUmwwwkYVPIoDGsYLaRHnG+To7FvMeyO7xDVQkMKzopTQV8AuKpyvpqu0a9pWOMaiCyDytO7GGN you@me.com' + path: '/home/adminuser/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } + } + sku: { + capacity: 1 + name: 'Standard_F2' + tier: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.confidentialledger/remarks.json b/settings/remarks/microsoft.confidentialledger/remarks.json index ac498dbe..1a0134a1 100644 --- a/settings/remarks/microsoft.confidentialledger/remarks.json +++ b/settings/remarks/microsoft.confidentialledger/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ConfidentialLedger/ledgers", - "Path": "samples/ledgers/main.tf", - "Description": "A basic example of deploying Confidential Ledger." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ConfidentialLedger/ledgers", + "Path": "samples/ledgers/main.tf", + "Description": "A basic example of deploying Confidential Ledger." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ConfidentialLedger/ledgers", + "Path": "samples/ledgers/main.bicep", + "Description": "A basic example of deploying Confidential Ledger." + } + ] +} diff --git a/settings/remarks/microsoft.confidentialledger/samples/ledgers/main.bicep b/settings/remarks/microsoft.confidentialledger/samples/ledgers/main.bicep new file mode 100644 index 00000000..248c723d --- /dev/null +++ b/settings/remarks/microsoft.confidentialledger/samples/ledgers/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The PEM-encoded certificate for the confidential ledger administrator') +param ledgerCertificate string + +resource ledger 'Microsoft.ConfidentialLedger/ledgers@2022-05-13' = { + name: resourceName + location: location + properties: { + aadBasedSecurityPrincipals: [ + { + ledgerRoleName: 'Administrator' + principalId: deployer().objectId + tenantId: deployer().tenantId + } + ] + certBasedSecurityPrincipals: [ + { + cert: null + ledgerRoleName: 'Administrator' + } + ] + ledgerType: 'Private' + } +} diff --git a/settings/remarks/microsoft.consumption/remarks.json b/settings/remarks/microsoft.consumption/remarks.json index 3a2ba343..851281db 100644 --- a/settings/remarks/microsoft.consumption/remarks.json +++ b/settings/remarks/microsoft.consumption/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Consumption/budgets", - "Path": "samples/budgets/main.tf", - "Description": "A basic example of deploying Consumption Budget." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Consumption/budgets", + "Path": "samples/budgets/main.tf", + "Description": "A basic example of deploying Consumption Budget." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Consumption/budgets", + "Path": "samples/budgets/main.bicep", + "Description": "A basic example of deploying Consumption Budget." + } + ] +} diff --git a/settings/remarks/microsoft.consumption/samples/budgets/main.bicep b/settings/remarks/microsoft.consumption/samples/budgets/main.bicep new file mode 100644 index 00000000..d8ab99ee --- /dev/null +++ b/settings/remarks/microsoft.consumption/samples/budgets/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' + +resource budget 'Microsoft.Consumption/budgets@2019-10-01' = { + name: resourceName + properties: { + amount: 1000 + category: 'Cost' + filter: { + tags: { + name: 'foo' + operator: 'In' + values: [ + 'bar' + ] + } + } + notifications: { + 'Actual_EqualTo_90.000000_Percent': { + contactEmails: [ + 'foo@example.com' + 'bar@example.com' + ] + contactGroups: [] + contactRoles: [] + enabled: true + operator: 'EqualTo' + threshold: 90 + thresholdType: 'Actual' + } + } + timeGrain: 'Monthly' + timePeriod: { + startDate: '2025-08-01T00:00:00Z' + } + } +} diff --git a/settings/remarks/microsoft.containerinstance/remarks.json b/settings/remarks/microsoft.containerinstance/remarks.json index dfe3fabb..78c723e6 100644 --- a/settings/remarks/microsoft.containerinstance/remarks.json +++ b/settings/remarks/microsoft.containerinstance/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ContainerInstance/containerGroups", - "Path": "samples/containergroups/main.tf", - "Description": "A basic example of deploying Azure Container Group instance." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ContainerInstance/containerGroups", + "Path": "samples/containergroups/main.tf", + "Description": "A basic example of deploying Azure Container Group instance." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ContainerInstance/containerGroups", + "Path": "samples/containergroups/main.bicep", + "Description": "A basic example of deploying Azure Container Group instance." + } + ] +} diff --git a/settings/remarks/microsoft.containerinstance/samples/containergroups/main.bicep b/settings/remarks/microsoft.containerinstance/samples/containergroups/main.bicep new file mode 100644 index 00000000..cd16892d --- /dev/null +++ b/settings/remarks/microsoft.containerinstance/samples/containergroups/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource containerGroup 'Microsoft.ContainerInstance/containerGroups@2023-05-01' = { + name: resourceName + location: location + properties: { + containers: [ + { + name: 'hw' + properties: { + command: [] + environmentVariables: [] + image: 'ubuntu:20.04' + ports: [ + { + port: 80 + protocol: 'TCP' + } + ] + resources: { + requests: { + cpu: any('0.5') + memoryInGB: any('0.5') + } + } + } + } + ] + initContainers: [] + ipAddress: { + autoGeneratedDomainNameLabelScope: 'Unsecure' + ports: [ + { + port: 80 + protocol: 'TCP' + } + ] + type: 'Public' + } + osType: 'Linux' + restartPolicy: 'Always' + volumes: [] + } + tags: { + environment: 'Testing' + } + zones: [] +} diff --git a/settings/remarks/microsoft.containerregistry/remarks.json b/settings/remarks/microsoft.containerregistry/remarks.json index 1f30451c..aaeae3a6 100644 --- a/settings/remarks/microsoft.containerregistry/remarks.json +++ b/settings/remarks/microsoft.containerregistry/remarks.json @@ -1,55 +1,107 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ContainerRegistry/registries", - "Path": "samples/registries/main.tf", - "Description": "A basic example of deploying Azure Container Registry." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/agentPools", - "Path": "samples/registries/agentpools/main.tf", - "Description": "A basic example of deploying Azure Container Registry Agent Pool." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/cacheRules", - "Path": "samples/registries/cacherules/main.tf", - "Description": "A basic example of deploying Azure Container Registry Cache Rule." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/connectedRegistries", - "Path": "samples/registries/connectedregistries/main.tf", - "Description": "A basic example of deploying Container Connected Registry." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/credentialSets", - "Path": "samples/registries/credentialsets/main.tf", - "Description": "A basic example of deploying Container Registry Credential Set." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/scopeMaps", - "Path": "samples/registries/scopemaps/main.tf", - "Description": "A basic example of deploying Azure Container Registry scope map." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/taskRuns", - "Path": "samples/registries/taskruns/main.tf", - "Description": "A basic example of deploying Container Registry Task Runs." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/tasks", - "Path": "samples/registries/tasks/main.tf", - "Description": "A basic example of deploying Container Registry Task." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/tokens", - "Path": "samples/registries/tokens/main.tf", - "Description": "A basic example of deploying Azure Container Registry token." - }, - { - "ResourceType": "Microsoft.ContainerRegistry/registries/webHooks", - "Path": "samples/registries/webhooks/main.tf", - "Description": "A basic example of deploying Azure Container Registry Webhook." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ContainerRegistry/registries", + "Path": "samples/registries/main.tf", + "Description": "A basic example of deploying Azure Container Registry." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/agentPools", + "Path": "samples/registries/agentpools/main.tf", + "Description": "A basic example of deploying Azure Container Registry Agent Pool." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/cacheRules", + "Path": "samples/registries/cacherules/main.tf", + "Description": "A basic example of deploying Azure Container Registry Cache Rule." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/connectedRegistries", + "Path": "samples/registries/connectedregistries/main.tf", + "Description": "A basic example of deploying Container Connected Registry." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/credentialSets", + "Path": "samples/registries/credentialsets/main.tf", + "Description": "A basic example of deploying Container Registry Credential Set." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/scopeMaps", + "Path": "samples/registries/scopemaps/main.tf", + "Description": "A basic example of deploying Azure Container Registry scope map." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/taskRuns", + "Path": "samples/registries/taskruns/main.tf", + "Description": "A basic example of deploying Container Registry Task Runs." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/tasks", + "Path": "samples/registries/tasks/main.tf", + "Description": "A basic example of deploying Container Registry Task." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/tokens", + "Path": "samples/registries/tokens/main.tf", + "Description": "A basic example of deploying Azure Container Registry token." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/webHooks", + "Path": "samples/registries/webhooks/main.tf", + "Description": "A basic example of deploying Azure Container Registry Webhook." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ContainerRegistry/registries", + "Path": "samples/registries/main.bicep", + "Description": "A basic example of deploying Azure Container Registry." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/agentPools", + "Path": "samples/registries/agentpools/main.bicep", + "Description": "A basic example of deploying Azure Container Registry Agent Pool." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/cacheRules", + "Path": "samples/registries/cacherules/main.bicep", + "Description": "A basic example of deploying Azure Container Registry Cache Rule." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/connectedRegistries", + "Path": "samples/registries/connectedregistries/main.bicep", + "Description": "A basic example of deploying Container Connected Registry." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/credentialSets", + "Path": "samples/registries/credentialsets/main.bicep", + "Description": "A basic example of deploying Container Registry Credential Set." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/scopeMaps", + "Path": "samples/registries/scopemaps/main.bicep", + "Description": "A basic example of deploying Azure Container Registry scope map." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/taskRuns", + "Path": "samples/registries/taskruns/main.bicep", + "Description": "A basic example of deploying Container Registry Task Runs." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/tasks", + "Path": "samples/registries/tasks/main.bicep", + "Description": "A basic example of deploying Container Registry Task." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/tokens", + "Path": "samples/registries/tokens/main.bicep", + "Description": "A basic example of deploying Azure Container Registry token." + }, + { + "ResourceType": "Microsoft.ContainerRegistry/registries/webHooks", + "Path": "samples/registries/webhooks/main.bicep", + "Description": "A basic example of deploying Azure Container Registry Webhook." + } + ] +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/agentpools/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/agentpools/main.bicep new file mode 100644 index 00000000..d5cfa193 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/agentpools/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Premium' + tier: 'Premium' + } +} + +resource agentPool 'Microsoft.ContainerRegistry/registries/agentPools@2019-06-01-preview' = { + parent: registry + name: resourceName + location: location + properties: { + count: 1 + os: 'Linux' + tier: 'S1' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/cacherules/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/cacherules/main.bicep new file mode 100644 index 00000000..a4ecf510 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/cacherules/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource registry 'Microsoft.ContainerRegistry/registries@2023-11-01-preview' = { + name: '${resourceName}registry' + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: {} + trustPolicy: {} + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Basic' + } +} + +resource cacheRule 'Microsoft.ContainerRegistry/registries/cacheRules@2023-07-01' = { + parent: registry + name: '${resourceName}-cache-rule' + properties: { + sourceRepository: 'mcr.microsoft.com/hello-world' + targetRepository: 'target' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/connectedregistries/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/connectedregistries/main.bicep new file mode 100644 index 00000000..e709e2a0 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/connectedregistries/main.bicep @@ -0,0 +1,77 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource registry 'Microsoft.ContainerRegistry/registries@2023-11-01-preview' = { + name: '${resourceName}registry' + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: true + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: {} + trustPolicy: {} + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Premium' + } +} + +resource connectedRegistry 'Microsoft.ContainerRegistry/registries/connectedRegistries@2023-11-01-preview' = { + parent: registry + name: '${resourceName}connectedregistry' + properties: { + clientTokenIds: null + logging: { + auditLogStatus: 'Disabled' + logLevel: 'None' + } + mode: 'ReadWrite' + parent: { + syncProperties: { + messageTtl: 'P1D' + schedule: '* * * * *' + syncWindow: '' + tokenId: token.id + } + } + } +} + +resource scopeMap 'Microsoft.ContainerRegistry/registries/scopeMaps@2023-11-01-preview' = { + parent: registry + name: '${resourceName}scopemap' + properties: { + actions: [ + 'repositories/hello-world/content/delete' + 'repositories/hello-world/content/read' + 'repositories/hello-world/content/write' + 'repositories/hello-world/metadata/read' + 'repositories/hello-world/metadata/write' + 'gateway/acctest0001connectedregistry/config/read' + 'gateway/acctest0001connectedregistry/config/write' + 'gateway/acctest0001connectedregistry/message/read' + 'gateway/acctest0001connectedregistry/message/write' + ] + description: '' + } +} + +resource token 'Microsoft.ContainerRegistry/registries/tokens@2023-11-01-preview' = { + parent: registry + name: '${resourceName}token' + properties: { + scopeMapId: scopeMap.id + status: 'enabled' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/credentialsets/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/credentialsets/main.bicep new file mode 100644 index 00000000..83e8da41 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/credentialsets/main.bicep @@ -0,0 +1,102 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The username for the container registry credential') +param credentialUsername string = 'testuser' +@secure() +@description('The password for the container registry credential') +param credentialPassword string + +resource registry 'Microsoft.ContainerRegistry/registries@2023-11-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: {} + trustPolicy: {} + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Basic' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: '${resourceName}vault' + location: location + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [] + keys: [] + secrets: [ + 'Get' + 'Set' + 'Delete' + 'Purge' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} + +resource credentialSet 'Microsoft.ContainerRegistry/registries/credentialSets@2023-07-01' = { + parent: registry + name: '${resourceName}-acr-credential-set' + properties: { + authCredentials: [ + { + name: 'Credential1' + passwordSecretIdentifier: 'https://acctest0001vault.vault.azure.net/secrets/password' + usernameSecretIdentifier: 'https://acctest0001vault.vault.azure.net/secrets/username' + } + ] + loginServer: 'docker.io' + } +} + +resource passwordSecret 'Microsoft.KeyVault/vaults/secrets@2023-02-01' = { + parent: vault + name: 'password' + properties: { + value: null + } +} + +resource usernameSecret 'Microsoft.KeyVault/vaults/secrets@2023-02-01' = { + parent: vault + name: 'username' + properties: { + value: 'testuser' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/main.bicep new file mode 100644 index 00000000..b9e3386c --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/scopemaps/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/scopemaps/main.bicep new file mode 100644 index 00000000..b40cc76a --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/scopemaps/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Premium' + tier: 'Premium' + } +} + +resource scopeMap 'Microsoft.ContainerRegistry/registries/scopeMaps@2021-08-01-preview' = { + parent: registry + name: resourceName + properties: { + actions: [ + 'repositories/testrepo/content/read' + ] + description: '' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/taskruns/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/taskruns/main.bicep new file mode 100644 index 00000000..0789863e --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/taskruns/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource taskRun 'Microsoft.ContainerRegistry/registries/taskRuns@2019-06-01-preview' = { + parent: registry + name: resourceName + location: location + properties: { + runRequest: { + dockerFilePath: 'Dockerfile' + imageNames: [ + 'helloworld:{{.Run.ID}}' + 'helloworld:latest' + ] + platform: { + os: 'Linux' + } + sourceLocation: 'https://github.com/Azure-Samples/aci-helloworld.git#master' + type: 'DockerBuildRequest' + } + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/tasks/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/tasks/main.bicep new file mode 100644 index 00000000..c31bbd8c --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/tasks/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} + +resource task 'Microsoft.ContainerRegistry/registries/tasks@2019-06-01-preview' = { + parent: registry + name: resourceName + location: location + properties: { + isSystemTask: true + status: 'Enabled' + step: null + timeout: 3600 + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/tokens/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/tokens/main.bicep new file mode 100644 index 00000000..b4380ac1 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/tokens/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: true + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Premium' + tier: 'Premium' + } +} + +resource token 'Microsoft.ContainerRegistry/registries/tokens@2021-08-01-preview' = { + parent: registry + name: resourceName + properties: { + scopeMapId: resourceId('Microsoft.ContainerRegistry/registries/scopeMaps', registry.name, '_repositories_pull') + status: 'enabled' + } +} diff --git a/settings/remarks/microsoft.containerregistry/samples/registries/webhooks/main.bicep b/settings/remarks/microsoft.containerregistry/samples/registries/webhooks/main.bicep new file mode 100644 index 00000000..23f95fe2 --- /dev/null +++ b/settings/remarks/microsoft.containerregistry/samples/registries/webhooks/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource registry 'Microsoft.ContainerRegistry/registries@2021-08-01-preview' = { + name: resourceName + location: location + properties: { + adminUserEnabled: false + anonymousPullEnabled: false + dataEndpointEnabled: false + encryption: { + status: 'disabled' + } + networkRuleBypassOptions: 'AzureServices' + policies: { + exportPolicy: { + status: 'enabled' + } + quarantinePolicy: { + status: 'disabled' + } + retentionPolicy: { + status: 'disabled' + } + trustPolicy: { + status: 'disabled' + } + } + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource webHook 'Microsoft.ContainerRegistry/registries/webHooks@2021-08-01-preview' = { + parent: registry + name: resourceName + location: location + properties: { + actions: [ + 'push' + ] + customHeaders: {} + scope: '' + serviceUri: 'https://mywebhookreceiver.example/mytag' + status: 'enabled' + } +} diff --git a/settings/remarks/microsoft.containerservice/remarks.json b/settings/remarks/microsoft.containerservice/remarks.json index d721cd24..aa1fa830 100644 --- a/settings/remarks/microsoft.containerservice/remarks.json +++ b/settings/remarks/microsoft.containerservice/remarks.json @@ -1,38 +1,65 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "For information about available add-ons, see [Add-ons, extensions, and other integrations with Azure Kubernetes Service](/azure/aks/integrations).", - "ResourceTypes": [ - "microsoft.containerservice/managedclusters" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ContainerService/fleets", - "Path": "samples/fleets/main.tf", - "Description": "A basic example of deploying Kubernetes Fleet Manager." - }, - { - "ResourceType": "Microsoft.ContainerService/fleets/members", - "Path": "samples/fleets/members/main.tf", - "Description": "A basic example of deploying Kubernetes Fleet Member." - }, - { - "ResourceType": "Microsoft.ContainerService/managedClusters", - "Path": "samples/managedclusters/main.tf", - "Description": "A basic example of deploying managed Kubernetes Cluster (also known as AKS / Azure Kubernetes Service)." - }, - { - "ResourceType": "Microsoft.ContainerService/managedClusters/agentPools", - "Path": "samples/managedclusters/agentpools/main.tf", - "Description": "A basic example of deploying Node Pool within a Kubernetes Cluster." - }, - { - "ResourceType": "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings", - "Path": "samples/managedclusters/trustedaccessrolebindings/main.tf", - "Description": "A basic example of deploying Kubernetes Cluster Trusted Access Role Binding." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "For information about available add-ons, see [Add-ons, extensions, and other integrations with Azure Kubernetes Service](/azure/aks/integrations).", + "ResourceTypes": [ + "microsoft.containerservice/managedclusters" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ContainerService/fleets", + "Path": "samples/fleets/main.tf", + "Description": "A basic example of deploying Kubernetes Fleet Manager." + }, + { + "ResourceType": "Microsoft.ContainerService/fleets/members", + "Path": "samples/fleets/members/main.tf", + "Description": "A basic example of deploying Kubernetes Fleet Member." + }, + { + "ResourceType": "Microsoft.ContainerService/managedClusters", + "Path": "samples/managedclusters/main.tf", + "Description": "A basic example of deploying managed Kubernetes Cluster (also known as AKS / Azure Kubernetes Service)." + }, + { + "ResourceType": "Microsoft.ContainerService/managedClusters/agentPools", + "Path": "samples/managedclusters/agentpools/main.tf", + "Description": "A basic example of deploying Node Pool within a Kubernetes Cluster." + }, + { + "ResourceType": "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings", + "Path": "samples/managedclusters/trustedaccessrolebindings/main.tf", + "Description": "A basic example of deploying Kubernetes Cluster Trusted Access Role Binding." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ContainerService/fleets", + "Path": "samples/fleets/main.bicep", + "Description": "A basic example of deploying Kubernetes Fleet Manager." + }, + { + "ResourceType": "Microsoft.ContainerService/fleets/members", + "Path": "samples/fleets/members/main.bicep", + "Description": "A basic example of deploying Kubernetes Fleet Member." + }, + { + "ResourceType": "Microsoft.ContainerService/managedClusters", + "Path": "samples/managedclusters/main.bicep", + "Description": "A basic example of deploying managed Kubernetes Cluster (also known as AKS / Azure Kubernetes Service)." + }, + { + "ResourceType": "Microsoft.ContainerService/managedClusters/agentPools", + "Path": "samples/managedclusters/agentpools/main.bicep", + "Description": "A basic example of deploying Node Pool within a Kubernetes Cluster." + }, + { + "ResourceType": "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings", + "Path": "samples/managedclusters/trustedaccessrolebindings/main.bicep", + "Description": "A basic example of deploying Kubernetes Cluster Trusted Access Role Binding." + } + ] +} diff --git a/settings/remarks/microsoft.containerservice/samples/fleets/main.bicep b/settings/remarks/microsoft.containerservice/samples/fleets/main.bicep new file mode 100644 index 00000000..67faef51 --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/fleets/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource fleet 'Microsoft.ContainerService/fleets@2024-04-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.containerservice/samples/fleets/members/main.bicep b/settings/remarks/microsoft.containerservice/samples/fleets/members/main.bicep new file mode 100644 index 00000000..627308ea --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/fleets/members/main.bicep @@ -0,0 +1,83 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource fleet 'Microsoft.ContainerService/fleets@2024-04-01' = { + name: resourceName + location: location + properties: {} +} + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2025-02-01' = { + name: resourceName + location: location + properties: { + addonProfiles: {} + agentPoolProfiles: [ + { + count: 1 + enableAutoScaling: false + enableEncryptionAtHost: false + enableFIPS: false + enableNodePublicIP: false + enableUltraSSD: false + kubeletDiskType: '' + mode: 'System' + name: 'default' + nodeLabels: {} + osDiskType: 'Managed' + osType: 'Linux' + scaleDownMode: 'Delete' + tags: {} + type: 'VirtualMachineScaleSets' + upgradeSettings: { + drainTimeoutInMinutes: 0 + maxSurge: '10%' + nodeSoakDurationInMinutes: 0 + } + vmSize: 'Standard_B2s' + } + ] + apiServerAccessProfile: { + disableRunCommand: false + enablePrivateCluster: false + enablePrivateClusterPublicFQDN: false + } + autoUpgradeProfile: { + nodeOSUpgradeChannel: 'NodeImage' + upgradeChannel: 'none' + } + azureMonitorProfile: { + metrics: { + enabled: false + } + } + disableLocalAccounts: false + dnsPrefix: 'acctest0001' + enableRBAC: true + kubernetesVersion: '' + metricsProfile: { + costAnalysis: { + enabled: false + } + } + nodeResourceGroup: '' + securityProfile: {} + servicePrincipalProfile: { + clientId: 'msi' + } + supportPlan: 'KubernetesOfficial' + } + sku: { + name: 'Base' + tier: 'Free' + } +} + +resource member 'Microsoft.ContainerService/fleets/members@2024-04-01' = { + parent: fleet + name: resourceName + properties: { + clusterResourceId: managedCluster.id + group: 'default' + } +} diff --git a/settings/remarks/microsoft.containerservice/samples/managedclusters/agentpools/main.bicep b/settings/remarks/microsoft.containerservice/samples/managedclusters/agentpools/main.bicep new file mode 100644 index 00000000..c752f464 --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/managedclusters/agentpools/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2023-04-02-preview' = { + name: resourceName + location: location + properties: { + agentPoolProfiles: [ + { + count: 1 + mode: 'System' + name: 'default' + vmSize: 'Standard_DS2_v2' + } + ] + dnsPrefix: 'acctest0001' + } +} + +resource agentPool 'Microsoft.ContainerService/managedClusters/agentPools@2023-04-02-preview' = { + parent: managedCluster + name: 'internal' + properties: { + count: 1 + mode: 'User' + vmSize: 'Standard_DS2_v2' + } +} diff --git a/settings/remarks/microsoft.containerservice/samples/managedclusters/main.bicep b/settings/remarks/microsoft.containerservice/samples/managedclusters/main.bicep new file mode 100644 index 00000000..786bb9f1 --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/managedclusters/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2023-04-02-preview' = { + name: resourceName + location: location + properties: { + agentPoolProfiles: [ + { + count: 1 + mode: 'System' + name: 'default' + vmSize: 'Standard_DS2_v2' + } + ] + dnsPrefix: 'acctest0001' + } +} diff --git a/settings/remarks/microsoft.containerservice/samples/managedclusters/trustedaccessrolebindings/main.bicep b/settings/remarks/microsoft.containerservice/samples/managedclusters/trustedaccessrolebindings/main.bicep new file mode 100644 index 00000000..25a49290 --- /dev/null +++ b/settings/remarks/microsoft.containerservice/samples/managedclusters/trustedaccessrolebindings/main.bicep @@ -0,0 +1,174 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: 'ai-${resourceName}' + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2025-02-01' = { + name: 'aks-${resourceName}' + location: location + properties: { + addonProfiles: {} + agentPoolProfiles: [ + { + count: 1 + enableAutoScaling: false + enableEncryptionAtHost: false + enableFIPS: false + enableNodePublicIP: false + enableUltraSSD: false + kubeletDiskType: '' + mode: 'System' + name: 'default' + nodeLabels: {} + osDiskType: 'Managed' + osType: 'Linux' + scaleDownMode: 'Delete' + tags: {} + type: 'VirtualMachineScaleSets' + upgradeSettings: { + drainTimeoutInMinutes: 0 + maxSurge: '10%' + nodeSoakDurationInMinutes: 0 + } + vmSize: 'Standard_B2s' + } + ] + apiServerAccessProfile: { + disableRunCommand: false + enablePrivateCluster: false + enablePrivateClusterPublicFQDN: false + } + autoUpgradeProfile: { + nodeOSUpgradeChannel: 'NodeImage' + upgradeChannel: 'none' + } + azureMonitorProfile: { + metrics: { + enabled: false + } + } + disableLocalAccounts: false + dnsPrefix: 'aks-acctest0001' + enableRBAC: true + kubernetesVersion: '' + metricsProfile: { + costAnalysis: { + enabled: false + } + } + nodeResourceGroup: '' + securityProfile: {} + servicePrincipalProfile: { + clientId: 'msi' + } + supportPlan: 'KubernetesOfficial' + } + sku: { + name: 'Base' + tier: 'Free' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: 'st${resourceName}' + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: 'kv${resourceName}' + location: location + properties: { + accessPolicies: [] + createMode: 'default' + enableRbacAuthorization: false + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} + +resource workspace 'Microsoft.MachineLearningServices/workspaces@2024-04-01' = { + name: 'mlw-${resourceName}' + location: location + kind: 'Default' + properties: { + applicationInsights: component.id + keyVault: vault.id + publicNetworkAccess: 'Enabled' + storageAccount: storageAccount.id + v1LegacyMode: false + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} + +resource trustedAccessRoleBinding 'Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings@2025-02-01' = { + parent: managedCluster + name: 'tarb-${resourceName}' + properties: { + roles: [ + 'Microsoft.MachineLearningServices/workspaces/mlworkload' + ] + sourceResourceId: workspace.id + } +} diff --git a/settings/remarks/microsoft.costmanagement/remarks.json b/settings/remarks/microsoft.costmanagement/remarks.json index 5b06e19f..63883269 100644 --- a/settings/remarks/microsoft.costmanagement/remarks.json +++ b/settings/remarks/microsoft.costmanagement/remarks.json @@ -1,25 +1,37 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.CostManagement/exports", - "Path": "samples/exports/main.tf", - "Description": "A basic example of deploying Azure Cost Management Export." - }, - { - "ResourceType": "Microsoft.CostManagement/scheduledActions", - "Path": "samples/scheduledactions/main.tf", - "Description": "A basic example of deploying Azure Cost Management Scheduled Action." - }, - { - "ResourceType": "Microsoft.CostManagement/scheduledActions", - "Path": "samples/scheduledactions/main.tf", - "Description": "A basic example of deploying Azure Cost Management Scheduled Action." - }, - { - "ResourceType": "Microsoft.CostManagement/views", - "Path": "samples/views/main.tf", - "Description": "A basic example of deploying Azure Cost Management View." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.CostManagement/exports", + "Path": "samples/exports/main.tf", + "Description": "A basic example of deploying Azure Cost Management Export." + }, + { + "ResourceType": "Microsoft.CostManagement/scheduledActions", + "Path": "samples/scheduledactions/main.tf", + "Description": "A basic example of deploying Azure Cost Management Scheduled Action." + }, + { + "ResourceType": "Microsoft.CostManagement/scheduledActions", + "Path": "samples/scheduledactions/main.tf", + "Description": "A basic example of deploying Azure Cost Management Scheduled Action." + }, + { + "ResourceType": "Microsoft.CostManagement/views", + "Path": "samples/views/main.tf", + "Description": "A basic example of deploying Azure Cost Management View." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.CostManagement/scheduledActions", + "Path": "samples/scheduledactions/main.bicep", + "Description": "A basic example of deploying Azure Cost Management Scheduled Action." + }, + { + "ResourceType": "Microsoft.CostManagement/views", + "Path": "samples/views/main.bicep", + "Description": "A basic example of deploying Azure Cost Management View." + } + ] +} diff --git a/settings/remarks/microsoft.costmanagement/samples/scheduledactions/main.bicep b/settings/remarks/microsoft.costmanagement/samples/scheduledactions/main.bicep new file mode 100644 index 00000000..1eb2dc82 --- /dev/null +++ b/settings/remarks/microsoft.costmanagement/samples/scheduledactions/main.bicep @@ -0,0 +1,34 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource scheduledAction 'Microsoft.CostManagement/scheduledActions@2022-10-01' = { + name: resourceName + kind: 'Email' + properties: { + displayName: 'CostByServiceViewerz3k' + fileDestination: { + fileFormats: [] + } + notification: { + message: '' + subject: 'Cost Management Report for Terraform Testing on Azure with TTL = 2 Day' + to: [ + 'test@test.com' + 'hashicorp@test.com' + ] + } + notificationEmail: 'test@test.com' + schedule: { + dayOfMonth: 0 + daysOfWeek: null + endDate: '2023-07-02T00:00:00Z' + frequency: 'Daily' + hourOfDay: 0 + startDate: '2023-07-01T00:00:00Z' + weeksOfMonth: null + } + status: 'Enabled' + viewId: resourceId('Microsoft.CostManagement/views', 'ms:CostByService') + } +} diff --git a/settings/remarks/microsoft.costmanagement/samples/views/main.bicep b/settings/remarks/microsoft.costmanagement/samples/views/main.bicep new file mode 100644 index 00000000..be056d90 --- /dev/null +++ b/settings/remarks/microsoft.costmanagement/samples/views/main.bicep @@ -0,0 +1,61 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource view 'Microsoft.CostManagement/views@2022-10-01' = { + name: resourceName + properties: { + accumulated: 'False' + chart: 'StackedColumn' + displayName: 'Test View wgvtl' + kpis: [ + { + enabled: true + type: 'Forecast' + } + ] + pivots: [ + { + name: 'ServiceName' + type: 'Dimension' + } + { + name: 'ResourceLocation' + type: 'Dimension' + } + { + name: 'ResourceGroupName' + type: 'Dimension' + } + ] + query: { + dataSet: { + aggregation: { + totalCost: { + function: 'Sum' + name: 'Cost' + } + totalCostUSD: { + function: 'Sum' + name: 'CostUSD' + } + } + granularity: 'Monthly' + grouping: [ + { + name: 'ResourceGroupName' + type: 'Dimension' + } + ] + sorting: [ + { + direction: 'Ascending' + name: 'BillingMonth' + } + ] + } + timeframe: 'MonthToDate' + type: 'Usage' + } + } +} diff --git a/settings/remarks/microsoft.customproviders/remarks.json b/settings/remarks/microsoft.customproviders/remarks.json index c584475a..fdfaf9f5 100644 --- a/settings/remarks/microsoft.customproviders/remarks.json +++ b/settings/remarks/microsoft.customproviders/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.CustomProviders/resourceProviders", - "Path": "samples/resourceproviders/main.tf", - "Description": "A basic example of deploying Azure Custom Provider." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.CustomProviders/resourceProviders", + "Path": "samples/resourceproviders/main.tf", + "Description": "A basic example of deploying Azure Custom Provider." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.CustomProviders/resourceProviders", + "Path": "samples/resourceproviders/main.bicep", + "Description": "A basic example of deploying Azure Custom Provider." + } + ] +} diff --git a/settings/remarks/microsoft.customproviders/samples/resourceproviders/main.bicep b/settings/remarks/microsoft.customproviders/samples/resourceproviders/main.bicep new file mode 100644 index 00000000..9cfb6695 --- /dev/null +++ b/settings/remarks/microsoft.customproviders/samples/resourceproviders/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource resourceProvider 'Microsoft.CustomProviders/resourceProviders@2018-09-01-preview' = { + name: resourceName + location: location + properties: { + resourceTypes: [ + { + endpoint: 'https://example.com/' + name: 'dEf1' + routingType: 'Proxy' + } + ] + } +} diff --git a/settings/remarks/microsoft.dashboard/remarks.json b/settings/remarks/microsoft.dashboard/remarks.json index 17c18300..e0c2ae51 100644 --- a/settings/remarks/microsoft.dashboard/remarks.json +++ b/settings/remarks/microsoft.dashboard/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Dashboard/grafana", - "Path": "samples/grafana/main.tf", - "Description": "A basic example of deploying Dashboard Grafana." - }, - { - "ResourceType": "Microsoft.Dashboard/grafana/managedPrivateEndpoints", - "Path": "samples/grafana/managedprivateendpoints/main.tf", - "Description": "A basic example of deploying Dashboard Grafana Managed Private Endpoint." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Dashboard/grafana", + "Path": "samples/grafana/main.tf", + "Description": "A basic example of deploying Dashboard Grafana." + }, + { + "ResourceType": "Microsoft.Dashboard/grafana/managedPrivateEndpoints", + "Path": "samples/grafana/managedprivateendpoints/main.tf", + "Description": "A basic example of deploying Dashboard Grafana Managed Private Endpoint." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Dashboard/grafana", + "Path": "samples/grafana/main.bicep", + "Description": "A basic example of deploying Dashboard Grafana." + }, + { + "ResourceType": "Microsoft.Dashboard/grafana/managedPrivateEndpoints", + "Path": "samples/grafana/managedprivateendpoints/main.bicep", + "Description": "A basic example of deploying Dashboard Grafana Managed Private Endpoint." + } + ] +} diff --git a/settings/remarks/microsoft.dashboard/samples/grafana/main.bicep b/settings/remarks/microsoft.dashboard/samples/grafana/main.bicep new file mode 100644 index 00000000..042f70ca --- /dev/null +++ b/settings/remarks/microsoft.dashboard/samples/grafana/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource grafana 'Microsoft.Dashboard/grafana@2022-08-01' = { + name: resourceName + location: location + properties: { + apiKey: 'Disabled' + autoGeneratedDomainNameLabelScope: 'TenantReuse' + deterministicOutboundIP: 'Disabled' + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + } +} diff --git a/settings/remarks/microsoft.dashboard/samples/grafana/managedprivateendpoints/main.bicep b/settings/remarks/microsoft.dashboard/samples/grafana/managedprivateendpoints/main.bicep new file mode 100644 index 00000000..71e55b93 --- /dev/null +++ b/settings/remarks/microsoft.dashboard/samples/grafana/managedprivateendpoints/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource account 'Microsoft.Monitor/accounts@2023-04-03' = { + name: '${resourceName}-mw' + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} + +resource grafana 'Microsoft.Dashboard/grafana@2023-09-01' = { + name: '${resourceName}-graf' + location: location + properties: { + apiKey: 'Disabled' + autoGeneratedDomainNameLabelScope: 'TenantReuse' + deterministicOutboundIP: 'Disabled' + grafanaMajorVersion: '11' + publicNetworkAccess: 'Enabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + } +} + +resource managedPrivateEndpoint 'Microsoft.Dashboard/grafana/managedPrivateEndpoints@2023-09-01' = { + parent: grafana + name: '${resourceName}-mpe' + location: location + properties: { + groupIds: [ + 'prometheusMetrics' + ] + privateLinkResourceId: account.id + privateLinkResourceRegion: 'eastus' + privateLinkServiceUrl: '' + requestMessage: '' + } +} diff --git a/settings/remarks/microsoft.databoxedge/remarks.json b/settings/remarks/microsoft.databoxedge/remarks.json index 6415f8e8..cb9dedbd 100644 --- a/settings/remarks/microsoft.databoxedge/remarks.json +++ b/settings/remarks/microsoft.databoxedge/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DataBoxEdge/dataBoxEdgeDevices", - "Path": "samples/databoxedgedevices/main.tf", - "Description": "A basic example of deploying Databox Edge Device." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DataBoxEdge/dataBoxEdgeDevices", + "Path": "samples/databoxedgedevices/main.tf", + "Description": "A basic example of deploying Databox Edge Device." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DataBoxEdge/dataBoxEdgeDevices", + "Path": "samples/databoxedgedevices/main.bicep", + "Description": "A basic example of deploying Databox Edge Device." + } + ] +} diff --git a/settings/remarks/microsoft.databoxedge/samples/databoxedgedevices/main.bicep b/settings/remarks/microsoft.databoxedge/samples/databoxedgedevices/main.bicep new file mode 100644 index 00000000..da5c4132 --- /dev/null +++ b/settings/remarks/microsoft.databoxedge/samples/databoxedgedevices/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource dataBoxEdgeDevice 'Microsoft.DataBoxEdge/dataBoxEdgeDevices@2022-03-01' = { + name: resourceName + location: location + sku: { + name: 'EdgeP_Base' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.databricks/remarks.json b/settings/remarks/microsoft.databricks/remarks.json index 05365428..5c5f6a65 100644 --- a/settings/remarks/microsoft.databricks/remarks.json +++ b/settings/remarks/microsoft.databricks/remarks.json @@ -1,20 +1,37 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Databricks/accessConnectors", - "Path": "samples/accessconnectors/main.tf", - "Description": "A basic example of deploying Databricks Access Connector." - }, - { - "ResourceType": "Microsoft.Databricks/workspaces", - "Path": "samples/workspaces/main.tf", - "Description": "A basic example of deploying Databricks Workspace." - }, - { - "ResourceType": "Microsoft.Databricks/workspaces/virtualNetworkPeerings", - "Path": "samples/workspaces/virtualnetworkpeerings/main.tf", - "Description": "A basic example of deploying Databricks Virtual Network Peering." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Databricks/accessConnectors", + "Path": "samples/accessconnectors/main.tf", + "Description": "A basic example of deploying Databricks Access Connector." + }, + { + "ResourceType": "Microsoft.Databricks/workspaces", + "Path": "samples/workspaces/main.tf", + "Description": "A basic example of deploying Databricks Workspace." + }, + { + "ResourceType": "Microsoft.Databricks/workspaces/virtualNetworkPeerings", + "Path": "samples/workspaces/virtualnetworkpeerings/main.tf", + "Description": "A basic example of deploying Databricks Virtual Network Peering." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Databricks/accessConnectors", + "Path": "samples/accessconnectors/main.bicep", + "Description": "A basic example of deploying Databricks Access Connector." + }, + { + "ResourceType": "Microsoft.Databricks/workspaces", + "Path": "samples/workspaces/main.bicep", + "Description": "A basic example of deploying Databricks Workspace." + }, + { + "ResourceType": "Microsoft.Databricks/workspaces/virtualNetworkPeerings", + "Path": "samples/workspaces/virtualnetworkpeerings/main.bicep", + "Description": "A basic example of deploying Databricks Virtual Network Peering." + } + ] +} diff --git a/settings/remarks/microsoft.databricks/samples/accessconnectors/main.bicep b/settings/remarks/microsoft.databricks/samples/accessconnectors/main.bicep new file mode 100644 index 00000000..f493107f --- /dev/null +++ b/settings/remarks/microsoft.databricks/samples/accessconnectors/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource accessConnector 'Microsoft.Databricks/accessConnectors@2022-10-01-preview' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.databricks/samples/workspaces/main.bicep b/settings/remarks/microsoft.databricks/samples/workspaces/main.bicep new file mode 100644 index 00000000..73fa901d --- /dev/null +++ b/settings/remarks/microsoft.databricks/samples/workspaces/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2' + +resource workspace 'Microsoft.Databricks/workspaces@2023-02-01' = { + name: resourceName + location: location + properties: { + managedResourceGroupId: resourceId('Microsoft.Resources/resourceGroups', 'databricks-rg-${resourceName}') + parameters: { + prepareEncryption: { + value: true + } + requireInfrastructureEncryption: { + value: true + } + } + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'premium' + } +} diff --git a/settings/remarks/microsoft.databricks/samples/workspaces/virtualnetworkpeerings/main.bicep b/settings/remarks/microsoft.databricks/samples/workspaces/virtualnetworkpeerings/main.bicep new file mode 100644 index 00000000..a75f36b6 --- /dev/null +++ b/settings/remarks/microsoft.databricks/samples/workspaces/virtualnetworkpeerings/main.bicep @@ -0,0 +1,54 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource workspace 'Microsoft.Databricks/workspaces@2023-02-01' = { + name: resourceName + location: location + properties: { + managedResourceGroupId: resourceId('Microsoft.Resources/resourceGroups', 'databricks-rg-${resourceName}') + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'standard' + } +} + +resource virtualNetworkPeering 'Microsoft.Databricks/workspaces/virtualNetworkPeerings@2023-02-01' = { + parent: workspace + name: resourceName + properties: { + allowForwardedTraffic: false + allowGatewayTransit: false + allowVirtualNetworkAccess: true + databricksAddressSpace: { + addressPrefixes: [ + '10.139.0.0/16' + ] + } + remoteAddressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + remoteVirtualNetwork: { + id: virtualNetwork.id + } + useRemoteGateways: false + } +} diff --git a/settings/remarks/microsoft.datafactory/remarks.json b/settings/remarks/microsoft.datafactory/remarks.json index d07fa9ca..ac26c717 100644 --- a/settings/remarks/microsoft.datafactory/remarks.json +++ b/settings/remarks/microsoft.datafactory/remarks.json @@ -1,55 +1,107 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DataFactory/factories", - "Path": "samples/factories/main.tf", - "Description": "A basic example of deploying Azure Data Factory (Version 2)." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/credentials", - "Path": "samples/factories/credentials/main.tf", - "Description": "A basic example of deploying Data Factory credential resource." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/dataflows", - "Path": "samples/factories/dataflows/main.tf", - "Description": "A basic example of deploying Data Flow inside an Azure Data Factory." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/datasets", - "Path": "samples/factories/datasets/main.tf", - "Description": "A basic example of deploying Dataset inside an Azure Data Factory." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/integrationRuntimes", - "Path": "samples/factories/integrationruntimes/main.tf", - "Description": "A basic example of deploying Data Factory Azure Integration Runtime." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/linkedservices", - "Path": "samples/factories/linkedservices/main.tf", - "Description": "A basic example of deploying Linked Service (connection) between a resource and Azure Data Factory." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/managedVirtualNetworks", - "Path": "samples/factories/managedvirtualnetworks/main.tf", - "Description": "A basic example of deploying Data Factory Managed Virtual Networks." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/managedVirtualNetworks/managedPrivateEndpoints", - "Path": "samples/factories/managedvirtualnetworks/managedprivateendpoints/main.tf", - "Description": "A basic example of deploying Data Factory Managed Private Endpoint." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/pipelines", - "Path": "samples/factories/pipelines/main.tf", - "Description": "A basic example of deploying Pipeline inside a Azure Data Factory." - }, - { - "ResourceType": "Microsoft.DataFactory/factories/triggers", - "Path": "samples/factories/triggers/main.tf", - "Description": "A basic example of deploying Trigger inside an Azure Data Factory." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DataFactory/factories", + "Path": "samples/factories/main.tf", + "Description": "A basic example of deploying Azure Data Factory (Version 2)." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/credentials", + "Path": "samples/factories/credentials/main.tf", + "Description": "A basic example of deploying Data Factory credential resource." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/dataflows", + "Path": "samples/factories/dataflows/main.tf", + "Description": "A basic example of deploying Data Flow inside an Azure Data Factory." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/datasets", + "Path": "samples/factories/datasets/main.tf", + "Description": "A basic example of deploying Dataset inside an Azure Data Factory." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/integrationRuntimes", + "Path": "samples/factories/integrationruntimes/main.tf", + "Description": "A basic example of deploying Data Factory Azure Integration Runtime." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/linkedservices", + "Path": "samples/factories/linkedservices/main.tf", + "Description": "A basic example of deploying Linked Service (connection) between a resource and Azure Data Factory." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/managedVirtualNetworks", + "Path": "samples/factories/managedvirtualnetworks/main.tf", + "Description": "A basic example of deploying Data Factory Managed Virtual Networks." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/managedVirtualNetworks/managedPrivateEndpoints", + "Path": "samples/factories/managedvirtualnetworks/managedprivateendpoints/main.tf", + "Description": "A basic example of deploying Data Factory Managed Private Endpoint." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/pipelines", + "Path": "samples/factories/pipelines/main.tf", + "Description": "A basic example of deploying Pipeline inside a Azure Data Factory." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/triggers", + "Path": "samples/factories/triggers/main.tf", + "Description": "A basic example of deploying Trigger inside an Azure Data Factory." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DataFactory/factories", + "Path": "samples/factories/main.bicep", + "Description": "A basic example of deploying Azure Data Factory (Version 2)." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/credentials", + "Path": "samples/factories/credentials/main.bicep", + "Description": "A basic example of deploying Data Factory credential resource." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/dataflows", + "Path": "samples/factories/dataflows/main.bicep", + "Description": "A basic example of deploying Data Flow inside an Azure Data Factory." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/datasets", + "Path": "samples/factories/datasets/main.bicep", + "Description": "A basic example of deploying Dataset inside an Azure Data Factory." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/integrationRuntimes", + "Path": "samples/factories/integrationruntimes/main.bicep", + "Description": "A basic example of deploying Data Factory Azure Integration Runtime." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/linkedservices", + "Path": "samples/factories/linkedservices/main.bicep", + "Description": "A basic example of deploying Linked Service (connection) between a resource and Azure Data Factory." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/managedVirtualNetworks", + "Path": "samples/factories/managedvirtualnetworks/main.bicep", + "Description": "A basic example of deploying Data Factory Managed Virtual Networks." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/managedVirtualNetworks/managedPrivateEndpoints", + "Path": "samples/factories/managedvirtualnetworks/managedprivateendpoints/main.bicep", + "Description": "A basic example of deploying Data Factory Managed Private Endpoint." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/pipelines", + "Path": "samples/factories/pipelines/main.bicep", + "Description": "A basic example of deploying Pipeline inside a Azure Data Factory." + }, + { + "ResourceType": "Microsoft.DataFactory/factories/triggers", + "Path": "samples/factories/triggers/main.bicep", + "Description": "A basic example of deploying Trigger inside an Azure Data Factory." + } + ] +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/credentials/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/credentials/main.bicep new file mode 100644 index 00000000..74ba3e81 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/credentials/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName +} + +resource credential 'Microsoft.DataFactory/factories/credentials@2018-06-01' = { + parent: factory + name: resourceName + properties: { + annotations: [ + 'test' + ] + description: 'this is a test' + type: 'ManagedIdentity' + typeProperties: { + resourceId: userAssignedIdentity.id + } + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/dataflows/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/dataflows/main.bicep new file mode 100644 index 00000000..f8f1274a --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/dataflows/main.bicep @@ -0,0 +1,104 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource dataflow 'Microsoft.DataFactory/factories/dataflows@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'Flowlet' + typeProperties: { + script: '''source( + allowSchemaDrift: true, + validateSchema: false, + limit: 100, + ignoreNoFilesFound: false, + documentForm: ''documentPerLine'') ~> source1 +source1 sink( + allowSchemaDrift: true, + validateSchema: false, + skipDuplicateMapInputs: true, + skipDuplicateMapOutputs: true) ~> sink1 +''' + sinks: [ + { + description: '' + linkedService: { + parameters: {} + referenceName: linkedservice.name + type: 'LinkedServiceReference' + } + name: 'sink1' + } + ] + sources: [ + { + description: '' + linkedService: { + parameters: {} + referenceName: linkedservice.name + type: 'LinkedServiceReference' + } + name: 'source1' + } + ] + } + } +} + +resource linkedservice 'Microsoft.DataFactory/factories/linkedservices@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'AzureBlobStorage' + typeProperties: { + serviceEndpoint: storageAccount.properties.primaryEndpoints.blob + } + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/datasets/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/datasets/main.bicep new file mode 100644 index 00000000..8f874454 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/datasets/main.bicep @@ -0,0 +1,81 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource dataset 'Microsoft.DataFactory/factories/datasets@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + linkedServiceName: { + referenceName: linkedservice.name + type: 'LinkedServiceReference' + } + type: 'Json' + typeProperties: { + encodingName: 'UTF-8' + location: { + container: 'container' + fileName: 'bar.txt' + folderPath: 'foo/bar/' + type: 'AzureBlobStorageLocation' + } + } + } +} + +resource linkedservice 'Microsoft.DataFactory/factories/linkedservices@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'AzureBlobStorage' + typeProperties: { + serviceEndpoint: storageAccount.properties.primaryEndpoints.blob + } + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/integrationruntimes/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/integrationruntimes/main.bicep new file mode 100644 index 00000000..0b9e810d --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/integrationruntimes/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource integrationRuntime 'Microsoft.DataFactory/factories/integrationRuntimes@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'SelfHosted' + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/linkedservices/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/linkedservices/main.bicep new file mode 100644 index 00000000..6eb10574 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/linkedservices/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource linkedservice 'Microsoft.DataFactory/factories/linkedservices@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + type: 'AzureBlobStorage' + typeProperties: { + serviceEndpoint: storageAccount.properties.primaryEndpoints.blob + } + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/main.bicep new file mode 100644 index 00000000..f41575b8 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/main.bicep new file mode 100644 index 00000000..bf26c35b --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + globalParameters: {} + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource managedVirtualNetwork 'Microsoft.DataFactory/factories/managedVirtualNetworks@2018-06-01' = { + parent: factory + name: 'default' + properties: {} +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/managedprivateendpoints/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/managedprivateendpoints/main.bicep new file mode 100644 index 00000000..aecaf32e --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/managedvirtualnetworks/managedprivateendpoints/main.bicep @@ -0,0 +1,63 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + globalParameters: {} + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'BlobStorage' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource managedVirtualNetwork 'Microsoft.DataFactory/factories/managedVirtualNetworks@2018-06-01' = { + parent: factory + name: 'default' + properties: {} +} + +resource managedPrivateEndpoint 'Microsoft.DataFactory/factories/managedVirtualNetworks/managedPrivateEndpoints@2018-06-01' = { + parent: managedVirtualNetwork + name: resourceName + properties: { + groupId: 'blob' + privateLinkResourceId: storageAccount.id + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/pipelines/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/pipelines/main.bicep new file mode 100644 index 00000000..a17dd9d8 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/pipelines/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource pipeline 'Microsoft.DataFactory/factories/pipelines@2018-06-01' = { + parent: factory + name: resourceName + properties: { + annotations: [] + description: '' + parameters: { + test: { + defaultValue: 'testparameter' + type: 'String' + } + } + variables: {} + } +} diff --git a/settings/remarks/microsoft.datafactory/samples/factories/triggers/main.bicep b/settings/remarks/microsoft.datafactory/samples/factories/triggers/main.bicep new file mode 100644 index 00000000..4921a197 --- /dev/null +++ b/settings/remarks/microsoft.datafactory/samples/factories/triggers/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource factory 'Microsoft.DataFactory/factories@2018-06-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + repoConfiguration: null + } +} + +resource pipeline 'Microsoft.DataFactory/factories/pipelines@2018-06-01' = { + parent: factory + name: resourceName + properties: { + annotations: [] + description: '' + parameters: { + test: { + defaultValue: 'testparameter' + type: 'String' + } + } + variables: {} + } +} + +resource trigger 'Microsoft.DataFactory/factories/triggers@2018-06-01' = { + parent: factory + name: resourceName + properties: { + description: '' + pipeline: { + parameters: {} + pipelineReference: { + referenceName: pipeline.name + type: 'PipelineReference' + } + } + type: 'TumblingWindowTrigger' + typeProperties: { + frequency: 'Minute' + interval: 15 + maxConcurrency: 50 + startTime: '2022-09-21T00:00:00Z' + } + } +} diff --git a/settings/remarks/microsoft.datamigration/remarks.json b/settings/remarks/microsoft.datamigration/remarks.json index 489f9a9a..226936a5 100644 --- a/settings/remarks/microsoft.datamigration/remarks.json +++ b/settings/remarks/microsoft.datamigration/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DataMigration/services", - "Path": "samples/services/main.tf", - "Description": "A basic example of deploying Azure Database Migration Service." - }, - { - "ResourceType": "Microsoft.DataMigration/services/projects", - "Path": "samples/services/projects/main.tf", - "Description": "A basic example of deploying Azure Database Migration Project instance." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DataMigration/services", + "Path": "samples/services/main.tf", + "Description": "A basic example of deploying Azure Database Migration Service." + }, + { + "ResourceType": "Microsoft.DataMigration/services/projects", + "Path": "samples/services/projects/main.tf", + "Description": "A basic example of deploying Azure Database Migration Project instance." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DataMigration/services", + "Path": "samples/services/main.bicep", + "Description": "A basic example of deploying Azure Database Migration Service." + }, + { + "ResourceType": "Microsoft.DataMigration/services/projects", + "Path": "samples/services/projects/main.bicep", + "Description": "A basic example of deploying Azure Database Migration Project instance." + } + ] +} diff --git a/settings/remarks/microsoft.datamigration/samples/services/main.bicep b/settings/remarks/microsoft.datamigration/samples/services/main.bicep new file mode 100644 index 00000000..655e65d7 --- /dev/null +++ b/settings/remarks/microsoft.datamigration/samples/services/main.bicep @@ -0,0 +1,43 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.DataMigration/services@2018-04-19' = { + name: resourceName + location: location + kind: 'Cloud' + properties: { + virtualSubnetId: subnet.id + } + sku: { + name: 'Standard_1vCores' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.datamigration/samples/services/projects/main.bicep b/settings/remarks/microsoft.datamigration/samples/services/projects/main.bicep new file mode 100644 index 00000000..097ee330 --- /dev/null +++ b/settings/remarks/microsoft.datamigration/samples/services/projects/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource service 'Microsoft.DataMigration/services@2018-04-19' = { + name: resourceName + location: location + kind: 'Cloud' + properties: { + virtualSubnetId: subnet.id + } + sku: { + name: 'Standard_1vCores' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource project 'Microsoft.DataMigration/services/projects@2018-04-19' = { + parent: service + name: resourceName + location: location + properties: { + sourcePlatform: 'SQL' + targetPlatform: 'SQLDB' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.dataprotection/remarks.json b/settings/remarks/microsoft.dataprotection/remarks.json index 52ff0ef5..b4578402 100644 --- a/settings/remarks/microsoft.dataprotection/remarks.json +++ b/settings/remarks/microsoft.dataprotection/remarks.json @@ -1,25 +1,47 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DataProtection/backupVaults", - "Path": "samples/backupvaults/main.tf", - "Description": "A basic example of deploying Backup Vault." - }, - { - "ResourceType": "Microsoft.DataProtection/backupVaults/backupInstances", - "Path": "samples/backupvaults/backupinstances/main.tf", - "Description": "A basic example of deploying Backup Instance." - }, - { - "ResourceType": "Microsoft.DataProtection/backupVaults/backupPolicies", - "Path": "samples/backupvaults/backuppolicies/main.tf", - "Description": "A basic example of deploying Backup Policy." - }, - { - "ResourceType": "Microsoft.DataProtection/resourceGuards", - "Path": "samples/resourceguards/main.tf", - "Description": "A basic example of deploying Resource Guard." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DataProtection/backupVaults", + "Path": "samples/backupvaults/main.tf", + "Description": "A basic example of deploying Backup Vault." + }, + { + "ResourceType": "Microsoft.DataProtection/backupVaults/backupInstances", + "Path": "samples/backupvaults/backupinstances/main.tf", + "Description": "A basic example of deploying Backup Instance." + }, + { + "ResourceType": "Microsoft.DataProtection/backupVaults/backupPolicies", + "Path": "samples/backupvaults/backuppolicies/main.tf", + "Description": "A basic example of deploying Backup Policy." + }, + { + "ResourceType": "Microsoft.DataProtection/resourceGuards", + "Path": "samples/resourceguards/main.tf", + "Description": "A basic example of deploying Resource Guard." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DataProtection/backupVaults", + "Path": "samples/backupvaults/main.bicep", + "Description": "A basic example of deploying Backup Vault." + }, + { + "ResourceType": "Microsoft.DataProtection/backupVaults/backupInstances", + "Path": "samples/backupvaults/backupinstances/main.bicep", + "Description": "A basic example of deploying Backup Instance." + }, + { + "ResourceType": "Microsoft.DataProtection/backupVaults/backupPolicies", + "Path": "samples/backupvaults/backuppolicies/main.bicep", + "Description": "A basic example of deploying Backup Policy." + }, + { + "ResourceType": "Microsoft.DataProtection/resourceGuards", + "Path": "samples/resourceguards/main.bicep", + "Description": "A basic example of deploying Resource Guard." + } + ] +} diff --git a/settings/remarks/microsoft.dataprotection/samples/backupvaults/backupinstances/main.bicep b/settings/remarks/microsoft.dataprotection/samples/backupvaults/backupinstances/main.bicep new file mode 100644 index 00000000..85769b4f --- /dev/null +++ b/settings/remarks/microsoft.dataprotection/samples/backupvaults/backupinstances/main.bicep @@ -0,0 +1,145 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource backupVault 'Microsoft.DataProtection/backupVaults@2022-04-01' = { + name: resourceName + location: location + properties: { + storageSettings: [ + { + datastoreType: 'VaultStore' + type: 'LocallyRedundant' + } + ] + } +} + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: 'psqladmin' + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 5120 + } + version: '9.5' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'B_Gen5_2' + tier: 'Basic' + } +} + +resource backupInstance 'Microsoft.DataProtection/backupVaults/backupInstances@2022-04-01' = { + parent: backupVault + name: resourceName + properties: { + dataSourceInfo: { + datasourceType: 'Microsoft.DBforPostgreSQL/servers/databases' + objectType: 'Datasource' + resourceID: database.id + resourceLocation: 'database.location' + resourceName: database.name + resourceType: 'Microsoft.DBforPostgreSQL/servers/databases' + resourceUri: '' + } + dataSourceSetInfo: { + datasourceType: 'Microsoft.DBforPostgreSQL/servers/databases' + objectType: 'DatasourceSet' + resourceID: server.id + resourceLocation: 'server.location' + resourceName: server.name + resourceType: 'Microsoft.DBForPostgreSQL/servers' + resourceUri: '' + } + datasourceAuthCredentials: null + friendlyName: 'acctest0001' + objectType: 'BackupInstance' + policyInfo: { + policyId: backupPolicy.id + } + } +} + +resource backupPolicy 'Microsoft.DataProtection/backupVaults/backupPolicies@2022-04-01' = { + parent: backupVault + name: resourceName + properties: { + datasourceTypes: [ + 'Microsoft.DBforPostgreSQL/servers/databases' + ] + objectType: 'BackupPolicy' + policyRules: [ + { + backupParameters: { + backupType: 'Full' + objectType: 'AzureBackupParams' + } + dataStore: { + dataStoreType: 'VaultStore' + objectType: 'DataStoreInfoBase' + } + name: 'BackupIntervals' + objectType: 'AzureBackupRule' + trigger: { + objectType: 'ScheduleBasedTriggerContext' + schedule: { + repeatingTimeIntervals: [ + 'R/2021-05-23T02:30:00+00:00/P1W' + ] + } + taggingCriteria: [ + { + isDefault: true + tagInfo: { + id: 'Default_' + tagName: 'Default' + } + taggingPriority: 99 + } + ] + } + } + { + isDefault: true + lifecycles: [ + { + deleteAfter: { + duration: 'P4M' + objectType: 'AbsoluteDeleteOption' + } + sourceDataStore: { + dataStoreType: 'VaultStore' + objectType: 'DataStoreInfoBase' + } + targetDataStoreCopySettings: [] + } + ] + name: 'Default' + objectType: 'AzureRetentionRule' + } + ] + } +} + +resource database 'Microsoft.DBforPostgreSQL/servers/databases@2017-12-01' = { + parent: server + name: resourceName + properties: { + charset: 'UTF8' + collation: 'English_United States.1252' + } +} diff --git a/settings/remarks/microsoft.dataprotection/samples/backupvaults/backuppolicies/main.bicep b/settings/remarks/microsoft.dataprotection/samples/backupvaults/backuppolicies/main.bicep new file mode 100644 index 00000000..0e11a48b --- /dev/null +++ b/settings/remarks/microsoft.dataprotection/samples/backupvaults/backuppolicies/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource backupVault 'Microsoft.DataProtection/backupVaults@2022-04-01' = { + name: resourceName + location: location + properties: { + storageSettings: [ + { + datastoreType: 'VaultStore' + type: 'LocallyRedundant' + } + ] + } +} + +resource backupPolicy 'Microsoft.DataProtection/backupVaults/backupPolicies@2022-04-01' = { + parent: backupVault + name: resourceName + properties: { + datasourceTypes: [ + 'Microsoft.DBforPostgreSQL/servers/databases' + ] + objectType: 'BackupPolicy' + policyRules: [ + { + backupParameters: { + backupType: 'Full' + objectType: 'AzureBackupParams' + } + dataStore: { + dataStoreType: 'VaultStore' + objectType: 'DataStoreInfoBase' + } + name: 'BackupIntervals' + objectType: 'AzureBackupRule' + trigger: { + objectType: 'ScheduleBasedTriggerContext' + schedule: { + repeatingTimeIntervals: [ + 'R/2021-05-23T02:30:00+00:00/P1W' + ] + } + taggingCriteria: [ + { + isDefault: true + tagInfo: { + id: 'Default_' + tagName: 'Default' + } + taggingPriority: 99 + } + ] + } + } + { + isDefault: true + lifecycles: [ + { + deleteAfter: { + duration: 'P4M' + objectType: 'AbsoluteDeleteOption' + } + sourceDataStore: { + dataStoreType: 'VaultStore' + objectType: 'DataStoreInfoBase' + } + targetDataStoreCopySettings: [] + } + ] + name: 'Default' + objectType: 'AzureRetentionRule' + } + ] + } +} diff --git a/settings/remarks/microsoft.dataprotection/samples/backupvaults/main.bicep b/settings/remarks/microsoft.dataprotection/samples/backupvaults/main.bicep new file mode 100644 index 00000000..00c95459 --- /dev/null +++ b/settings/remarks/microsoft.dataprotection/samples/backupvaults/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource backupVault 'Microsoft.DataProtection/backupVaults@2022-04-01' = { + name: resourceName + location: location + properties: { + storageSettings: [ + { + datastoreType: 'VaultStore' + type: 'LocallyRedundant' + } + ] + } +} diff --git a/settings/remarks/microsoft.dataprotection/samples/resourceguards/main.bicep b/settings/remarks/microsoft.dataprotection/samples/resourceguards/main.bicep new file mode 100644 index 00000000..388188e4 --- /dev/null +++ b/settings/remarks/microsoft.dataprotection/samples/resourceguards/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource resourceGuard 'Microsoft.DataProtection/resourceGuards@2022-04-01' = { + name: resourceName + location: location + properties: { + vaultCriticalOperationExclusionList: [] + } +} diff --git a/settings/remarks/microsoft.datashare/remarks.json b/settings/remarks/microsoft.datashare/remarks.json index 6f639473..e1781c3a 100644 --- a/settings/remarks/microsoft.datashare/remarks.json +++ b/settings/remarks/microsoft.datashare/remarks.json @@ -1,20 +1,32 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DataShare/accounts", - "Path": "samples/accounts/main.tf", - "Description": "A basic example of deploying Data Share Account." - }, - { - "ResourceType": "Microsoft.DataShare/accounts/shares", - "Path": "samples/accounts/shares/main.tf", - "Description": "A basic example of deploying Data Share." - }, - { - "ResourceType": "Microsoft.DataShare/accounts/shares/dataSets", - "Path": "samples/accounts/shares/datasets/main.tf", - "Description": "A basic example of deploying Data Share Dataset." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DataShare/accounts", + "Path": "samples/accounts/main.tf", + "Description": "A basic example of deploying Data Share Account." + }, + { + "ResourceType": "Microsoft.DataShare/accounts/shares", + "Path": "samples/accounts/shares/main.tf", + "Description": "A basic example of deploying Data Share." + }, + { + "ResourceType": "Microsoft.DataShare/accounts/shares/dataSets", + "Path": "samples/accounts/shares/datasets/main.tf", + "Description": "A basic example of deploying Data Share Dataset." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DataShare/accounts", + "Path": "samples/accounts/main.bicep", + "Description": "A basic example of deploying Data Share Account." + }, + { + "ResourceType": "Microsoft.DataShare/accounts/shares", + "Path": "samples/accounts/shares/main.bicep", + "Description": "A basic example of deploying Data Share." + } + ] +} diff --git a/settings/remarks/microsoft.datashare/samples/accounts/main.bicep b/settings/remarks/microsoft.datashare/samples/accounts/main.bicep new file mode 100644 index 00000000..0e694088 --- /dev/null +++ b/settings/remarks/microsoft.datashare/samples/accounts/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.DataShare/accounts@2019-11-01' = { + name: resourceName + location: location + tags: { + env: 'Test' + } +} diff --git a/settings/remarks/microsoft.datashare/samples/accounts/shares/main.bicep b/settings/remarks/microsoft.datashare/samples/accounts/shares/main.bicep new file mode 100644 index 00000000..60c29ba6 --- /dev/null +++ b/settings/remarks/microsoft.datashare/samples/accounts/shares/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.DataShare/accounts@2019-11-01' = { + name: resourceName + location: location + tags: { + env: 'Test' + } +} + +resource share 'Microsoft.DataShare/accounts/shares@2019-11-01' = { + parent: account + name: resourceName + properties: { + description: '' + shareKind: 'CopyBased' + terms: '' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/remarks.json b/settings/remarks/microsoft.dbformariadb/remarks.json index db9345ff..4c2e78e9 100644 --- a/settings/remarks/microsoft.dbformariadb/remarks.json +++ b/settings/remarks/microsoft.dbformariadb/remarks.json @@ -1,30 +1,57 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DBforMariaDB/servers", - "Path": "samples/servers/main.tf", - "Description": "A basic example of deploying Database for MariaDB Servers." - }, - { - "ResourceType": "Microsoft.DBforMariaDB/servers/configurations", - "Path": "samples/servers/configurations/main.tf", - "Description": "A basic example of deploying Database for MariaDB Servers Configurations." - }, - { - "ResourceType": "Microsoft.DBforMariaDB/servers/databases", - "Path": "samples/servers/databases/main.tf", - "Description": "A basic example of deploying Database for MariaDB Servers Databases." - }, - { - "ResourceType": "Microsoft.DBforMariaDB/servers/firewallRules", - "Path": "samples/servers/firewallrules/main.tf", - "Description": "A basic example of deploying Database for MariaDB Servers Firewall Rules." - }, - { - "ResourceType": "Microsoft.DBforMariaDB/servers/virtualNetworkRules", - "Path": "samples/servers/virtualnetworkrules/main.tf", - "Description": "A basic example of deploying Database for MariaDB Servers Virtual Network Rules." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DBforMariaDB/servers", + "Path": "samples/servers/main.tf", + "Description": "A basic example of deploying Database for MariaDB Servers." + }, + { + "ResourceType": "Microsoft.DBforMariaDB/servers/configurations", + "Path": "samples/servers/configurations/main.tf", + "Description": "A basic example of deploying Database for MariaDB Servers Configurations." + }, + { + "ResourceType": "Microsoft.DBforMariaDB/servers/databases", + "Path": "samples/servers/databases/main.tf", + "Description": "A basic example of deploying Database for MariaDB Servers Databases." + }, + { + "ResourceType": "Microsoft.DBforMariaDB/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.tf", + "Description": "A basic example of deploying Database for MariaDB Servers Firewall Rules." + }, + { + "ResourceType": "Microsoft.DBforMariaDB/servers/virtualNetworkRules", + "Path": "samples/servers/virtualnetworkrules/main.tf", + "Description": "A basic example of deploying Database for MariaDB Servers Virtual Network Rules." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DBforMariaDB/servers", + "Path": "samples/servers/main.bicep", + "Description": "A basic example of deploying Database for MariaDB Servers." + }, + { + "ResourceType": "Microsoft.DBforMariaDB/servers/configurations", + "Path": "samples/servers/configurations/main.bicep", + "Description": "A basic example of deploying Database for MariaDB Servers Configurations." + }, + { + "ResourceType": "Microsoft.DBforMariaDB/servers/databases", + "Path": "samples/servers/databases/main.bicep", + "Description": "A basic example of deploying Database for MariaDB Servers Databases." + }, + { + "ResourceType": "Microsoft.DBforMariaDB/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.bicep", + "Description": "A basic example of deploying Database for MariaDB Servers Firewall Rules." + }, + { + "ResourceType": "Microsoft.DBforMariaDB/servers/virtualNetworkRules", + "Path": "samples/servers/virtualnetworkrules/main.bicep", + "Description": "A basic example of deploying Database for MariaDB Servers Virtual Network Rules." + } + ] +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/configurations/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/configurations/main.bicep new file mode 100644 index 00000000..cd3d6b2e --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/configurations/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource configuration 'Microsoft.DBforMariaDB/servers/configurations@2018-06-01' = { + parent: server + name: 'character_set_server' + properties: { + value: 'LATIN1' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/databases/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/databases/main.bicep new file mode 100644 index 00000000..deeb5349 --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/databases/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'B_Gen5_2' + tier: 'Basic' + } +} + +resource database 'Microsoft.DBforMariaDB/servers/databases@2018-06-01' = { + parent: server + name: resourceName + properties: { + charset: 'utf8' + collation: 'utf8_general_ci' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/firewallrules/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/firewallrules/main.bicep new file mode 100644 index 00000000..a521dad4 --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/firewallrules/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource firewallRule 'Microsoft.DBforMariaDB/servers/firewallRules@2018-06-01' = { + parent: server + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/main.bicep new file mode 100644 index 00000000..2f777e9f --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} diff --git a/settings/remarks/microsoft.dbformariadb/samples/servers/virtualnetworkrules/main.bicep b/settings/remarks/microsoft.dbformariadb/samples/servers/virtualnetworkrules/main.bicep new file mode 100644 index 00000000..a29902eb --- /dev/null +++ b/settings/remarks/microsoft.dbformariadb/samples/servers/virtualnetworkrules/main.bicep @@ -0,0 +1,74 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MariaDB server') +param administratorLogin string +@secure() +@description('The administrator login password for the MariaDB server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMariaDB/servers@2018-06-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '10.2' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.7.29.0/29' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.7.29.0/29' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [ + { + service: 'Microsoft.Sql' + } + ] + } +} + +resource virtualNetworkRule 'Microsoft.DBforMariaDB/servers/virtualNetworkRules@2018-06-01' = { + parent: server + name: resourceName + properties: { + ignoreMissingVnetServiceEndpoint: false + virtualNetworkSubnetId: subnet.id + } +} diff --git a/settings/remarks/microsoft.dbformysql/remarks.json b/settings/remarks/microsoft.dbformysql/remarks.json index 653f5b88..b1d36778 100644 --- a/settings/remarks/microsoft.dbformysql/remarks.json +++ b/settings/remarks/microsoft.dbformysql/remarks.json @@ -1,74 +1,131 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "Using a template to create a MySQL server with the **Replica** value is not idempotent. The server is created successfully the first time. However, deploying the template when the replica server already exists returns an error.", - "ResourceTypes": [ - "microsoft.dbformysql/servers" - ] - }, - { - "Description": "Use the `maintenanceWindow` property only when updating an existing flexible server. When creating a new flexible servcer, don't specify values for this property.", - "ResourceTypes": [ - "microsoft.dbformysql/flexibleservers" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DBforMySQL/flexibleServers", - "Path": "samples/flexibleservers/main.tf", - "Description": "A basic example of deploying MySQL Flexible Server." - }, - { - "ResourceType": "Microsoft.DBforMySQL/flexibleServers/administrators", - "Path": "samples/flexibleservers/administrators/main.tf", - "Description": "A basic example of deploying Active Directory administrator on a MySQL Flexible Server." - }, - { - "ResourceType": "Microsoft.DBforMySQL/flexibleServers/configurations", - "Path": "samples/flexibleservers/configurations/main.tf", - "Description": "A basic example of deploying Sets a MySQL Flexible Server Configuration value on a MySQL Flexible Server." - }, - { - "ResourceType": "Microsoft.DBforMySQL/flexibleServers/databases", - "Path": "samples/flexibleservers/databases/main.tf", - "Description": "A basic example of deploying MySQL Database within a MySQL Flexible Server." - }, - { - "ResourceType": "Microsoft.DBforMySQL/flexibleServers/firewallRules", - "Path": "samples/flexibleservers/firewallrules/main.tf", - "Description": "A basic example of deploying Firewall Rule for a MySQL Flexible Server." - }, - { - "ResourceType": "Microsoft.DBforMySQL/servers", - "Path": "samples/servers/main.tf", - "Description": "A basic example of deploying Database for MySQL Servers." - }, - { - "ResourceType": "Microsoft.DBforMySQL/servers/administrators", - "Path": "samples/servers/administrators/main.tf", - "Description": "A basic example of deploying Database for MySQL Servers Administrators." - }, - { - "ResourceType": "Microsoft.DBforMySQL/servers/configurations", - "Path": "samples/servers/configurations/main.tf", - "Description": "A basic example of deploying Database for MySQL Servers Configurations." - }, - { - "ResourceType": "Microsoft.DBforMySQL/servers/databases", - "Path": "samples/servers/databases/main.tf", - "Description": "A basic example of deploying Database for MySQL Servers Databases." - }, - { - "ResourceType": "Microsoft.DBforMySQL/servers/firewallRules", - "Path": "samples/servers/firewallrules/main.tf", - "Description": "A basic example of deploying Database for MySQL Servers Firewall Rules." - }, - { - "ResourceType": "Microsoft.DBforMySQL/servers/virtualNetworkRules", - "Path": "samples/servers/virtualnetworkrules/main.tf", - "Description": "A basic example of deploying Database for MySQL Servers Virtual Network Rules." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "Using a template to create a MySQL server with the **Replica** value is not idempotent. The server is created successfully the first time. However, deploying the template when the replica server already exists returns an error.", + "ResourceTypes": [ + "microsoft.dbformysql/servers" + ] + }, + { + "Description": "Use the `maintenanceWindow` property only when updating an existing flexible server. When creating a new flexible servcer, don't specify values for this property.", + "ResourceTypes": [ + "microsoft.dbformysql/flexibleservers" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers", + "Path": "samples/flexibleservers/main.tf", + "Description": "A basic example of deploying MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers/administrators", + "Path": "samples/flexibleservers/administrators/main.tf", + "Description": "A basic example of deploying Active Directory administrator on a MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers/configurations", + "Path": "samples/flexibleservers/configurations/main.tf", + "Description": "A basic example of deploying Sets a MySQL Flexible Server Configuration value on a MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers/databases", + "Path": "samples/flexibleservers/databases/main.tf", + "Description": "A basic example of deploying MySQL Database within a MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers/firewallRules", + "Path": "samples/flexibleservers/firewallrules/main.tf", + "Description": "A basic example of deploying Firewall Rule for a MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers", + "Path": "samples/servers/main.tf", + "Description": "A basic example of deploying Database for MySQL Servers." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/administrators", + "Path": "samples/servers/administrators/main.tf", + "Description": "A basic example of deploying Database for MySQL Servers Administrators." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/configurations", + "Path": "samples/servers/configurations/main.tf", + "Description": "A basic example of deploying Database for MySQL Servers Configurations." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/databases", + "Path": "samples/servers/databases/main.tf", + "Description": "A basic example of deploying Database for MySQL Servers Databases." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.tf", + "Description": "A basic example of deploying Database for MySQL Servers Firewall Rules." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/virtualNetworkRules", + "Path": "samples/servers/virtualnetworkrules/main.tf", + "Description": "A basic example of deploying Database for MySQL Servers Virtual Network Rules." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers", + "Path": "samples/flexibleservers/main.bicep", + "Description": "A basic example of deploying MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers/administrators", + "Path": "samples/flexibleservers/administrators/main.bicep", + "Description": "A basic example of deploying Active Directory administrator on a MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers/configurations", + "Path": "samples/flexibleservers/configurations/main.bicep", + "Description": "A basic example of deploying Sets a MySQL Flexible Server Configuration value on a MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers/databases", + "Path": "samples/flexibleservers/databases/main.bicep", + "Description": "A basic example of deploying MySQL Database within a MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/flexibleServers/firewallRules", + "Path": "samples/flexibleservers/firewallrules/main.bicep", + "Description": "A basic example of deploying Firewall Rule for a MySQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers", + "Path": "samples/servers/main.bicep", + "Description": "A basic example of deploying Database for MySQL Servers." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/administrators", + "Path": "samples/servers/administrators/main.bicep", + "Description": "A basic example of deploying Database for MySQL Servers Administrators." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/configurations", + "Path": "samples/servers/configurations/main.bicep", + "Description": "A basic example of deploying Database for MySQL Servers Configurations." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/databases", + "Path": "samples/servers/databases/main.bicep", + "Description": "A basic example of deploying Database for MySQL Servers Databases." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.bicep", + "Description": "A basic example of deploying Database for MySQL Servers Firewall Rules." + }, + { + "ResourceType": "Microsoft.DBforMySQL/servers/virtualNetworkRules", + "Path": "samples/servers/virtualnetworkrules/main.bicep", + "Description": "A basic example of deploying Database for MySQL Servers Virtual Network Rules." + } + ] +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/administrators/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/administrators/main.bicep new file mode 100644 index 00000000..e74f865d --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/administrators/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the MySQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2023-12-30' = { + name: '${resourceName}-mysql' + location: location + properties: { + administratorLogin: 'tfadmin' + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + version: '8.0.21' + } + sku: { + name: 'Standard_B1ms' + tier: 'Burstable' + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-uai1' + location: location +} + +resource userassignedidentity1 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-uai2' + location: location +} + +resource administrator 'Microsoft.DBforMySQL/flexibleServers/administrators@2023-12-30' = { + parent: flexibleServer + name: 'ActiveDirectory' + properties: { + administratorType: 'ActiveDirectory' + identityResourceId: userAssignedIdentity.id + login: 'sqladmin' + sid: deployer().objectId + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/configurations/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/configurations/main.bicep new file mode 100644 index 00000000..f6ea8f5b --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/configurations/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the MySQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2023-12-30' = { + name: '${resourceName}-mysql' + location: location + properties: { + administratorLogin: 'tfadmin' + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + version: '8.0.21' + } + sku: { + name: 'Standard_B1ms' + tier: 'Burstable' + } +} + +resource configuration 'Microsoft.DBforMySQL/flexibleServers/configurations@2023-12-30' = { + parent: flexibleServer + name: 'character_set_server' + properties: { + value: 'utf8mb4' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/databases/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/databases/main.bicep new file mode 100644 index 00000000..463da0ff --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/databases/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the MySQL flexible server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2021-05-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + createMode: '' + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + version: '' + } + sku: { + name: 'Standard_B1s' + tier: 'Burstable' + } +} + +resource database 'Microsoft.DBforMySQL/flexibleServers/databases@2021-05-01' = { + parent: flexibleServer + name: resourceName + properties: { + charset: 'utf8' + collation: 'utf8_unicode_ci' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/firewallrules/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/firewallrules/main.bicep new file mode 100644 index 00000000..01af1e66 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/firewallrules/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the MySQL flexible server') +param mysqlAdministratorPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2021-05-01' = { + name: resourceName + location: location + properties: { + administratorLogin: 'adminTerraform' + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + createMode: '' + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + version: '5.7' + } + sku: { + name: 'Standard_B1s' + tier: 'Burstable' + } +} + +resource firewallRule 'Microsoft.DBforMySQL/flexibleServers/firewallRules@2021-05-01' = { + parent: flexibleServer + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/flexibleservers/main.bicep b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/main.bicep new file mode 100644 index 00000000..93c05978 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/flexibleservers/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the MySQL flexible server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforMySQL/flexibleServers@2021-05-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + backup: { + backupRetentionDays: 7 + geoRedundantBackup: 'Disabled' + } + createMode: '' + dataEncryption: { + type: 'SystemManaged' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + } + sku: { + name: 'Standard_B1s' + tier: 'Burstable' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/administrators/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/administrators/main.bicep new file mode 100644 index 00000000..d06f8361 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/administrators/main.bicep @@ -0,0 +1,44 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource administrator 'Microsoft.DBforMySQL/servers/administrators@2017-12-01' = { + parent: server + name: 'activeDirectory' + properties: { + administratorType: 'ActiveDirectory' + login: 'sqladmin' + sid: deployer().objectId + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/configurations/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/configurations/main.bicep new file mode 100644 index 00000000..28c38190 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/configurations/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource configuration 'Microsoft.DBforMySQL/servers/configurations@2017-12-01' = { + parent: server + name: 'character_set_server' + properties: { + value: 'latin1' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/databases/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/databases/main.bicep new file mode 100644 index 00000000..4464b7d9 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/databases/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_1' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource database 'Microsoft.DBforMySQL/servers/databases@2017-12-01' = { + parent: server + name: resourceName + properties: { + charset: 'utf8' + collation: 'utf8_unicode_ci' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/firewallrules/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/firewallrules/main.bicep new file mode 100644 index 00000000..6e518061 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/firewallrules/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource firewallRule 'Microsoft.DBforMySQL/servers/firewallRules@2017-12-01' = { + parent: server + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/main.bicep new file mode 100644 index 00000000..b2d69497 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_1' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} diff --git a/settings/remarks/microsoft.dbformysql/samples/servers/virtualnetworkrules/main.bicep b/settings/remarks/microsoft.dbformysql/samples/servers/virtualnetworkrules/main.bicep new file mode 100644 index 00000000..8e5a7693 --- /dev/null +++ b/settings/remarks/microsoft.dbformysql/samples/servers/virtualnetworkrules/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the MySQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the MySQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforMySQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '5.7' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.7.29.0/29' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.7.29.0/29' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [ + { + service: 'Microsoft.Sql' + } + ] + } +} + +resource virtualNetworkRule 'Microsoft.DBforMySQL/servers/virtualNetworkRules@2017-12-01' = { + parent: server + name: resourceName + properties: { + ignoreMissingVnetServiceEndpoint: false + virtualNetworkSubnetId: subnet.id + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/remarks.json b/settings/remarks/microsoft.dbforpostgresql/remarks.json index aa6ce682..1efcfe92 100644 --- a/settings/remarks/microsoft.dbforpostgresql/remarks.json +++ b/settings/remarks/microsoft.dbforpostgresql/remarks.json @@ -1,70 +1,137 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers", - "Path": "samples/flexibleservers/main.tf", - "Description": "A basic example of deploying PostgreSQL Flexible Server." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/administrators", - "Path": "samples/flexibleservers/administrators/main.tf", - "Description": "A basic example of deploying Active Directory administrator on a PostgreSQL Flexible server." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/configurations", - "Path": "samples/flexibleservers/configurations/main.tf", - "Description": "A basic example of deploying Sets a PostgreSQL Configuration value on a Azure PostgreSQL Flexible Server." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/databases", - "Path": "samples/flexibleservers/databases/main.tf", - "Description": "A basic example of deploying PostgreSQL Flexible Server Database." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/firewallRules", - "Path": "samples/flexibleservers/firewallrules/main.tf", - "Description": "A basic example of deploying PostgreSQL Flexible Server Firewall Rule." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/virtualEndpoints", - "Path": "samples/flexibleservers/virtualendpoints/main.tf", - "Description": "A basic example of deploying Virtual Endpoint on a PostgreSQL Flexible Server." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/serverGroupsv2", - "Path": "samples/servergroupsv2/main.tf", - "Description": "A basic example of deploying Azure Cosmos DB for PostgreSQL Cluster." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/servers", - "Path": "samples/servers/main.tf", - "Description": "A basic example of deploying PostgreSQL Server." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/servers/administrators", - "Path": "samples/servers/administrators/main.tf", - "Description": "A basic example of deploying Database for PostgreSQL Servers Administrators." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/servers/configurations", - "Path": "samples/servers/configurations/main.tf", - "Description": "A basic example of deploying Sets a PostgreSQL Configuration value on a PostgreSQL Server." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/servers/databases", - "Path": "samples/servers/databases/main.tf", - "Description": "A basic example of deploying PostgreSQL Database within a PostgreSQL Server." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/servers/firewallRules", - "Path": "samples/servers/firewallrules/main.tf", - "Description": "A basic example of deploying Firewall Rule for a PostgreSQL Server." - }, - { - "ResourceType": "Microsoft.DBforPostgreSQL/servers/virtualNetworkRules", - "Path": "samples/servers/virtualnetworkrules/main.tf", - "Description": "A basic example of deploying PostgreSQL Virtual Network Rule." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers", + "Path": "samples/flexibleservers/main.tf", + "Description": "A basic example of deploying PostgreSQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/administrators", + "Path": "samples/flexibleservers/administrators/main.tf", + "Description": "A basic example of deploying Active Directory administrator on a PostgreSQL Flexible server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/configurations", + "Path": "samples/flexibleservers/configurations/main.tf", + "Description": "A basic example of deploying Sets a PostgreSQL Configuration value on a Azure PostgreSQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/databases", + "Path": "samples/flexibleservers/databases/main.tf", + "Description": "A basic example of deploying PostgreSQL Flexible Server Database." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/firewallRules", + "Path": "samples/flexibleservers/firewallrules/main.tf", + "Description": "A basic example of deploying PostgreSQL Flexible Server Firewall Rule." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/virtualEndpoints", + "Path": "samples/flexibleservers/virtualendpoints/main.tf", + "Description": "A basic example of deploying Virtual Endpoint on a PostgreSQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/serverGroupsv2", + "Path": "samples/servergroupsv2/main.tf", + "Description": "A basic example of deploying Azure Cosmos DB for PostgreSQL Cluster." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers", + "Path": "samples/servers/main.tf", + "Description": "A basic example of deploying PostgreSQL Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/administrators", + "Path": "samples/servers/administrators/main.tf", + "Description": "A basic example of deploying Database for PostgreSQL Servers Administrators." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/configurations", + "Path": "samples/servers/configurations/main.tf", + "Description": "A basic example of deploying Sets a PostgreSQL Configuration value on a PostgreSQL Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/databases", + "Path": "samples/servers/databases/main.tf", + "Description": "A basic example of deploying PostgreSQL Database within a PostgreSQL Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.tf", + "Description": "A basic example of deploying Firewall Rule for a PostgreSQL Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/virtualNetworkRules", + "Path": "samples/servers/virtualnetworkrules/main.tf", + "Description": "A basic example of deploying PostgreSQL Virtual Network Rule." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers", + "Path": "samples/flexibleservers/main.bicep", + "Description": "A basic example of deploying PostgreSQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/administrators", + "Path": "samples/flexibleservers/administrators/main.bicep", + "Description": "A basic example of deploying Active Directory administrator on a PostgreSQL Flexible server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/configurations", + "Path": "samples/flexibleservers/configurations/main.bicep", + "Description": "A basic example of deploying Sets a PostgreSQL Configuration value on a Azure PostgreSQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/databases", + "Path": "samples/flexibleservers/databases/main.bicep", + "Description": "A basic example of deploying PostgreSQL Flexible Server Database." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/firewallRules", + "Path": "samples/flexibleservers/firewallrules/main.bicep", + "Description": "A basic example of deploying PostgreSQL Flexible Server Firewall Rule." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/flexibleServers/virtualEndpoints", + "Path": "samples/flexibleservers/virtualendpoints/main.bicep", + "Description": "A basic example of deploying Virtual Endpoint on a PostgreSQL Flexible Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/serverGroupsv2", + "Path": "samples/servergroupsv2/main.bicep", + "Description": "A basic example of deploying Azure Cosmos DB for PostgreSQL Cluster." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers", + "Path": "samples/servers/main.bicep", + "Description": "A basic example of deploying PostgreSQL Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/administrators", + "Path": "samples/servers/administrators/main.bicep", + "Description": "A basic example of deploying Database for PostgreSQL Servers Administrators." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/configurations", + "Path": "samples/servers/configurations/main.bicep", + "Description": "A basic example of deploying Sets a PostgreSQL Configuration value on a PostgreSQL Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/databases", + "Path": "samples/servers/databases/main.bicep", + "Description": "A basic example of deploying PostgreSQL Database within a PostgreSQL Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.bicep", + "Description": "A basic example of deploying Firewall Rule for a PostgreSQL Server." + }, + { + "ResourceType": "Microsoft.DBforPostgreSQL/servers/virtualNetworkRules", + "Path": "samples/servers/virtualnetworkrules/main.bicep", + "Description": "A basic example of deploying PostgreSQL Virtual Network Rule." + } + ] +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/administrators/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/administrators/main.bicep new file mode 100644 index 00000000..a53943c6 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/administrators/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL flexible server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2022-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + authConfig: { + activeDirectoryAuth: 'Enabled' + passwordAuth: 'Enabled' + tenantId: deployer().tenantId + } + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} + +resource administrator 'Microsoft.DBforPostgreSQL/flexibleServers/administrators@2022-12-01' = { + parent: flexibleServer + name: 'data.azurerm_client_config.current.object_id' + properties: { + principalType: 'ServicePrincipal' + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/configurations/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/configurations/main.bicep new file mode 100644 index 00000000..29b9710c --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/configurations/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The administrator password for the PostgreSQL flexible server') +param postgresqlAdministratorPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2023-06-01-preview' = { + name: resourceName + location: location + identity: { + type: 'None' + userAssignedIdentities: null + } + properties: { + administratorLogin: 'adminTerraform' + administratorLoginPassword: null + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} + +resource pgbouncerDefaultPoolSize 'Microsoft.DBforPostgreSQL/flexibleServers/configurations@2022-12-01' = { + parent: flexibleServer + name: 'pgbouncer.default_pool_size' + properties: { + source: 'user-override' + value: '40' + } + dependsOn: [ + pgbouncerEnabled + ] +} + +resource pgbouncerEnabled 'Microsoft.DBforPostgreSQL/flexibleServers/configurations@2022-12-01' = { + parent: flexibleServer + name: 'pgbouncer.enabled' + properties: { + source: 'user-override' + value: 'true' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/databases/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/databases/main.bicep new file mode 100644 index 00000000..36781900 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/databases/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the PostgreSQL flexible server') +param postgresqlAdministratorPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2022-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: 'adminTerraform' + administratorLoginPassword: null + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} + +resource database 'Microsoft.DBforPostgreSQL/flexibleServers/databases@2022-12-01' = { + parent: flexibleServer + name: resourceName + properties: { + charset: 'UTF8' + collation: 'en_US.UTF8' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/firewallrules/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/firewallrules/main.bicep new file mode 100644 index 00000000..0f1d9126 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/firewallrules/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the PostgreSQL flexible server') +param postgresqlAdministratorPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2022-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: 'adminTerraform' + administratorLoginPassword: null + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} + +resource firewallRule 'Microsoft.DBforPostgreSQL/flexibleServers/firewallRules@2022-12-01' = { + parent: flexibleServer + name: resourceName + properties: { + endIpAddress: '122.122.0.0' + startIpAddress: '122.122.0.0' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/main.bicep new file mode 100644 index 00000000..bd677693 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@description('The administrator login name for the PostgreSQL flexible server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2023-06-01-preview' = { + name: resourceName + location: location + identity: { + type: 'None' + userAssignedIdentities: null + } + properties: { + administratorLogin: null + administratorLoginPassword: null + availabilityZone: '2' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: {} + storage: { + storageSizeGB: 32 + } + version: '12' + } + sku: { + name: 'Standard_D2s_v3' + tier: 'GeneralPurpose' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/virtualendpoints/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/virtualendpoints/main.bicep new file mode 100644 index 00000000..f32b3bc8 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/flexibleservers/virtualendpoints/main.bicep @@ -0,0 +1,70 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the PostgreSQL flexible server') +param administratorLoginPassword string + +resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2024-08-01' = { + name: '${resourceName}-primary' + location: location + properties: { + administratorLogin: 'psqladmin' + administratorLoginPassword: null + availabilityZone: '1' + backup: { + geoRedundantBackup: 'Disabled' + } + highAvailability: { + mode: 'Disabled' + } + network: { + publicNetworkAccess: 'Disabled' + } + storage: { + autoGrow: 'Disabled' + storageSizeGB: 32 + tier: 'P30' + } + version: '16' + } + sku: { + name: 'Standard_D2ads_v5' + tier: 'GeneralPurpose' + } +} + +resource flexibleserver1 'Microsoft.DBforPostgreSQL/flexibleServers@2024-08-01' = { + name: '${resourceName}-replica' + location: location + properties: { + availabilityZone: '1' + backup: { + geoRedundantBackup: 'Disabled' + } + createMode: 'Replica' + highAvailability: { + mode: 'Disabled' + } + network: { + publicNetworkAccess: 'Disabled' + } + sourceServerResourceId: flexibleServer.id + storage: { + autoGrow: 'Disabled' + storageSizeGB: 32 + tier: 'P30' + } + version: '16' + } +} + +resource virtualEndpoint 'Microsoft.DBforPostgreSQL/flexibleServers/virtualEndpoints@2024-08-01' = { + parent: flexibleServer + name: resourceName + properties: { + endpointType: 'ReadWrite' + members: [ + flexibleserver1.name + ] + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servergroupsv2/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servergroupsv2/main.bicep new file mode 100644 index 00000000..b4888c67 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servergroupsv2/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the PostgreSQL server group') +param administratorLoginPassword string + +resource serverGroupsv2 'Microsoft.DBforPostgreSQL/serverGroupsv2@2022-11-08' = { + name: resourceName + location: location + properties: { + administratorLoginPassword: null + coordinatorEnablePublicIpAccess: true + coordinatorServerEdition: 'GeneralPurpose' + coordinatorStorageQuotaInMb: 131072 + coordinatorVCores: 2 + enableHa: false + nodeCount: 0 + nodeEnablePublicIpAccess: false + nodeServerEdition: 'MemoryOptimized' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/administrators/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/administrators/main.bicep new file mode 100644 index 00000000..042fc32c --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/administrators/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string +@description('The administrator login name for the PostgreSQL server admin') +param adminLogin string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.6' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource administrator 'Microsoft.DBforPostgreSQL/servers/administrators@2017-12-01' = { + parent: server + name: 'activeDirectory' + properties: { + administratorType: 'ActiveDirectory' + login: null + sid: deployer().objectId + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/configurations/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/configurations/main.bicep new file mode 100644 index 00000000..e3a3be58 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/configurations/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.6' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource configuration 'Microsoft.DBforPostgreSQL/servers/configurations@2017-12-01' = { + parent: server + name: 'backslash_quote' + properties: { + value: 'on' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/databases/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/databases/main.bicep new file mode 100644 index 00000000..3b7730c5 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/databases/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.6' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource database 'Microsoft.DBforPostgreSQL/servers/databases@2017-12-01' = { + parent: server + name: resourceName + properties: { + charset: 'UTF8' + collation: 'English_United States.1252' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/firewallrules/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/firewallrules/main.bicep new file mode 100644 index 00000000..5d2022d7 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/firewallrules/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.6' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource firewallRule 'Microsoft.DBforPostgreSQL/servers/firewallRules@2017-12-01' = { + parent: server + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/main.bicep new file mode 100644 index 00000000..39559318 --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.5' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} diff --git a/settings/remarks/microsoft.dbforpostgresql/samples/servers/virtualnetworkrules/main.bicep b/settings/remarks/microsoft.dbforpostgresql/samples/servers/virtualnetworkrules/main.bicep new file mode 100644 index 00000000..471521bb --- /dev/null +++ b/settings/remarks/microsoft.dbforpostgresql/samples/servers/virtualnetworkrules/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login for the PostgreSQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the PostgreSQL server') +param administratorLoginPassword string + +resource server 'Microsoft.DBforPostgreSQL/servers@2017-12-01' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + createMode: 'Default' + infrastructureEncryption: 'Disabled' + minimalTlsVersion: 'TLS1_2' + publicNetworkAccess: 'Enabled' + sslEnforcement: 'Enabled' + storageProfile: { + backupRetentionDays: 7 + storageAutogrow: 'Enabled' + storageMB: 51200 + } + version: '9.5' + } + sku: { + capacity: 2 + family: 'Gen5' + name: 'GP_Gen5_2' + tier: 'GeneralPurpose' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.7.29.0/29' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.7.29.0/29' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [ + { + service: 'Microsoft.Sql' + } + ] + } +} + +resource virtualNetworkRule 'Microsoft.DBforPostgreSQL/servers/virtualNetworkRules@2017-12-01' = { + parent: server + name: resourceName + properties: { + ignoreMissingVnetServiceEndpoint: false + virtualNetworkSubnetId: subnet.id + } +} diff --git a/settings/remarks/microsoft.desktopvirtualization/remarks.json b/settings/remarks/microsoft.desktopvirtualization/remarks.json index 47203009..8c18d77b 100644 --- a/settings/remarks/microsoft.desktopvirtualization/remarks.json +++ b/settings/remarks/microsoft.desktopvirtualization/remarks.json @@ -1,25 +1,42 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DesktopVirtualization/applicationGroups", - "Path": "samples/applicationgroups/main.tf", - "Description": "A basic example of deploying Virtual Desktop Application Group." - }, - { - "ResourceType": "Microsoft.DesktopVirtualization/applicationGroups/applications", - "Path": "samples/applicationgroups/applications/main.tf", - "Description": "A basic example of deploying Virtual Desktop Application." - }, - { - "ResourceType": "Microsoft.DesktopVirtualization/scalingPlans/personalSchedules", - "Path": "samples/scalingplans/personalschedules/main.tf", - "Description": "A basic example of deploying Desktop Virtualization Scaling Plans Personal Schedules." - }, - { - "ResourceType": "Microsoft.DesktopVirtualization/workspaces", - "Path": "samples/workspaces/main.tf", - "Description": "A basic example of deploying Virtual Desktop Workspace." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DesktopVirtualization/applicationGroups", + "Path": "samples/applicationgroups/main.tf", + "Description": "A basic example of deploying Virtual Desktop Application Group." + }, + { + "ResourceType": "Microsoft.DesktopVirtualization/applicationGroups/applications", + "Path": "samples/applicationgroups/applications/main.tf", + "Description": "A basic example of deploying Virtual Desktop Application." + }, + { + "ResourceType": "Microsoft.DesktopVirtualization/scalingPlans/personalSchedules", + "Path": "samples/scalingplans/personalschedules/main.tf", + "Description": "A basic example of deploying Desktop Virtualization Scaling Plans Personal Schedules." + }, + { + "ResourceType": "Microsoft.DesktopVirtualization/workspaces", + "Path": "samples/workspaces/main.tf", + "Description": "A basic example of deploying Virtual Desktop Workspace." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DesktopVirtualization/applicationGroups", + "Path": "samples/applicationgroups/main.bicep", + "Description": "A basic example of deploying Virtual Desktop Application Group." + }, + { + "ResourceType": "Microsoft.DesktopVirtualization/applicationGroups/applications", + "Path": "samples/applicationgroups/applications/main.bicep", + "Description": "A basic example of deploying Virtual Desktop Application." + }, + { + "ResourceType": "Microsoft.DesktopVirtualization/workspaces", + "Path": "samples/workspaces/main.bicep", + "Description": "A basic example of deploying Virtual Desktop Workspace." + } + ] +} diff --git a/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/applications/main.bicep b/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/applications/main.bicep new file mode 100644 index 00000000..190e9064 --- /dev/null +++ b/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/applications/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource applicationGroup 'Microsoft.DesktopVirtualization/applicationGroups@2023-09-05' = { + name: resourceName + location: location + properties: { + applicationGroupType: 'RemoteApp' + hostPoolArmPath: hostPool.id + } +} + +resource hostPool 'Microsoft.DesktopVirtualization/hostPools@2023-09-05' = { + name: resourceName + location: location + properties: { + hostPoolType: 'Pooled' + loadBalancerType: 'BreadthFirst' + maxSessionLimit: 999999 + preferredAppGroupType: 'Desktop' + publicNetworkAccess: 'Enabled' + startVMOnConnect: false + validationEnvironment: false + } +} + +resource application 'Microsoft.DesktopVirtualization/applicationGroups/applications@2023-09-05' = { + parent: applicationGroup + name: resourceName + location: location + properties: { + commandLineSetting: 'DoNotAllow' + filePath: 'C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe' + showInPortal: false + } +} diff --git a/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/main.bicep b/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/main.bicep new file mode 100644 index 00000000..75e4a4c3 --- /dev/null +++ b/settings/remarks/microsoft.desktopvirtualization/samples/applicationgroups/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource applicationGroup 'Microsoft.DesktopVirtualization/applicationGroups@2024-04-03' = { + name: '${resourceName}-ag' + location: location + properties: { + applicationGroupType: 'Desktop' + description: '' + friendlyName: '' + hostPoolArmPath: hostPool.id + } +} + +resource hostPool 'Microsoft.DesktopVirtualization/hostPools@2024-04-03' = { + name: '${resourceName}-hp' + location: location + properties: { + customRdpProperty: '' + description: '' + friendlyName: '' + hostPoolType: 'Pooled' + loadBalancerType: 'BreadthFirst' + maxSessionLimit: 999999 + personalDesktopAssignmentType: '' + preferredAppGroupType: 'Desktop' + publicNetworkAccess: 'Enabled' + startVMOnConnect: false + validationEnvironment: false + vmTemplate: '' + } +} diff --git a/settings/remarks/microsoft.desktopvirtualization/samples/workspaces/main.bicep b/settings/remarks/microsoft.desktopvirtualization/samples/workspaces/main.bicep new file mode 100644 index 00000000..41fcd7a5 --- /dev/null +++ b/settings/remarks/microsoft.desktopvirtualization/samples/workspaces/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource workspace 'Microsoft.DesktopVirtualization/workspaces@2024-04-03' = { + name: resourceName + location: location + properties: { + description: '' + friendlyName: '' + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.devcenter/remarks.json b/settings/remarks/microsoft.devcenter/remarks.json index 06a0b051..14551069 100644 --- a/settings/remarks/microsoft.devcenter/remarks.json +++ b/settings/remarks/microsoft.devcenter/remarks.json @@ -1,50 +1,92 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DevCenter/devCenters", - "Path": "samples/devcenters/main.tf", - "Description": "A basic example of deploying Dev Center." - }, - { - "ResourceType": "Microsoft.DevCenter/devCenters/catalogs", - "Path": "samples/devcenters/catalogs/main.tf", - "Description": "A basic example of deploying Dev Center Catalog." - }, - { - "ResourceType": "Microsoft.DevCenter/devCenters/environmentTypes", - "Path": "samples/devcenters/environmenttypes/main.tf", - "Description": "A basic example of deploying Dev Center Environment Type." - }, - { - "ResourceType": "Microsoft.DevCenter/devCenters/galleries", - "Path": "samples/devcenters/galleries/main.tf", - "Description": "A basic example of deploying Dev Center Gallery." - }, - { - "ResourceType": "Microsoft.DevCenter/devcenters/attachednetworks", - "Path": "samples/devcenters/attachednetworks/main.tf", - "Description": "A basic example of deploying Dev Center Attached Network." - }, - { - "ResourceType": "Microsoft.DevCenter/devcenters/devboxdefinitions", - "Path": "samples/devcenters/devboxdefinitions/main.tf", - "Description": "A basic example of deploying Dev Center Dev Box Definition." - }, - { - "ResourceType": "Microsoft.DevCenter/networkConnections", - "Path": "samples/networkconnections/main.tf", - "Description": "A basic example of deploying Dev Center Network Connection." - }, - { - "ResourceType": "Microsoft.DevCenter/projects", - "Path": "samples/projects/main.tf", - "Description": "A basic example of deploying Dev Center Project." - }, - { - "ResourceType": "Microsoft.DevCenter/projects/environmentTypes", - "Path": "samples/projects/environmenttypes/main.tf", - "Description": "A basic example of deploying Dev Center Project Environment Type." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DevCenter/devCenters", + "Path": "samples/devcenters/main.tf", + "Description": "A basic example of deploying Dev Center." + }, + { + "ResourceType": "Microsoft.DevCenter/devCenters/catalogs", + "Path": "samples/devcenters/catalogs/main.tf", + "Description": "A basic example of deploying Dev Center Catalog." + }, + { + "ResourceType": "Microsoft.DevCenter/devCenters/environmentTypes", + "Path": "samples/devcenters/environmenttypes/main.tf", + "Description": "A basic example of deploying Dev Center Environment Type." + }, + { + "ResourceType": "Microsoft.DevCenter/devCenters/galleries", + "Path": "samples/devcenters/galleries/main.tf", + "Description": "A basic example of deploying Dev Center Gallery." + }, + { + "ResourceType": "Microsoft.DevCenter/devcenters/attachednetworks", + "Path": "samples/devcenters/attachednetworks/main.tf", + "Description": "A basic example of deploying Dev Center Attached Network." + }, + { + "ResourceType": "Microsoft.DevCenter/devcenters/devboxdefinitions", + "Path": "samples/devcenters/devboxdefinitions/main.tf", + "Description": "A basic example of deploying Dev Center Dev Box Definition." + }, + { + "ResourceType": "Microsoft.DevCenter/networkConnections", + "Path": "samples/networkconnections/main.tf", + "Description": "A basic example of deploying Dev Center Network Connection." + }, + { + "ResourceType": "Microsoft.DevCenter/projects", + "Path": "samples/projects/main.tf", + "Description": "A basic example of deploying Dev Center Project." + }, + { + "ResourceType": "Microsoft.DevCenter/projects/environmentTypes", + "Path": "samples/projects/environmenttypes/main.tf", + "Description": "A basic example of deploying Dev Center Project Environment Type." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DevCenter/devCenters", + "Path": "samples/devcenters/main.bicep", + "Description": "A basic example of deploying Dev Center." + }, + { + "ResourceType": "Microsoft.DevCenter/devCenters/catalogs", + "Path": "samples/devcenters/catalogs/main.bicep", + "Description": "A basic example of deploying Dev Center Catalog." + }, + { + "ResourceType": "Microsoft.DevCenter/devCenters/environmentTypes", + "Path": "samples/devcenters/environmenttypes/main.bicep", + "Description": "A basic example of deploying Dev Center Environment Type." + }, + { + "ResourceType": "Microsoft.DevCenter/devcenters/attachednetworks", + "Path": "samples/devcenters/attachednetworks/main.bicep", + "Description": "A basic example of deploying Dev Center Attached Network." + }, + { + "ResourceType": "Microsoft.DevCenter/devcenters/devboxdefinitions", + "Path": "samples/devcenters/devboxdefinitions/main.bicep", + "Description": "A basic example of deploying Dev Center Dev Box Definition." + }, + { + "ResourceType": "Microsoft.DevCenter/networkConnections", + "Path": "samples/networkconnections/main.bicep", + "Description": "A basic example of deploying Dev Center Network Connection." + }, + { + "ResourceType": "Microsoft.DevCenter/projects", + "Path": "samples/projects/main.bicep", + "Description": "A basic example of deploying Dev Center Project." + }, + { + "ResourceType": "Microsoft.DevCenter/projects/environmentTypes", + "Path": "samples/projects/environmenttypes/main.bicep", + "Description": "A basic example of deploying Dev Center Project Environment Type." + } + ] +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/attachednetworks/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/attachednetworks/main.bicep new file mode 100644 index 00000000..7cb03984 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/attachednetworks/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource devCenter 'Microsoft.DevCenter/devcenters@2023-04-01' = { + name: resourceName + location: location + identity: { + type: 'SystemAssigned' + userAssignedIdentities: null + } +} + +resource networkConnection 'Microsoft.DevCenter/networkConnections@2023-04-01' = { + name: resourceName + location: 'westeurope' + properties: { + domainJoinType: 'AzureADJoin' + subnetId: subnet.id + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + } +} + +resource attachNetwork 'Microsoft.DevCenter/devcenters/attachednetworks@2023-04-01' = { + parent: devCenter + name: resourceName + properties: { + networkConnectionId: networkConnection.id + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/catalogs/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/catalogs/main.bicep new file mode 100644 index 00000000..a6a3809a --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/catalogs/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: '${substring(resourceName, 0, 22)}-dc' + location: location + properties: {} +} + +resource catalog 'Microsoft.DevCenter/devCenters/catalogs@2025-02-01' = { + parent: devCenter + name: '${substring(resourceName, 0, 17)}-catalog' + properties: { + adoGit: { + branch: 'main' + path: '/template' + secretIdentifier: 'https://amlim-kv.vault.azure.net/secrets/ado/6279752c2bdd4a38a3e79d958cc36a75' + uri: 'https://amlim@dev.azure.com/amlim/testCatalog/_git/testCatalog' + } + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/devboxdefinitions/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/devboxdefinitions/main.bicep new file mode 100644 index 00000000..2368eef0 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/devboxdefinitions/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource devCenter 'Microsoft.DevCenter/devcenters@2023-04-01' = { + name: resourceName + location: location + identity: { + type: 'SystemAssigned' + userAssignedIdentities: null + } +} + +resource devBoxDefinition 'Microsoft.DevCenter/devcenters/devboxdefinitions@2024-10-01-preview' = { + parent: devCenter + name: resourceName + location: location + properties: { + hibernateSupport: 'Enabled' + imageReference: { + id: '${devCenter.id}/galleries/default/images/microsoftvisualstudio_visualstudioplustools_vs-2022-ent-general-win10-m365-gen2' + } + sku: { + name: 'general_i_8c32gb256ssd_v2' + } + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/environmenttypes/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/environmenttypes/main.bicep new file mode 100644 index 00000000..48152382 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/environmenttypes/main.bicep @@ -0,0 +1,13 @@ +param resourceName string +param location string + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: resourceName + location: location + properties: {} +} + +resource environmentType 'Microsoft.DevCenter/devCenters/environmentTypes@2025-02-01' = { + parent: devCenter + name: resourceName +} diff --git a/settings/remarks/microsoft.devcenter/samples/devcenters/main.bicep b/settings/remarks/microsoft.devcenter/samples/devcenters/main.bicep new file mode 100644 index 00000000..c091a718 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/devcenters/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: resourceName + location: location +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-uai' + location: location +} diff --git a/settings/remarks/microsoft.devcenter/samples/networkconnections/main.bicep b/settings/remarks/microsoft.devcenter/samples/networkconnections/main.bicep new file mode 100644 index 00000000..b1655e53 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/networkconnections/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkConnection 'Microsoft.DevCenter/networkConnections@2023-04-01' = { + name: resourceName + location: location + properties: { + domainJoinType: 'AzureADJoin' + subnetId: subnet.id + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/projects/environmenttypes/main.bicep b/settings/remarks/microsoft.devcenter/samples/projects/environmenttypes/main.bicep new file mode 100644 index 00000000..85ced5c5 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/projects/environmenttypes/main.bicep @@ -0,0 +1,32 @@ +param resourceName string +param location string + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: resourceName + location: location + properties: {} +} + +resource project 'Microsoft.DevCenter/projects@2025-02-01' = { + name: '${resourceName}-proj' + location: location + properties: { + description: '' + devCenterId: devCenter.id + maxDevBoxesPerUser: 0 + } +} + +resource environmentType 'Microsoft.DevCenter/devCenters/environmentTypes@2025-02-01' = { + parent: devCenter + name: '${resourceName}-envtype' +} + +resource environmenttype1 'Microsoft.DevCenter/projects/environmentTypes@2025-02-01' = { + parent: project + name: 'environmentType.name' + properties: { + deploymentTargetId: '/subscriptions/subscription().subscriptionId' + status: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.devcenter/samples/projects/main.bicep b/settings/remarks/microsoft.devcenter/samples/projects/main.bicep new file mode 100644 index 00000000..53ecbc92 --- /dev/null +++ b/settings/remarks/microsoft.devcenter/samples/projects/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource devCenter 'Microsoft.DevCenter/devCenters@2025-02-01' = { + name: resourceName + location: location + properties: {} +} + +resource project 'Microsoft.DevCenter/projects@2025-02-01' = { + name: '${resourceName}-proj' + location: location + properties: { + description: '' + devCenterId: devCenter.id + maxDevBoxesPerUser: 0 + } +} diff --git a/settings/remarks/microsoft.devices/remarks.json b/settings/remarks/microsoft.devices/remarks.json index a826894b..41cdef03 100644 --- a/settings/remarks/microsoft.devices/remarks.json +++ b/settings/remarks/microsoft.devices/remarks.json @@ -1,33 +1,55 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "Create and update is supported only on versions 2022-02-05 and later.", - "ResourceTypes": [ - "microsoft.devices/provisioningservices/certificates" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Devices/IotHubs", - "Path": "samples/iothubs/main.tf", - "Description": "A basic example of deploying IotHub." - }, - { - "ResourceType": "Microsoft.Devices/IotHubs/certificates", - "Path": "samples/iothubs/certificates/main.tf", - "Description": "A basic example of deploying IoTHub Certificate." - }, - { - "ResourceType": "Microsoft.Devices/provisioningServices", - "Path": "samples/provisioningservices/main.tf", - "Description": "A basic example of deploying IoT Device Provisioning Service." - }, - { - "ResourceType": "Microsoft.Devices/provisioningServices/certificates", - "Path": "samples/provisioningservices/certificates/main.tf", - "Description": "A basic example of deploying IoT Device Provisioning Service Certificate." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "Create and update is supported only on versions 2022-02-05 and later.", + "ResourceTypes": [ + "microsoft.devices/provisioningservices/certificates" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Devices/IotHubs", + "Path": "samples/iothubs/main.tf", + "Description": "A basic example of deploying IotHub." + }, + { + "ResourceType": "Microsoft.Devices/IotHubs/certificates", + "Path": "samples/iothubs/certificates/main.tf", + "Description": "A basic example of deploying IoTHub Certificate." + }, + { + "ResourceType": "Microsoft.Devices/provisioningServices", + "Path": "samples/provisioningservices/main.tf", + "Description": "A basic example of deploying IoT Device Provisioning Service." + }, + { + "ResourceType": "Microsoft.Devices/provisioningServices/certificates", + "Path": "samples/provisioningservices/certificates/main.tf", + "Description": "A basic example of deploying IoT Device Provisioning Service Certificate." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Devices/IotHubs", + "Path": "samples/iothubs/main.bicep", + "Description": "A basic example of deploying IotHub." + }, + { + "ResourceType": "Microsoft.Devices/IotHubs/certificates", + "Path": "samples/iothubs/certificates/main.bicep", + "Description": "A basic example of deploying IoTHub Certificate." + }, + { + "ResourceType": "Microsoft.Devices/provisioningServices", + "Path": "samples/provisioningservices/main.bicep", + "Description": "A basic example of deploying IoT Device Provisioning Service." + }, + { + "ResourceType": "Microsoft.Devices/provisioningServices/certificates", + "Path": "samples/provisioningservices/certificates/main.bicep", + "Description": "A basic example of deploying IoT Device Provisioning Service Certificate." + } + ] +} diff --git a/settings/remarks/microsoft.devices/samples/iothubs/certificates/main.bicep b/settings/remarks/microsoft.devices/samples/iothubs/certificates/main.bicep new file mode 100644 index 00000000..eaac0850 --- /dev/null +++ b/settings/remarks/microsoft.devices/samples/iothubs/certificates/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The Base64 encoded certificate content for the IoT Hub') +param certificateContent string + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'B1' + } +} + +resource certificate 'Microsoft.Devices/IotHubs/certificates@2022-04-30-preview' = { + parent: iothub + name: resourceName + properties: { + certificate: null + isVerified: false + } +} diff --git a/settings/remarks/microsoft.devices/samples/iothubs/main.bicep b/settings/remarks/microsoft.devices/samples/iothubs/main.bicep new file mode 100644 index 00000000..036e8dd0 --- /dev/null +++ b/settings/remarks/microsoft.devices/samples/iothubs/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'S1' + } +} diff --git a/settings/remarks/microsoft.devices/samples/provisioningservices/certificates/main.bicep b/settings/remarks/microsoft.devices/samples/provisioningservices/certificates/main.bicep new file mode 100644 index 00000000..0132ce72 --- /dev/null +++ b/settings/remarks/microsoft.devices/samples/provisioningservices/certificates/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource provisioningService 'Microsoft.Devices/provisioningServices@2022-02-05' = { + name: resourceName + location: location + properties: { + allocationPolicy: 'Hashed' + enableDataResidency: false + iotHubs: [] + publicNetworkAccess: 'Enabled' + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource certificate 'Microsoft.Devices/provisioningServices/certificates@2022-02-05' = { + parent: provisioningService + name: resourceName + properties: { + certificate: 'LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tDQpNSUlEYnpDQ0FsZWdBd0lCQWdJSkFJempSRDM2c0liYk1BMEdDU3FHU0liM0RRRUJDd1VBTUUweEN6QUpCZ05WDQpCQVlUQWxWVE1STXdFUVlEVlFRSURBcFRiMjFsTFZOMFlYUmxNUkl3RUFZRFZRUUtEQWwwWlhKeVlXWnZjbTB4DQpGVEFUQmdOVkJBTU1ESFJsY25KaFptOXliUzVwYnpBZ0Z3MHhOekEwTWpFeU1EQTFNamRhR0E4eU1URTNNRE15DQpPREl3TURVeU4xb3dUVEVMTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnTUNsTnZiV1V0VTNSaGRHVXhFakFRDQpCZ05WQkFvTUNYUmxjbkpoWm05eWJURVZNQk1HQTFVRUF3d01kR1Z5Y21GbWIzSnRMbWx2TUlJQklqQU5CZ2txDQpoa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQTNMOUw1c3pUNCtGTHlrVEZOeXlQankvazNCUVRZQWZSDQpRelAyZGhuc3VVS20zY2RQQzBOeVord0VYSVVHaG9ETzJZRzZFWUNoT2w4ZnNEcURPamxvU1VHS3FZdysrbmxwDQpISXVVZ0p4OEl4eEcyWGtBTENqRlU3RW1GK3c3a243NmQwZXpwRUlZeG5MUCtLRzJEVm9ybm9FdDFhTGh2MU1MDQptcGdFWlpQaERiTVNMaFNZV2VUVlJNYXlYTHdxdGZnbkR1bVFTQis4ZC8xSnVKcXJTSTRwRDEySm96VlRoemI2DQpoc2pmYjZSTVg0ZXBQbXJHbjBQYlRQRUVBNmF3bXN4QkNYQjBzMTNuTlF0L08waExNMmFnd3ZBeW96aWxRVitzDQo2MTZDa2drNkRKb1VrcVpoRHk3dlBZTUlSU3I5OGZCd3M2emtyVjZ0VExqbUQ4eEF2b2JlUFFJREFRQUJvMUF3DQpUakFkQmdOVkhRNEVGZ1FVWElxTzQyMXpNTW1iY1JSWDl3Y3RaRkNRdVBJd0h3WURWUjBqQkJnd0ZvQVVYSXFPDQo0MjF6TU1tYmNSUlg5d2N0WkZDUXVQSXdEQVlEVlIwVEJBVXdBd0VCL3pBTkJna3Foa2lHOXcwQkFRc0ZBQU9DDQpBUUVBcjgyTmVUM0JZSk9LTGxVTDZPbTVMalVGNjZld2NKakc5bHRkdnlRd1ZuZU1jcTd0NVVBUHhnQ2h6cU5SDQpWazRkYThQemtYcGpCSnlXZXpIdXBkSk5YM1hxZVVrMmtTeHFRNi9nbWhxdmZJM3k3ZGpyd29PNmp2TUVZMjZXDQpxdGtUTk9SV0RQM1RISkpWaW1DM3pWK0tNVTVVQlZyRXpoT1ZoSFNVNzA5bEJQNzVvMEJCbjN4R3NQcVNxOWs4DQpJb3RJRmZ5QWM2YStYUDMrWk1wdmg3d3FBVW1sN3ZXYTV3bGNYRXhDeDM5aDFiYWxmRFNMR05DNHN3V1BDcDlBDQpNblFSMHArdk1heTloTlAxRWgrOVFZVWFpMTRkNUtTM2NGVitLeEUxY0pSNUhEL2lMbHRubk9FYnBNc0IwZVZPDQpaV2tGdkU3WTVsVzBvVlNBZmluNVR3VEpNUT09DQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t' + } +} diff --git a/settings/remarks/microsoft.devices/samples/provisioningservices/main.bicep b/settings/remarks/microsoft.devices/samples/provisioningservices/main.bicep new file mode 100644 index 00000000..e38ef376 --- /dev/null +++ b/settings/remarks/microsoft.devices/samples/provisioningservices/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource provisioningService 'Microsoft.Devices/provisioningServices@2022-02-05' = { + name: resourceName + location: location + properties: { + allocationPolicy: 'Hashed' + enableDataResidency: false + iotHubs: [] + publicNetworkAccess: 'Enabled' + } + sku: { + capacity: 1 + name: 'S1' + } +} diff --git a/settings/remarks/microsoft.deviceupdate/remarks.json b/settings/remarks/microsoft.deviceupdate/remarks.json index 61abe75f..6e55d6df 100644 --- a/settings/remarks/microsoft.deviceupdate/remarks.json +++ b/settings/remarks/microsoft.deviceupdate/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DeviceUpdate/accounts", - "Path": "samples/accounts/main.tf", - "Description": "A basic example of deploying IoT Hub Device Update Account." - }, - { - "ResourceType": "Microsoft.DeviceUpdate/accounts/instances", - "Path": "samples/accounts/instances/main.tf", - "Description": "A basic example of deploying IoT Hub Device Update Instance." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DeviceUpdate/accounts", + "Path": "samples/accounts/main.tf", + "Description": "A basic example of deploying IoT Hub Device Update Account." + }, + { + "ResourceType": "Microsoft.DeviceUpdate/accounts/instances", + "Path": "samples/accounts/instances/main.tf", + "Description": "A basic example of deploying IoT Hub Device Update Instance." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DeviceUpdate/accounts", + "Path": "samples/accounts/main.bicep", + "Description": "A basic example of deploying IoT Hub Device Update Account." + }, + { + "ResourceType": "Microsoft.DeviceUpdate/accounts/instances", + "Path": "samples/accounts/instances/main.bicep", + "Description": "A basic example of deploying IoT Hub Device Update Instance." + } + ] +} diff --git a/settings/remarks/microsoft.deviceupdate/samples/accounts/instances/main.bicep b/settings/remarks/microsoft.deviceupdate/samples/accounts/instances/main.bicep new file mode 100644 index 00000000..348c8fb1 --- /dev/null +++ b/settings/remarks/microsoft.deviceupdate/samples/accounts/instances/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource account 'Microsoft.DeviceUpdate/accounts@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + sku: 'Standard' + } +} + +resource instance 'Microsoft.DeviceUpdate/accounts/instances@2022-10-01' = { + parent: account + name: resourceName + location: location + properties: { + accountName: account.name + enableDiagnostics: false + iotHubs: [ + { + resourceId: iothub.id + } + ] + } +} diff --git a/settings/remarks/microsoft.deviceupdate/samples/accounts/main.bicep b/settings/remarks/microsoft.deviceupdate/samples/accounts/main.bicep new file mode 100644 index 00000000..1850c1aa --- /dev/null +++ b/settings/remarks/microsoft.deviceupdate/samples/accounts/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.DeviceUpdate/accounts@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + sku: 'Standard' + } +} diff --git a/settings/remarks/microsoft.devtestlab/remarks.json b/settings/remarks/microsoft.devtestlab/remarks.json index 8d884d3c..db661cfc 100644 --- a/settings/remarks/microsoft.devtestlab/remarks.json +++ b/settings/remarks/microsoft.devtestlab/remarks.json @@ -1,35 +1,67 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DevTestLab/labs", - "Path": "samples/labs/main.tf", - "Description": "A basic example of deploying Dev Test Lab." - }, - { - "ResourceType": "Microsoft.DevTestLab/labs/policySets/policies", - "Path": "samples/labs/policysets/policies/main.tf", - "Description": "A basic example of deploying Policy within a Dev Test Policy Set." - }, - { - "ResourceType": "Microsoft.DevTestLab/labs/schedules", - "Path": "samples/labs/schedules/main.tf", - "Description": "A basic example of deploying automated startup and shutdown schedules for Azure Dev Test Lab." - }, - { - "ResourceType": "Microsoft.DevTestLab/labs/virtualMachines", - "Path": "samples/labs/virtualmachines/main.tf", - "Description": "A basic example of deploying Virtual Machine within a Dev Test Lab." - }, - { - "ResourceType": "Microsoft.DevTestLab/labs/virtualNetworks", - "Path": "samples/labs/virtualnetworks/main.tf", - "Description": "A basic example of deploying Virtual Network within a DevTest Lab." - }, - { - "ResourceType": "Microsoft.DevTestLab/schedules", - "Path": "samples/schedules/main.tf", - "Description": "A basic example of deploying automated shutdown schedules for Azure Resource Manager VMs outside of Dev Test Labs." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DevTestLab/labs", + "Path": "samples/labs/main.tf", + "Description": "A basic example of deploying Dev Test Lab." + }, + { + "ResourceType": "Microsoft.DevTestLab/labs/policySets/policies", + "Path": "samples/labs/policysets/policies/main.tf", + "Description": "A basic example of deploying Policy within a Dev Test Policy Set." + }, + { + "ResourceType": "Microsoft.DevTestLab/labs/schedules", + "Path": "samples/labs/schedules/main.tf", + "Description": "A basic example of deploying automated startup and shutdown schedules for Azure Dev Test Lab." + }, + { + "ResourceType": "Microsoft.DevTestLab/labs/virtualMachines", + "Path": "samples/labs/virtualmachines/main.tf", + "Description": "A basic example of deploying Virtual Machine within a Dev Test Lab." + }, + { + "ResourceType": "Microsoft.DevTestLab/labs/virtualNetworks", + "Path": "samples/labs/virtualnetworks/main.tf", + "Description": "A basic example of deploying Virtual Network within a DevTest Lab." + }, + { + "ResourceType": "Microsoft.DevTestLab/schedules", + "Path": "samples/schedules/main.tf", + "Description": "A basic example of deploying automated shutdown schedules for Azure Resource Manager VMs outside of Dev Test Labs." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DevTestLab/labs", + "Path": "samples/labs/main.bicep", + "Description": "A basic example of deploying Dev Test Lab." + }, + { + "ResourceType": "Microsoft.DevTestLab/labs/policySets/policies", + "Path": "samples/labs/policysets/policies/main.bicep", + "Description": "A basic example of deploying Policy within a Dev Test Policy Set." + }, + { + "ResourceType": "Microsoft.DevTestLab/labs/schedules", + "Path": "samples/labs/schedules/main.bicep", + "Description": "A basic example of deploying automated startup and shutdown schedules for Azure Dev Test Lab." + }, + { + "ResourceType": "Microsoft.DevTestLab/labs/virtualMachines", + "Path": "samples/labs/virtualmachines/main.bicep", + "Description": "A basic example of deploying Virtual Machine within a Dev Test Lab." + }, + { + "ResourceType": "Microsoft.DevTestLab/labs/virtualNetworks", + "Path": "samples/labs/virtualnetworks/main.bicep", + "Description": "A basic example of deploying Virtual Network within a DevTest Lab." + }, + { + "ResourceType": "Microsoft.DevTestLab/schedules", + "Path": "samples/schedules/main.bicep", + "Description": "A basic example of deploying automated shutdown schedules for Azure Resource Manager VMs outside of Dev Test Labs." + } + ] +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/main.bicep new file mode 100644 index 00000000..c9b0ad5d --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location + properties: { + labStorageType: 'Premium' + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/policysets/policies/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/policysets/policies/main.bicep new file mode 100644 index 00000000..94a1f5c2 --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/policysets/policies/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location +} + +// The policy set is a singleton named 'default' under the lab +resource policySet 'Microsoft.DevTestLab/labs/policySets@2018-09-15' existing = { + parent: lab + name: 'default' +} + +resource policy 'Microsoft.DevTestLab/labs/policySets/policies@2018-09-15' = { + parent: policySet + name: 'LabVmCount' + properties: { + description: '' + evaluatorType: 'MaxValuePolicy' + factData: '' + factName: 'LabVmCount' + threshold: '999' + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/schedules/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/schedules/main.bicep new file mode 100644 index 00000000..c4733acb --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/schedules/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location + properties: { + labStorageType: 'Premium' + } +} + +resource schedule 'Microsoft.DevTestLab/labs/schedules@2018-09-15' = { + parent: lab + name: 'LabVmsShutdown' + location: location + properties: { + dailyRecurrence: { + time: '0100' + } + notificationSettings: { + status: 'Disabled' + timeInMinutes: 0 + webhookUrl: '' + } + status: 'Disabled' + taskType: 'LabVmsShutdownTask' + timeZoneId: 'India Standard Time' + } + tags: { + environment: 'Production' + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/virtualmachines/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/virtualmachines/main.bicep new file mode 100644 index 00000000..ce588176 --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/virtualmachines/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The password for the DevTest Lab virtual machine') +param vmPassword string + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location + properties: { + labStorageType: 'Premium' + } +} + +resource virtualMachine 'Microsoft.DevTestLab/labs/virtualMachines@2018-09-15' = { + parent: lab + name: resourceName + location: location + properties: { + allowClaim: true + disallowPublicIpAddress: false + galleryImageReference: { + offer: 'WindowsServer' + osType: 'Windows' + publisher: 'MicrosoftWindowsServer' + sku: '2012-Datacenter' + version: 'latest' + } + isAuthenticationWithSshKey: false + labSubnetName: '\'${resourceName}Subnet\'' + labVirtualNetworkId: virtualNetwork.id + networkInterface: {} + notes: '' + osType: 'Windows' + password: null + size: 'Standard_F2' + storageType: 'Standard' + userName: 'acct5stU5er' + } +} + +resource virtualNetwork 'Microsoft.DevTestLab/labs/virtualNetworks@2018-09-15' = { + parent: lab + name: resourceName + properties: { + description: '' + subnetOverrides: [ + { + labSubnetName: '\'${resourceName}Subnet\'' + resourceId: resourceId('Microsoft.Network/virtualNetworks/subnets', resourceName, '${resourceName}Subnet') + useInVmCreationPermission: 'Allow' + usePublicIpAddressPermission: 'Allow' + } + ] + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/labs/virtualnetworks/main.bicep b/settings/remarks/microsoft.devtestlab/samples/labs/virtualnetworks/main.bicep new file mode 100644 index 00000000..68435e1e --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/labs/virtualnetworks/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource lab 'Microsoft.DevTestLab/labs@2018-09-15' = { + name: resourceName + location: location + properties: { + labStorageType: 'Premium' + } +} + +resource virtualNetwork 'Microsoft.DevTestLab/labs/virtualNetworks@2018-09-15' = { + parent: lab + name: resourceName + properties: { + description: '' + subnetOverrides: [ + { + labSubnetName: '\'${resourceName}Subnet\'' + resourceId: resourceId('Microsoft.Network/virtualNetworks/subnets', resourceName, '${resourceName}Subnet') + useInVmCreationPermission: 'Allow' + usePublicIpAddressPermission: 'Allow' + } + ] + } +} diff --git a/settings/remarks/microsoft.devtestlab/samples/schedules/main.bicep b/settings/remarks/microsoft.devtestlab/samples/schedules/main.bicep new file mode 100644 index 00000000..6aa87538 --- /dev/null +++ b/settings/remarks/microsoft.devtestlab/samples/schedules/main.bicep @@ -0,0 +1,148 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource schedule 'Microsoft.DevTestLab/schedules@2018-09-15' = { + name: resourceName + location: location + properties: { + dailyRecurrence: { + time: '0100' + } + notificationSettings: { + emailRecipient: '' + status: 'Disabled' + timeInMinutes: 30 + webhookUrl: '' + } + status: 'Enabled' + targetResourceId: virtualMachine.id + taskType: 'ComputeVmShutdownTask' + timeZoneId: 'Pacific Standard Time' + } + tags: { + environment: 'Production' + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_B2s' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + allowExtensionOperations: true + computerName: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '18.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + name: 'myosdisk-230630033106863551' + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.digitaltwins/remarks.json b/settings/remarks/microsoft.digitaltwins/remarks.json index 7cc6c6be..948be10a 100644 --- a/settings/remarks/microsoft.digitaltwins/remarks.json +++ b/settings/remarks/microsoft.digitaltwins/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DigitalTwins/digitalTwinsInstances", - "Path": "samples/digitaltwinsinstances/main.tf", - "Description": "A basic example of deploying Digital Twins instance." - }, - { - "ResourceType": "Microsoft.DigitalTwins/digitalTwinsInstances/endpoints", - "Path": "samples/digitaltwinsinstances/endpoints/main.tf", - "Description": "A basic example of deploying Digital Twins Endpoint." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DigitalTwins/digitalTwinsInstances", + "Path": "samples/digitaltwinsinstances/main.tf", + "Description": "A basic example of deploying Digital Twins instance." + }, + { + "ResourceType": "Microsoft.DigitalTwins/digitalTwinsInstances/endpoints", + "Path": "samples/digitaltwinsinstances/endpoints/main.tf", + "Description": "A basic example of deploying Digital Twins Endpoint." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DigitalTwins/digitalTwinsInstances", + "Path": "samples/digitaltwinsinstances/main.bicep", + "Description": "A basic example of deploying Digital Twins instance." + }, + { + "ResourceType": "Microsoft.DigitalTwins/digitalTwinsInstances/endpoints", + "Path": "samples/digitaltwinsinstances/endpoints/main.bicep", + "Description": "A basic example of deploying Digital Twins Endpoint." + } + ] +} diff --git a/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/endpoints/main.bicep b/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/endpoints/main.bicep new file mode 100644 index 00000000..7ed9bdf0 --- /dev/null +++ b/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/endpoints/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource digitalTwinsInstance 'Microsoft.DigitalTwins/digitalTwinsInstances@2020-12-01' = { + name: resourceName + location: location +} + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource endpoint 'Microsoft.DigitalTwins/digitalTwinsInstances/endpoints@2020-12-01' = { + parent: digitalTwinsInstance + name: resourceName + properties: { + authenticationType: 'KeyBased' + deadLetterSecret: '' + endpointType: 'ServiceBus' + primaryConnectionString: 'authorizationRule.listKeys().primaryConnectionString' + secondaryConnectionString: 'authorizationRule.listKeys().secondaryConnectionString' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: false + maxSizeInMegabytes: 5120 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} + +resource authorizationRule 'Microsoft.ServiceBus/namespaces/topics/authorizationRules@2021-06-01-preview' = { + parent: topic + name: resourceName + properties: { + rights: [ + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/main.bicep b/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/main.bicep new file mode 100644 index 00000000..ec3d55c4 --- /dev/null +++ b/settings/remarks/microsoft.digitaltwins/samples/digitaltwinsinstances/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource digitalTwinsInstance 'Microsoft.DigitalTwins/digitalTwinsInstances@2020-12-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.documentdb/remarks.json b/settings/remarks/microsoft.documentdb/remarks.json index 197309a9..b98fa4ef 100644 --- a/settings/remarks/microsoft.documentdb/remarks.json +++ b/settings/remarks/microsoft.documentdb/remarks.json @@ -1,105 +1,202 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts", - "Path": "samples/databaseaccounts/main.tf", - "Description": "A basic example of deploying CosmosDB (formally DocumentDB) Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces", - "Path": "samples/databaseaccounts/cassandrakeyspaces/main.tf", - "Description": "A basic example of deploying Cassandra KeySpace within a Cosmos DB Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces/tables", - "Path": "samples/databaseaccounts/cassandrakeyspaces/tables/main.tf", - "Description": "A basic example of deploying Cassandra Table within a Cosmos DB Cassandra Keyspace." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/gremlinDatabases", - "Path": "samples/databaseaccounts/gremlindatabases/main.tf", - "Description": "A basic example of deploying Gremlin Database within a Cosmos DB Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/graphs", - "Path": "samples/databaseaccounts/gremlindatabases/graphs/main.tf", - "Description": "A basic example of deploying Gremlin Graph within a Cosmos DB Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbDatabases", - "Path": "samples/databaseaccounts/mongodbdatabases/main.tf", - "Description": "A basic example of deploying Mongo Database within a Cosmos DB Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbRoleDefinitions", - "Path": "samples/databaseaccounts/mongodbroledefinitions/main.tf", - "Description": "A basic example of deploying Cosmos DB Mongo Role Definition." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbUserDefinitions", - "Path": "samples/databaseaccounts/mongodbuserdefinitions/main.tf", - "Description": "A basic example of deploying Cosmos DB Mongo User Definition." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/services", - "Path": "samples/databaseaccounts/services/main.tf", - "Description": "A basic example of deploying SQL Dedicated Gateway within a Cosmos DB Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases", - "Path": "samples/databaseaccounts/sqldatabases/main.tf", - "Description": "A basic example of deploying SQL Database within a Cosmos DB Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers", - "Path": "samples/databaseaccounts/sqldatabases/containers/main.tf", - "Description": "A basic example of deploying SQL Container within a Cosmos DB Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/storedProcedures", - "Path": "samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.tf", - "Description": "A basic example of deploying SQL Stored Procedure within a Cosmos DB Account SQL Database." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/triggers", - "Path": "samples/databaseaccounts/sqldatabases/containers/triggers/main.tf", - "Description": "A basic example of deploying SQL Trigger." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/userDefinedFunctions", - "Path": "samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.tf", - "Description": "A basic example of deploying SQL User Defined Function." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlRoleAssignments", - "Path": "samples/databaseaccounts/sqlroleassignments/main.tf", - "Description": "A basic example of deploying Cosmos DB SQL Role Assignment." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions", - "Path": "samples/databaseaccounts/sqlroledefinitions/main.tf", - "Description": "A basic example of deploying Cosmos DB SQL Role Definition." - }, - { - "ResourceType": "Microsoft.DocumentDB/databaseAccounts/tables", - "Path": "samples/databaseaccounts/tables/main.tf", - "Description": "A basic example of deploying Table within a Cosmos DB Account." - }, - { - "ResourceType": "Microsoft.DocumentDB/mongoClusters", - "Path": "samples/mongoclusters/main.tf", - "Description": "A basic example of deploying Azure Cosmos DB for MongoDB (vCore)." - }, - { - "ResourceType": "Microsoft.DocumentDB/mongoClusters/firewallRules", - "Path": "samples/mongoclusters/firewallrules/main.tf", - "Description": "A basic example of deploying Azure Cosmos DB for MongoDB (vCore) Firewall Rule." - }, - { - "ResourceType": "Microsoft.DocumentDB/mongoClusters/users", - "Path": "samples/mongoclusters/users/main.tf", - "Description": "A basic example of deploying Azure Cosmos DB for MongoDB (vCore) User." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts", + "Path": "samples/databaseaccounts/main.tf", + "Description": "A basic example of deploying CosmosDB (formally DocumentDB) Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces", + "Path": "samples/databaseaccounts/cassandrakeyspaces/main.tf", + "Description": "A basic example of deploying Cassandra KeySpace within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces/tables", + "Path": "samples/databaseaccounts/cassandrakeyspaces/tables/main.tf", + "Description": "A basic example of deploying Cassandra Table within a Cosmos DB Cassandra Keyspace." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/gremlinDatabases", + "Path": "samples/databaseaccounts/gremlindatabases/main.tf", + "Description": "A basic example of deploying Gremlin Database within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/graphs", + "Path": "samples/databaseaccounts/gremlindatabases/graphs/main.tf", + "Description": "A basic example of deploying Gremlin Graph within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbDatabases", + "Path": "samples/databaseaccounts/mongodbdatabases/main.tf", + "Description": "A basic example of deploying Mongo Database within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbRoleDefinitions", + "Path": "samples/databaseaccounts/mongodbroledefinitions/main.tf", + "Description": "A basic example of deploying Cosmos DB Mongo Role Definition." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbUserDefinitions", + "Path": "samples/databaseaccounts/mongodbuserdefinitions/main.tf", + "Description": "A basic example of deploying Cosmos DB Mongo User Definition." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/services", + "Path": "samples/databaseaccounts/services/main.tf", + "Description": "A basic example of deploying SQL Dedicated Gateway within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases", + "Path": "samples/databaseaccounts/sqldatabases/main.tf", + "Description": "A basic example of deploying SQL Database within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers", + "Path": "samples/databaseaccounts/sqldatabases/containers/main.tf", + "Description": "A basic example of deploying SQL Container within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/storedProcedures", + "Path": "samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.tf", + "Description": "A basic example of deploying SQL Stored Procedure within a Cosmos DB Account SQL Database." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/triggers", + "Path": "samples/databaseaccounts/sqldatabases/containers/triggers/main.tf", + "Description": "A basic example of deploying SQL Trigger." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/userDefinedFunctions", + "Path": "samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.tf", + "Description": "A basic example of deploying SQL User Defined Function." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlRoleAssignments", + "Path": "samples/databaseaccounts/sqlroleassignments/main.tf", + "Description": "A basic example of deploying Cosmos DB SQL Role Assignment." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions", + "Path": "samples/databaseaccounts/sqlroledefinitions/main.tf", + "Description": "A basic example of deploying Cosmos DB SQL Role Definition." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/tables", + "Path": "samples/databaseaccounts/tables/main.tf", + "Description": "A basic example of deploying Table within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/mongoClusters", + "Path": "samples/mongoclusters/main.tf", + "Description": "A basic example of deploying Azure Cosmos DB for MongoDB (vCore)." + }, + { + "ResourceType": "Microsoft.DocumentDB/mongoClusters/firewallRules", + "Path": "samples/mongoclusters/firewallrules/main.tf", + "Description": "A basic example of deploying Azure Cosmos DB for MongoDB (vCore) Firewall Rule." + }, + { + "ResourceType": "Microsoft.DocumentDB/mongoClusters/users", + "Path": "samples/mongoclusters/users/main.tf", + "Description": "A basic example of deploying Azure Cosmos DB for MongoDB (vCore) User." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts", + "Path": "samples/databaseaccounts/main.bicep", + "Description": "A basic example of deploying CosmosDB (formally DocumentDB) Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces", + "Path": "samples/databaseaccounts/cassandrakeyspaces/main.bicep", + "Description": "A basic example of deploying Cassandra KeySpace within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces/tables", + "Path": "samples/databaseaccounts/cassandrakeyspaces/tables/main.bicep", + "Description": "A basic example of deploying Cassandra Table within a Cosmos DB Cassandra Keyspace." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/gremlinDatabases", + "Path": "samples/databaseaccounts/gremlindatabases/main.bicep", + "Description": "A basic example of deploying Gremlin Database within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/graphs", + "Path": "samples/databaseaccounts/gremlindatabases/graphs/main.bicep", + "Description": "A basic example of deploying Gremlin Graph within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbDatabases", + "Path": "samples/databaseaccounts/mongodbdatabases/main.bicep", + "Description": "A basic example of deploying Mongo Database within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbRoleDefinitions", + "Path": "samples/databaseaccounts/mongodbroledefinitions/main.bicep", + "Description": "A basic example of deploying Cosmos DB Mongo Role Definition." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/mongodbUserDefinitions", + "Path": "samples/databaseaccounts/mongodbuserdefinitions/main.bicep", + "Description": "A basic example of deploying Cosmos DB Mongo User Definition." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/services", + "Path": "samples/databaseaccounts/services/main.bicep", + "Description": "A basic example of deploying SQL Dedicated Gateway within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases", + "Path": "samples/databaseaccounts/sqldatabases/main.bicep", + "Description": "A basic example of deploying SQL Database within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers", + "Path": "samples/databaseaccounts/sqldatabases/containers/main.bicep", + "Description": "A basic example of deploying SQL Container within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/storedProcedures", + "Path": "samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.bicep", + "Description": "A basic example of deploying SQL Stored Procedure within a Cosmos DB Account SQL Database." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/triggers", + "Path": "samples/databaseaccounts/sqldatabases/containers/triggers/main.bicep", + "Description": "A basic example of deploying SQL Trigger." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/userDefinedFunctions", + "Path": "samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.bicep", + "Description": "A basic example of deploying SQL User Defined Function." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlRoleAssignments", + "Path": "samples/databaseaccounts/sqlroleassignments/main.bicep", + "Description": "A basic example of deploying Cosmos DB SQL Role Assignment." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions", + "Path": "samples/databaseaccounts/sqlroledefinitions/main.bicep", + "Description": "A basic example of deploying Cosmos DB SQL Role Definition." + }, + { + "ResourceType": "Microsoft.DocumentDB/databaseAccounts/tables", + "Path": "samples/databaseaccounts/tables/main.bicep", + "Description": "A basic example of deploying Table within a Cosmos DB Account." + }, + { + "ResourceType": "Microsoft.DocumentDB/mongoClusters/firewallRules", + "Path": "samples/mongoclusters/firewallrules/main.bicep", + "Description": "A basic example of deploying Azure Cosmos DB for MongoDB (vCore) Firewall Rule." + }, + { + "ResourceType": "Microsoft.DocumentDB/mongoClusters/users", + "Path": "samples/mongoclusters/users/main.bicep", + "Description": "A basic example of deploying Azure Cosmos DB for MongoDB (vCore) User." + } + ] +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/main.bicep new file mode 100644 index 00000000..6c9cc2f6 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [ + { + name: 'EnableCassandra' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource cassandraKeyspace 'Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/tables/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/tables/main.bicep new file mode 100644 index 00000000..b2e7c20a --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/cassandrakeyspaces/tables/main.bicep @@ -0,0 +1,90 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +var accountName = toLower(replace(resourceName, '-', '')) +var keyspaceName = '${toLower(resourceName)}ks' +var tableName = '${toLower(resourceName)}tbl' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2024-08-15' = { + name: accountName + location: location + kind: 'GlobalDocumentDB' + properties: { + backupPolicy: null + capabilities: [ + { + name: 'EnableCassandra' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: true + enableAutomaticFailover: false + enableBurstCapacity: false + enableFreeTier: false + enableMultipleWriteLocations: false + enablePartitionMerge: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'eastus' + } + ] + minimalTlsVersion: 'Tls12' + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource cassandraKeyspace 'Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces@2021-10-15' = { + parent: databaseAccount + name: keyspaceName + properties: { + options: {} + resource: { + id: keyspaceName + } + } +} + +resource table 'Microsoft.DocumentDB/databaseAccounts/cassandraKeyspaces/tables@2021-10-15' = { + parent: cassandraKeyspace + name: tableName + properties: { + options: {} + resource: { + analyticalStorageTtl: 1 + id: tableName + schema: { + clusterKeys: [] + columns: [ + { + name: 'test1' + type: 'ascii' + } + { + name: 'test2' + type: 'int' + } + ] + partitionKeys: [ + { + name: 'test1' + } + ] + } + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/graphs/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/graphs/main.bicep new file mode 100644 index 00000000..497566c8 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/graphs/main.bicep @@ -0,0 +1,71 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [ + { + name: 'EnableGremlin' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource gremlinDatabase 'Microsoft.DocumentDB/databaseAccounts/gremlinDatabases@2023-04-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} + +resource graph 'Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/graphs@2023-04-15' = { + parent: gremlinDatabase + name: resourceName + properties: { + options: { + throughput: 400 + } + resource: { + id: 'acctest0001' + partitionKey: { + kind: 'Hash' + paths: [ + '/test' + ] + } + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/main.bicep new file mode 100644 index 00000000..a620ab10 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/gremlindatabases/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [ + { + name: 'EnableGremlin' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource gremlinDatabase 'Microsoft.DocumentDB/databaseAccounts/gremlinDatabases@2023-04-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/main.bicep new file mode 100644 index 00000000..325a0359 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 10 + maxStalenessPrefix: 200 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbdatabases/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbdatabases/main.bicep new file mode 100644 index 00000000..55714880 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbdatabases/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'MongoDB' + properties: { + capabilities: [ + { + name: 'EnableMongo' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource mongodbDatabase 'Microsoft.DocumentDB/databaseAccounts/mongodbDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbroledefinitions/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbroledefinitions/main.bicep new file mode 100644 index 00000000..c6bc4736 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbroledefinitions/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +var accountName = toLower(replace(resourceName, '-', '')) +var dbName = '${toLower(resourceName)}db' +var roleName = '${toLower(resourceName)}role' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2024-08-15' = { + name: accountName + location: location + kind: 'MongoDB' + properties: { + backupPolicy: null + capabilities: [ + { + name: 'EnableMongoRoleBasedAccessControl' + } + { + name: 'EnableMongo' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableBurstCapacity: false + enableFreeTier: false + enableMultipleWriteLocations: false + enablePartitionMerge: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'eastus' + } + ] + minimalTlsVersion: 'Tls12' + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource mongodbDatabase 'Microsoft.DocumentDB/databaseAccounts/mongodbDatabases@2021-10-15' = { + parent: databaseAccount + name: dbName + properties: { + options: {} + resource: { + id: dbName + } + } +} + +resource mongodbRoleDefinition 'Microsoft.DocumentDB/databaseAccounts/mongodbRoleDefinitions@2022-11-15' = { + parent: databaseAccount + name: '${dbName}.${roleName}' + properties: { + databaseName: dbName + roleName: roleName + type: 1 + } + dependsOn: [ + mongodbDatabase + ] +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbuserdefinitions/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbuserdefinitions/main.bicep new file mode 100644 index 00000000..471dae66 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/mongodbuserdefinitions/main.bicep @@ -0,0 +1,72 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The password for the MongoDB user') +param mongodbUserPassword string + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2024-08-15' = { + name: '${resourceName}-acct' + location: location + kind: 'MongoDB' + properties: { + backupPolicy: null + capabilities: [ + { + name: 'EnableMongoRoleBasedAccessControl' + } + { + name: 'EnableMongo' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableBurstCapacity: false + enableFreeTier: false + enableMultipleWriteLocations: false + enablePartitionMerge: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'westus' + } + ] + minimalTlsVersion: 'Tls12' + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource mongodbDatabas 'Microsoft.DocumentDB/databaseAccounts/mongodbDatabases@2021-10-15' = { + parent: databaseAccount + name: '${resourceName}-mongodb' + properties: { + options: {} + resource: { + id: 'acctest0001-mongodb' + } + } +} + +resource mongodbUserDefinition 'Microsoft.DocumentDB/databaseAccounts/mongodbUserDefinitions@2022-11-15' = { + parent: databaseAccount + name: '${mongodbDatabas.name}.myUserName' + properties: { + databaseName: mongodbDatabas.name + mechanisms: 'SCRAM-SHA-256' + password: null + userName: 'myUserName' + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/services/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/services/main.bicep new file mode 100644 index 00000000..fe8b85c7 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/services/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource service 'Microsoft.DocumentDB/databaseAccounts/services@2022-05-15' = { + parent: databaseAccount + name: 'SqlDedicatedGateway' + properties: { + instanceCount: 1 + instanceSize: 'Cosmos.D4s' + serviceType: 'SqlDedicatedGateway' + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/main.bicep new file mode 100644 index 00000000..145232df --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 10 + maxStalenessPrefix: 200 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: { + throughput: 400 + } + resource: { + id: 'acctest0001' + } + } +} + +resource container 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers@2023-04-15' = { + parent: sqlDatabase + name: resourceName + properties: { + options: {} + resource: { + id: 'test-containerWest Europe' + partitionKey: { + kind: 'Hash' + paths: [ + '/definition' + ] + } + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.bicep new file mode 100644 index 00000000..e412697c --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/storedprocedures/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Session' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} + +resource container 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers@2023-04-15' = { + parent: sqlDatabase + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + partitionKey: { + kind: 'Hash' + paths: [ + '/definition/id' + ] + } + } + } +} + +resource storedProcedure 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/storedProcedures@2021-10-15' = { + parent: container + name: resourceName + properties: { + options: {} + resource: { + body: ''' function () { + var context = getContext(); + var response = context.getResponse(); + response.setBody(''Hello, World''); + } +''' + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/triggers/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/triggers/main.bicep new file mode 100644 index 00000000..e580ac3c --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/triggers/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Session' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} + +resource container 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers@2023-04-15' = { + parent: sqlDatabase + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + partitionKey: { + kind: 'Hash' + paths: [ + '/definition/id' + ] + } + } + } +} + +resource trigger 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/triggers@2021-10-15' = { + parent: container + name: resourceName + properties: { + options: {} + resource: { + body: 'function trigger(){}' + id: 'acctest0001' + triggerOperation: 'All' + triggerType: 'Pre' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.bicep new file mode 100644 index 00000000..4ee0c4fb --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/containers/userdefinedfunctions/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Session' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} + +resource container 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers@2023-04-15' = { + parent: sqlDatabase + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + partitionKey: { + kind: 'Hash' + paths: [ + '/definition/id' + ] + } + } + } +} + +resource userDefinedFunction 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/userDefinedFunctions@2021-10-15' = { + parent: container + name: resourceName + properties: { + options: {} + resource: { + body: ''' function test() { + var context = getContext(); + var response = context.getResponse(); + response.setBody(''Hello, World''); + } +''' + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/main.bicep new file mode 100644 index 00000000..a5d2f53d --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqldatabases/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 10 + maxStalenessPrefix: 200 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: { + throughput: 400 + } + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroleassignments/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroleassignments/main.bicep new file mode 100644 index 00000000..f2ac0313 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroleassignments/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource sqlRoleDefinition 'Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions@2021-10-15' existing = { + parent: databaseAccount + name: '00000000-0000-0000-0000-000000000001' +} + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Session' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource database 'Microsoft.Kusto/clusters/databases@2023-05-02' = { + parent: cluster + name: resourceName + location: location + kind: 'ReadWrite' + properties: {} +} + +resource sqlRoleAssignment 'Microsoft.DocumentDB/databaseAccounts/sqlRoleAssignments@2021-10-15' = { + parent: databaseAccount + name: 'ff419bf7-f8ca-ef51-00d2-3576700c341b' + properties: { + principalId: cluster.properties.identity.principalId + roleDefinitionId: sqlRoleDefinition.id + scope: databaseAccount.id + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroledefinitions/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroledefinitions/main.bicep new file mode 100644 index 00000000..d27400e8 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/sqlroledefinitions/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource sqlRoleDefinition 'Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions@2021-10-15' = { + parent: databaseAccount + name: 'c3ce1661-d0b9-3476-0a7c-2654ce2f3055' + properties: { + assignableScopes: [ + databaseAccount.id + ] + permissions: [ + { + dataActions: [ + 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read' + ] + } + ] + roleName: 'acctest0001' + type: 'CustomRole' + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/databaseaccounts/tables/main.bicep b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/tables/main.bicep new file mode 100644 index 00000000..210b7112 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/databaseaccounts/tables/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [ + { + name: 'EnableTable' + } + ] + consistencyPolicy: { + defaultConsistencyLevel: 'Strong' + maxIntervalInSeconds: 5 + maxStalenessPrefix: 100 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource table 'Microsoft.DocumentDB/databaseAccounts/tables@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: {} + resource: { + id: 'acctest0001' + } + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/mongoclusters/firewallrules/main.bicep b/settings/remarks/microsoft.documentdb/samples/mongoclusters/firewallrules/main.bicep new file mode 100644 index 00000000..69e3ef43 --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/mongoclusters/firewallrules/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westus3' + +resource mongoCluster 'Microsoft.DocumentDB/mongoClusters@2025-09-01' = { + name: resourceName + location: location + properties: { + authConfig: { + allowedModes: [ + 'MicrosoftEntraID' + ] + } + compute: { + tier: 'M40' + } + highAvailability: { + targetMode: 'Disabled' + } + previewFeatures: [ + 'ShardRebalancer' + ] + publicNetworkAccess: 'Enabled' + serverVersion: '5.0' + sharding: { + shardCount: 1 + } + storage: { + sizeGb: 32 + } + } +} + +resource firewallRule 'Microsoft.DocumentDB/mongoClusters/firewallRules@2025-09-01' = { + parent: mongoCluster + name: resourceName + properties: { + endIpAddress: '0.0.0.0' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.documentdb/samples/mongoclusters/users/main.bicep b/settings/remarks/microsoft.documentdb/samples/mongoclusters/users/main.bicep new file mode 100644 index 00000000..b5f1dd2e --- /dev/null +++ b/settings/remarks/microsoft.documentdb/samples/mongoclusters/users/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'westus3' + +resource mongoClusterSSDv2 'Microsoft.DocumentDB/mongoClusters@2025-09-01' = { + name: '${resourceName}-ssdv2' + location: location + properties: { + authConfig: { + allowedModes: [ + 'MicrosoftEntraID' + ] + } + compute: { + tier: 'M30' + } + highAvailability: { + targetMode: 'Disabled' + } + publicNetworkAccess: 'Disabled' + serverVersion: '6.0' + sharding: { + shardCount: 1 + } + storage: { + sizeGb: 64 + type: 'PremiumSSDv2' + } + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName + location: location +} + +resource mongouserEntraserviceprincipal 'Microsoft.DocumentDB/mongoClusters/users@2025-09-01' = { + parent: mongoClusterSSDv2 + name: 'userAssignedIdentity.properties.principalId' + properties: { + identityProvider: { + properties: { + principalType: 'ServicePrincipal' + } + type: 'MicrosoftEntraID' + } + roles: [ + { + db: 'admin' + role: 'root' + } + ] + } +} diff --git a/settings/remarks/microsoft.elasticsan/remarks.json b/settings/remarks/microsoft.elasticsan/remarks.json index 52f30c2c..b98381ad 100644 --- a/settings/remarks/microsoft.elasticsan/remarks.json +++ b/settings/remarks/microsoft.elasticsan/remarks.json @@ -1,20 +1,37 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ElasticSan/elasticSans", - "Path": "samples/elasticsans/main.tf", - "Description": "A basic example of deploying Azure Elastic SAN (Storage Area Network) resource." - }, - { - "ResourceType": "Microsoft.ElasticSan/elasticSans/volumeGroups", - "Path": "samples/elasticsans/volumegroups/main.tf", - "Description": "A basic example of deploying Elastic SAN Volume Group resource." - }, - { - "ResourceType": "Microsoft.ElasticSan/elasticSans/volumeGroups/volumes", - "Path": "samples/elasticsans/volumegroups/volumes/main.tf", - "Description": "A basic example of deploying Elastic SAN Volume resource." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ElasticSan/elasticSans", + "Path": "samples/elasticsans/main.tf", + "Description": "A basic example of deploying Azure Elastic SAN (Storage Area Network) resource." + }, + { + "ResourceType": "Microsoft.ElasticSan/elasticSans/volumeGroups", + "Path": "samples/elasticsans/volumegroups/main.tf", + "Description": "A basic example of deploying Elastic SAN Volume Group resource." + }, + { + "ResourceType": "Microsoft.ElasticSan/elasticSans/volumeGroups/volumes", + "Path": "samples/elasticsans/volumegroups/volumes/main.tf", + "Description": "A basic example of deploying Elastic SAN Volume resource." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ElasticSan/elasticSans", + "Path": "samples/elasticsans/main.bicep", + "Description": "A basic example of deploying Azure Elastic SAN (Storage Area Network) resource." + }, + { + "ResourceType": "Microsoft.ElasticSan/elasticSans/volumeGroups", + "Path": "samples/elasticsans/volumegroups/main.bicep", + "Description": "A basic example of deploying Elastic SAN Volume Group resource." + }, + { + "ResourceType": "Microsoft.ElasticSan/elasticSans/volumeGroups/volumes", + "Path": "samples/elasticsans/volumegroups/volumes/main.bicep", + "Description": "A basic example of deploying Elastic SAN Volume resource." + } + ] +} diff --git a/settings/remarks/microsoft.elasticsan/samples/elasticsans/main.bicep b/settings/remarks/microsoft.elasticsan/samples/elasticsans/main.bicep new file mode 100644 index 00000000..9e0b659a --- /dev/null +++ b/settings/remarks/microsoft.elasticsan/samples/elasticsans/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource elasticSan 'Microsoft.ElasticSan/elasticSans@2023-01-01' = { + name: resourceName + location: location + properties: { + baseSizeTiB: 1 + extendedCapacitySizeTiB: 0 + sku: { + name: 'Premium_LRS' + tier: 'Premium' + } + } +} diff --git a/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/main.bicep b/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/main.bicep new file mode 100644 index 00000000..c9205983 --- /dev/null +++ b/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource elasticSan 'Microsoft.ElasticSan/elasticSans@2023-01-01' = { + name: '${resourceName}-es' + location: location + properties: { + baseSizeTiB: 1 + extendedCapacitySizeTiB: 0 + sku: { + name: 'Premium_LRS' + tier: 'Premium' + } + } +} + +resource volumeGroup 'Microsoft.ElasticSan/elasticSans/volumeGroups@2023-01-01' = { + parent: elasticSan + name: '${resourceName}-vg' + properties: { + encryption: 'EncryptionAtRestWithPlatformKey' + networkAcls: { + virtualNetworkRules: [] + } + protocolType: 'Iscsi' + } +} diff --git a/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/volumes/main.bicep b/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/volumes/main.bicep new file mode 100644 index 00000000..ab0d9770 --- /dev/null +++ b/settings/remarks/microsoft.elasticsan/samples/elasticsans/volumegroups/volumes/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource elasticSan 'Microsoft.ElasticSan/elasticSans@2023-01-01' = { + name: '${resourceName}-es' + location: location + properties: { + baseSizeTiB: 1 + extendedCapacitySizeTiB: 0 + sku: { + name: 'Premium_LRS' + tier: 'Premium' + } + } +} + +resource volumeGroup 'Microsoft.ElasticSan/elasticSans/volumeGroups@2023-01-01' = { + parent: elasticSan + name: '${resourceName}-vg' + properties: { + encryption: 'EncryptionAtRestWithPlatformKey' + networkAcls: { + virtualNetworkRules: [] + } + protocolType: 'Iscsi' + } +} + +resource volume 'Microsoft.ElasticSan/elasticSans/volumeGroups/volumes@2023-01-01' = { + parent: volumeGroup + name: '${resourceName}-v' + properties: { + sizeGiB: 1 + } +} diff --git a/settings/remarks/microsoft.eventgrid/remarks.json b/settings/remarks/microsoft.eventgrid/remarks.json index b1311136..e867426f 100644 --- a/settings/remarks/microsoft.eventgrid/remarks.json +++ b/settings/remarks/microsoft.eventgrid/remarks.json @@ -1,40 +1,77 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.EventGrid/domains", - "Path": "samples/domains/main.tf", - "Description": "A basic example of deploying EventGrid Domain." - }, - { - "ResourceType": "Microsoft.EventGrid/domains/topics", - "Path": "samples/domains/topics/main.tf", - "Description": "A basic example of deploying EventGrid Domain Topic." - }, - { - "ResourceType": "Microsoft.EventGrid/eventSubscriptions", - "Path": "samples/eventsubscriptions/main.tf", - "Description": "A basic example of deploying EventGrid Event Subscription." - }, - { - "ResourceType": "Microsoft.EventGrid/namespaces", - "Path": "samples/namespaces/main.tf", - "Description": "A basic example of deploying EventGrid Namespace." - }, - { - "ResourceType": "Microsoft.EventGrid/systemTopics", - "Path": "samples/systemtopics/main.tf", - "Description": "A basic example of deploying Event Grid System Topic." - }, - { - "ResourceType": "Microsoft.EventGrid/systemTopics/eventSubscriptions", - "Path": "samples/systemtopics/eventsubscriptions/main.tf", - "Description": "A basic example of deploying EventGrid System Topic Event Subscription." - }, - { - "ResourceType": "Microsoft.EventGrid/topics", - "Path": "samples/topics/main.tf", - "Description": "A basic example of deploying EventGrid Topic." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.EventGrid/domains", + "Path": "samples/domains/main.tf", + "Description": "A basic example of deploying EventGrid Domain." + }, + { + "ResourceType": "Microsoft.EventGrid/domains/topics", + "Path": "samples/domains/topics/main.tf", + "Description": "A basic example of deploying EventGrid Domain Topic." + }, + { + "ResourceType": "Microsoft.EventGrid/eventSubscriptions", + "Path": "samples/eventsubscriptions/main.tf", + "Description": "A basic example of deploying EventGrid Event Subscription." + }, + { + "ResourceType": "Microsoft.EventGrid/namespaces", + "Path": "samples/namespaces/main.tf", + "Description": "A basic example of deploying EventGrid Namespace." + }, + { + "ResourceType": "Microsoft.EventGrid/systemTopics", + "Path": "samples/systemtopics/main.tf", + "Description": "A basic example of deploying Event Grid System Topic." + }, + { + "ResourceType": "Microsoft.EventGrid/systemTopics/eventSubscriptions", + "Path": "samples/systemtopics/eventsubscriptions/main.tf", + "Description": "A basic example of deploying EventGrid System Topic Event Subscription." + }, + { + "ResourceType": "Microsoft.EventGrid/topics", + "Path": "samples/topics/main.tf", + "Description": "A basic example of deploying EventGrid Topic." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.EventGrid/domains", + "Path": "samples/domains/main.bicep", + "Description": "A basic example of deploying EventGrid Domain." + }, + { + "ResourceType": "Microsoft.EventGrid/domains/topics", + "Path": "samples/domains/topics/main.bicep", + "Description": "A basic example of deploying EventGrid Domain Topic." + }, + { + "ResourceType": "Microsoft.EventGrid/eventSubscriptions", + "Path": "samples/eventsubscriptions/main.bicep", + "Description": "A basic example of deploying EventGrid Event Subscription." + }, + { + "ResourceType": "Microsoft.EventGrid/namespaces", + "Path": "samples/namespaces/main.bicep", + "Description": "A basic example of deploying EventGrid Namespace." + }, + { + "ResourceType": "Microsoft.EventGrid/systemTopics", + "Path": "samples/systemtopics/main.bicep", + "Description": "A basic example of deploying Event Grid System Topic." + }, + { + "ResourceType": "Microsoft.EventGrid/systemTopics/eventSubscriptions", + "Path": "samples/systemtopics/eventsubscriptions/main.bicep", + "Description": "A basic example of deploying EventGrid System Topic Event Subscription." + }, + { + "ResourceType": "Microsoft.EventGrid/topics", + "Path": "samples/topics/main.bicep", + "Description": "A basic example of deploying EventGrid Topic." + } + ] +} diff --git a/settings/remarks/microsoft.eventgrid/samples/domains/main.bicep b/settings/remarks/microsoft.eventgrid/samples/domains/main.bicep new file mode 100644 index 00000000..a9c9a9ec --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/domains/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource domain 'Microsoft.EventGrid/domains@2021-12-01' = { + name: resourceName + location: location + properties: { + autoCreateTopicWithFirstSubscription: true + autoDeleteTopicWithLastSubscription: true + disableLocalAuth: false + inputSchema: 'EventGridSchema' + inputSchemaMapping: null + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/domains/topics/main.bicep b/settings/remarks/microsoft.eventgrid/samples/domains/topics/main.bicep new file mode 100644 index 00000000..200dc074 --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/domains/topics/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource domain 'Microsoft.EventGrid/domains@2021-12-01' = { + name: resourceName + location: location + properties: { + autoCreateTopicWithFirstSubscription: true + autoDeleteTopicWithLastSubscription: true + disableLocalAuth: false + inputSchema: 'EventGridSchema' + inputSchemaMapping: null + publicNetworkAccess: 'Enabled' + } +} + +resource topic 'Microsoft.EventGrid/domains/topics@2021-12-01' = { + parent: domain + name: resourceName +} diff --git a/settings/remarks/microsoft.eventgrid/samples/eventsubscriptions/main.bicep b/settings/remarks/microsoft.eventgrid/samples/eventsubscriptions/main.bicep new file mode 100644 index 00000000..cb0ed3cd --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/eventsubscriptions/main.bicep @@ -0,0 +1,91 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource eventSubscription 'Microsoft.EventGrid/eventSubscriptions@2021-12-01' = { + scope: storageAccount + name: resourceName + properties: { + deadLetterDestination: null + destination: { + endpointType: 'EventHub' + properties: { + deliveryAttributeMappings: null + resourceId: eventhub.id + } + } + eventDeliverySchema: 'EventGridSchema' + filter: { + includedEventTypes: [ + 'Microsoft.Storage.BlobCreated' + 'Microsoft.Storage.BlobRenamed' + ] + } + labels: [] + retryPolicy: { + eventTimeToLiveInMinutes: 144 + maxDeliveryAttempts: 10 + } + } +} + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 1 + status: 'Active' + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/namespaces/main.bicep b/settings/remarks/microsoft.eventgrid/samples/namespaces/main.bicep new file mode 100644 index 00000000..cac8743f --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/namespaces/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource namespace 'Microsoft.EventGrid/namespaces@2023-12-15-preview' = { + name: '${resourceName}-ns' + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + capacity: 1 + name: 'Standard' + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/systemtopics/eventsubscriptions/main.bicep b/settings/remarks/microsoft.eventgrid/samples/systemtopics/eventsubscriptions/main.bicep new file mode 100644 index 00000000..962f523d --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/systemtopics/eventsubscriptions/main.bicep @@ -0,0 +1,132 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +var queueName = '${resourceName}queue' +var eventSubscription1Name = '${resourceName}-es1' +var eventSubscription2Name = '${resourceName}-es2' +var systemTopicName = '${resourceName}-st' +var storageAccountName = '${resourceName}sa01' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: storageAccountName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource systemTopic 'Microsoft.EventGrid/systemTopics@2022-06-15' = { + name: systemTopicName + location: 'global' + properties: { + source: resourceGroup().id + topicType: 'Microsoft.Resources.ResourceGroups' + } +} + +resource eventSubscription 'Microsoft.EventGrid/systemTopics/eventSubscriptions@2022-06-15' = { + parent: systemTopic + name: eventSubscription1Name + properties: { + deadLetterDestination: null + destination: { + endpointType: 'StorageQueue' + properties: { + queueName: queueName + resourceId: storageAccount.id + } + } + eventDeliverySchema: 'EventGridSchema' + filter: { + advancedFilters: [ + { + key: 'subject' + operatorType: 'StringBeginsWith' + values: ['foo'] + } + ] + } + labels: [] + } + dependsOn: [ + queue + ] +} + +resource eventsubscription1 'Microsoft.EventGrid/systemTopics/eventSubscriptions@2022-06-15' = { + parent: systemTopic + name: eventSubscription2Name + properties: { + deadLetterDestination: null + destination: { + endpointType: 'StorageQueue' + properties: { + queueName: queueName + resourceId: storageAccount.id + } + } + eventDeliverySchema: 'EventGridSchema' + filter: { + advancedFilters: [ + { + key: 'subject' + operatorType: 'StringEndsWith' + values: ['bar'] + } + ] + } + labels: [] + } + dependsOn: [ + queue + ] +} + +// The queue service is a singleton named 'default' under the storage account +resource queueService 'Microsoft.Storage/storageAccounts/queueServices@2023-05-01' existing = { + parent: storageAccount + name: 'default' +} + +resource queue 'Microsoft.Storage/storageAccounts/queueServices/queues@2023-05-01' = { + parent: queueService + name: queueName + + dependsOn: [ + storageAccount + ] +} diff --git a/settings/remarks/microsoft.eventgrid/samples/systemtopics/main.bicep b/settings/remarks/microsoft.eventgrid/samples/systemtopics/main.bicep new file mode 100644 index 00000000..02267b1a --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/systemtopics/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' + +resource systemTopic 'Microsoft.EventGrid/systemTopics@2021-12-01' = { + name: resourceName + location: 'global' + properties: { + source: resourceGroup().id + topicType: 'Microsoft.Resources.ResourceGroups' + } +} diff --git a/settings/remarks/microsoft.eventgrid/samples/topics/main.bicep b/settings/remarks/microsoft.eventgrid/samples/topics/main.bicep new file mode 100644 index 00000000..7d52cb0d --- /dev/null +++ b/settings/remarks/microsoft.eventgrid/samples/topics/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource topic 'Microsoft.EventGrid/topics@2021-12-01' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + inputSchema: 'EventGridSchema' + inputSchemaMapping: null + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.eventhub/remarks.json b/settings/remarks/microsoft.eventhub/remarks.json index 8a393964..13305a6e 100644 --- a/settings/remarks/microsoft.eventhub/remarks.json +++ b/settings/remarks/microsoft.eventhub/remarks.json @@ -1,45 +1,87 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.EventHub/clusters", - "Path": "samples/clusters/main.tf", - "Description": "A basic example of deploying EventHub Cluster." - }, - { - "ResourceType": "Microsoft.EventHub/namespaces", - "Path": "samples/namespaces/main.tf", - "Description": "A basic example of deploying EventHub Namespace." - }, - { - "ResourceType": "Microsoft.EventHub/namespaces/authorizationRules", - "Path": "samples/namespaces/authorizationrules/main.tf", - "Description": "A basic example of deploying Authorization Rule for an Event Hub Namespace." - }, - { - "ResourceType": "Microsoft.EventHub/namespaces/disasterRecoveryConfigs", - "Path": "samples/namespaces/disasterrecoveryconfigs/main.tf", - "Description": "A basic example of deploying Disaster Recovery Config for an Event Hub Namespace." - }, - { - "ResourceType": "Microsoft.EventHub/namespaces/eventhubs", - "Path": "samples/namespaces/eventhubs/main.tf", - "Description": "A basic example of deploying Event Hubs as a nested resource within an Event Hubs namespace." - }, - { - "ResourceType": "Microsoft.EventHub/namespaces/eventhubs/authorizationRules", - "Path": "samples/namespaces/eventhubs/authorizationrules/main.tf", - "Description": "A basic example of deploying Event Hubs authorization Rule within an Event Hub." - }, - { - "ResourceType": "Microsoft.EventHub/namespaces/eventhubs/consumerGroups", - "Path": "samples/namespaces/eventhubs/consumergroups/main.tf", - "Description": "A basic example of deploying Event Hubs Consumer Group as a nested resource within an Event Hub." - }, - { - "ResourceType": "Microsoft.EventHub/namespaces/schemaGroups", - "Path": "samples/namespaces/schemagroups/main.tf", - "Description": "A basic example of deploying Schema Group for a EventHub Namespace." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.EventHub/clusters", + "Path": "samples/clusters/main.tf", + "Description": "A basic example of deploying EventHub Cluster." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces", + "Path": "samples/namespaces/main.tf", + "Description": "A basic example of deploying EventHub Namespace." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/authorizationRules", + "Path": "samples/namespaces/authorizationrules/main.tf", + "Description": "A basic example of deploying Authorization Rule for an Event Hub Namespace." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/disasterRecoveryConfigs", + "Path": "samples/namespaces/disasterrecoveryconfigs/main.tf", + "Description": "A basic example of deploying Disaster Recovery Config for an Event Hub Namespace." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/eventhubs", + "Path": "samples/namespaces/eventhubs/main.tf", + "Description": "A basic example of deploying Event Hubs as a nested resource within an Event Hubs namespace." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/eventhubs/authorizationRules", + "Path": "samples/namespaces/eventhubs/authorizationrules/main.tf", + "Description": "A basic example of deploying Event Hubs authorization Rule within an Event Hub." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/eventhubs/consumerGroups", + "Path": "samples/namespaces/eventhubs/consumergroups/main.tf", + "Description": "A basic example of deploying Event Hubs Consumer Group as a nested resource within an Event Hub." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/schemaGroups", + "Path": "samples/namespaces/schemagroups/main.tf", + "Description": "A basic example of deploying Schema Group for a EventHub Namespace." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.EventHub/clusters", + "Path": "samples/clusters/main.bicep", + "Description": "A basic example of deploying EventHub Cluster." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces", + "Path": "samples/namespaces/main.bicep", + "Description": "A basic example of deploying EventHub Namespace." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/authorizationRules", + "Path": "samples/namespaces/authorizationrules/main.bicep", + "Description": "A basic example of deploying Authorization Rule for an Event Hub Namespace." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/disasterRecoveryConfigs", + "Path": "samples/namespaces/disasterrecoveryconfigs/main.bicep", + "Description": "A basic example of deploying Disaster Recovery Config for an Event Hub Namespace." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/eventhubs", + "Path": "samples/namespaces/eventhubs/main.bicep", + "Description": "A basic example of deploying Event Hubs as a nested resource within an Event Hubs namespace." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/eventhubs/authorizationRules", + "Path": "samples/namespaces/eventhubs/authorizationrules/main.bicep", + "Description": "A basic example of deploying Event Hubs authorization Rule within an Event Hub." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/eventhubs/consumerGroups", + "Path": "samples/namespaces/eventhubs/consumergroups/main.bicep", + "Description": "A basic example of deploying Event Hubs Consumer Group as a nested resource within an Event Hub." + }, + { + "ResourceType": "Microsoft.EventHub/namespaces/schemaGroups", + "Path": "samples/namespaces/schemagroups/main.bicep", + "Description": "A basic example of deploying Schema Group for a EventHub Namespace." + } + ] +} diff --git a/settings/remarks/microsoft.eventhub/samples/clusters/main.bicep b/settings/remarks/microsoft.eventhub/samples/clusters/main.bicep new file mode 100644 index 00000000..0f1ada93 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/clusters/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.EventHub/clusters@2021-11-01' = { + name: resourceName + location: location + sku: { + capacity: 1 + name: 'Dedicated' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/authorizationrules/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/authorizationrules/main.bicep new file mode 100644 index 00000000..b2e9ba33 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/authorizationrules/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Basic' + tier: 'Basic' + } +} + +resource authorizationRule 'Microsoft.EventHub/namespaces/authorizationRules@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + rights: [ + 'Listen' + 'Send' + 'Manage' + ] + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/disasterrecoveryconfigs/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/disasterrecoveryconfigs/main.bicep new file mode 100644 index 00000000..e6831c27 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/disasterrecoveryconfigs/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource namespace2 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource disasterRecoveryConfig 'Microsoft.EventHub/namespaces/disasterRecoveryConfigs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + partnerNamespace: namespace2.id + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/authorizationrules/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/authorizationrules/main.bicep new file mode 100644 index 00000000..8101f1a7 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/authorizationrules/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Basic' + tier: 'Basic' + } +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} + +resource authorizationRule 'Microsoft.EventHub/namespaces/eventhubs/authorizationRules@2021-11-01' = { + parent: eventhub + name: resourceName + properties: { + rights: [ + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/consumergroups/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/consumergroups/main.bicep new file mode 100644 index 00000000..044a8065 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/consumergroups/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} + +resource consumerGroup 'Microsoft.EventHub/namespaces/eventhubs/consumerGroups@2021-11-01' = { + parent: eventhub + name: resourceName + properties: { + userMetadata: '' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/main.bicep new file mode 100644 index 00000000..423bc654 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/eventhubs/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/main.bicep new file mode 100644 index 00000000..e41aea1f --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.eventhub/samples/namespaces/schemagroups/main.bicep b/settings/remarks/microsoft.eventhub/samples/namespaces/schemagroups/main.bicep new file mode 100644 index 00000000..b61787f7 --- /dev/null +++ b/settings/remarks/microsoft.eventhub/samples/namespaces/schemagroups/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource schemaGroup 'Microsoft.EventHub/namespaces/schemaGroups@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + schemaCompatibility: 'Forward' + schemaType: 'Avro' + } +} diff --git a/settings/remarks/microsoft.fluidrelay/remarks.json b/settings/remarks/microsoft.fluidrelay/remarks.json index 2beb8ee5..b8c2ef5d 100644 --- a/settings/remarks/microsoft.fluidrelay/remarks.json +++ b/settings/remarks/microsoft.fluidrelay/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.FluidRelay/fluidRelayServers", - "Path": "samples/fluidrelayservers/main.tf", - "Description": "A basic example of deploying Fluid Relay Server." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.FluidRelay/fluidRelayServers", + "Path": "samples/fluidrelayservers/main.tf", + "Description": "A basic example of deploying Fluid Relay Server." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.FluidRelay/fluidRelayServers", + "Path": "samples/fluidrelayservers/main.bicep", + "Description": "A basic example of deploying Fluid Relay Server." + } + ] +} diff --git a/settings/remarks/microsoft.fluidrelay/samples/fluidrelayservers/main.bicep b/settings/remarks/microsoft.fluidrelay/samples/fluidrelayservers/main.bicep new file mode 100644 index 00000000..06166752 --- /dev/null +++ b/settings/remarks/microsoft.fluidrelay/samples/fluidrelayservers/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource fluidRelayServer 'Microsoft.FluidRelay/fluidRelayServers@2022-05-26' = { + name: resourceName + location: location + properties: {} + tags: { + foo: 'bar' + } +} diff --git a/settings/remarks/microsoft.guestconfiguration/remarks.json b/settings/remarks/microsoft.guestconfiguration/remarks.json index d3008ae7..7756db25 100644 --- a/settings/remarks/microsoft.guestconfiguration/remarks.json +++ b/settings/remarks/microsoft.guestconfiguration/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.GuestConfiguration/guestConfigurationAssignments", - "Path": "samples/guestconfigurationassignments/main.tf", - "Description": "A basic example of deploying Applies a Guest Configuration Policy to a Virtual Machine." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.GuestConfiguration/guestConfigurationAssignments", + "Path": "samples/guestconfigurationassignments/main.tf", + "Description": "A basic example of deploying Applies a Guest Configuration Policy to a Virtual Machine." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.GuestConfiguration/guestConfigurationAssignments", + "Path": "samples/guestconfigurationassignments/main.bicep", + "Description": "A basic example of deploying Applies a Guest Configuration Policy to a Virtual Machine." + } + ] +} diff --git a/settings/remarks/microsoft.guestconfiguration/samples/guestconfigurationassignments/main.bicep b/settings/remarks/microsoft.guestconfiguration/samples/guestconfigurationassignments/main.bicep new file mode 100644 index 00000000..212e175b --- /dev/null +++ b/settings/remarks/microsoft.guestconfiguration/samples/guestconfigurationassignments/main.bicep @@ -0,0 +1,146 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource guestConfigurationAssignment 'Microsoft.GuestConfiguration/guestConfigurationAssignments@2020-06-25' = { + scope: virtualMachine + name: 'WhitelistedApplication' + location: location + properties: { + guestConfiguration: { + assignmentType: '' + configurationParameter: [ + { + name: '[InstalledApplication]bwhitelistedapp;Name' + value: 'NotePad,sql' + } + ] + contentHash: '' + contentUri: '' + name: 'WhitelistedApplication' + version: '1.*' + } + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctestvmdro23' + secrets: [] + windowsConfiguration: { + enableAutomaticUpdates: true + patchSettings: { + assessmentMode: 'ImageDefault' + enableHotpatching: false + patchMode: 'AutomaticByOS' + } + provisionVMAgent: true + winRM: { + listeners: [] + } + } + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'WindowsServer' + publisher: 'MicrosoftWindowsServer' + sku: '2016-Datacenter' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Windows' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.hdinsight/remarks.json b/settings/remarks/microsoft.hdinsight/remarks.json index 10bb64ce..546765d2 100644 --- a/settings/remarks/microsoft.hdinsight/remarks.json +++ b/settings/remarks/microsoft.hdinsight/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.HDInsight/clusters", - "Path": "samples/clusters/main.tf", - "Description": "A basic example of deploying HDInsight Cluster." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.HDInsight/clusters", + "Path": "samples/clusters/main.tf", + "Description": "A basic example of deploying HDInsight Cluster." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.HDInsight/clusters", + "Path": "samples/clusters/main.bicep", + "Description": "A basic example of deploying HDInsight Cluster." + } + ] +} diff --git a/settings/remarks/microsoft.hdinsight/samples/clusters/main.bicep b/settings/remarks/microsoft.hdinsight/samples/clusters/main.bicep new file mode 100644 index 00000000..ce8260ec --- /dev/null +++ b/settings/remarks/microsoft.hdinsight/samples/clusters/main.bicep @@ -0,0 +1,142 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The username for the HDInsight cluster virtual machines') +param vmUsername string +@secure() +@description('The password for the HDInsight cluster virtual machines') +param vmPassword string +@secure() +@description('The REST API credential password for the HDInsight cluster gateway') +param restCredentialPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource cluster 'Microsoft.HDInsight/clusters@2018-06-01-preview' = { + name: resourceName + location: location + properties: { + clusterDefinition: { + componentVersion: { + Spark: '2.4' + } + configurations: { + gateway: { + 'restAuthCredential.isEnabled': true + 'restAuthCredential.password': restCredentialPassword + 'restAuthCredential.username': 'acctestusrgw' + } + } + kind: 'Spark' + } + clusterVersion: '4.0.3000.1' + computeProfile: { + roles: [ + { + hardwareProfile: { + vmSize: 'standard_a4_v2' + } + name: 'headnode' + osProfile: { + linuxOperatingSystemProfile: { + password: vmPassword + username: vmUsername + } + } + targetInstanceCount: 2 + } + { + hardwareProfile: { + vmSize: 'standard_a4_v2' + } + name: 'workernode' + osProfile: { + linuxOperatingSystemProfile: { + password: vmPassword + username: vmUsername + } + } + targetInstanceCount: 3 + } + { + hardwareProfile: { + vmSize: 'standard_a2_v2' + } + name: 'zookeepernode' + osProfile: { + linuxOperatingSystemProfile: { + password: vmPassword + username: vmUsername + } + } + targetInstanceCount: 3 + } + ] + } + encryptionInTransitProperties: { + isEncryptionInTransitEnabled: false + } + minSupportedTlsVersion: '1.2' + osType: 'Linux' + storageProfile: { + storageaccounts: [ + { + container: container.name + isDefault: true + key: storageAccount.listKeys().keys[0].value + name: '${storageAccount.name}.blob.core.windows.net' + resourceId: storageAccount.id + } + ] + } + tier: 'standard' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.healthbot/remarks.json b/settings/remarks/microsoft.healthbot/remarks.json index 9851261e..1b143b72 100644 --- a/settings/remarks/microsoft.healthbot/remarks.json +++ b/settings/remarks/microsoft.healthbot/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.HealthBot/healthBots", - "Path": "samples/healthbots/main.tf", - "Description": "A basic example of deploying Healthbot Service." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.HealthBot/healthBots", + "Path": "samples/healthbots/main.tf", + "Description": "A basic example of deploying Healthbot Service." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.HealthBot/healthBots", + "Path": "samples/healthbots/main.bicep", + "Description": "A basic example of deploying Healthbot Service." + } + ] +} diff --git a/settings/remarks/microsoft.healthbot/samples/healthbots/main.bicep b/settings/remarks/microsoft.healthbot/samples/healthbots/main.bicep new file mode 100644 index 00000000..6a54a915 --- /dev/null +++ b/settings/remarks/microsoft.healthbot/samples/healthbots/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource healthBot 'Microsoft.HealthBot/healthBots@2022-08-08' = { + name: resourceName + location: location + sku: { + name: 'F0' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/remarks.json b/settings/remarks/microsoft.healthcareapis/remarks.json index 59256777..81bdfb96 100644 --- a/settings/remarks/microsoft.healthcareapis/remarks.json +++ b/settings/remarks/microsoft.healthcareapis/remarks.json @@ -1,35 +1,67 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.HealthcareApis/services", - "Path": "samples/services/main.tf", - "Description": "A basic example of deploying Healthcare Service." - }, - { - "ResourceType": "Microsoft.HealthcareApis/workspaces", - "Path": "samples/workspaces/main.tf", - "Description": "A basic example of deploying Healthcare Workspace." - }, - { - "ResourceType": "Microsoft.HealthcareApis/workspaces/dicomServices", - "Path": "samples/workspaces/dicomservices/main.tf", - "Description": "A basic example of deploying Healthcare DICOM (Digital Imaging and Communications in Medicine) Service." - }, - { - "ResourceType": "Microsoft.HealthcareApis/workspaces/fhirServices", - "Path": "samples/workspaces/fhirservices/main.tf", - "Description": "A basic example of deploying Healthcare FHIR (Fast Healthcare Interoperability Resources) Service." - }, - { - "ResourceType": "Microsoft.HealthcareApis/workspaces/iotConnectors", - "Path": "samples/workspaces/iotconnectors/main.tf", - "Description": "A basic example of deploying Healthcare MedTech (Internet of Medical Things) devices Service." - }, - { - "ResourceType": "Microsoft.HealthcareApis/workspaces/iotConnectors/fhirDestinations", - "Path": "samples/workspaces/iotconnectors/fhirdestinations/main.tf", - "Description": "A basic example of deploying Healthcare Med Tech (Internet of Medical Things) Service Fhir Destination." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.HealthcareApis/services", + "Path": "samples/services/main.tf", + "Description": "A basic example of deploying Healthcare Service." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces", + "Path": "samples/workspaces/main.tf", + "Description": "A basic example of deploying Healthcare Workspace." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces/dicomServices", + "Path": "samples/workspaces/dicomservices/main.tf", + "Description": "A basic example of deploying Healthcare DICOM (Digital Imaging and Communications in Medicine) Service." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces/fhirServices", + "Path": "samples/workspaces/fhirservices/main.tf", + "Description": "A basic example of deploying Healthcare FHIR (Fast Healthcare Interoperability Resources) Service." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces/iotConnectors", + "Path": "samples/workspaces/iotconnectors/main.tf", + "Description": "A basic example of deploying Healthcare MedTech (Internet of Medical Things) devices Service." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces/iotConnectors/fhirDestinations", + "Path": "samples/workspaces/iotconnectors/fhirdestinations/main.tf", + "Description": "A basic example of deploying Healthcare Med Tech (Internet of Medical Things) Service Fhir Destination." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.HealthcareApis/services", + "Path": "samples/services/main.bicep", + "Description": "A basic example of deploying Healthcare Service." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces", + "Path": "samples/workspaces/main.bicep", + "Description": "A basic example of deploying Healthcare Workspace." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces/dicomServices", + "Path": "samples/workspaces/dicomservices/main.bicep", + "Description": "A basic example of deploying Healthcare DICOM (Digital Imaging and Communications in Medicine) Service." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces/fhirServices", + "Path": "samples/workspaces/fhirservices/main.bicep", + "Description": "A basic example of deploying Healthcare FHIR (Fast Healthcare Interoperability Resources) Service." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces/iotConnectors", + "Path": "samples/workspaces/iotconnectors/main.bicep", + "Description": "A basic example of deploying Healthcare MedTech (Internet of Medical Things) devices Service." + }, + { + "ResourceType": "Microsoft.HealthcareApis/workspaces/iotConnectors/fhirDestinations", + "Path": "samples/workspaces/iotconnectors/fhirdestinations/main.bicep", + "Description": "A basic example of deploying Healthcare Med Tech (Internet of Medical Things) Service Fhir Destination." + } + ] +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/services/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/services/main.bicep new file mode 100644 index 00000000..47827fb8 --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/services/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westus2' + +resource service 'Microsoft.HealthcareApis/services@2022-12-01' = { + name: resourceName + location: location + kind: 'fhir' + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + } + ] + authenticationConfiguration: {} + corsConfiguration: {} + cosmosDbConfiguration: { + offerThroughput: 1000 + } + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/dicomservices/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/dicomservices/main.bicep new file mode 100644 index 00000000..1be52aff --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/dicomservices/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} + +resource dicomService 'Microsoft.HealthcareApis/workspaces/dicomServices@2022-12-01' = { + parent: workspace + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/fhirservices/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/fhirservices/main.bicep new file mode 100644 index 00000000..3fb569c6 --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/fhirservices/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} + +resource fhirService 'Microsoft.HealthcareApis/workspaces/fhirServices@2022-12-01' = { + parent: workspace + name: resourceName + location: location + kind: 'fhir-R4' + properties: { + acrConfiguration: {} + authenticationConfiguration: { + audience: 'https://acctestfhir.fhir.azurehealthcareapis.com' + authority: 'https://login.microsoftonline.com/deployer().tenantId' + smartProxyEnabled: false + } + corsConfiguration: { + allowCredentials: false + headers: [] + methods: [] + origins: [] + } + } +} + +resource fhirService2 'Microsoft.HealthcareApis/workspaces/fhirServices@2022-12-01' = { + parent: workspace + name: resourceName + location: location + kind: 'fhir-R4' + properties: { + acrConfiguration: {} + authenticationConfiguration: { + audience: fhirService.properties.authenticationConfiguration.audience + authority: fhirService.properties.authenticationConfiguration.authority + smartProxyEnabled: false + } + corsConfiguration: { + allowCredentials: false + headers: [] + methods: [] + origins: [] + } + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/fhirdestinations/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/fhirdestinations/main.bicep new file mode 100644 index 00000000..f2bcb8fc --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/fhirdestinations/main.bicep @@ -0,0 +1,97 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} + +resource fhirService 'Microsoft.HealthcareApis/workspaces/fhirServices@2022-12-01' = { + parent: workspace + name: resourceName + location: location + kind: 'fhir-R4' + properties: { + acrConfiguration: {} + authenticationConfiguration: { + audience: 'https://acctestfhir.fhir.azurehealthcareapis.com' + authority: 'https://login.microsoftonline.com/deployer().tenantId' + smartProxyEnabled: false + } + corsConfiguration: { + allowCredentials: false + headers: [] + methods: [] + origins: [] + } + } +} + +resource iotConnector 'Microsoft.HealthcareApis/workspaces/iotConnectors@2022-12-01' = { + parent: workspace + name: resourceName + location: location + properties: { + deviceMapping: { + content: { + template: [] + templateType: 'CollectionContent' + } + } + ingestionEndpointConfiguration: { + consumerGroup: consumerGroup.id + eventHubName: eventhub.name + fullyQualifiedEventHubNamespace: '${namespace.name}.servicebus.windows.net' + } + } +} + +resource consumerGroup 'Microsoft.EventHub/namespaces/eventhubs/consumerGroups@2021-11-01' = { + parent: eventhub + name: resourceName + properties: { + userMetadata: '' + } +} + +resource fhirDestination 'Microsoft.HealthcareApis/workspaces/iotConnectors/fhirDestinations@2022-12-01' = { + parent: iotConnector + name: resourceName + location: location + properties: { + fhirMapping: { + content: { + template: [] + templateType: 'CollectionFhirTemplate' + } + } + fhirServiceResourceId: fhirService.id + resourceIdentityResolutionType: 'Create' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/main.bicep new file mode 100644 index 00000000..eefb1927 --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/iotconnectors/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Standard' + tier: 'Standard' + } +} + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} + +resource eventhub 'Microsoft.EventHub/namespaces/eventhubs@2021-11-01' = { + parent: namespace + name: resourceName + properties: { + messageRetentionInDays: 1 + partitionCount: 2 + status: 'Active' + } +} + +resource iotConnector 'Microsoft.HealthcareApis/workspaces/iotConnectors@2022-12-01' = { + parent: workspace + name: resourceName + location: location + properties: { + deviceMapping: { + content: { + template: [] + templateType: 'CollectionContent' + } + } + ingestionEndpointConfiguration: { + consumerGroup: consumerGroup.id + eventHubName: eventhub.name + fullyQualifiedEventHubNamespace: '${namespace.name}.servicebus.windows.net' + } + } +} + +resource consumerGroup 'Microsoft.EventHub/namespaces/eventhubs/consumerGroups@2021-11-01' = { + parent: eventhub + name: resourceName + properties: { + userMetadata: '' + } +} diff --git a/settings/remarks/microsoft.healthcareapis/samples/workspaces/main.bicep b/settings/remarks/microsoft.healthcareapis/samples/workspaces/main.bicep new file mode 100644 index 00000000..3facef31 --- /dev/null +++ b/settings/remarks/microsoft.healthcareapis/samples/workspaces/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.HealthcareApis/workspaces@2022-12-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.hybridcompute/remarks.json b/settings/remarks/microsoft.hybridcompute/remarks.json index 1f590505..f14da0c4 100644 --- a/settings/remarks/microsoft.hybridcompute/remarks.json +++ b/settings/remarks/microsoft.hybridcompute/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.HybridCompute/machines", - "Path": "samples/machines/main.tf", - "Description": "A basic example of deploying Hybrid Compute Machine." - }, - { - "ResourceType": "Microsoft.HybridCompute/privateLinkScopes", - "Path": "samples/privatelinkscopes/main.tf", - "Description": "A basic example of deploying Azure Arc Private Link Scope." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.HybridCompute/machines", + "Path": "samples/machines/main.tf", + "Description": "A basic example of deploying Hybrid Compute Machine." + }, + { + "ResourceType": "Microsoft.HybridCompute/privateLinkScopes", + "Path": "samples/privatelinkscopes/main.tf", + "Description": "A basic example of deploying Azure Arc Private Link Scope." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.HybridCompute/machines", + "Path": "samples/machines/main.bicep", + "Description": "A basic example of deploying Hybrid Compute Machine." + }, + { + "ResourceType": "Microsoft.HybridCompute/privateLinkScopes", + "Path": "samples/privatelinkscopes/main.bicep", + "Description": "A basic example of deploying Azure Arc Private Link Scope." + } + ] +} diff --git a/settings/remarks/microsoft.hybridcompute/samples/machines/main.bicep b/settings/remarks/microsoft.hybridcompute/samples/machines/main.bicep new file mode 100644 index 00000000..3ddd517f --- /dev/null +++ b/settings/remarks/microsoft.hybridcompute/samples/machines/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource machine 'Microsoft.HybridCompute/machines@2024-07-10' = { + name: '${resourceName}hcm' + location: location + kind: 'SCVMM' +} diff --git a/settings/remarks/microsoft.hybridcompute/samples/privatelinkscopes/main.bicep b/settings/remarks/microsoft.hybridcompute/samples/privatelinkscopes/main.bicep new file mode 100644 index 00000000..cad6864a --- /dev/null +++ b/settings/remarks/microsoft.hybridcompute/samples/privatelinkscopes/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource privateLinkScope 'Microsoft.HybridCompute/privateLinkScopes@2022-11-10' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.impact/remarks.json b/settings/remarks/microsoft.impact/remarks.json index ce3275f4..ade21c60 100644 --- a/settings/remarks/microsoft.impact/remarks.json +++ b/settings/remarks/microsoft.impact/remarks.json @@ -1,15 +1,22 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Impact/connectors", - "Path": "samples/connectors/main.tf", - "Description": "A basic example of deploying Impact Connectors." - }, - { - "ResourceType": "Microsoft.Impact/workloadImpacts", - "Path": "samples/workloadimpacts/main.tf", - "Description": "A basic example of deploying Impact Workload Impacts." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Impact/connectors", + "Path": "samples/connectors/main.tf", + "Description": "A basic example of deploying Impact Connectors." + }, + { + "ResourceType": "Microsoft.Impact/workloadImpacts", + "Path": "samples/workloadimpacts/main.tf", + "Description": "A basic example of deploying Impact Workload Impacts." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Impact/connectors", + "Path": "samples/connectors/main.bicep", + "Description": "A basic example of deploying Impact Connectors." + } + ] +} diff --git a/settings/remarks/microsoft.impact/samples/connectors/main.bicep b/settings/remarks/microsoft.impact/samples/connectors/main.bicep new file mode 100644 index 00000000..39b2c82d --- /dev/null +++ b/settings/remarks/microsoft.impact/samples/connectors/main.bicep @@ -0,0 +1,10 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource connector 'Microsoft.Impact/connectors@2024-05-01-preview' = { + name: resourceName + properties: { + connectorType: 'AzureMonitor' + } +} diff --git a/settings/remarks/microsoft.insights/remarks.json b/settings/remarks/microsoft.insights/remarks.json index e98615f3..6bee898e 100644 --- a/settings/remarks/microsoft.insights/remarks.json +++ b/settings/remarks/microsoft.insights/remarks.json @@ -1,114 +1,196 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "For guidance on deploying monitoring solutions, see [Create monitoring resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-monitoring).", - "ResourceTypes": [ - "microsoft.insights/actiongroups", - "microsoft.insights/activitylogalerts", - "microsoft.insights/autoscalesettings", - "microsoft.insights/components", - "microsoft.insights/diagnosticsettings", - "microsoft.insights/metricalerts", - "microsoft.insights/scheduledqueryrules" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Insights/actionGroups", - "Path": "samples/actiongroups/main.tf", - "Description": "A basic example of deploying Action Group within Azure Monitor." - }, - { - "ResourceType": "Microsoft.Insights/activityLogAlerts", - "Path": "samples/activitylogalerts/main.tf", - "Description": "A basic example of deploying Activity Log Alert within Azure Monitor." - }, - { - "ResourceType": "Microsoft.Insights/autoScaleSettings", - "Path": "samples/autoscalesettings/main.tf", - "Description": "A basic example of deploying AutoScale Setting which can be applied to Virtual Machine Scale Sets, App Services and other scalable resources." - }, - { - "ResourceType": "Microsoft.Insights/components", - "Path": "samples/components/main.tf", - "Description": "A basic example of deploying Application Insights component." - }, - { - "ResourceType": "Microsoft.Insights/components/ProactiveDetectionConfigs", - "Path": "samples/components/proactivedetectionconfigs/main.tf", - "Description": "A basic example of deploying Application Insights Smart Detection Rule." - }, - { - "ResourceType": "Microsoft.Insights/components/analyticsItems", - "Path": "samples/components/analyticsitems/main.tf", - "Description": "A basic example of deploying Application Insights Analytics Item component." - }, - { - "ResourceType": "Microsoft.Insights/dataCollectionEndpoints", - "Path": "samples/datacollectionendpoints/main.tf", - "Description": "A basic example of deploying Data Collection Endpoint." - }, - { - "ResourceType": "Microsoft.Insights/dataCollectionRuleAssociations", - "Path": "samples/datacollectionruleassociations/main.tf", - "Description": "A basic example of deploying Data Collection Rule Association." - }, - { - "ResourceType": "Microsoft.Insights/dataCollectionRules", - "Path": "samples/datacollectionrules/main.tf", - "Description": "A basic example of deploying Data Collection Rule." - }, - { - "ResourceType": "Microsoft.Insights/diagnosticSettings", - "Path": "samples/diagnosticsettings/main.tf", - "Description": "A basic example of deploying Insights Diagnostic Settings." - }, - { - "ResourceType": "Microsoft.Insights/logProfiles", - "Path": "samples/logprofiles/main.tf", - "Description": "A basic example of deploying Insights Log Profiles." - }, - { - "ResourceType": "Microsoft.Insights/metricAlerts", - "Path": "samples/metricalerts/main.tf", - "Description": "A basic example of deploying Metric Alert within Azure Monitor." - }, - { - "ResourceType": "Microsoft.Insights/privateLinkScopes", - "Path": "samples/privatelinkscopes/main.tf", - "Description": "A basic example of deploying Azure Monitor Private Link Scope." - }, - { - "ResourceType": "Microsoft.Insights/privateLinkScopes/scopedResources", - "Path": "samples/privatelinkscopes/scopedresources/main.tf", - "Description": "A basic example of deploying Azure Monitor Private Link Scoped Service." - }, - { - "ResourceType": "Microsoft.Insights/scheduledQueryRules", - "Path": "samples/scheduledqueryrules/main.tf", - "Description": "A basic example of deploying AlertingAction Scheduled Query Rules resource within Azure Monitor." - }, - { - "ResourceType": "Microsoft.Insights/scheduledQueryRules", - "Path": "samples/scheduledqueryrules/main.tf", - "Description": "A basic example of deploying AlertingAction Scheduled Query Rules resource within Azure Monitor." - }, - { - "ResourceType": "Microsoft.Insights/webTests", - "Path": "samples/webtests/main.tf", - "Description": "A basic example of deploying Application Insights Standard WebTest." - }, - { - "ResourceType": "Microsoft.Insights/workbookTemplates", - "Path": "samples/workbooktemplates/main.tf", - "Description": "A basic example of deploying Application Insights Workbook Template." - }, - { - "ResourceType": "Microsoft.Insights/workbooks", - "Path": "samples/workbooks/main.tf", - "Description": "A basic example of deploying Azure Workbook." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "For guidance on deploying monitoring solutions, see [Create monitoring resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-monitoring).", + "ResourceTypes": [ + "microsoft.insights/actiongroups", + "microsoft.insights/activitylogalerts", + "microsoft.insights/autoscalesettings", + "microsoft.insights/components", + "microsoft.insights/diagnosticsettings", + "microsoft.insights/metricalerts", + "microsoft.insights/scheduledqueryrules" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Insights/actionGroups", + "Path": "samples/actiongroups/main.tf", + "Description": "A basic example of deploying Action Group within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/activityLogAlerts", + "Path": "samples/activitylogalerts/main.tf", + "Description": "A basic example of deploying Activity Log Alert within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/autoScaleSettings", + "Path": "samples/autoscalesettings/main.tf", + "Description": "A basic example of deploying AutoScale Setting which can be applied to Virtual Machine Scale Sets, App Services and other scalable resources." + }, + { + "ResourceType": "Microsoft.Insights/components", + "Path": "samples/components/main.tf", + "Description": "A basic example of deploying Application Insights component." + }, + { + "ResourceType": "Microsoft.Insights/components/ProactiveDetectionConfigs", + "Path": "samples/components/proactivedetectionconfigs/main.tf", + "Description": "A basic example of deploying Application Insights Smart Detection Rule." + }, + { + "ResourceType": "Microsoft.Insights/components/analyticsItems", + "Path": "samples/components/analyticsitems/main.tf", + "Description": "A basic example of deploying Application Insights Analytics Item component." + }, + { + "ResourceType": "Microsoft.Insights/dataCollectionEndpoints", + "Path": "samples/datacollectionendpoints/main.tf", + "Description": "A basic example of deploying Data Collection Endpoint." + }, + { + "ResourceType": "Microsoft.Insights/dataCollectionRuleAssociations", + "Path": "samples/datacollectionruleassociations/main.tf", + "Description": "A basic example of deploying Data Collection Rule Association." + }, + { + "ResourceType": "Microsoft.Insights/dataCollectionRules", + "Path": "samples/datacollectionrules/main.tf", + "Description": "A basic example of deploying Data Collection Rule." + }, + { + "ResourceType": "Microsoft.Insights/diagnosticSettings", + "Path": "samples/diagnosticsettings/main.tf", + "Description": "A basic example of deploying Insights Diagnostic Settings." + }, + { + "ResourceType": "Microsoft.Insights/logProfiles", + "Path": "samples/logprofiles/main.tf", + "Description": "A basic example of deploying Insights Log Profiles." + }, + { + "ResourceType": "Microsoft.Insights/metricAlerts", + "Path": "samples/metricalerts/main.tf", + "Description": "A basic example of deploying Metric Alert within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/privateLinkScopes", + "Path": "samples/privatelinkscopes/main.tf", + "Description": "A basic example of deploying Azure Monitor Private Link Scope." + }, + { + "ResourceType": "Microsoft.Insights/privateLinkScopes/scopedResources", + "Path": "samples/privatelinkscopes/scopedresources/main.tf", + "Description": "A basic example of deploying Azure Monitor Private Link Scoped Service." + }, + { + "ResourceType": "Microsoft.Insights/scheduledQueryRules", + "Path": "samples/scheduledqueryrules/main.tf", + "Description": "A basic example of deploying AlertingAction Scheduled Query Rules resource within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/scheduledQueryRules", + "Path": "samples/scheduledqueryrules/main.tf", + "Description": "A basic example of deploying AlertingAction Scheduled Query Rules resource within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/webTests", + "Path": "samples/webtests/main.tf", + "Description": "A basic example of deploying Application Insights Standard WebTest." + }, + { + "ResourceType": "Microsoft.Insights/workbookTemplates", + "Path": "samples/workbooktemplates/main.tf", + "Description": "A basic example of deploying Application Insights Workbook Template." + }, + { + "ResourceType": "Microsoft.Insights/workbooks", + "Path": "samples/workbooks/main.tf", + "Description": "A basic example of deploying Azure Workbook." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Insights/actionGroups", + "Path": "samples/actiongroups/main.bicep", + "Description": "A basic example of deploying Action Group within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/activityLogAlerts", + "Path": "samples/activitylogalerts/main.bicep", + "Description": "A basic example of deploying Activity Log Alert within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/autoScaleSettings", + "Path": "samples/autoscalesettings/main.bicep", + "Description": "A basic example of deploying AutoScale Setting which can be applied to Virtual Machine Scale Sets, App Services and other scalable resources." + }, + { + "ResourceType": "Microsoft.Insights/components", + "Path": "samples/components/main.bicep", + "Description": "A basic example of deploying Application Insights component." + }, + { + "ResourceType": "Microsoft.Insights/components/analyticsItems", + "Path": "samples/components/analyticsitems/main.bicep", + "Description": "A basic example of deploying Application Insights Analytics Item component." + }, + { + "ResourceType": "Microsoft.Insights/dataCollectionEndpoints", + "Path": "samples/datacollectionendpoints/main.bicep", + "Description": "A basic example of deploying Data Collection Endpoint." + }, + { + "ResourceType": "Microsoft.Insights/dataCollectionRuleAssociations", + "Path": "samples/datacollectionruleassociations/main.bicep", + "Description": "A basic example of deploying Data Collection Rule Association." + }, + { + "ResourceType": "Microsoft.Insights/dataCollectionRules", + "Path": "samples/datacollectionrules/main.bicep", + "Description": "A basic example of deploying Data Collection Rule." + }, + { + "ResourceType": "Microsoft.Insights/diagnosticSettings", + "Path": "samples/diagnosticsettings/main.bicep", + "Description": "A basic example of deploying Insights Diagnostic Settings." + }, + { + "ResourceType": "Microsoft.Insights/metricAlerts", + "Path": "samples/metricalerts/main.bicep", + "Description": "A basic example of deploying Metric Alert within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/privateLinkScopes", + "Path": "samples/privatelinkscopes/main.bicep", + "Description": "A basic example of deploying Azure Monitor Private Link Scope." + }, + { + "ResourceType": "Microsoft.Insights/privateLinkScopes/scopedResources", + "Path": "samples/privatelinkscopes/scopedresources/main.bicep", + "Description": "A basic example of deploying Azure Monitor Private Link Scoped Service." + }, + { + "ResourceType": "Microsoft.Insights/scheduledQueryRules", + "Path": "samples/scheduledqueryrules/main.bicep", + "Description": "A basic example of deploying AlertingAction Scheduled Query Rules resource within Azure Monitor." + }, + { + "ResourceType": "Microsoft.Insights/webTests", + "Path": "samples/webtests/main.bicep", + "Description": "A basic example of deploying Application Insights Standard WebTest." + }, + { + "ResourceType": "Microsoft.Insights/workbookTemplates", + "Path": "samples/workbooktemplates/main.bicep", + "Description": "A basic example of deploying Application Insights Workbook Template." + }, + { + "ResourceType": "Microsoft.Insights/workbooks", + "Path": "samples/workbooks/main.bicep", + "Description": "A basic example of deploying Azure Workbook." + } + ] +} diff --git a/settings/remarks/microsoft.insights/samples/actiongroups/main.bicep b/settings/remarks/microsoft.insights/samples/actiongroups/main.bicep new file mode 100644 index 00000000..a50473f2 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/actiongroups/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' + +resource actionGroup 'Microsoft.Insights/actionGroups@2023-01-01' = { + name: resourceName + location: 'global' + properties: { + armRoleReceivers: [] + automationRunbookReceivers: [] + azureAppPushReceivers: [] + azureFunctionReceivers: [] + emailReceivers: [] + enabled: true + eventHubReceivers: [] + groupShortName: 'acctestag' + itsmReceivers: [] + logicAppReceivers: [] + smsReceivers: [] + voiceReceivers: [] + webhookReceivers: [] + } +} diff --git a/settings/remarks/microsoft.insights/samples/activitylogalerts/main.bicep b/settings/remarks/microsoft.insights/samples/activitylogalerts/main.bicep new file mode 100644 index 00000000..fe95dfcf --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/activitylogalerts/main.bicep @@ -0,0 +1,150 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource actionGroup 'Microsoft.Insights/actionGroups@2023-01-01' = { + name: resourceName + location: 'global' + properties: { + armRoleReceivers: [] + automationRunbookReceivers: [] + azureAppPushReceivers: [] + azureFunctionReceivers: [] + emailReceivers: [] + enabled: true + eventHubReceivers: [] + groupShortName: 'acctestag1' + itsmReceivers: [] + logicAppReceivers: [] + smsReceivers: [] + voiceReceivers: [] + webhookReceivers: [] + } +} + +resource actionGroup2 'Microsoft.Insights/actionGroups@2023-01-01' = { + name: resourceName + location: 'global' + properties: { + armRoleReceivers: [] + automationRunbookReceivers: [] + azureAppPushReceivers: [] + azureFunctionReceivers: [] + emailReceivers: [] + enabled: true + eventHubReceivers: [] + groupShortName: 'acctestag2' + itsmReceivers: [] + logicAppReceivers: [] + smsReceivers: [] + voiceReceivers: [] + webhookReceivers: [] + } +} + +resource activityLogAlert 'Microsoft.Insights/activityLogAlerts@2020-10-01' = { + name: resourceName + location: 'global' + properties: { + actions: { + actionGroups: [ + { + actionGroupId: actionGroup.id + webhookProperties: {} + } + { + actionGroupId: actionGroup2.id + webhookProperties: { + from: 'terraform test' + to: 'microsoft azure' + } + } + ] + } + condition: { + allOf: [ + { + equals: 'ResourceHealth' + field: 'category' + } + { + anyOf: [ + { + equals: 'Unavailable' + field: 'properties.currentHealthStatus' + } + { + equals: 'Degraded' + field: 'properties.currentHealthStatus' + } + ] + } + { + anyOf: [ + { + equals: 'Unknown' + field: 'properties.previousHealthStatus' + } + { + equals: 'Available' + field: 'properties.previousHealthStatus' + } + ] + } + { + anyOf: [ + { + equals: 'PlatformInitiated' + field: 'properties.cause' + } + { + equals: 'UserInitiated' + field: 'properties.cause' + } + ] + } + ] + } + description: 'This is just a test acceptance.' + enabled: true + scopes: [ + resourceGroup().id + storageAccount.id + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.insights/samples/autoscalesettings/main.bicep b/settings/remarks/microsoft.insights/samples/autoscalesettings/main.bicep new file mode 100644 index 00000000..a1ef6631 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/autoscalesettings/main.bicep @@ -0,0 +1,184 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the virtual machine scale set') +param adminUsername string +@secure() +@description('The administrator password for the virtual machine scale set') +param adminPassword string + +resource autoScaleSetting 'Microsoft.Insights/autoScaleSettings@2022-10-01' = { + name: resourceName + location: location + properties: { + enabled: true + notifications: [] + profiles: [ + { + capacity: { + default: '1' + maximum: '10' + minimum: '1' + } + name: 'metricRules' + rules: [ + { + metricTrigger: { + dimensions: [] + dividePerInstance: true + metricName: 'Percentage CPU' + metricNamespace: '' + metricResourceUri: virtualMachineScaleSet.id + operator: 'GreaterThan' + statistic: 'Average' + threshold: 75 + timeAggregation: 'Last' + timeGrain: 'PT1M' + timeWindow: 'PT5M' + } + scaleAction: { + cooldown: 'PT1M' + direction: 'Increase' + type: 'ChangeCount' + value: '1' + } + } + ] + } + ] + targetResourceUri: virtualMachineScaleSet.id + } +} + +resource virtualMachineScaleSet 'Microsoft.Compute/virtualMachineScaleSets@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + doNotRunExtensionsOnOverprovisionedVMs: false + orchestrationMode: 'Uniform' + overprovision: true + scaleInPolicy: { + forceDeletion: false + rules: [ + 'Default' + ] + } + singlePlacementGroup: true + upgradePolicy: { + mode: 'Manual' + } + virtualMachineProfile: { + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionProfile: { + extensionsTimeBudget: 'PT1H30M' + } + networkProfile: { + networkInterfaceConfigurations: [ + { + name: 'TestNetworkProfile-230630033559396108' + properties: { + dnsSettings: { + dnsServers: [] + } + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'TestIPConfiguration' + properties: { + applicationGatewayBackendAddressPools: [] + applicationSecurityGroups: [] + loadBalancerBackendAddressPools: [] + loadBalancerInboundNatPools: [] + primary: true + privateIPAddressVersion: 'IPv4' + subnet: { + id: subnet.id + } + } + } + ] + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: null + computerNamePrefix: 'testvm-230630033559396108' + linuxConfiguration: { + disablePasswordAuthentication: false + provisionVMAgent: true + ssh: { + publicKeys: [ + { + keyData: 'ssh-rsa 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 hello@world.com' + path: '/home/myadmin/.ssh/authorized_keys' + } + ] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'StandardSSD_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } + } + sku: { + capacity: 2 + name: 'Standard_F2' + tier: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.insights/samples/components/analyticsitems/main.bicep b/settings/remarks/microsoft.insights/samples/components/analyticsitems/main.bicep new file mode 100644 index 00000000..c22f4fd2 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/components/analyticsitems/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource analyticsItem 'microsoft.insights/components/analyticsItems@2015-05-01' = { + parent: component + name: 'item' + Content: 'requests #test' + Name: 'testquery' + Scope: 'shared' + Type: 'query' +} diff --git a/settings/remarks/microsoft.insights/samples/components/main.bicep b/settings/remarks/microsoft.insights/samples/components/main.bicep new file mode 100644 index 00000000..e36d6913 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/components/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.insights/samples/datacollectionendpoints/main.bicep b/settings/remarks/microsoft.insights/samples/datacollectionendpoints/main.bicep new file mode 100644 index 00000000..3f0bf9f1 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/datacollectionendpoints/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dataCollectionEndpoint 'Microsoft.Insights/dataCollectionEndpoints@2022-06-01' = { + name: resourceName + location: location + properties: { + description: '' + networkAcls: { + publicNetworkAccess: 'Enabled' + } + } +} diff --git a/settings/remarks/microsoft.insights/samples/datacollectionruleassociations/main.bicep b/settings/remarks/microsoft.insights/samples/datacollectionruleassociations/main.bicep new file mode 100644 index 00000000..72d5147a --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/datacollectionruleassociations/main.bicep @@ -0,0 +1,156 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource dataCollectionRule 'Microsoft.Insights/dataCollectionRules@2022-06-01' = { + name: resourceName + location: location + properties: { + dataFlows: [ + { + destinations: [ + 'test-destination-metrics' + ] + streams: [ + 'Microsoft-InsightsMetrics' + ] + } + ] + description: '' + destinations: { + azureMonitorMetrics: { + name: 'test-destination-metrics' + } + } + } +} + +resource dataCollectionRuleAssociation 'Microsoft.Insights/dataCollectionRuleAssociations@2022-06-01' = { + scope: virtualMachine + name: resourceName + properties: { + dataCollectionRuleId: dataCollectionRule.id + description: '' + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: 'nic-230630033559397415' + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'internal' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: 'machine-230630033559397415' + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_B1ls' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'machine-230630033559397415' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: 'network-230630033559397415' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'subnet-230630033559397415' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.insights/samples/datacollectionrules/main.bicep b/settings/remarks/microsoft.insights/samples/datacollectionrules/main.bicep new file mode 100644 index 00000000..30fee3fa --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/datacollectionrules/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dataCollectionRule 'Microsoft.Insights/dataCollectionRules@2022-06-01' = { + name: resourceName + location: location + properties: { + dataFlows: [ + { + destinations: [ + 'test-destination-metrics' + ] + streams: [ + 'Microsoft-InsightsMetrics' + ] + } + ] + description: '' + destinations: { + azureMonitorMetrics: { + name: 'test-destination-metrics' + } + } + } +} diff --git a/settings/remarks/microsoft.insights/samples/diagnosticsettings/main.bicep b/settings/remarks/microsoft.insights/samples/diagnosticsettings/main.bicep new file mode 100644 index 00000000..0b673c3a --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/diagnosticsettings/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource diagnosticSetting 'Microsoft.Insights/diagnosticSettings@2021-05-01-preview' = { + scope: vault + name: resourceName + properties: { + eventHubAuthorizationRuleId: authorizationRule.id + eventHubName: namespace.name + logs: [ + { + categoryGroup: 'Audit' + enabled: true + retentionPolicy: { + days: 0 + enabled: false + } + } + ] + metrics: [ + { + category: 'AllMetrics' + enabled: true + retentionPolicy: { + days: 0 + enabled: false + } + } + ] + } +} + +resource namespace 'Microsoft.EventHub/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + isAutoInflateEnabled: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 1 + name: 'Basic' + tier: 'Basic' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource authorizationRule 'Microsoft.EventHub/namespaces/authorizationRules@2021-11-01' = { + parent: namespace + name: 'example' + properties: { + rights: [ + 'Listen' + 'Send' + 'Manage' + ] + } +} diff --git a/settings/remarks/microsoft.insights/samples/metricalerts/main.bicep b/settings/remarks/microsoft.insights/samples/metricalerts/main.bicep new file mode 100644 index 00000000..f09c6e22 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/metricalerts/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource metricAlert 'Microsoft.Insights/metricAlerts@2018-03-01' = { + name: resourceName + location: 'global' + properties: { + actions: [] + autoMitigate: true + criteria: { + allOf: [ + { + criterionType: 'StaticThresholdCriterion' + dimensions: [] + metricName: 'UsedCapacity' + metricNamespace: 'Microsoft.Storage/storageAccounts' + name: 'Metric1' + operator: 'GreaterThan' + skipMetricValidation: false + threshold: any('55.5') + timeAggregation: 'Average' + } + ] + 'odata.type': 'Microsoft.Azure.Monitor.MultipleResourceMultipleMetricCriteria' + } + description: '' + enabled: true + evaluationFrequency: 'PT1M' + scopes: [ + storageAccount.id + ] + severity: 3 + targetResourceRegion: '' + targetResourceType: '' + windowSize: 'PT1H' + } + tags: { + CUSTOMER: 'CUSTOMERx' + Example: 'Example123' + terraform: 'Coolllll' + test: '123' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.insights/samples/privatelinkscopes/main.bicep b/settings/remarks/microsoft.insights/samples/privatelinkscopes/main.bicep new file mode 100644 index 00000000..59efc1be --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/privatelinkscopes/main.bicep @@ -0,0 +1,6 @@ +param resourceName string = 'acctest0001' + +resource privateLinkScope 'Microsoft.Insights/privateLinkScopes@2019-10-17-preview' = { + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.insights/samples/privatelinkscopes/scopedresources/main.bicep b/settings/remarks/microsoft.insights/samples/privatelinkscopes/scopedresources/main.bicep new file mode 100644 index 00000000..05a33bb3 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/privatelinkscopes/scopedresources/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource privateLinkScope 'Microsoft.Insights/privateLinkScopes@2019-10-17-preview' = { + name: resourceName + properties: {} +} + +resource scopedResource 'Microsoft.Insights/privateLinkScopes/scopedResources@2019-10-17-preview' = { + parent: privateLinkScope + name: resourceName + properties: { + linkedResourceId: component.id + } +} diff --git a/settings/remarks/microsoft.insights/samples/scheduledqueryrules/main.bicep b/settings/remarks/microsoft.insights/samples/scheduledqueryrules/main.bicep new file mode 100644 index 00000000..fae18770 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/scheduledqueryrules/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource scheduledQueryRule 'Microsoft.Insights/scheduledQueryRules@2021-08-01' = { + name: resourceName + location: location + kind: 'LogAlert' + properties: { + autoMitigate: false + checkWorkspaceAlertsStorageConfigured: false + criteria: { + allOf: [ + { + dimensions: null + operator: 'Equal' + query: ''' requests +| summarize CountByCountry=count() by client_CountryOrRegion +''' + threshold: 5 + timeAggregation: 'Count' + } + ] + } + enabled: true + evaluationFrequency: 'PT5M' + scopes: [ + component.id + ] + severity: 3 + skipQueryValidation: false + targetResourceTypes: null + windowSize: 'PT5M' + } +} diff --git a/settings/remarks/microsoft.insights/samples/webtests/main.bicep b/settings/remarks/microsoft.insights/samples/webtests/main.bicep new file mode 100644 index 00000000..072fc674 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/webtests/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource webTest 'Microsoft.Insights/webTests@2022-06-15' = { + name: resourceName + location: location + kind: 'standard' + properties: { + Description: '' + Enabled: false + Frequency: 300 + Kind: 'standard' + Locations: [ + { + Id: 'us-tx-sn1-azr' + } + ] + Name: 'acctest0001' + Request: { + FollowRedirects: false + Headers: [ + { + key: 'x-header' + value: 'testheader' + } + { + key: 'x-header-2' + value: 'testheader2' + } + ] + HttpVerb: 'GET' + ParseDependentRequests: false + RequestUrl: 'http://microsoft.com' + } + RetryEnabled: false + SyntheticMonitorId: 'acctest0001' + Timeout: 30 + ValidationRules: { + ExpectedHttpStatusCode: 200 + SSLCheck: false + } + } + tags: { + 'hidden-link:azapi_resource.component.id': 'Resource' + } +} diff --git a/settings/remarks/microsoft.insights/samples/workbooks/main.bicep b/settings/remarks/microsoft.insights/samples/workbooks/main.bicep new file mode 100644 index 00000000..50f54680 --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/workbooks/main.bicep @@ -0,0 +1,13 @@ +param location string = 'westeurope' + +resource workbook 'Microsoft.Insights/workbooks@2022-04-01' = { + name: 'be1ad266-d329-4454-b693-8287e4d3b35d' + location: location + kind: 'shared' + properties: { + category: 'workbook' + displayName: 'acctest-amw-230630032616547405' + serializedData: '{"fallbackResourceIds":["Azure Monitor"],"isLocked":false,"items":[{"content":{"json":"Test2022"},"name":"text - 0","type":1}],"version":"Notebook/1.0"}' + sourceId: 'azure monitor' + } +} diff --git a/settings/remarks/microsoft.insights/samples/workbooktemplates/main.bicep b/settings/remarks/microsoft.insights/samples/workbooktemplates/main.bicep new file mode 100644 index 00000000..5538419d --- /dev/null +++ b/settings/remarks/microsoft.insights/samples/workbooktemplates/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workbookTemplate 'Microsoft.Insights/workbookTemplates@2020-11-20' = { + name: resourceName + location: location + properties: { + galleries: [ + { + category: 'workbook' + name: 'test' + order: 0 + resourceType: 'Azure Monitor' + type: 'workbook' + } + ] + priority: 0 + templateData: { + '$schema': 'https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json' + items: [ + { + content: { + json: '''## New workbook +--- + +Welcome to your new workbook.''' + } + name: 'text - 2' + type: 1 + } + ] + styleSettings: {} + version: 'Notebook/1.0' + } + } +} diff --git a/settings/remarks/microsoft.iotcentral/remarks.json b/settings/remarks/microsoft.iotcentral/remarks.json index 5f5b47ac..32b8b13e 100644 --- a/settings/remarks/microsoft.iotcentral/remarks.json +++ b/settings/remarks/microsoft.iotcentral/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.IoTCentral/iotApps", - "Path": "samples/iotapps/main.tf", - "Description": "A basic example of deploying IotCentral Application." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.IoTCentral/iotApps", + "Path": "samples/iotapps/main.tf", + "Description": "A basic example of deploying IotCentral Application." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.IoTCentral/iotApps", + "Path": "samples/iotapps/main.bicep", + "Description": "A basic example of deploying IotCentral Application." + } + ] +} diff --git a/settings/remarks/microsoft.iotcentral/samples/iotapps/main.bicep b/settings/remarks/microsoft.iotcentral/samples/iotapps/main.bicep new file mode 100644 index 00000000..464310e5 --- /dev/null +++ b/settings/remarks/microsoft.iotcentral/samples/iotapps/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iotApp 'Microsoft.IoTCentral/iotApps@2021-11-01-preview' = { + name: resourceName + location: location + properties: { + displayName: 'acctest0001' + publicNetworkAccess: 'Enabled' + subdomain: 'subdomain-2306300333537' + template: 'iotc-pnp-preview@1.0.0' + } + sku: { + name: 'ST1' + } +} diff --git a/settings/remarks/microsoft.keyvault/remarks.json b/settings/remarks/microsoft.keyvault/remarks.json index 282129e0..94664cf5 100644 --- a/settings/remarks/microsoft.keyvault/remarks.json +++ b/settings/remarks/microsoft.keyvault/remarks.json @@ -1,40 +1,67 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "For guidance on using key vaults for secure values, see [Manage secrets by using Bicep](/azure/azure-resource-manager/bicep/scenarios-secrets).\n\nFor a quickstart on creating a secret, see [Quickstart: Set and retrieve a secret from Azure Key Vault using an ARM template](/azure/key-vault/secrets/quick-create-template).\n\nFor a quickstart on creating a key, see [Quickstart: Create an Azure key vault and a key by using ARM template](/azure/key-vault/keys/quick-create-template).", - "ResourceTypes": [ - "microsoft.keyvault/vaults", - "microsoft.keyvault/vaults/keys", - "microsoft.keyvault/vaults/secrets" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.KeyVault/managedHSMs", - "Path": "samples/managedhsms/main.tf", - "Description": "A basic example of deploying Key Vault Managed Hardware Security Module." - }, - { - "ResourceType": "Microsoft.KeyVault/vaults", - "Path": "samples/vaults/main.tf", - "Description": "A basic example of deploying Key Vault." - }, - { - "ResourceType": "Microsoft.KeyVault/vaults/accessPolicies", - "Path": "samples/vaults/accesspolicies/main.tf", - "Description": "A basic example of deploying Key Vault Access Policies." - }, - { - "ResourceType": "Microsoft.KeyVault/vaults/keys", - "Path": "samples/vaults/keys/main.tf", - "Description": "A basic example of deploying Key Vault Keys." - }, - { - "ResourceType": "Microsoft.KeyVault/vaults/secrets", - "Path": "samples/vaults/secrets/main.tf", - "Description": "A basic example of deploying Key Vault Secrets." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "For guidance on using key vaults for secure values, see [Manage secrets by using Bicep](/azure/azure-resource-manager/bicep/scenarios-secrets).\n\nFor a quickstart on creating a secret, see [Quickstart: Set and retrieve a secret from Azure Key Vault using an ARM template](/azure/key-vault/secrets/quick-create-template).\n\nFor a quickstart on creating a key, see [Quickstart: Create an Azure key vault and a key by using ARM template](/azure/key-vault/keys/quick-create-template).", + "ResourceTypes": [ + "microsoft.keyvault/vaults", + "microsoft.keyvault/vaults/keys", + "microsoft.keyvault/vaults/secrets" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.KeyVault/managedHSMs", + "Path": "samples/managedhsms/main.tf", + "Description": "A basic example of deploying Key Vault Managed Hardware Security Module." + }, + { + "ResourceType": "Microsoft.KeyVault/vaults", + "Path": "samples/vaults/main.tf", + "Description": "A basic example of deploying Key Vault." + }, + { + "ResourceType": "Microsoft.KeyVault/vaults/accessPolicies", + "Path": "samples/vaults/accesspolicies/main.tf", + "Description": "A basic example of deploying Key Vault Access Policies." + }, + { + "ResourceType": "Microsoft.KeyVault/vaults/keys", + "Path": "samples/vaults/keys/main.tf", + "Description": "A basic example of deploying Key Vault Keys." + }, + { + "ResourceType": "Microsoft.KeyVault/vaults/secrets", + "Path": "samples/vaults/secrets/main.tf", + "Description": "A basic example of deploying Key Vault Secrets." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.KeyVault/managedHSMs", + "Path": "samples/managedhsms/main.bicep", + "Description": "A basic example of deploying Key Vault Managed Hardware Security Module." + }, + { + "ResourceType": "Microsoft.KeyVault/vaults", + "Path": "samples/vaults/main.bicep", + "Description": "A basic example of deploying Key Vault." + }, + { + "ResourceType": "Microsoft.KeyVault/vaults/accessPolicies", + "Path": "samples/vaults/accesspolicies/main.bicep", + "Description": "A basic example of deploying Key Vault Access Policies." + }, + { + "ResourceType": "Microsoft.KeyVault/vaults/keys", + "Path": "samples/vaults/keys/main.bicep", + "Description": "A basic example of deploying Key Vault Keys." + }, + { + "ResourceType": "Microsoft.KeyVault/vaults/secrets", + "Path": "samples/vaults/secrets/main.bicep", + "Description": "A basic example of deploying Key Vault Secrets." + } + ] +} diff --git a/settings/remarks/microsoft.keyvault/samples/managedhsms/main.bicep b/settings/remarks/microsoft.keyvault/samples/managedhsms/main.bicep new file mode 100644 index 00000000..bed18d28 --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/managedhsms/main.bicep @@ -0,0 +1,21 @@ +param location string = 'westeurope' + +resource managedHSM 'Microsoft.KeyVault/managedHSMs@2021-10-01' = { + name: 'kvHsm230630033342437496' + location: location + properties: { + createMode: 'default' + enablePurgeProtection: false + enableSoftDelete: true + initialAdminObjectIds: [ + deployer().objectId + ] + publicNetworkAccess: 'Enabled' + softDeleteRetentionInDays: 90 + tenantId: deployer().tenantId + } + sku: { + family: 'B' + name: 'Standard_B1' + } +} diff --git a/settings/remarks/microsoft.keyvault/samples/vaults/accesspolicies/main.bicep b/settings/remarks/microsoft.keyvault/samples/vaults/accesspolicies/main.bicep new file mode 100644 index 00000000..439d976c --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/vaults/accesspolicies/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + enableSoftDelete: true + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource putAccesspolicy 'Microsoft.KeyVault/vaults/accessPolicies@2023-02-01' = { + parent: vault + name: 'add' + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Create' + ] + secrets: [ + 'Set' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + } +} diff --git a/settings/remarks/microsoft.keyvault/samples/vaults/keys/main.bicep b/settings/remarks/microsoft.keyvault/samples/vaults/keys/main.bicep new file mode 100644 index 00000000..01dbf532 --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/vaults/keys/main.bicep @@ -0,0 +1,74 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + enablePurgeProtection: true + enableSoftDelete: true + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource putAccesspolicy 'Microsoft.KeyVault/vaults/accessPolicies@2023-02-01' = { + parent: vault + name: 'add' + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Get' + 'Create' + 'Delete' + 'List' + 'Restore' + 'Recover' + 'UnwrapKey' + 'WrapKey' + 'Purge' + 'Encrypt' + 'Decrypt' + 'Sign' + 'Verify' + ] + secrets: [ + 'Get' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + } +} + +resource putKey 'Microsoft.KeyVault/vaults/keys@2023-02-01' = { + parent: vault + name: resourceName + properties: { + keyOps: [ + 'encrypt' + 'decrypt' + 'sign' + 'verify' + 'wrapKey' + 'unwrapKey' + ] + keySize: 2048 + kty: 'RSA' + } + dependsOn: [ + putAccesspolicy + ] +} diff --git a/settings/remarks/microsoft.keyvault/samples/vaults/main.bicep b/settings/remarks/microsoft.keyvault/samples/vaults/main.bicep new file mode 100644 index 00000000..dbd1ed80 --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/vaults/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Create' + ] + secrets: [ + 'Set' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.keyvault/samples/vaults/secrets/main.bicep b/settings/remarks/microsoft.keyvault/samples/vaults/secrets/main.bicep new file mode 100644 index 00000000..a761e6f5 --- /dev/null +++ b/settings/remarks/microsoft.keyvault/samples/vaults/secrets/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + enableSoftDelete: true + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource putSecret 'Microsoft.KeyVault/vaults/secrets@2023-02-01' = { + parent: vault + name: resourceName + properties: { + value: 'szechuan' + } +} diff --git a/settings/remarks/microsoft.kubernetes/remarks.json b/settings/remarks/microsoft.kubernetes/remarks.json index adee9dff..7bd3cc83 100644 --- a/settings/remarks/microsoft.kubernetes/remarks.json +++ b/settings/remarks/microsoft.kubernetes/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Kubernetes/connectedClusters", - "Path": "samples/connectedclusters/main.tf", - "Description": "A basic example of deploying Arc Kubernetes Cluster." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Kubernetes/connectedClusters", + "Path": "samples/connectedclusters/main.tf", + "Description": "A basic example of deploying Arc Kubernetes Cluster." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Kubernetes/connectedClusters", + "Path": "samples/connectedclusters/main.bicep", + "Description": "A basic example of deploying Arc Kubernetes Cluster." + } + ] +} diff --git a/settings/remarks/microsoft.kubernetes/samples/connectedclusters/main.bicep b/settings/remarks/microsoft.kubernetes/samples/connectedclusters/main.bicep new file mode 100644 index 00000000..c92ee190 --- /dev/null +++ b/settings/remarks/microsoft.kubernetes/samples/connectedclusters/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource connectedCluster 'Microsoft.Kubernetes/connectedClusters@2024-01-01' = { + name: '${resourceName}-cc' + location: location + kind: 'ProvisionedCluster' + properties: { + agentPublicKeyCertificate: '' + arcAgentProfile: { + agentAutoUpgrade: 'Enabled' + } + } +} diff --git a/settings/remarks/microsoft.kubernetesconfiguration/remarks.json b/settings/remarks/microsoft.kubernetesconfiguration/remarks.json index 2d0dbd74..233a38cf 100644 --- a/settings/remarks/microsoft.kubernetesconfiguration/remarks.json +++ b/settings/remarks/microsoft.kubernetesconfiguration/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.KubernetesConfiguration/extensions", - "Path": "samples/extensions/main.tf", - "Description": "A basic example of deploying Kubernetes Cluster Extension." - }, - { - "ResourceType": "Microsoft.KubernetesConfiguration/fluxConfigurations", - "Path": "samples/fluxconfigurations/main.tf", - "Description": "A basic example of deploying Kubernetes Flux Configuration." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.KubernetesConfiguration/extensions", + "Path": "samples/extensions/main.tf", + "Description": "A basic example of deploying Kubernetes Cluster Extension." + }, + { + "ResourceType": "Microsoft.KubernetesConfiguration/fluxConfigurations", + "Path": "samples/fluxconfigurations/main.tf", + "Description": "A basic example of deploying Kubernetes Flux Configuration." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.KubernetesConfiguration/extensions", + "Path": "samples/extensions/main.bicep", + "Description": "A basic example of deploying Kubernetes Cluster Extension." + }, + { + "ResourceType": "Microsoft.KubernetesConfiguration/fluxConfigurations", + "Path": "samples/fluxconfigurations/main.bicep", + "Description": "A basic example of deploying Kubernetes Flux Configuration." + } + ] +} diff --git a/settings/remarks/microsoft.kubernetesconfiguration/samples/extensions/main.bicep b/settings/remarks/microsoft.kubernetesconfiguration/samples/extensions/main.bicep new file mode 100644 index 00000000..f3c96a80 --- /dev/null +++ b/settings/remarks/microsoft.kubernetesconfiguration/samples/extensions/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource extension 'Microsoft.KubernetesConfiguration/extensions@2022-11-01' = { + scope: managedCluster + name: resourceName + properties: { + autoUpgradeMinorVersion: true + extensionType: 'microsoft.flux' + } +} + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2023-04-02-preview' = { + name: resourceName + location: location + properties: { + agentPoolProfiles: [ + { + count: 1 + mode: 'System' + name: 'default' + vmSize: 'Standard_DS2_v2' + } + ] + dnsPrefix: 'acctest0001' + } +} diff --git a/settings/remarks/microsoft.kubernetesconfiguration/samples/fluxconfigurations/main.bicep b/settings/remarks/microsoft.kubernetesconfiguration/samples/fluxconfigurations/main.bicep new file mode 100644 index 00000000..342721d7 --- /dev/null +++ b/settings/remarks/microsoft.kubernetesconfiguration/samples/fluxconfigurations/main.bicep @@ -0,0 +1,70 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource extension 'Microsoft.KubernetesConfiguration/extensions@2022-11-01' = { + scope: managedCluster + name: resourceName + properties: { + autoUpgradeMinorVersion: true + extensionType: 'microsoft.flux' + } +} + +resource fluxConfiguration 'Microsoft.KubernetesConfiguration/fluxConfigurations@2022-03-01' = { + scope: managedCluster + name: resourceName + properties: { + gitRepository: { + repositoryRef: { + branch: 'branch' + } + syncIntervalInSeconds: 120 + timeoutInSeconds: 120 + url: 'https://github.com/Azure/arc-k8s-demo' + } + kustomizations: { + applications: { + dependsOn: [ + 'shared' + ] + force: false + path: 'cluster-config/applications' + prune: false + retryIntervalInSeconds: 60 + syncIntervalInSeconds: 60 + timeoutInSeconds: 600 + } + shared: { + force: false + path: 'cluster-config/shared' + prune: false + retryIntervalInSeconds: 60 + syncIntervalInSeconds: 60 + timeoutInSeconds: 600 + } + } + namespace: 'flux-system' + scope: 'cluster' + sourceKind: 'GitRepository' + suspend: false + } + dependsOn: [ + extension + ] +} + +resource managedCluster 'Microsoft.ContainerService/managedClusters@2023-04-02-preview' = { + name: resourceName + location: location + properties: { + agentPoolProfiles: [ + { + count: 1 + mode: 'System' + name: 'default' + vmSize: 'Standard_DS2_v2' + } + ] + dnsPrefix: 'acctest0001' + } +} diff --git a/settings/remarks/microsoft.kusto/remarks.json b/settings/remarks/microsoft.kusto/remarks.json index 13380998..b7f919e4 100644 --- a/settings/remarks/microsoft.kusto/remarks.json +++ b/settings/remarks/microsoft.kusto/remarks.json @@ -1,50 +1,82 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Kusto/clusters", - "Path": "samples/clusters/main.tf", - "Description": "A basic example of deploying Kusto (also known as Azure Data Explorer) Cluster." - }, - { - "ResourceType": "Microsoft.Kusto/clusters", - "Path": "samples/clusters/main.tf", - "Description": "A basic example of deploying Kusto (also known as Azure Data Explorer) Cluster." - }, - { - "ResourceType": "Microsoft.Kusto/clusters/databases", - "Path": "samples/clusters/databases/main.tf", - "Description": "A basic example of deploying Kusto / Data Explorer Database." - }, - { - "ResourceType": "Microsoft.Kusto/clusters/databases", - "Path": "samples/clusters/databases/main.tf", - "Description": "A basic example of deploying Kusto / Data Explorer Database." - }, - { - "ResourceType": "Microsoft.Kusto/clusters/databases/principalAssignments", - "Path": "samples/clusters/databases/principalassignments/main.tf", - "Description": "A basic example of deploying Kusto / Data Explorer Database Principal Assignment." - }, - { - "ResourceType": "Microsoft.Kusto/clusters/databases/scripts", - "Path": "samples/clusters/databases/scripts/main.tf", - "Description": "A basic example of deploying Kusto Script." - }, - { - "ResourceType": "Microsoft.Kusto/clusters/databases/scripts", - "Path": "samples/clusters/databases/scripts/main.tf", - "Description": "A basic example of deploying Kusto Script." - }, - { - "ResourceType": "Microsoft.Kusto/clusters/managedPrivateEndpoints", - "Path": "samples/clusters/managedprivateendpoints/main.tf", - "Description": "A basic example of deploying Managed Private Endpoint for a Kusto Cluster." - }, - { - "ResourceType": "Microsoft.Kusto/clusters/principalAssignments", - "Path": "samples/clusters/principalassignments/main.tf", - "Description": "A basic example of deploying Kusto Cluster Principal Assignment." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Kusto/clusters", + "Path": "samples/clusters/main.tf", + "Description": "A basic example of deploying Kusto (also known as Azure Data Explorer) Cluster." + }, + { + "ResourceType": "Microsoft.Kusto/clusters", + "Path": "samples/clusters/main.tf", + "Description": "A basic example of deploying Kusto (also known as Azure Data Explorer) Cluster." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/databases", + "Path": "samples/clusters/databases/main.tf", + "Description": "A basic example of deploying Kusto / Data Explorer Database." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/databases", + "Path": "samples/clusters/databases/main.tf", + "Description": "A basic example of deploying Kusto / Data Explorer Database." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/databases/principalAssignments", + "Path": "samples/clusters/databases/principalassignments/main.tf", + "Description": "A basic example of deploying Kusto / Data Explorer Database Principal Assignment." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/databases/scripts", + "Path": "samples/clusters/databases/scripts/main.tf", + "Description": "A basic example of deploying Kusto Script." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/databases/scripts", + "Path": "samples/clusters/databases/scripts/main.tf", + "Description": "A basic example of deploying Kusto Script." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/managedPrivateEndpoints", + "Path": "samples/clusters/managedprivateendpoints/main.tf", + "Description": "A basic example of deploying Managed Private Endpoint for a Kusto Cluster." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/principalAssignments", + "Path": "samples/clusters/principalassignments/main.tf", + "Description": "A basic example of deploying Kusto Cluster Principal Assignment." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Kusto/clusters", + "Path": "samples/clusters/main.bicep", + "Description": "A basic example of deploying Kusto (also known as Azure Data Explorer) Cluster." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/databases", + "Path": "samples/clusters/databases/main.bicep", + "Description": "A basic example of deploying Kusto / Data Explorer Database." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/databases/principalAssignments", + "Path": "samples/clusters/databases/principalassignments/main.bicep", + "Description": "A basic example of deploying Kusto / Data Explorer Database Principal Assignment." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/databases/scripts", + "Path": "samples/clusters/databases/scripts/main.bicep", + "Description": "A basic example of deploying Kusto Script." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/managedPrivateEndpoints", + "Path": "samples/clusters/managedprivateendpoints/main.bicep", + "Description": "A basic example of deploying Managed Private Endpoint for a Kusto Cluster." + }, + { + "ResourceType": "Microsoft.Kusto/clusters/principalAssignments", + "Path": "samples/clusters/principalassignments/main.bicep", + "Description": "A basic example of deploying Kusto Cluster Principal Assignment." + } + ] +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/databases/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/databases/main.bicep new file mode 100644 index 00000000..e7f447c8 --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/databases/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource database 'Microsoft.Kusto/clusters/databases@2023-05-02' = { + parent: cluster + name: resourceName + location: location + kind: 'ReadWrite' + properties: {} +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/databases/principalassignments/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/databases/principalassignments/main.bicep new file mode 100644 index 00000000..fd2d641b --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/databases/principalassignments/main.bicep @@ -0,0 +1,43 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource database 'Microsoft.Kusto/clusters/databases@2023-05-02' = { + parent: cluster + name: resourceName + location: location + kind: 'ReadWrite' + properties: {} +} + +resource principalAssignment 'Microsoft.Kusto/clusters/databases/principalAssignments@2023-05-02' = { + parent: database + name: resourceName + properties: { + principalId: deployer().objectId + principalType: 'App' + role: 'Viewer' + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/databases/scripts/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/databases/scripts/main.bicep new file mode 100644 index 00000000..de6d36b8 --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/databases/scripts/main.bicep @@ -0,0 +1,51 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource database 'Microsoft.Kusto/clusters/databases@2023-05-02' = { + parent: cluster + name: resourceName + location: location + kind: 'ReadWrite' + properties: {} +} + +resource script 'Microsoft.Kusto/clusters/databases/scripts@2023-05-02' = { + parent: database + name: 'create-table-script' + properties: { + continueOnErrors: false + forceUpdateTag: '9e2e7874-aa37-7041-81b7-06397f03a37d' + scriptContent: '''.create table TestTable(Id:string, Name:string, _ts:long, _timestamp:datetime) +.create table TestTable ingestion json mapping "TestMapping" +''['' +'' {"column":"Id","path":"$.id"},'' +'' {"column":"Name","path":"$.name"},'' +'' {"column":"_ts","path":"$._ts"},'' +'' {"column":"_timestamp","path":"$._ts", "transform":"DateTimeFromUnixSeconds"}'' +'']'' +.alter table TestTable policy ingestionbatching "{''MaximumBatchingTimeSpan'': ''0:0:10'', ''MaximumNumberOfItems'': 10000}" +''' + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/main.bicep new file mode 100644 index 00000000..1a464e0e --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/managedprivateendpoints/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/managedprivateendpoints/main.bicep new file mode 100644 index 00000000..d595fe4c --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/managedprivateendpoints/main.bicep @@ -0,0 +1,69 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource managedPrivateEndpoint 'Microsoft.Kusto/clusters/managedPrivateEndpoints@2023-05-02' = { + parent: cluster + name: resourceName + properties: { + groupId: 'blob' + privateLinkResourceId: storageAccount.id + } +} diff --git a/settings/remarks/microsoft.kusto/samples/clusters/principalassignments/main.bicep b/settings/remarks/microsoft.kusto/samples/clusters/principalassignments/main.bicep new file mode 100644 index 00000000..bfe0741d --- /dev/null +++ b/settings/remarks/microsoft.kusto/samples/clusters/principalassignments/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.Kusto/clusters@2023-05-02' = { + name: resourceName + location: location + properties: { + enableAutoStop: true + enableDiskEncryption: false + enableDoubleEncryption: false + enablePurge: false + enableStreamingIngest: false + engineType: 'V2' + publicIPType: 'IPv4' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + trustedExternalTenants: [] + } + sku: { + capacity: 1 + name: 'Dev(No SLA)_Standard_D11_v2' + tier: 'Basic' + } +} + +resource principalAssignment 'Microsoft.Kusto/clusters/principalAssignments@2023-05-02' = { + parent: cluster + name: resourceName + properties: { + principalId: deployer().objectId + principalType: 'App' + role: 'AllDatabasesViewer' + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.labservices/remarks.json b/settings/remarks/microsoft.labservices/remarks.json index e9b59a2a..f7ddaa2a 100644 --- a/settings/remarks/microsoft.labservices/remarks.json +++ b/settings/remarks/microsoft.labservices/remarks.json @@ -1,25 +1,47 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.LabServices/labPlans", - "Path": "samples/labplans/main.tf", - "Description": "A basic example of deploying Lab Services Lab Plans." - }, - { - "ResourceType": "Microsoft.LabServices/labs", - "Path": "samples/labs/main.tf", - "Description": "A basic example of deploying Lab Services Labs." - }, - { - "ResourceType": "Microsoft.LabServices/labs/schedules", - "Path": "samples/labs/schedules/main.tf", - "Description": "A basic example of deploying Lab Services Labs Schedules." - }, - { - "ResourceType": "Microsoft.LabServices/labs/users", - "Path": "samples/labs/users/main.tf", - "Description": "A basic example of deploying Lab Services Labs Users." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.LabServices/labPlans", + "Path": "samples/labplans/main.tf", + "Description": "A basic example of deploying Lab Services Lab Plans." + }, + { + "ResourceType": "Microsoft.LabServices/labs", + "Path": "samples/labs/main.tf", + "Description": "A basic example of deploying Lab Services Labs." + }, + { + "ResourceType": "Microsoft.LabServices/labs/schedules", + "Path": "samples/labs/schedules/main.tf", + "Description": "A basic example of deploying Lab Services Labs Schedules." + }, + { + "ResourceType": "Microsoft.LabServices/labs/users", + "Path": "samples/labs/users/main.tf", + "Description": "A basic example of deploying Lab Services Labs Users." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.LabServices/labPlans", + "Path": "samples/labplans/main.bicep", + "Description": "A basic example of deploying Lab Services Lab Plans." + }, + { + "ResourceType": "Microsoft.LabServices/labs", + "Path": "samples/labs/main.bicep", + "Description": "A basic example of deploying Lab Services Labs." + }, + { + "ResourceType": "Microsoft.LabServices/labs/schedules", + "Path": "samples/labs/schedules/main.bicep", + "Description": "A basic example of deploying Lab Services Labs Schedules." + }, + { + "ResourceType": "Microsoft.LabServices/labs/users", + "Path": "samples/labs/users/main.bicep", + "Description": "A basic example of deploying Lab Services Labs Users." + } + ] +} diff --git a/settings/remarks/microsoft.labservices/samples/labplans/main.bicep b/settings/remarks/microsoft.labservices/samples/labplans/main.bicep new file mode 100644 index 00000000..8b9e5b62 --- /dev/null +++ b/settings/remarks/microsoft.labservices/samples/labplans/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource labPlan 'Microsoft.LabServices/labPlans@2022-08-01' = { + name: resourceName + location: location + properties: { + allowedRegions: [ + 'westeurope' + ] + } +} diff --git a/settings/remarks/microsoft.labservices/samples/labs/main.bicep b/settings/remarks/microsoft.labservices/samples/labs/main.bicep new file mode 100644 index 00000000..16a69b18 --- /dev/null +++ b/settings/remarks/microsoft.labservices/samples/labs/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the lab virtual machine') +param adminPassword string + +resource lab 'Microsoft.LabServices/labs@2022-08-01' = { + name: resourceName + location: location + properties: { + autoShutdownProfile: { + shutdownOnDisconnect: 'Disabled' + shutdownOnIdle: 'None' + shutdownWhenNotConnected: 'Disabled' + } + connectionProfile: { + clientRdpAccess: 'None' + clientSshAccess: 'None' + webRdpAccess: 'None' + webSshAccess: 'None' + } + securityProfile: { + openAccess: 'Disabled' + } + title: 'Test Title' + virtualMachineProfile: { + additionalCapabilities: { + installGpuDrivers: 'Disabled' + } + adminUser: { + password: null + username: 'testadmin' + } + createOption: 'Image' + imageReference: { + offer: '0001-com-ubuntu-server-focal' + publisher: 'canonical' + sku: '20_04-lts' + version: 'latest' + } + sku: { + capacity: 1 + name: 'Classic_Fsv2_2_4GB_128_S_SSD' + } + usageQuota: 'PT0S' + useSharedPassword: 'Disabled' + } + } +} diff --git a/settings/remarks/microsoft.labservices/samples/labs/schedules/main.bicep b/settings/remarks/microsoft.labservices/samples/labs/schedules/main.bicep new file mode 100644 index 00000000..2794d8e2 --- /dev/null +++ b/settings/remarks/microsoft.labservices/samples/labs/schedules/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the lab virtual machine') +param adminPassword string + +resource lab 'Microsoft.LabServices/labs@2022-08-01' = { + name: resourceName + location: location + properties: { + autoShutdownProfile: { + shutdownOnDisconnect: 'Disabled' + shutdownOnIdle: 'None' + shutdownWhenNotConnected: 'Disabled' + } + connectionProfile: { + clientRdpAccess: 'None' + clientSshAccess: 'None' + webRdpAccess: 'None' + webSshAccess: 'None' + } + securityProfile: { + openAccess: 'Disabled' + } + title: 'Test Title' + virtualMachineProfile: { + additionalCapabilities: { + installGpuDrivers: 'Disabled' + } + adminUser: { + password: null + username: 'testadmin' + } + createOption: 'Image' + imageReference: { + offer: '0001-com-ubuntu-server-focal' + publisher: 'canonical' + sku: '20_04-lts' + version: 'latest' + } + sku: { + capacity: 1 + name: 'Classic_Fsv2_2_4GB_128_S_SSD' + } + usageQuota: 'PT0S' + useSharedPassword: 'Disabled' + } + } +} + +resource schedule 'Microsoft.LabServices/labs/schedules@2022-08-01' = { + parent: lab + name: resourceName + properties: { + stopAt: '2023-06-30T04:33:55Z' + timeZoneId: 'America/Los_Angeles' + } +} diff --git a/settings/remarks/microsoft.labservices/samples/labs/users/main.bicep b/settings/remarks/microsoft.labservices/samples/labs/users/main.bicep new file mode 100644 index 00000000..9453127f --- /dev/null +++ b/settings/remarks/microsoft.labservices/samples/labs/users/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the lab virtual machine') +param adminPassword string + +resource lab 'Microsoft.LabServices/labs@2022-08-01' = { + name: resourceName + location: location + properties: { + autoShutdownProfile: { + shutdownOnDisconnect: 'Disabled' + shutdownOnIdle: 'None' + shutdownWhenNotConnected: 'Disabled' + } + connectionProfile: { + clientRdpAccess: 'None' + clientSshAccess: 'None' + webRdpAccess: 'None' + webSshAccess: 'None' + } + securityProfile: { + openAccess: 'Disabled' + } + title: 'Test Title' + virtualMachineProfile: { + additionalCapabilities: { + installGpuDrivers: 'Disabled' + } + adminUser: { + password: null + username: 'testadmin' + } + createOption: 'Image' + imageReference: { + offer: '0001-com-ubuntu-server-focal' + publisher: 'canonical' + sku: '20_04-lts' + version: 'latest' + } + sku: { + capacity: 1 + name: 'Classic_Fsv2_2_4GB_128_S_SSD' + } + usageQuota: 'PT0S' + useSharedPassword: 'Disabled' + } + } +} + +resource user 'Microsoft.LabServices/labs/users@2022-08-01' = { + parent: lab + name: resourceName + properties: { + additionalUsageQuota: 'PT0S' + email: 'terraform-acctest@hashicorp.com' + } +} diff --git a/settings/remarks/microsoft.loadtestservice/remarks.json b/settings/remarks/microsoft.loadtestservice/remarks.json index d26d8ad9..bf18ebfa 100644 --- a/settings/remarks/microsoft.loadtestservice/remarks.json +++ b/settings/remarks/microsoft.loadtestservice/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.LoadTestService/loadTests", - "Path": "samples/loadtests/main.tf", - "Description": "A basic example of deploying Load Test." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.LoadTestService/loadTests", + "Path": "samples/loadtests/main.tf", + "Description": "A basic example of deploying Load Test." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.LoadTestService/loadTests", + "Path": "samples/loadtests/main.bicep", + "Description": "A basic example of deploying Load Test." + } + ] +} diff --git a/settings/remarks/microsoft.loadtestservice/samples/loadtests/main.bicep b/settings/remarks/microsoft.loadtestservice/samples/loadtests/main.bicep new file mode 100644 index 00000000..8e9482ee --- /dev/null +++ b/settings/remarks/microsoft.loadtestservice/samples/loadtests/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadTest 'Microsoft.LoadTestService/loadTests@2022-12-01' = { + name: resourceName + location: location + properties: { + description: 'This is new load test' + } +} diff --git a/settings/remarks/microsoft.logic/remarks.json b/settings/remarks/microsoft.logic/remarks.json index 7bc5213f..c5affda9 100644 --- a/settings/remarks/microsoft.logic/remarks.json +++ b/settings/remarks/microsoft.logic/remarks.json @@ -1,50 +1,97 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Logic/integrationAccounts", - "Path": "samples/integrationaccounts/main.tf", - "Description": "A basic example of deploying Logic App Integration Account." - }, - { - "ResourceType": "Microsoft.Logic/integrationAccounts/agreements", - "Path": "samples/integrationaccounts/agreements/main.tf", - "Description": "A basic example of deploying Logic App Integration Account Agreement." - }, - { - "ResourceType": "Microsoft.Logic/integrationAccounts/assemblies", - "Path": "samples/integrationaccounts/assemblies/main.tf", - "Description": "A basic example of deploying Logic App Integration Account Assembly." - }, - { - "ResourceType": "Microsoft.Logic/integrationAccounts/batchConfigurations", - "Path": "samples/integrationaccounts/batchconfigurations/main.tf", - "Description": "A basic example of deploying Logic App Integration Account Batch Configuration." - }, - { - "ResourceType": "Microsoft.Logic/integrationAccounts/maps", - "Path": "samples/integrationaccounts/maps/main.tf", - "Description": "A basic example of deploying Logic App Integration Account Map." - }, - { - "ResourceType": "Microsoft.Logic/integrationAccounts/partners", - "Path": "samples/integrationaccounts/partners/main.tf", - "Description": "A basic example of deploying Logic App Integration Account Partner." - }, - { - "ResourceType": "Microsoft.Logic/integrationAccounts/schemas", - "Path": "samples/integrationaccounts/schemas/main.tf", - "Description": "A basic example of deploying Logic App Integration Account Schema." - }, - { - "ResourceType": "Microsoft.Logic/integrationAccounts/sessions", - "Path": "samples/integrationaccounts/sessions/main.tf", - "Description": "A basic example of deploying Logic App Integration Account Session." - }, - { - "ResourceType": "Microsoft.Logic/workflows", - "Path": "samples/workflows/main.tf", - "Description": "A basic example of deploying Logic App Workflow." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Logic/integrationAccounts", + "Path": "samples/integrationaccounts/main.tf", + "Description": "A basic example of deploying Logic App Integration Account." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/agreements", + "Path": "samples/integrationaccounts/agreements/main.tf", + "Description": "A basic example of deploying Logic App Integration Account Agreement." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/assemblies", + "Path": "samples/integrationaccounts/assemblies/main.tf", + "Description": "A basic example of deploying Logic App Integration Account Assembly." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/batchConfigurations", + "Path": "samples/integrationaccounts/batchconfigurations/main.tf", + "Description": "A basic example of deploying Logic App Integration Account Batch Configuration." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/maps", + "Path": "samples/integrationaccounts/maps/main.tf", + "Description": "A basic example of deploying Logic App Integration Account Map." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/partners", + "Path": "samples/integrationaccounts/partners/main.tf", + "Description": "A basic example of deploying Logic App Integration Account Partner." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/schemas", + "Path": "samples/integrationaccounts/schemas/main.tf", + "Description": "A basic example of deploying Logic App Integration Account Schema." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/sessions", + "Path": "samples/integrationaccounts/sessions/main.tf", + "Description": "A basic example of deploying Logic App Integration Account Session." + }, + { + "ResourceType": "Microsoft.Logic/workflows", + "Path": "samples/workflows/main.tf", + "Description": "A basic example of deploying Logic App Workflow." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Logic/integrationAccounts", + "Path": "samples/integrationaccounts/main.bicep", + "Description": "A basic example of deploying Logic App Integration Account." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/agreements", + "Path": "samples/integrationaccounts/agreements/main.bicep", + "Description": "A basic example of deploying Logic App Integration Account Agreement." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/assemblies", + "Path": "samples/integrationaccounts/assemblies/main.bicep", + "Description": "A basic example of deploying Logic App Integration Account Assembly." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/batchConfigurations", + "Path": "samples/integrationaccounts/batchconfigurations/main.bicep", + "Description": "A basic example of deploying Logic App Integration Account Batch Configuration." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/maps", + "Path": "samples/integrationaccounts/maps/main.bicep", + "Description": "A basic example of deploying Logic App Integration Account Map." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/partners", + "Path": "samples/integrationaccounts/partners/main.bicep", + "Description": "A basic example of deploying Logic App Integration Account Partner." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/schemas", + "Path": "samples/integrationaccounts/schemas/main.bicep", + "Description": "A basic example of deploying Logic App Integration Account Schema." + }, + { + "ResourceType": "Microsoft.Logic/integrationAccounts/sessions", + "Path": "samples/integrationaccounts/sessions/main.bicep", + "Description": "A basic example of deploying Logic App Integration Account Session." + }, + { + "ResourceType": "Microsoft.Logic/workflows", + "Path": "samples/workflows/main.bicep", + "Description": "A basic example of deploying Logic App Workflow." + } + ] +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/agreements/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/agreements/main.bicep new file mode 100644 index 00000000..21d7e4b9 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/agreements/main.bicep @@ -0,0 +1,199 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + } +} + +resource agreement 'Microsoft.Logic/integrationAccounts/agreements@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + agreementType: 'AS2' + content: { + aS2: { + receiveAgreement: { + protocolSettings: { + acknowledgementConnectionSettings: { + ignoreCertificateNameMismatch: false + keepHttpConnectionAlive: false + supportHttpStatusCodeContinue: false + unfoldHttpHeaders: false + } + envelopeSettings: { + autogenerateFileName: false + fileNameTemplate: '%FILE().ReceivedFileName%' + messageContentType: 'text/plain' + suspendMessageOnFileNameGenerationError: true + transmitFileNameInMimeHeader: false + } + errorSettings: { + resendIfMDNNotReceived: false + suspendDuplicateMessage: false + } + mdnSettings: { + dispositionNotificationTo: 'http://localhost' + micHashingAlgorithm: 'SHA1' + needMDN: false + sendInboundMDNToMessageBox: true + sendMDNAsynchronously: false + signMDN: false + signOutboundMDNIfOptional: false + } + messageConnectionSettings: { + ignoreCertificateNameMismatch: false + keepHttpConnectionAlive: true + supportHttpStatusCodeContinue: true + unfoldHttpHeaders: true + } + securitySettings: { + enableNRRForInboundDecodedMessages: false + enableNRRForInboundEncodedMessages: false + enableNRRForInboundMDN: false + enableNRRForOutboundDecodedMessages: false + enableNRRForOutboundEncodedMessages: false + enableNRRForOutboundMDN: false + overrideGroupSigningCertificate: false + } + validationSettings: { + checkCertificateRevocationListOnReceive: false + checkCertificateRevocationListOnSend: false + checkDuplicateMessage: false + compressMessage: false + encryptMessage: false + encryptionAlgorithm: 'DES3' + interchangeDuplicatesValidityDays: 5 + overrideMessageProperties: false + signMessage: false + signingAlgorithm: 'Default' + } + } + receiverBusinessIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + senderBusinessIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamDC' + } + } + sendAgreement: { + protocolSettings: { + acknowledgementConnectionSettings: { + ignoreCertificateNameMismatch: false + keepHttpConnectionAlive: false + supportHttpStatusCodeContinue: false + unfoldHttpHeaders: false + } + envelopeSettings: { + autogenerateFileName: false + fileNameTemplate: '%FILE().ReceivedFileName%' + messageContentType: 'text/plain' + suspendMessageOnFileNameGenerationError: true + transmitFileNameInMimeHeader: false + } + errorSettings: { + resendIfMDNNotReceived: false + suspendDuplicateMessage: false + } + mdnSettings: { + dispositionNotificationTo: 'http://localhost' + micHashingAlgorithm: 'SHA1' + needMDN: false + sendInboundMDNToMessageBox: true + sendMDNAsynchronously: false + signMDN: false + signOutboundMDNIfOptional: false + } + messageConnectionSettings: { + ignoreCertificateNameMismatch: false + keepHttpConnectionAlive: true + supportHttpStatusCodeContinue: true + unfoldHttpHeaders: true + } + securitySettings: { + enableNRRForInboundDecodedMessages: false + enableNRRForInboundEncodedMessages: false + enableNRRForInboundMDN: false + enableNRRForOutboundDecodedMessages: false + enableNRRForOutboundEncodedMessages: false + enableNRRForOutboundMDN: false + overrideGroupSigningCertificate: false + } + validationSettings: { + checkCertificateRevocationListOnReceive: false + checkCertificateRevocationListOnSend: false + checkDuplicateMessage: false + compressMessage: false + encryptMessage: false + encryptionAlgorithm: 'DES3' + interchangeDuplicatesValidityDays: 5 + overrideMessageProperties: false + signMessage: false + signingAlgorithm: 'Default' + } + } + receiverBusinessIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamDC' + } + senderBusinessIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + } + } + } + guestIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamDC' + } + guestPartner: partner2.name + hostIdentity: { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + hostPartner: partner.name + } +} + +resource partner 'Microsoft.Logic/integrationAccounts/partners@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: { + b2b: { + businessIdentities: [ + { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + ] + } + } + partnerType: 'B2B' + } +} + +resource partner2 'Microsoft.Logic/integrationAccounts/partners@2019-05-01' = { + parent: integrationAccount + name: '${resourceName}another' + properties: { + content: { + b2b: { + businessIdentities: [ + { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + ] + } + } + partnerType: 'B2B' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/assemblies/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/assemblies/main.bicep new file mode 100644 index 00000000..f52d2ca9 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/assemblies/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: '${resourceName}-ia' + location: location + properties: {} + sku: { + name: 'Standard' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: replace(substring(toLower('${resourceName}sa'), 0, 24), '-', '') + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource assembly 'Microsoft.Logic/integrationAccounts/assemblies@2019-05-01' = { + parent: integrationAccount + name: '${resourceName}-assembly' + properties: { + assemblyName: 'TestAssembly2' + assemblyVersion: '2.2.2.2' + content: 'dGVzdA==' + contentType: 'application/octet-stream' + metadata: { + foo: 'bar2' + } + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/batchconfigurations/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/batchconfigurations/main.bicep new file mode 100644 index 00000000..ffb5d1cd --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/batchconfigurations/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + } +} + +resource batchConfiguration 'Microsoft.Logic/integrationAccounts/batchConfigurations@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + batchGroupName: 'TestBatchGroup' + releaseCriteria: { + messageCount: 80 + } + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/main.bicep new file mode 100644 index 00000000..8f755960 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Basic' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/maps/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/maps/main.bicep new file mode 100644 index 00000000..5cf9e450 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/maps/main.bicep @@ -0,0 +1,91 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Basic' + } +} + +resource map 'Microsoft.Logic/integrationAccounts/maps@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: ''' + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +''' + contentType: 'application/xml' + mapType: 'Xslt' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/partners/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/partners/main.bicep new file mode 100644 index 00000000..b61925a7 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/partners/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + } +} + +resource partner 'Microsoft.Logic/integrationAccounts/partners@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: { + b2b: { + businessIdentities: [ + { + qualifier: 'AS2Identity' + value: 'FabrikamNY' + } + ] + } + } + partnerType: 'B2B' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/schemas/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/schemas/main.bicep new file mode 100644 index 00000000..fa4c7780 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/schemas/main.bicep @@ -0,0 +1,243 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Basic' + } +} + +resource schema 'Microsoft.Logic/integrationAccounts/schemas@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: ''' + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +''' + contentType: 'application/xml' + schemaType: 'Xml' + } +} diff --git a/settings/remarks/microsoft.logic/samples/integrationaccounts/sessions/main.bicep b/settings/remarks/microsoft.logic/samples/integrationaccounts/sessions/main.bicep new file mode 100644 index 00000000..1b05b99d --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/integrationaccounts/sessions/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource integrationAccount 'Microsoft.Logic/integrationAccounts@2019-05-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Basic' + } +} + +resource session 'Microsoft.Logic/integrationAccounts/sessions@2019-05-01' = { + parent: integrationAccount + name: resourceName + properties: { + content: ''' { + "controlNumber": "1234" + } +''' + } +} diff --git a/settings/remarks/microsoft.logic/samples/workflows/main.bicep b/settings/remarks/microsoft.logic/samples/workflows/main.bicep new file mode 100644 index 00000000..837fca77 --- /dev/null +++ b/settings/remarks/microsoft.logic/samples/workflows/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workflow 'Microsoft.Logic/workflows@2019-05-01' = { + name: resourceName + location: location + properties: { + definition: { + '$schema': 'https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#' + actions: {} + contentVersion: '1.0.0.0' + parameters: null + triggers: {} + } + parameters: {} + state: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.machinelearningservices/remarks.json b/settings/remarks/microsoft.machinelearningservices/remarks.json index 28dd7fe4..8a07689d 100644 --- a/settings/remarks/microsoft.machinelearningservices/remarks.json +++ b/settings/remarks/microsoft.machinelearningservices/remarks.json @@ -1,30 +1,47 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.MachineLearningServices/workspaces", - "Path": "samples/workspaces/main.tf", - "Description": "A basic example of deploying Azure Machine Learning Workspace." - }, - { - "ResourceType": "Microsoft.MachineLearningServices/workspaces/codes/versions", - "Path": "samples/workspaces/codes/versions/main.tf", - "Description": "A basic example of deploying Machine Learning Services Workspace Codes Versions." - }, - { - "ResourceType": "Microsoft.MachineLearningServices/workspaces/computes", - "Path": "samples/workspaces/computes/main.tf", - "Description": "A basic example of deploying Machine Learning Compute." - }, - { - "ResourceType": "Microsoft.MachineLearningServices/workspaces/dataStores", - "Path": "samples/workspaces/datastores/main.tf", - "Description": "A basic example of deploying Machine Learning DataStore." - }, - { - "ResourceType": "Microsoft.MachineLearningServices/workspaces/outboundRules", - "Path": "samples/workspaces/outboundrules/main.tf", - "Description": "A basic example of deploying Azure Machine Learning Workspace FQDN Network Outbound Rule." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.MachineLearningServices/workspaces", + "Path": "samples/workspaces/main.tf", + "Description": "A basic example of deploying Azure Machine Learning Workspace." + }, + { + "ResourceType": "Microsoft.MachineLearningServices/workspaces/codes/versions", + "Path": "samples/workspaces/codes/versions/main.tf", + "Description": "A basic example of deploying Machine Learning Services Workspace Codes Versions." + }, + { + "ResourceType": "Microsoft.MachineLearningServices/workspaces/computes", + "Path": "samples/workspaces/computes/main.tf", + "Description": "A basic example of deploying Machine Learning Compute." + }, + { + "ResourceType": "Microsoft.MachineLearningServices/workspaces/dataStores", + "Path": "samples/workspaces/datastores/main.tf", + "Description": "A basic example of deploying Machine Learning DataStore." + }, + { + "ResourceType": "Microsoft.MachineLearningServices/workspaces/outboundRules", + "Path": "samples/workspaces/outboundrules/main.tf", + "Description": "A basic example of deploying Azure Machine Learning Workspace FQDN Network Outbound Rule." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.MachineLearningServices/workspaces", + "Path": "samples/workspaces/main.bicep", + "Description": "A basic example of deploying Azure Machine Learning Workspace." + }, + { + "ResourceType": "Microsoft.MachineLearningServices/workspaces/computes", + "Path": "samples/workspaces/computes/main.bicep", + "Description": "A basic example of deploying Machine Learning Compute." + }, + { + "ResourceType": "Microsoft.MachineLearningServices/workspaces/dataStores", + "Path": "samples/workspaces/datastores/main.bicep", + "Description": "A basic example of deploying Machine Learning DataStore." + } + ] +} diff --git a/settings/remarks/microsoft.machinelearningservices/samples/workspaces/computes/main.bicep b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/computes/main.bicep new file mode 100644 index 00000000..fa34ddd9 --- /dev/null +++ b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/computes/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + sku: { + name: 'Standard_LRS' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [] + createMode: 'default' + enablePurgeProtection: true + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource workspace 'Microsoft.MachineLearningServices/workspaces@2022-05-01' = { + name: resourceName + location: location + properties: { + applicationInsights: component.id + keyVault: vault.id + publicNetworkAccess: 'Enabled' + storageAccount: storageAccount.id + v1LegacyMode: false + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} + +resource compute 'Microsoft.MachineLearningServices/workspaces/computes@2022-05-01' = { + parent: workspace + name: resourceName + location: location + properties: { + computeLocation: 'westeurope' + computeType: 'ComputeInstance' + description: '' + disableLocalAuth: true + properties: { + vmSize: 'STANDARD_D2_V2' + } + } +} diff --git a/settings/remarks/microsoft.machinelearningservices/samples/workspaces/datastores/main.bicep b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/datastores/main.bicep new file mode 100644 index 00000000..8cc4565a --- /dev/null +++ b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/datastores/main.bicep @@ -0,0 +1,136 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: '${resourceName}-ai' + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: '${toLower(substring(resourceName, 0, 16))}acc' + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2023-02-01' = { + name: '${resourceName}vault' + location: location + properties: { + accessPolicies: [] + createMode: 'default' + enablePurgeProtection: true + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource workspace 'Microsoft.MachineLearningServices/workspaces@2024-04-01' = { + name: '${resourceName}-mlw' + location: location + kind: 'Default' + properties: { + applicationInsights: component.id + keyVault: vault.id + publicNetworkAccess: 'Enabled' + storageAccount: storageAccount.id + v1LegacyMode: false + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} + +resource dataStore 'Microsoft.MachineLearningServices/workspaces/dataStores@2024-04-01' = { + parent: workspace + name: replace('${resourceName}_ds', '-', '_') + properties: { + accountName: storageAccount.name + containerName: container.name + credentials: { + credentialsType: 'AccountKey' + secrets: { + key: base64(storageAccount.listKeys().keys[0].value) + secretsType: 'AccountKey' + } + } + datastoreType: 'AzureBlob' + description: '' + endpoint: 'core.windows.net' + serviceDataAccessAuthIdentity: 'None' + tags: null + } + dependsOn: [ + container + ] +} + +// The blob service is a singleton named 'default' under the storage account +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2023-05-01' existing = { + parent: storageAccount + name: 'default' +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2023-05-01' = { + parent: blobService + name: 'datacontainer' + properties: { + publicAccess: 'None' + } +} diff --git a/settings/remarks/microsoft.machinelearningservices/samples/workspaces/main.bicep b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/main.bicep new file mode 100644 index 00000000..2dc36480 --- /dev/null +++ b/settings/remarks/microsoft.machinelearningservices/samples/workspaces/main.bicep @@ -0,0 +1,108 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource component 'Microsoft.Insights/components@2020-02-02' = { + name: resourceName + location: location + kind: 'web' + properties: { + Application_Type: 'web' + DisableIpMasking: false + DisableLocalAuth: false + ForceCustomerStorageForProfiler: false + RetentionInDays: 90 + SamplingPercentage: 100 + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [ + { + objectId: '45a2d1ea-488a-44b0-bb2e-3cd8e485ebef' + permissions: { + certificates: [ + 'all' + ] + keys: [ + 'all' + ] + secrets: [ + 'all' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enablePurgeProtection: true + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + tenantId: deployer().tenantId + } +} + +resource workspace 'Microsoft.MachineLearningServices/workspaces@2022-05-01' = { + name: resourceName + location: location + properties: { + applicationInsights: component.id + keyVault: vault.id + publicNetworkAccess: 'Disabled' + storageAccount: storageAccount.id + v1LegacyMode: false + } + sku: { + name: 'Basic' + tier: 'Basic' + } +} diff --git a/settings/remarks/microsoft.maintenance/remarks.json b/settings/remarks/microsoft.maintenance/remarks.json index 5fe1cc24..c6db67d7 100644 --- a/settings/remarks/microsoft.maintenance/remarks.json +++ b/settings/remarks/microsoft.maintenance/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Maintenance/configurationAssignments", - "Path": "samples/configurationassignments/main.tf", - "Description": "A basic example of deploying Maintenance Assignment." - }, - { - "ResourceType": "Microsoft.Maintenance/maintenanceConfigurations", - "Path": "samples/maintenanceconfigurations/main.tf", - "Description": "A basic example of deploying Maintenance Configuration." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Maintenance/configurationAssignments", + "Path": "samples/configurationassignments/main.tf", + "Description": "A basic example of deploying Maintenance Assignment." + }, + { + "ResourceType": "Microsoft.Maintenance/maintenanceConfigurations", + "Path": "samples/maintenanceconfigurations/main.tf", + "Description": "A basic example of deploying Maintenance Configuration." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Maintenance/configurationAssignments", + "Path": "samples/configurationassignments/main.bicep", + "Description": "A basic example of deploying Maintenance Assignment." + }, + { + "ResourceType": "Microsoft.Maintenance/maintenanceConfigurations", + "Path": "samples/maintenanceconfigurations/main.bicep", + "Description": "A basic example of deploying Maintenance Configuration." + } + ] +} diff --git a/settings/remarks/microsoft.maintenance/samples/configurationassignments/main.bicep b/settings/remarks/microsoft.maintenance/samples/configurationassignments/main.bicep new file mode 100644 index 00000000..c0374d0f --- /dev/null +++ b/settings/remarks/microsoft.maintenance/samples/configurationassignments/main.bicep @@ -0,0 +1,145 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource configurationAssignment 'Microsoft.Maintenance/configurationAssignments@2022-07-01-preview' = { + scope: virtualMachine + name: resourceName + location: 'westeurope' + properties: { + maintenanceConfigurationId: maintenanceConfiguration.id + resourceId: virtualMachine.id + } +} + +resource maintenanceConfiguration 'Microsoft.Maintenance/maintenanceConfigurations@2022-07-01-preview' = { + name: resourceName + location: location + properties: { + extensionProperties: {} + maintenanceScope: 'SQLDB' + namespace: 'Microsoft.Maintenance' + visibility: 'Custom' + } +} + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + additionalCapabilities: {} + applicationProfile: { + galleryApplications: [] + } + diagnosticsProfile: { + bootDiagnostics: { + enabled: false + storageUri: '' + } + } + extensionsTimeBudget: 'PT1H30M' + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'adminuser' + allowExtensionOperations: true + computerName: 'acctest0001' + linuxConfiguration: { + disablePasswordAuthentication: false + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'ImageDefault' + } + provisionVMAgent: true + ssh: { + publicKeys: [] + } + } + secrets: [] + } + priority: 'Regular' + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + osType: 'Linux' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.maintenance/samples/maintenanceconfigurations/main.bicep b/settings/remarks/microsoft.maintenance/samples/maintenanceconfigurations/main.bicep new file mode 100644 index 00000000..78ee5514 --- /dev/null +++ b/settings/remarks/microsoft.maintenance/samples/maintenanceconfigurations/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource maintenanceConfiguration 'Microsoft.Maintenance/maintenanceConfigurations@2022-07-01-preview' = { + name: resourceName + location: location + properties: { + extensionProperties: {} + maintenanceScope: 'SQLDB' + namespace: 'Microsoft.Maintenance' + visibility: 'Custom' + } +} diff --git a/settings/remarks/microsoft.managedidentity/remarks.json b/settings/remarks/microsoft.managedidentity/remarks.json index 65e31980..ca810cef 100644 --- a/settings/remarks/microsoft.managedidentity/remarks.json +++ b/settings/remarks/microsoft.managedidentity/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ManagedIdentity/userAssignedIdentities", - "Path": "samples/userassignedidentities/main.tf", - "Description": "A basic example of deploying User Assigned Identity." - }, - { - "ResourceType": "Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials", - "Path": "samples/userassignedidentities/federatedidentitycredentials/main.tf", - "Description": "A basic example of deploying Federated Identity Credential." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ManagedIdentity/userAssignedIdentities", + "Path": "samples/userassignedidentities/main.tf", + "Description": "A basic example of deploying User Assigned Identity." + }, + { + "ResourceType": "Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials", + "Path": "samples/userassignedidentities/federatedidentitycredentials/main.tf", + "Description": "A basic example of deploying Federated Identity Credential." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ManagedIdentity/userAssignedIdentities", + "Path": "samples/userassignedidentities/main.bicep", + "Description": "A basic example of deploying User Assigned Identity." + }, + { + "ResourceType": "Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials", + "Path": "samples/userassignedidentities/federatedidentitycredentials/main.bicep", + "Description": "A basic example of deploying Federated Identity Credential." + } + ] +} diff --git a/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/federatedidentitycredentials/main.bicep b/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/federatedidentitycredentials/main.bicep new file mode 100644 index 00000000..d0743e9a --- /dev/null +++ b/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/federatedidentitycredentials/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName + location: location +} + +resource federatedIdentityCredential 'Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials@2022-01-31-preview' = { + parent: userAssignedIdentity + name: resourceName + location: location + properties: { + audiences: [ + 'foo' + ] + issuer: 'https://foo' + subject: 'foo' + } +} diff --git a/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/main.bicep b/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/main.bicep new file mode 100644 index 00000000..68c0ec1c --- /dev/null +++ b/settings/remarks/microsoft.managedidentity/samples/userassignedidentities/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.maps/remarks.json b/settings/remarks/microsoft.maps/remarks.json index 9b0bcae0..a3f6e9cc 100644 --- a/settings/remarks/microsoft.maps/remarks.json +++ b/settings/remarks/microsoft.maps/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Maps/accounts", - "Path": "samples/accounts/main.tf", - "Description": "A basic example of deploying Azure Maps Account." - }, - { - "ResourceType": "Microsoft.Maps/accounts/creators", - "Path": "samples/accounts/creators/main.tf", - "Description": "A basic example of deploying Azure Maps Creator." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Maps/accounts", + "Path": "samples/accounts/main.tf", + "Description": "A basic example of deploying Azure Maps Account." + }, + { + "ResourceType": "Microsoft.Maps/accounts/creators", + "Path": "samples/accounts/creators/main.tf", + "Description": "A basic example of deploying Azure Maps Creator." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Maps/accounts", + "Path": "samples/accounts/main.bicep", + "Description": "A basic example of deploying Azure Maps Account." + }, + { + "ResourceType": "Microsoft.Maps/accounts/creators", + "Path": "samples/accounts/creators/main.bicep", + "Description": "A basic example of deploying Azure Maps Creator." + } + ] +} diff --git a/settings/remarks/microsoft.maps/samples/accounts/creators/main.bicep b/settings/remarks/microsoft.maps/samples/accounts/creators/main.bicep new file mode 100644 index 00000000..9f4e2ea5 --- /dev/null +++ b/settings/remarks/microsoft.maps/samples/accounts/creators/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.Maps/accounts@2021-02-01' = { + name: resourceName + location: 'global' + sku: { + name: 'G2' + } +} + +resource creator 'Microsoft.Maps/accounts/creators@2021-02-01' = { + parent: account + name: resourceName + location: location + properties: { + storageUnits: 1 + } +} diff --git a/settings/remarks/microsoft.maps/samples/accounts/main.bicep b/settings/remarks/microsoft.maps/samples/accounts/main.bicep new file mode 100644 index 00000000..8aa8bc3f --- /dev/null +++ b/settings/remarks/microsoft.maps/samples/accounts/main.bicep @@ -0,0 +1,9 @@ +param resourceName string = 'acctest0001' + +resource account 'Microsoft.Maps/accounts@2021-02-01' = { + name: resourceName + location: 'global' + sku: { + name: 'G2' + } +} diff --git a/settings/remarks/microsoft.media/remarks.json b/settings/remarks/microsoft.media/remarks.json index d4c79f18..56c8dd96 100644 --- a/settings/remarks/microsoft.media/remarks.json +++ b/settings/remarks/microsoft.media/remarks.json @@ -1,55 +1,107 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Media/mediaServices", - "Path": "samples/mediaservices/main.tf", - "Description": "A basic example of deploying Media Services." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/accountFilters", - "Path": "samples/mediaservices/accountfilters/main.tf", - "Description": "A basic example of deploying Media Services Account Filters." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/assets", - "Path": "samples/mediaservices/assets/main.tf", - "Description": "A basic example of deploying Media Services Assets." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/assets/assetFilters", - "Path": "samples/mediaservices/assets/assetfilters/main.tf", - "Description": "A basic example of deploying Media Services Asset Filters." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/contentKeyPolicies", - "Path": "samples/mediaservices/contentkeypolicies/main.tf", - "Description": "A basic example of deploying Media Services Content Key Policies." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/liveEvents", - "Path": "samples/mediaservices/liveevents/main.tf", - "Description": "A basic example of deploying Media Services Live Events." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/streamingEndpoints", - "Path": "samples/mediaservices/streamingendpoints/main.tf", - "Description": "A basic example of deploying Media Services Streaming Endpoints." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/streamingLocators", - "Path": "samples/mediaservices/streaminglocators/main.tf", - "Description": "A basic example of deploying Media Services Streaming Locators." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/streamingPolicies", - "Path": "samples/mediaservices/streamingpolicies/main.tf", - "Description": "A basic example of deploying Media Services Streaming Policies." - }, - { - "ResourceType": "Microsoft.Media/mediaServices/transforms", - "Path": "samples/mediaservices/transforms/main.tf", - "Description": "A basic example of deploying Media Services Transforms." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Media/mediaServices", + "Path": "samples/mediaservices/main.tf", + "Description": "A basic example of deploying Media Services." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/accountFilters", + "Path": "samples/mediaservices/accountfilters/main.tf", + "Description": "A basic example of deploying Media Services Account Filters." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/assets", + "Path": "samples/mediaservices/assets/main.tf", + "Description": "A basic example of deploying Media Services Assets." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/assets/assetFilters", + "Path": "samples/mediaservices/assets/assetfilters/main.tf", + "Description": "A basic example of deploying Media Services Asset Filters." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/contentKeyPolicies", + "Path": "samples/mediaservices/contentkeypolicies/main.tf", + "Description": "A basic example of deploying Media Services Content Key Policies." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/liveEvents", + "Path": "samples/mediaservices/liveevents/main.tf", + "Description": "A basic example of deploying Media Services Live Events." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/streamingEndpoints", + "Path": "samples/mediaservices/streamingendpoints/main.tf", + "Description": "A basic example of deploying Media Services Streaming Endpoints." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/streamingLocators", + "Path": "samples/mediaservices/streaminglocators/main.tf", + "Description": "A basic example of deploying Media Services Streaming Locators." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/streamingPolicies", + "Path": "samples/mediaservices/streamingpolicies/main.tf", + "Description": "A basic example of deploying Media Services Streaming Policies." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/transforms", + "Path": "samples/mediaservices/transforms/main.tf", + "Description": "A basic example of deploying Media Services Transforms." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Media/mediaServices", + "Path": "samples/mediaservices/main.bicep", + "Description": "A basic example of deploying Media Services." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/accountFilters", + "Path": "samples/mediaservices/accountfilters/main.bicep", + "Description": "A basic example of deploying Media Services Account Filters." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/assets", + "Path": "samples/mediaservices/assets/main.bicep", + "Description": "A basic example of deploying Media Services Assets." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/assets/assetFilters", + "Path": "samples/mediaservices/assets/assetfilters/main.bicep", + "Description": "A basic example of deploying Media Services Asset Filters." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/contentKeyPolicies", + "Path": "samples/mediaservices/contentkeypolicies/main.bicep", + "Description": "A basic example of deploying Media Services Content Key Policies." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/liveEvents", + "Path": "samples/mediaservices/liveevents/main.bicep", + "Description": "A basic example of deploying Media Services Live Events." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/streamingEndpoints", + "Path": "samples/mediaservices/streamingendpoints/main.bicep", + "Description": "A basic example of deploying Media Services Streaming Endpoints." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/streamingLocators", + "Path": "samples/mediaservices/streaminglocators/main.bicep", + "Description": "A basic example of deploying Media Services Streaming Locators." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/streamingPolicies", + "Path": "samples/mediaservices/streamingpolicies/main.bicep", + "Description": "A basic example of deploying Media Services Streaming Policies." + }, + { + "ResourceType": "Microsoft.Media/mediaServices/transforms", + "Path": "samples/mediaservices/transforms/main.bicep", + "Description": "A basic example of deploying Media Services Transforms." + } + ] +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/accountfilters/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/accountfilters/main.bicep new file mode 100644 index 00000000..7bfbd1a0 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/accountfilters/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource accountFilter 'Microsoft.Media/mediaServices/accountFilters@2022-08-01' = { + parent: mediaService + name: 'Filter-1' + properties: { + tracks: [] + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/assets/assetfilters/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/assets/assetfilters/main.bicep new file mode 100644 index 00000000..370f9233 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/assets/assetfilters/main.bicep @@ -0,0 +1,70 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource asset 'Microsoft.Media/mediaServices/assets@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + description: '' + } +} + +resource assetFilter 'Microsoft.Media/mediaServices/assets/assetFilters@2022-08-01' = { + parent: asset + name: resourceName + properties: { + firstQuality: { + bitrate: 0 + } + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/assets/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/assets/main.bicep new file mode 100644 index 00000000..d3113e8f --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/assets/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource asset 'Microsoft.Media/mediaServices/assets@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + description: '' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/contentkeypolicies/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/contentkeypolicies/main.bicep new file mode 100644 index 00000000..ff8c4df1 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/contentkeypolicies/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource contentKeyPolicy 'Microsoft.Media/mediaServices/contentKeyPolicies@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + description: 'My Policy Description' + options: [ + { + configuration: { + '@odata.type': '#Microsoft.Media.ContentKeyPolicyClearKeyConfiguration' + } + name: 'ClearKeyOption' + restriction: { + '@odata.type': '#Microsoft.Media.ContentKeyPolicyTokenRestriction' + audience: 'urn:audience' + issuer: 'urn:issuer' + primaryVerificationKey: { + '@odata.type': '#Microsoft.Media.ContentKeyPolicySymmetricTokenKey' + keyValue: 'AAAAAAAAAAAAAAAAAAAAAA==' + } + requiredClaims: [] + restrictionTokenType: 'Swt' + } + } + ] + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/liveevents/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/liveevents/main.bicep new file mode 100644 index 00000000..d7b6c81c --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/liveevents/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + sku: { + name: 'Standard_GRS' + } +} + +resource liveEvent 'Microsoft.Media/mediaServices/liveEvents@2022-08-01' = { + parent: mediaService + name: resourceName + location: location + properties: { + input: { + accessControl: { + ip: { + allow: [ + { + address: '0.0.0.0' + name: 'AllowAll' + subnetPrefixLength: 0 + } + ] + } + } + keyFrameIntervalDuration: 'PT6S' + streamingProtocol: 'RTMP' + } + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/main.bicep new file mode 100644 index 00000000..a042e3e7 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/streamingendpoints/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/streamingendpoints/main.bicep new file mode 100644 index 00000000..bb91f091 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/streamingendpoints/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource streamingEndpoint 'Microsoft.Media/mediaServices/streamingEndpoints@2022-08-01' = { + parent: mediaService + name: resourceName + location: location + properties: { + scaleUnits: 1 + } + tags: { + env: 'test' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/streaminglocators/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/streaminglocators/main.bicep new file mode 100644 index 00000000..1c928f50 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/streaminglocators/main.bicep @@ -0,0 +1,69 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource asset 'Microsoft.Media/mediaServices/assets@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + description: '' + } +} + +resource streamingLocator 'Microsoft.Media/mediaServices/streamingLocators@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + assetName: asset.name + streamingPolicyName: 'Predefined_ClearStreamingOnly' + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/streamingpolicies/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/streamingpolicies/main.bicep new file mode 100644 index 00000000..523fcedf --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/streamingpolicies/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource streamingPolicy 'Microsoft.Media/mediaServices/streamingPolicies@2022-08-01' = { + parent: mediaService + name: resourceName + properties: { + noEncryption: { + enabledProtocols: { + dash: true + download: true + hls: true + smoothStreaming: true + } + } + } +} diff --git a/settings/remarks/microsoft.media/samples/mediaservices/transforms/main.bicep b/settings/remarks/microsoft.media/samples/mediaservices/transforms/main.bicep new file mode 100644 index 00000000..98dd85b2 --- /dev/null +++ b/settings/remarks/microsoft.media/samples/mediaservices/transforms/main.bicep @@ -0,0 +1,70 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource mediaService 'Microsoft.Media/mediaServices@2021-11-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + storageAccounts: [ + { + id: storageAccount.id + type: 'Primary' + } + ] + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource transform 'Microsoft.Media/mediaServices/transforms@2022-07-01' = { + parent: mediaService + name: resourceName + properties: { + description: '' + outputs: [ + { + onError: 'ContinueJob' + preset: { + '@odata.type': '#Microsoft.Media.BuiltInStandardEncoderPreset' + presetName: 'AACGoodQualityAudio' + } + relativePriority: 'Normal' + } + ] + } +} diff --git a/settings/remarks/microsoft.migrate/remarks.json b/settings/remarks/microsoft.migrate/remarks.json index 71b489f8..ffa58636 100644 --- a/settings/remarks/microsoft.migrate/remarks.json +++ b/settings/remarks/microsoft.migrate/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Migrate/migrateProjects", - "Path": "samples/migrateprojects/main.tf", - "Description": "A basic example of deploying Migrate Projects." - }, - { - "ResourceType": "Microsoft.Migrate/migrateProjects/solutions", - "Path": "samples/migrateprojects/solutions/main.tf", - "Description": "A basic example of deploying Migrate Project Solutions." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Migrate/migrateProjects", + "Path": "samples/migrateprojects/main.tf", + "Description": "A basic example of deploying Migrate Projects." + }, + { + "ResourceType": "Microsoft.Migrate/migrateProjects/solutions", + "Path": "samples/migrateprojects/solutions/main.tf", + "Description": "A basic example of deploying Migrate Project Solutions." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Migrate/migrateProjects", + "Path": "samples/migrateprojects/main.bicep", + "Description": "A basic example of deploying Migrate Projects." + }, + { + "ResourceType": "Microsoft.Migrate/migrateProjects/solutions", + "Path": "samples/migrateprojects/solutions/main.bicep", + "Description": "A basic example of deploying Migrate Project Solutions." + } + ] +} diff --git a/settings/remarks/microsoft.migrate/samples/migrateprojects/main.bicep b/settings/remarks/microsoft.migrate/samples/migrateprojects/main.bicep new file mode 100644 index 00000000..abc2b611 --- /dev/null +++ b/settings/remarks/microsoft.migrate/samples/migrateprojects/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource project 'Microsoft.Migrate/migrateProjects@2020-05-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + utilityStorageAccountId: storageAccount.id + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.migrate/samples/migrateprojects/solutions/main.bicep b/settings/remarks/microsoft.migrate/samples/migrateprojects/solutions/main.bicep new file mode 100644 index 00000000..0e8f74a8 --- /dev/null +++ b/settings/remarks/microsoft.migrate/samples/migrateprojects/solutions/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource project 'Microsoft.Migrate/migrateProjects@2020-05-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + utilityStorageAccountId: storageAccount.id + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource solution 'Microsoft.Migrate/migrateProjects/solutions@2018-09-01-preview' = { + parent: project + name: resourceName + properties: { + summary: { + instanceType: 'Servers' + migratedCount: 0 + } + } +} diff --git a/settings/remarks/microsoft.mixedreality/remarks.json b/settings/remarks/microsoft.mixedreality/remarks.json index 1d6968bf..3dced6ae 100644 --- a/settings/remarks/microsoft.mixedreality/remarks.json +++ b/settings/remarks/microsoft.mixedreality/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.MixedReality/spatialAnchorsAccounts", - "Path": "samples/spatialanchorsaccounts/main.tf", - "Description": "A basic example of deploying Azure Spatial Anchors Account." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.MixedReality/spatialAnchorsAccounts", + "Path": "samples/spatialanchorsaccounts/main.tf", + "Description": "A basic example of deploying Azure Spatial Anchors Account." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.MixedReality/spatialAnchorsAccounts", + "Path": "samples/spatialanchorsaccounts/main.bicep", + "Description": "A basic example of deploying Azure Spatial Anchors Account." + } + ] +} diff --git a/settings/remarks/microsoft.mixedreality/samples/spatialanchorsaccounts/main.bicep b/settings/remarks/microsoft.mixedreality/samples/spatialanchorsaccounts/main.bicep new file mode 100644 index 00000000..195aee0e --- /dev/null +++ b/settings/remarks/microsoft.mixedreality/samples/spatialanchorsaccounts/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spatialAnchorsAccount 'Microsoft.MixedReality/spatialAnchorsAccounts@2021-01-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.mobilenetwork/remarks.json b/settings/remarks/microsoft.mobilenetwork/remarks.json index fb673791..70acb954 100644 --- a/settings/remarks/microsoft.mobilenetwork/remarks.json +++ b/settings/remarks/microsoft.mobilenetwork/remarks.json @@ -1,50 +1,97 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.MobileNetwork/mobileNetworks", - "Path": "samples/mobilenetworks/main.tf", - "Description": "A basic example of deploying Azure Mobile Network." - }, - { - "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/dataNetworks", - "Path": "samples/mobilenetworks/datanetworks/main.tf", - "Description": "A basic example of deploying Mobile Network Data Network." - }, - { - "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/services", - "Path": "samples/mobilenetworks/services/main.tf", - "Description": "A basic example of deploying Mobile Network Service." - }, - { - "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/simPolicies", - "Path": "samples/mobilenetworks/simpolicies/main.tf", - "Description": "A basic example of deploying Mobile Network Sim Policy." - }, - { - "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/sites", - "Path": "samples/mobilenetworks/sites/main.tf", - "Description": "A basic example of deploying Mobile Network Site." - }, - { - "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/slices", - "Path": "samples/mobilenetworks/slices/main.tf", - "Description": "A basic example of deploying Mobile Network Slice." - }, - { - "ResourceType": "Microsoft.MobileNetwork/packetCoreControlPlanes", - "Path": "samples/packetcorecontrolplanes/main.tf", - "Description": "A basic example of deploying Mobile Network Packet Core Control Plane." - }, - { - "ResourceType": "Microsoft.MobileNetwork/packetCoreControlPlanes/packetCoreDataPlanes", - "Path": "samples/packetcorecontrolplanes/packetcoredataplanes/main.tf", - "Description": "A basic example of deploying Mobile Network Packet Core Data Plane." - }, - { - "ResourceType": "Microsoft.MobileNetwork/simGroups", - "Path": "samples/simgroups/main.tf", - "Description": "A basic example of deploying Mobile Network Sim Group." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks", + "Path": "samples/mobilenetworks/main.tf", + "Description": "A basic example of deploying Azure Mobile Network." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/dataNetworks", + "Path": "samples/mobilenetworks/datanetworks/main.tf", + "Description": "A basic example of deploying Mobile Network Data Network." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/services", + "Path": "samples/mobilenetworks/services/main.tf", + "Description": "A basic example of deploying Mobile Network Service." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/simPolicies", + "Path": "samples/mobilenetworks/simpolicies/main.tf", + "Description": "A basic example of deploying Mobile Network Sim Policy." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/sites", + "Path": "samples/mobilenetworks/sites/main.tf", + "Description": "A basic example of deploying Mobile Network Site." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/slices", + "Path": "samples/mobilenetworks/slices/main.tf", + "Description": "A basic example of deploying Mobile Network Slice." + }, + { + "ResourceType": "Microsoft.MobileNetwork/packetCoreControlPlanes", + "Path": "samples/packetcorecontrolplanes/main.tf", + "Description": "A basic example of deploying Mobile Network Packet Core Control Plane." + }, + { + "ResourceType": "Microsoft.MobileNetwork/packetCoreControlPlanes/packetCoreDataPlanes", + "Path": "samples/packetcorecontrolplanes/packetcoredataplanes/main.tf", + "Description": "A basic example of deploying Mobile Network Packet Core Data Plane." + }, + { + "ResourceType": "Microsoft.MobileNetwork/simGroups", + "Path": "samples/simgroups/main.tf", + "Description": "A basic example of deploying Mobile Network Sim Group." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks", + "Path": "samples/mobilenetworks/main.bicep", + "Description": "A basic example of deploying Azure Mobile Network." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/dataNetworks", + "Path": "samples/mobilenetworks/datanetworks/main.bicep", + "Description": "A basic example of deploying Mobile Network Data Network." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/services", + "Path": "samples/mobilenetworks/services/main.bicep", + "Description": "A basic example of deploying Mobile Network Service." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/simPolicies", + "Path": "samples/mobilenetworks/simpolicies/main.bicep", + "Description": "A basic example of deploying Mobile Network Sim Policy." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/sites", + "Path": "samples/mobilenetworks/sites/main.bicep", + "Description": "A basic example of deploying Mobile Network Site." + }, + { + "ResourceType": "Microsoft.MobileNetwork/mobileNetworks/slices", + "Path": "samples/mobilenetworks/slices/main.bicep", + "Description": "A basic example of deploying Mobile Network Slice." + }, + { + "ResourceType": "Microsoft.MobileNetwork/packetCoreControlPlanes", + "Path": "samples/packetcorecontrolplanes/main.bicep", + "Description": "A basic example of deploying Mobile Network Packet Core Control Plane." + }, + { + "ResourceType": "Microsoft.MobileNetwork/packetCoreControlPlanes/packetCoreDataPlanes", + "Path": "samples/packetcorecontrolplanes/packetcoredataplanes/main.bicep", + "Description": "A basic example of deploying Mobile Network Packet Core Data Plane." + }, + { + "ResourceType": "Microsoft.MobileNetwork/simGroups", + "Path": "samples/simgroups/main.bicep", + "Description": "A basic example of deploying Mobile Network Sim Group." + } + ] +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/datanetworks/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/datanetworks/main.bicep new file mode 100644 index 00000000..ec6d2ae5 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/datanetworks/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource dataNetwork 'Microsoft.MobileNetwork/mobileNetworks/dataNetworks@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/main.bicep new file mode 100644 index 00000000..b02701ae --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/services/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/services/main.bicep new file mode 100644 index 00000000..15eeb4fe --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/services/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource service 'Microsoft.MobileNetwork/mobileNetworks/services@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + pccRules: [ + { + ruleName: 'default-rule' + rulePrecedence: 1 + serviceDataFlowTemplates: [ + { + direction: 'Uplink' + ports: [] + protocol: [ + 'ip' + ] + remoteIpList: [ + '10.3.4.0/24' + ] + templateName: 'IP-to-server' + } + ] + trafficControl: 'Enabled' + } + ] + servicePrecedence: 0 + } +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/simpolicies/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/simpolicies/main.bicep new file mode 100644 index 00000000..f2a66712 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/simpolicies/main.bicep @@ -0,0 +1,112 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource dataNetwork 'Microsoft.MobileNetwork/mobileNetworks/dataNetworks@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} + +resource service 'Microsoft.MobileNetwork/mobileNetworks/services@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + pccRules: [ + { + ruleName: 'default-rule' + rulePrecedence: 1 + serviceDataFlowTemplates: [ + { + direction: 'Uplink' + ports: [] + protocol: [ + 'ip' + ] + remoteIpList: [ + '10.3.4.0/24' + ] + templateName: 'IP-to-server' + } + ] + trafficControl: 'Enabled' + } + ] + servicePrecedence: 0 + } +} + +resource simPolicy 'Microsoft.MobileNetwork/mobileNetworks/simPolicies@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + defaultSlice: { + id: slice.id + } + registrationTimer: 3240 + sliceConfigurations: [ + { + dataNetworkConfigurations: [ + { + '5qi': 9 + additionalAllowedSessionTypes: null + allocationAndRetentionPriorityLevel: 9 + allowedServices: [ + { + id: service.id + } + ] + dataNetwork: { + id: dataNetwork.id + } + defaultSessionType: 'IPv4' + maximumNumberOfBufferedPackets: 10 + preemptionCapability: 'NotPreempt' + preemptionVulnerability: 'Preemptable' + sessionAmbr: { + downlink: '1 Gbps' + uplink: '500 Mbps' + } + } + ] + defaultDataNetwork: { + id: dataNetwork.id + } + slice: { + id: slice.id + } + } + ] + ueAmbr: { + downlink: '1 Gbps' + uplink: '500 Mbps' + } + } + tags: { + key: 'value' + } +} + +resource slice 'Microsoft.MobileNetwork/mobileNetworks/slices@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + snssai: { + sst: 1 + } + } +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/sites/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/sites/main.bicep new file mode 100644 index 00000000..41648948 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/sites/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource site 'Microsoft.MobileNetwork/mobileNetworks/sites@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/slices/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/slices/main.bicep new file mode 100644 index 00000000..dd8ad036 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/mobilenetworks/slices/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource slice 'Microsoft.MobileNetwork/mobileNetworks/slices@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: { + snssai: { + sst: 1 + } + } +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/main.bicep new file mode 100644 index 00000000..8a727b34 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource dataBoxEdgeDevice 'Microsoft.DataBoxEdge/dataBoxEdgeDevices@2022-03-01' = { + name: resourceName + location: location + sku: { + name: 'EdgeP_Base' + tier: 'Standard' + } +} + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource packetCoreControlPlane 'Microsoft.MobileNetwork/packetCoreControlPlanes@2022-11-01' = { + name: resourceName + location: location + properties: { + controlPlaneAccessInterface: {} + localDiagnosticsAccess: { + authenticationType: 'AAD' + } + platform: { + azureStackEdgeDevice: { + id: dataBoxEdgeDevice.id + } + type: 'AKS-HCI' + } + sites: [ + { + id: site.id + } + ] + sku: 'G0' + ueMtu: 1440 + } +} + +resource site 'Microsoft.MobileNetwork/mobileNetworks/sites@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/packetcoredataplanes/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/packetcoredataplanes/main.bicep new file mode 100644 index 00000000..8d46b641 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/packetcorecontrolplanes/packetcoredataplanes/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource dataBoxEdgeDevice 'Microsoft.DataBoxEdge/dataBoxEdgeDevices@2022-03-01' = { + name: resourceName + location: location + sku: { + name: 'EdgeP_Base' + tier: 'Standard' + } +} + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource packetCoreControlPlane 'Microsoft.MobileNetwork/packetCoreControlPlanes@2022-11-01' = { + name: resourceName + location: location + properties: { + controlPlaneAccessInterface: {} + localDiagnosticsAccess: { + authenticationType: 'AAD' + } + platform: { + azureStackEdgeDevice: { + id: dataBoxEdgeDevice.id + } + type: 'AKS-HCI' + } + sites: [ + { + id: site.id + } + ] + sku: 'G0' + ueMtu: 1440 + } +} + +resource packetCoreDataPlane 'Microsoft.MobileNetwork/packetCoreControlPlanes/packetCoreDataPlanes@2022-11-01' = { + parent: packetCoreControlPlane + name: resourceName + location: location + properties: { + userPlaneAccessInterface: {} + } +} + +resource site 'Microsoft.MobileNetwork/mobileNetworks/sites@2022-11-01' = { + parent: mobileNetwork + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.mobilenetwork/samples/simgroups/main.bicep b/settings/remarks/microsoft.mobilenetwork/samples/simgroups/main.bicep new file mode 100644 index 00000000..2e9533b7 --- /dev/null +++ b/settings/remarks/microsoft.mobilenetwork/samples/simgroups/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource mobileNetwork 'Microsoft.MobileNetwork/mobileNetworks@2022-11-01' = { + name: resourceName + location: location + properties: { + publicLandMobileNetworkIdentifier: { + mcc: '001' + mnc: '01' + } + } +} + +resource simGroup 'Microsoft.MobileNetwork/simGroups@2022-11-01' = { + name: resourceName + location: location + properties: { + mobileNetwork: { + id: mobileNetwork.id + } + } +} diff --git a/settings/remarks/microsoft.monitor/remarks.json b/settings/remarks/microsoft.monitor/remarks.json index 8c07349b..62cf1d96 100644 --- a/settings/remarks/microsoft.monitor/remarks.json +++ b/settings/remarks/microsoft.monitor/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Monitor/accounts", - "Path": "samples/accounts/main.tf", - "Description": "A basic example of deploying Azure Monitor Workspace." - }, - { - "ResourceType": "Microsoft.Monitor/accounts/privateEndpointConnections", - "Path": "samples/accounts/privateendpointconnections/main.tf", - "Description": "A basic example of deploying Monitor Accounts Private Endpoint Connections." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Monitor/accounts", + "Path": "samples/accounts/main.tf", + "Description": "A basic example of deploying Azure Monitor Workspace." + }, + { + "ResourceType": "Microsoft.Monitor/accounts/privateEndpointConnections", + "Path": "samples/accounts/privateendpointconnections/main.tf", + "Description": "A basic example of deploying Monitor Accounts Private Endpoint Connections." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Monitor/accounts", + "Path": "samples/accounts/main.bicep", + "Description": "A basic example of deploying Azure Monitor Workspace." + }, + { + "ResourceType": "Microsoft.Monitor/accounts/privateEndpointConnections", + "Path": "samples/accounts/privateendpointconnections/main.bicep", + "Description": "A basic example of deploying Monitor Accounts Private Endpoint Connections." + } + ] +} diff --git a/settings/remarks/microsoft.monitor/samples/accounts/main.bicep b/settings/remarks/microsoft.monitor/samples/accounts/main.bicep new file mode 100644 index 00000000..feaac301 --- /dev/null +++ b/settings/remarks/microsoft.monitor/samples/accounts/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.Monitor/accounts@2023-04-03' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.monitor/samples/accounts/privateendpointconnections/main.bicep b/settings/remarks/microsoft.monitor/samples/accounts/privateendpointconnections/main.bicep new file mode 100644 index 00000000..0c9d0885 --- /dev/null +++ b/settings/remarks/microsoft.monitor/samples/accounts/privateendpointconnections/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource account 'Microsoft.Monitor/accounts@2023-04-03' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Disabled' + } +} + +resource grafana 'Microsoft.Dashboard/grafana@2023-09-01' = { + name: resourceName + location: location + identity: { + type: 'None' + userAssignedIdentities: null + } + properties: { + apiKey: 'Disabled' + autoGeneratedDomainNameLabelScope: 'TenantReuse' + deterministicOutboundIP: 'Disabled' + grafanaIntegrations: { + azureMonitorWorkspaceIntegrations: [ + { + azureMonitorWorkspaceResourceId: account.id + } + ] + } + publicNetworkAccess: 'Disabled' + zoneRedundancy: 'Disabled' + } + sku: { + name: 'Standard' + } +} + +resource grafanaManagedPrivateEndpointConnectionApproval 'Microsoft.Monitor/accounts/privateEndpointConnections@2023-04-03' = { + parent: account + name: 'account.properties.privateEndpointConnections[0].name' + properties: { + privateLinkServiceConnectionState: { + actionsRequired: 'None' + description: 'Approved via Terraform' + status: 'Approved' + } + } + dependsOn: [ + managedPrivateEndpoint + ] +} + +resource managedPrivateEndpoint 'Microsoft.Dashboard/grafana/managedPrivateEndpoints@2023-09-01' = { + parent: grafana + name: resourceName + location: location + properties: { + groupIds: [ + 'prometheusMetrics' + ] + privateLinkResourceId: account.id + privateLinkResourceRegion: 'eastus' + } +} diff --git a/settings/remarks/microsoft.netapp/remarks.json b/settings/remarks/microsoft.netapp/remarks.json index 6ed34907..cc26884b 100644 --- a/settings/remarks/microsoft.netapp/remarks.json +++ b/settings/remarks/microsoft.netapp/remarks.json @@ -1,45 +1,87 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.NetApp/netAppAccounts", - "Path": "samples/netappaccounts/main.tf", - "Description": "A basic example of deploying NetApp Account." - }, - { - "ResourceType": "Microsoft.NetApp/netAppAccounts/backupPolicies", - "Path": "samples/netappaccounts/backuppolicies/main.tf", - "Description": "A basic example of deploying NetApp Backup Policy." - }, - { - "ResourceType": "Microsoft.NetApp/netAppAccounts/backupVaults", - "Path": "samples/netappaccounts/backupvaults/main.tf", - "Description": "A basic example of deploying NetApp Backup Vault." - }, - { - "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools", - "Path": "samples/netappaccounts/capacitypools/main.tf", - "Description": "A basic example of deploying Pool within a NetApp Account." - }, - { - "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes", - "Path": "samples/netappaccounts/capacitypools/volumes/main.tf", - "Description": "A basic example of deploying NetApp Volume." - }, - { - "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes/snapshots", - "Path": "samples/netappaccounts/capacitypools/volumes/snapshots/main.tf", - "Description": "A basic example of deploying NetApp Snapshot." - }, - { - "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes/volumeQuotaRules", - "Path": "samples/netappaccounts/capacitypools/volumes/volumequotarules/main.tf", - "Description": "A basic example of deploying Volume Quota Rule." - }, - { - "ResourceType": "Microsoft.NetApp/netAppAccounts/snapshotPolicies", - "Path": "samples/netappaccounts/snapshotpolicies/main.tf", - "Description": "A basic example of deploying NetApp Snapshot Policy." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.NetApp/netAppAccounts", + "Path": "samples/netappaccounts/main.tf", + "Description": "A basic example of deploying NetApp Account." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/backupPolicies", + "Path": "samples/netappaccounts/backuppolicies/main.tf", + "Description": "A basic example of deploying NetApp Backup Policy." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/backupVaults", + "Path": "samples/netappaccounts/backupvaults/main.tf", + "Description": "A basic example of deploying NetApp Backup Vault." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools", + "Path": "samples/netappaccounts/capacitypools/main.tf", + "Description": "A basic example of deploying Pool within a NetApp Account." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes", + "Path": "samples/netappaccounts/capacitypools/volumes/main.tf", + "Description": "A basic example of deploying NetApp Volume." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes/snapshots", + "Path": "samples/netappaccounts/capacitypools/volumes/snapshots/main.tf", + "Description": "A basic example of deploying NetApp Snapshot." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes/volumeQuotaRules", + "Path": "samples/netappaccounts/capacitypools/volumes/volumequotarules/main.tf", + "Description": "A basic example of deploying Volume Quota Rule." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/snapshotPolicies", + "Path": "samples/netappaccounts/snapshotpolicies/main.tf", + "Description": "A basic example of deploying NetApp Snapshot Policy." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.NetApp/netAppAccounts", + "Path": "samples/netappaccounts/main.bicep", + "Description": "A basic example of deploying NetApp Account." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/backupPolicies", + "Path": "samples/netappaccounts/backuppolicies/main.bicep", + "Description": "A basic example of deploying NetApp Backup Policy." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/backupVaults", + "Path": "samples/netappaccounts/backupvaults/main.bicep", + "Description": "A basic example of deploying NetApp Backup Vault." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools", + "Path": "samples/netappaccounts/capacitypools/main.bicep", + "Description": "A basic example of deploying Pool within a NetApp Account." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes", + "Path": "samples/netappaccounts/capacitypools/volumes/main.bicep", + "Description": "A basic example of deploying NetApp Volume." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes/snapshots", + "Path": "samples/netappaccounts/capacitypools/volumes/snapshots/main.bicep", + "Description": "A basic example of deploying NetApp Snapshot." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/capacityPools/volumes/volumeQuotaRules", + "Path": "samples/netappaccounts/capacitypools/volumes/volumequotarules/main.bicep", + "Description": "A basic example of deploying Volume Quota Rule." + }, + { + "ResourceType": "Microsoft.NetApp/netAppAccounts/snapshotPolicies", + "Path": "samples/netappaccounts/snapshotpolicies/main.bicep", + "Description": "A basic example of deploying NetApp Snapshot Policy." + } + ] +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/backuppolicies/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/backuppolicies/main.bicep new file mode 100644 index 00000000..0a338a03 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/backuppolicies/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2025-01-01' = { + name: resourceName + location: location + properties: {} +} + +resource backupPolicy 'Microsoft.NetApp/netAppAccounts/backupPolicies@2025-01-01' = { + parent: netAppAccount + name: '${resourceName}-policy' + location: location + properties: { + dailyBackupsToKeep: 2 + enabled: true + monthlyBackupsToKeep: 1 + weeklyBackupsToKeep: 1 + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/backupvaults/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/backupvaults/main.bicep new file mode 100644 index 00000000..edd441bd --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/backupvaults/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2025-01-01' = { + name: resourceName + location: location + properties: {} +} + +resource backupVault 'Microsoft.NetApp/netAppAccounts/backupVaults@2025-01-01' = { + parent: netAppAccount + name: '${resourceName}-backupvault' + location: location +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/main.bicep new file mode 100644 index 00000000..39beab5f --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource capacityPool 'Microsoft.NetApp/netAppAccounts/capacityPools@2022-05-01' = { + parent: netAppAccount + name: resourceName + location: location + properties: { + serviceLevel: 'Standard' + size: 4398046511104 + } + tags: { + SkipASMAzSecPack: 'true' + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/main.bicep new file mode 100644 index 00000000..18cd550e --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/main.bicep @@ -0,0 +1,116 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.6.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource capacityPool 'Microsoft.NetApp/netAppAccounts/capacityPools@2022-05-01' = { + parent: netAppAccount + name: resourceName + location: location + properties: { + serviceLevel: 'Standard' + size: 4398046511104 + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'GatewaySubnet' + properties: { + addressPrefix: '10.6.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource subnet2 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.6.2.0/24' + delegations: [ + { + name: 'testdelegation' + properties: { + serviceName: 'Microsoft.Netapp/volumes' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource volume 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2022-05-01' = { + parent: capacityPool + name: resourceName + location: location + properties: { + avsDataStore: 'Enabled' + creationToken: 'my-unique-file-path-230630034120103726' + dataProtection: {} + exportPolicy: { + rules: [ + { + allowedClients: '0.0.0.0/0' + cifs: false + hasRootAccess: true + nfsv3: true + nfsv41: false + ruleIndex: 1 + unixReadOnly: false + unixReadWrite: true + } + ] + } + networkFeatures: 'Basic' + protocolTypes: [ + 'NFSv3' + ] + serviceLevel: 'Standard' + snapshotDirectoryVisible: true + subnetId: subnet2.id + usageThreshold: 107374182400 + volumeType: '' + } + tags: { + SkipASMAzSecPack: 'true' + } + zones: [] +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/snapshots/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/snapshots/main.bicep new file mode 100644 index 00000000..e44656a4 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/snapshots/main.bicep @@ -0,0 +1,88 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource capacityPool 'Microsoft.NetApp/netAppAccounts/capacityPools@2022-05-01' = { + parent: netAppAccount + name: resourceName + location: location + properties: { + serviceLevel: 'Premium' + size: 4398046511104 + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [ + { + name: 'netapp' + properties: { + serviceName: 'Microsoft.Netapp/volumes' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource volume 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2022-05-01' = { + parent: capacityPool + name: resourceName + location: location + properties: { + avsDataStore: 'Disabled' + creationToken: 'my-unique-file-path-230630033642692134' + dataProtection: {} + exportPolicy: { + rules: [] + } + networkFeatures: 'Basic' + protocolTypes: [ + 'NFSv3' + ] + securityStyle: 'Unix' + serviceLevel: 'Premium' + snapshotDirectoryVisible: false + snapshotId: '' + subnetId: subnet.id + usageThreshold: 107374182400 + volumeType: '' + } + zones: [] +} + +resource snapshot 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes/snapshots@2022-05-01' = { + parent: volume + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/volumequotarules/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/volumequotarules/main.bicep new file mode 100644 index 00000000..7c333bc5 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/capacitypools/volumes/volumequotarules/main.bicep @@ -0,0 +1,98 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2025-01-01' = { + name: '${resourceName}-acct' + location: location + properties: {} +} + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2024-05-01' = { + name: '${resourceName}-nsg' + location: location + properties: { + securityRules: [] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.88.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource capacityPool 'Microsoft.NetApp/netAppAccounts/capacityPools@2025-01-01' = { + parent: netAppAccount + name: '${resourceName}-pool' + location: location + properties: { + coolAccess: false + encryptionType: 'Single' + qosType: 'Auto' + serviceLevel: 'Standard' + size: 4398046511104 + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.88.2.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'netapp-delegation' + properties: { + serviceName: 'Microsoft.NetApp/volumes' + } + } + ] + networkSecurityGroup: { + id: networkSecurityGroup.id + } + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource volume 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2025-01-01' = { + parent: capacityPool + name: '${resourceName}-vol' + location: location + properties: { + creationToken: 'acctest0001-path' + dataProtection: {} + exportPolicy: { + rules: [] + } + protocolTypes: [ + 'NFSv3' + ] + serviceLevel: 'Standard' + subnetId: subnet.id + usageThreshold: 107374182400 + } +} + +resource volumeQuotaRule 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes/volumeQuotaRules@2025-01-01' = { + parent: volume + name: '${resourceName}-quota' + location: location + properties: { + quotaSizeInKiBs: 2048 + quotaType: 'DefaultGroupQuota' + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/main.bicep new file mode 100644 index 00000000..850f5955 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} diff --git a/settings/remarks/microsoft.netapp/samples/netappaccounts/snapshotpolicies/main.bicep b/settings/remarks/microsoft.netapp/samples/netappaccounts/snapshotpolicies/main.bicep new file mode 100644 index 00000000..dcdd13a9 --- /dev/null +++ b/settings/remarks/microsoft.netapp/samples/netappaccounts/snapshotpolicies/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2' + +resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-05-01' = { + name: resourceName + location: location + properties: { + activeDirectories: [] + } +} + +resource snapshotPolicy 'Microsoft.NetApp/netAppAccounts/snapshotPolicies@2022-05-01' = { + parent: netAppAccount + name: resourceName + location: location + properties: { + dailySchedule: { + hour: 22 + minute: 15 + snapshotsToKeep: 1 + } + enabled: true + hourlySchedule: { + minute: 15 + snapshotsToKeep: 1 + } + monthlySchedule: { + daysOfMonth: '30,15,1' + hour: 5 + minute: 0 + snapshotsToKeep: 1 + } + weeklySchedule: { + day: 'Monday,Friday' + hour: 23 + minute: 0 + snapshotsToKeep: 1 + } + } +} diff --git a/settings/remarks/microsoft.network/remarks.json b/settings/remarks/microsoft.network/remarks.json index 2822eb84..e1975543 100644 --- a/settings/remarks/microsoft.network/remarks.json +++ b/settings/remarks/microsoft.network/remarks.json @@ -1,532 +1,1019 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "For guidance on creating network security groups, see [Create virtual network resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-virtual-networks#network-security-groups).", - "ResourceTypes": [ - "microsoft.network/networksecuritygroups", - "microsoft.network/networksecuritygroups/securityrules" - ] - }, - { - "Description": "For guidance on creating private endpoints, see [Create virtual network resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-virtual-networks#private-endpoints).", - "ResourceTypes": [ - "microsoft.network/privateendpoints" - ] - }, - { - "Description": "For guidance on creating virtual networks and subnets, see [Create virtual network resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-virtual-networks).", - "ResourceTypes": [ - "microsoft.network/virtualnetworks", - "microsoft.network/virtualnetworks/subnets" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies", - "Path": "samples/applicationgatewaywebapplicationfirewallpolicies/main.tf", - "Description": "A basic example of deploying Azure Web Application Firewall Policy instance." - }, - { - "ResourceType": "Microsoft.Network/ExpressRoutePorts", - "Path": "samples/expressrouteports/main.tf", - "Description": "A basic example of deploying Express Route Port." - }, - { - "ResourceType": "Microsoft.Network/FrontDoorWebApplicationFirewallPolicies", - "Path": "samples/frontdoorwebapplicationfirewallpolicies/main.tf", - "Description": "A basic example of deploying Front Door Firewall Policy instance." - }, - { - "ResourceType": "Microsoft.Network/applicationGateways", - "Path": "samples/applicationgateways/main.tf", - "Description": "A basic example of deploying Application Gateway." - }, - { - "ResourceType": "Microsoft.Network/applicationSecurityGroups", - "Path": "samples/applicationsecuritygroups/main.tf", - "Description": "A basic example of deploying Application Security Group." - }, - { - "ResourceType": "Microsoft.Network/azureFirewalls", - "Path": "samples/azurefirewalls/main.tf", - "Description": "A basic example of deploying Azure Firewall." - }, - { - "ResourceType": "Microsoft.Network/bastionHosts", - "Path": "samples/bastionhosts/main.tf", - "Description": "A basic example of deploying Bastion Host." - }, - { - "ResourceType": "Microsoft.Network/ddosProtectionPlans", - "Path": "samples/ddosprotectionplans/main.tf", - "Description": "A basic example of deploying Azure Network DDoS Protection Plan." - }, - { - "ResourceType": "Microsoft.Network/dnsForwardingRulesets", - "Path": "samples/dnsforwardingrulesets/main.tf", - "Description": "A basic example of deploying Private DNS Resolver Dns Forwarding Ruleset." - }, - { - "ResourceType": "Microsoft.Network/dnsForwardingRulesets/forwardingRules", - "Path": "samples/dnsforwardingrulesets/forwardingrules/main.tf", - "Description": "A basic example of deploying Private DNS Resolver Forwarding Rule." - }, - { - "ResourceType": "Microsoft.Network/dnsForwardingRulesets/virtualNetworkLinks", - "Path": "samples/dnsforwardingrulesets/virtualnetworklinks/main.tf", - "Description": "A basic example of deploying Private DNS Resolver Virtual Network Link." - }, - { - "ResourceType": "Microsoft.Network/dnsResolvers", - "Path": "samples/dnsresolvers/main.tf", - "Description": "A basic example of deploying Private DNS Resolver." - }, - { - "ResourceType": "Microsoft.Network/dnsResolvers/inboundEndpoints", - "Path": "samples/dnsresolvers/inboundendpoints/main.tf", - "Description": "A basic example of deploying Private DNS Resolver Inbound Endpoint." - }, - { - "ResourceType": "Microsoft.Network/dnsResolvers/outboundEndpoints", - "Path": "samples/dnsresolvers/outboundendpoints/main.tf", - "Description": "A basic example of deploying Private DNS Resolver Outbound Endpoint." - }, - { - "ResourceType": "Microsoft.Network/dnsZones", - "Path": "samples/dnszones/main.tf", - "Description": "A basic example of deploying DNS Zone." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/A", - "Path": "samples/dnszones/a/main.tf", - "Description": "A basic example of deploying DNS A Record." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/AAAA", - "Path": "samples/dnszones/aaaa/main.tf", - "Description": "A basic example of deploying DNS AAAA Record." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/CAA", - "Path": "samples/dnszones/caa/main.tf", - "Description": "A basic example of deploying DNS CAA Record." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/CNAME", - "Path": "samples/dnszones/cname/main.tf", - "Description": "A basic example of deploying DNS CNAME Record." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/MX", - "Path": "samples/dnszones/mx/main.tf", - "Description": "A basic example of deploying DNS MX Record." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/NS", - "Path": "samples/dnszones/ns/main.tf", - "Description": "A basic example of deploying DNS NS Record." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/PTR", - "Path": "samples/dnszones/ptr/main.tf", - "Description": "A basic example of deploying DNS PTR Record." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/SRV", - "Path": "samples/dnszones/srv/main.tf", - "Description": "A basic example of deploying DNS SRV Record." - }, - { - "ResourceType": "Microsoft.Network/dnsZones/TXT", - "Path": "samples/dnszones/txt/main.tf", - "Description": "A basic example of deploying DNS TXT Record." - }, - { - "ResourceType": "Microsoft.Network/expressRouteCircuits", - "Path": "samples/expressroutecircuits/main.tf", - "Description": "A basic example of deploying ExpressRoute circuit." - }, - { - "ResourceType": "Microsoft.Network/expressRouteCircuits/authorizations", - "Path": "samples/expressroutecircuits/authorizations/main.tf", - "Description": "A basic example of deploying ExpressRoute Circuit Authorization." - }, - { - "ResourceType": "Microsoft.Network/expressRouteCircuits/peerings", - "Path": "samples/expressroutecircuits/peerings/main.tf", - "Description": "A basic example of deploying ExpressRoute Circuit Peering." - }, - { - "ResourceType": "Microsoft.Network/expressRouteCircuits/peerings/connections", - "Path": "samples/expressroutecircuits/peerings/connections/main.tf", - "Description": "A basic example of deploying Express Route Circuit Connection." - }, - { - "ResourceType": "Microsoft.Network/expressRouteGateways", - "Path": "samples/expressroutegateways/main.tf", - "Description": "A basic example of deploying ExpressRoute gateway." - }, - { - "ResourceType": "Microsoft.Network/expressRouteGateways/expressRouteConnections", - "Path": "samples/expressroutegateways/expressrouteconnections/main.tf", - "Description": "A basic example of deploying Express Route Connection." - }, - { - "ResourceType": "Microsoft.Network/expressRoutePorts/authorizations", - "Path": "samples/expressrouteports/authorizations/main.tf", - "Description": "A basic example of deploying ExpressRoute Port Authorization." - }, - { - "ResourceType": "Microsoft.Network/firewallPolicies", - "Path": "samples/firewallpolicies/main.tf", - "Description": "A basic example of deploying Firewall Policy." - }, - { - "ResourceType": "Microsoft.Network/firewallPolicies/ruleCollectionGroups", - "Path": "samples/firewallpolicies/rulecollectiongroups/main.tf", - "Description": "A basic example of deploying Firewall Policy Rule Collection Group." - }, - { - "ResourceType": "Microsoft.Network/frontDoors/rulesEngines", - "Path": "samples/frontdoors/rulesengines/main.tf", - "Description": "A basic example of deploying Azure Front Door (classic) Rules Engine configuration and rules." - }, - { - "ResourceType": "Microsoft.Network/ipGroups", - "Path": "samples/ipgroups/main.tf", - "Description": "A basic example of deploying IP group which contains a list of CIDRs and/or IP addresses." - }, - { - "ResourceType": "Microsoft.Network/loadBalancers", - "Path": "samples/loadbalancers/main.tf", - "Description": "A basic example of deploying Load Balancer Resource." - }, - { - "ResourceType": "Microsoft.Network/loadBalancers/backendAddressPools", - "Path": "samples/loadbalancers/backendaddresspools/main.tf", - "Description": "A basic example of deploying Load Balancer Backend Address Pool." - }, - { - "ResourceType": "Microsoft.Network/localNetworkGateways", - "Path": "samples/localnetworkgateways/main.tf", - "Description": "A basic example of deploying local network gateway connection over which specific connections can be configured." - }, - { - "ResourceType": "Microsoft.Network/natGateways", - "Path": "samples/natgateways/main.tf", - "Description": "A basic example of deploying Azure NAT Gateway." - }, - { - "ResourceType": "Microsoft.Network/networkInterfaces", - "Path": "samples/networkinterfaces/main.tf", - "Description": "A basic example of deploying Network Interface." - }, - { - "ResourceType": "Microsoft.Network/networkManagerConnections", - "Path": "samples/networkmanagerconnections/main.tf", - "Description": "A basic example of deploying Network Manager Management Group Connection." - }, - { - "ResourceType": "Microsoft.Network/networkManagers", - "Path": "samples/networkmanagers/main.tf", - "Description": "A basic example of deploying Network Manager." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/connectivityConfigurations", - "Path": "samples/networkmanagers/connectivityconfigurations/main.tf", - "Description": "A basic example of deploying Network Manager Connectivity Configuration." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/ipamPools", - "Path": "samples/networkmanagers/ipampools/main.tf", - "Description": "A basic example of deploying Network Managers IPAM Pools." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/ipamPools/staticCidr", - "Path": "samples/networkmanagers/ipampools/staticcidr/main.tf", - "Description": "A basic example of deploying Network Managers IPAM Pools Static CIDR." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/networkGroups", - "Path": "samples/networkmanagers/networkgroups/main.tf", - "Description": "A basic example of deploying Network Manager Network Group." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/networkGroups/staticMembers", - "Path": "samples/networkmanagers/networkgroups/staticmembers/main.tf", - "Description": "A basic example of deploying Network Manager Static Member." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/routingConfigurations/ruleCollections/rules", - "Path": "samples/networkmanagers/routingconfigurations/rulecollections/rules/main.tf", - "Description": "A basic example of deploying Network Manager Routing Rule." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/scopeConnections", - "Path": "samples/networkmanagers/scopeconnections/main.tf", - "Description": "A basic example of deploying Network Manager Scope Connection." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations", - "Path": "samples/networkmanagers/securityadminconfigurations/main.tf", - "Description": "A basic example of deploying Network Manager Security Admin Configuration." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections", - "Path": "samples/networkmanagers/securityadminconfigurations/rulecollections/main.tf", - "Description": "A basic example of deploying Network Manager Admin Rule Collection." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules", - "Path": "samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.tf", - "Description": "A basic example of deploying Network Manager Admin Rule." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace", - "Path": "samples/networkmanagers/verifierworkspace/main.tf", - "Description": "A basic example of deploying Network Managers Verifier Workspace." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace/reachabilityAnalysisIntent", - "Path": "samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.tf", - "Description": "A basic example of deploying Network Managers Verifier Workspace Reachability Analysis Intent." - }, - { - "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace/reachabilityAnalysisIntent/reachabilityAnalysisRun", - "Path": "samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.tf", - "Description": "A basic example of deploying Network Managers Verifier Workspace Reachability Analysis Run." - }, - { - "ResourceType": "Microsoft.Network/networkProfiles", - "Path": "samples/networkprofiles/main.tf", - "Description": "A basic example of deploying Network Profile." - }, - { - "ResourceType": "Microsoft.Network/networkSecurityGroups", - "Path": "samples/networksecuritygroups/main.tf", - "Description": "A basic example of deploying network security group that contains a list of network security rules. Network security groups enable inbound or outbound traffic to be enabled or denied." - }, - { - "ResourceType": "Microsoft.Network/networkSecurityGroups/securityRules", - "Path": "samples/networksecuritygroups/securityrules/main.tf", - "Description": "A basic example of deploying Network Security Rule." - }, - { - "ResourceType": "Microsoft.Network/networkWatchers/flowLogs", - "Path": "samples/networkwatchers/flowlogs/main.tf", - "Description": "A basic example of deploying Network Watcher Flow Log." - }, - { - "ResourceType": "Microsoft.Network/networkWatchers/packetCaptures", - "Path": "samples/networkwatchers/packetcaptures/main.tf", - "Description": "A basic example of deploying Configures Packet Capturing against a Virtual Machine using a Network Watcher." - }, - { - "ResourceType": "Microsoft.Network/p2svpnGateways", - "Path": "samples/p2svpngateways/main.tf", - "Description": "A basic example of deploying Point-to-Site VPN Gateway." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones", - "Path": "samples/privatednszones/main.tf", - "Description": "A basic example of deploying Private DNS Zone." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones/A", - "Path": "samples/privatednszones/a/main.tf", - "Description": "A basic example of deploying Private DNS A Record." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones/AAAA", - "Path": "samples/privatednszones/aaaa/main.tf", - "Description": "A basic example of deploying Private DNS AAAA Record." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones/CNAME", - "Path": "samples/privatednszones/cname/main.tf", - "Description": "A basic example of deploying Private DNS CNAME Record." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones/MX", - "Path": "samples/privatednszones/mx/main.tf", - "Description": "A basic example of deploying Private DNS Zones MX." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones/PTR", - "Path": "samples/privatednszones/ptr/main.tf", - "Description": "A basic example of deploying Private DNS PTR Record." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones/SRV", - "Path": "samples/privatednszones/srv/main.tf", - "Description": "A basic example of deploying Private DNS SRV Record." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones/TXT", - "Path": "samples/privatednszones/txt/main.tf", - "Description": "A basic example of deploying Private DNS TXT Record." - }, - { - "ResourceType": "Microsoft.Network/privateDnsZones/virtualNetworkLinks", - "Path": "samples/privatednszones/virtualnetworklinks/main.tf", - "Description": "A basic example of deploying Private DNS Zone Virtual Network Link." - }, - { - "ResourceType": "Microsoft.Network/privateEndpoints", - "Path": "samples/privateendpoints/main.tf", - "Description": "A basic example of deploying Private Endpoint." - }, - { - "ResourceType": "Microsoft.Network/privateLinkServices", - "Path": "samples/privatelinkservices/main.tf", - "Description": "A basic example of deploying Private Link Service." - }, - { - "ResourceType": "Microsoft.Network/publicIPAddresses", - "Path": "samples/publicipaddresses/main.tf", - "Description": "A basic example of deploying Public IP Address." - }, - { - "ResourceType": "Microsoft.Network/publicIPPrefixes", - "Path": "samples/publicipprefixes/main.tf", - "Description": "A basic example of deploying Public IP Prefix." - }, - { - "ResourceType": "Microsoft.Network/routeFilters", - "Path": "samples/routefilters/main.tf", - "Description": "A basic example of deploying Route Filter." - }, - { - "ResourceType": "Microsoft.Network/routeTables", - "Path": "samples/routetables/main.tf", - "Description": "A basic example of deploying Route Table." - }, - { - "ResourceType": "Microsoft.Network/routeTables/routes", - "Path": "samples/routetables/routes/main.tf", - "Description": "A basic example of deploying Route within a Route Table." - }, - { - "ResourceType": "Microsoft.Network/securityPartnerProviders", - "Path": "samples/securitypartnerproviders/main.tf", - "Description": "A basic example of deploying Security Partner Provider which could be associated to virtual hub." - }, - { - "ResourceType": "Microsoft.Network/serviceEndpointPolicies", - "Path": "samples/serviceendpointpolicies/main.tf", - "Description": "A basic example of deploying Subnet Service Endpoint Storage Policy." - }, - { - "ResourceType": "Microsoft.Network/trafficManagerProfiles", - "Path": "samples/trafficmanagerprofiles/main.tf", - "Description": "A basic example of deploying Traffic Manager Profile." - }, - { - "ResourceType": "Microsoft.Network/trafficManagerProfiles/AzureEndpoints", - "Path": "samples/trafficmanagerprofiles/azureendpoints/main.tf", - "Description": "A basic example of deploying Azure Endpoint within a Traffic Manager Profile." - }, - { - "ResourceType": "Microsoft.Network/trafficManagerProfiles/ExternalEndpoints", - "Path": "samples/trafficmanagerprofiles/externalendpoints/main.tf", - "Description": "A basic example of deploying External Endpoint within a Traffic Manager Profile." - }, - { - "ResourceType": "Microsoft.Network/trafficManagerProfiles/NestedEndpoints", - "Path": "samples/trafficmanagerprofiles/nestedendpoints/main.tf", - "Description": "A basic example of deploying Nested Endpoint within a Traffic Manager Profile." - }, - { - "ResourceType": "Microsoft.Network/virtualHubs", - "Path": "samples/virtualhubs/main.tf", - "Description": "A basic example of deploying Virtual Hub within a Virtual WAN." - }, - { - "ResourceType": "Microsoft.Network/virtualHubs/hubVirtualNetworkConnections", - "Path": "samples/virtualhubs/hubvirtualnetworkconnections/main.tf", - "Description": "A basic example of deploying Connection for a Virtual Hub." - }, - { - "ResourceType": "Microsoft.Network/virtualHubs/ipConfigurations", - "Path": "samples/virtualhubs/ipconfigurations/main.tf", - "Description": "A basic example of deploying Virtual Hub IP. This resource is also known as a Route Server." - }, - { - "ResourceType": "Microsoft.Network/virtualHubs/routingIntent", - "Path": "samples/virtualhubs/routingintent/main.tf", - "Description": "A basic example of deploying Virtual Hub Routing Intent." - }, - { - "ResourceType": "Microsoft.Network/virtualNetworkGateways", - "Path": "samples/virtualnetworkgateways/main.tf", - "Description": "A basic example of deploying virtual network gateway to establish secure, cross-premises connectivity." - }, - { - "ResourceType": "Microsoft.Network/virtualNetworkGateways/natRules", - "Path": "samples/virtualnetworkgateways/natrules/main.tf", - "Description": "A basic example of deploying Virtual Network Gateway Nat Rule." - }, - { - "ResourceType": "Microsoft.Network/virtualNetworks", - "Path": "samples/virtualnetworks/main.tf", - "Description": "A basic example of deploying virtual network including any configured subnets." - }, - { - "ResourceType": "Microsoft.Network/virtualNetworks", - "Path": "samples/virtualnetworks/withipampool/main.tf", - "Description": "A withipampool example of deploying virtual network including any configured subnets." - }, - { - "ResourceType": "Microsoft.Network/virtualNetworks/subnets", - "Path": "samples/virtualnetworks/subnets/main.tf", - "Description": "A basic example of deploying subnet which represent network segments within the IP space defined by the virtual network." - }, - { - "ResourceType": "Microsoft.Network/virtualNetworks/subnets", - "Path": "samples/virtualnetworks/subnets/withipampool/main.tf", - "Description": "A withipampool example of deploying subnet which represent network segments within the IP space defined by the virtual network." - }, - { - "ResourceType": "Microsoft.Network/virtualNetworks/virtualNetworkPeerings", - "Path": "samples/virtualnetworks/virtualnetworkpeerings/main.tf", - "Description": "A basic example of deploying virtual network peering which allows resources to access other." - }, - { - "ResourceType": "Microsoft.Network/virtualWans", - "Path": "samples/virtualwans/main.tf", - "Description": "A basic example of deploying Virtual WAN." - }, - { - "ResourceType": "Microsoft.Network/vpnGateways", - "Path": "samples/vpngateways/main.tf", - "Description": "A basic example of deploying VPN Gateway within a Virtual Hub." - }, - { - "ResourceType": "Microsoft.Network/vpnGateways/natRules", - "Path": "samples/vpngateways/natrules/main.tf", - "Description": "A basic example of deploying VPN Gateway NAT Rule." - }, - { - "ResourceType": "Microsoft.Network/vpnGateways/vpnConnections", - "Path": "samples/vpngateways/vpnconnections/main.tf", - "Description": "A basic example of deploying VPN Gateway Connection." - }, - { - "ResourceType": "Microsoft.Network/vpnServerConfigurations", - "Path": "samples/vpnserverconfigurations/main.tf", - "Description": "A basic example of deploying VPN Server Configuration." - }, - { - "ResourceType": "Microsoft.Network/vpnServerConfigurations/configurationPolicyGroups", - "Path": "samples/vpnserverconfigurations/configurationpolicygroups/main.tf", - "Description": "A basic example of deploying VPN Server Configuration Policy Group." - }, - { - "ResourceType": "Microsoft.Network/vpnSites", - "Path": "samples/vpnsites/main.tf", - "Description": "A basic example of deploying VPN Site." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "For guidance on creating network security groups, see [Create virtual network resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-virtual-networks#network-security-groups).", + "ResourceTypes": [ + "microsoft.network/networksecuritygroups", + "microsoft.network/networksecuritygroups/securityrules" + ] + }, + { + "Description": "For guidance on creating private endpoints, see [Create virtual network resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-virtual-networks#private-endpoints).", + "ResourceTypes": [ + "microsoft.network/privateendpoints" + ] + }, + { + "Description": "For guidance on creating virtual networks and subnets, see [Create virtual network resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-virtual-networks).", + "ResourceTypes": [ + "microsoft.network/virtualnetworks", + "microsoft.network/virtualnetworks/subnets" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies", + "Path": "samples/applicationgatewaywebapplicationfirewallpolicies/main.tf", + "Description": "A basic example of deploying Azure Web Application Firewall Policy instance." + }, + { + "ResourceType": "Microsoft.Network/ExpressRoutePorts", + "Path": "samples/expressrouteports/main.tf", + "Description": "A basic example of deploying Express Route Port." + }, + { + "ResourceType": "Microsoft.Network/FrontDoorWebApplicationFirewallPolicies", + "Path": "samples/frontdoorwebapplicationfirewallpolicies/main.tf", + "Description": "A basic example of deploying Front Door Firewall Policy instance." + }, + { + "ResourceType": "Microsoft.Network/applicationGateways", + "Path": "samples/applicationgateways/main.tf", + "Description": "A basic example of deploying Application Gateway." + }, + { + "ResourceType": "Microsoft.Network/applicationSecurityGroups", + "Path": "samples/applicationsecuritygroups/main.tf", + "Description": "A basic example of deploying Application Security Group." + }, + { + "ResourceType": "Microsoft.Network/azureFirewalls", + "Path": "samples/azurefirewalls/main.tf", + "Description": "A basic example of deploying Azure Firewall." + }, + { + "ResourceType": "Microsoft.Network/bastionHosts", + "Path": "samples/bastionhosts/main.tf", + "Description": "A basic example of deploying Bastion Host." + }, + { + "ResourceType": "Microsoft.Network/ddosProtectionPlans", + "Path": "samples/ddosprotectionplans/main.tf", + "Description": "A basic example of deploying Azure Network DDoS Protection Plan." + }, + { + "ResourceType": "Microsoft.Network/dnsForwardingRulesets", + "Path": "samples/dnsforwardingrulesets/main.tf", + "Description": "A basic example of deploying Private DNS Resolver Dns Forwarding Ruleset." + }, + { + "ResourceType": "Microsoft.Network/dnsForwardingRulesets/forwardingRules", + "Path": "samples/dnsforwardingrulesets/forwardingrules/main.tf", + "Description": "A basic example of deploying Private DNS Resolver Forwarding Rule." + }, + { + "ResourceType": "Microsoft.Network/dnsForwardingRulesets/virtualNetworkLinks", + "Path": "samples/dnsforwardingrulesets/virtualnetworklinks/main.tf", + "Description": "A basic example of deploying Private DNS Resolver Virtual Network Link." + }, + { + "ResourceType": "Microsoft.Network/dnsResolvers", + "Path": "samples/dnsresolvers/main.tf", + "Description": "A basic example of deploying Private DNS Resolver." + }, + { + "ResourceType": "Microsoft.Network/dnsResolvers/inboundEndpoints", + "Path": "samples/dnsresolvers/inboundendpoints/main.tf", + "Description": "A basic example of deploying Private DNS Resolver Inbound Endpoint." + }, + { + "ResourceType": "Microsoft.Network/dnsResolvers/outboundEndpoints", + "Path": "samples/dnsresolvers/outboundendpoints/main.tf", + "Description": "A basic example of deploying Private DNS Resolver Outbound Endpoint." + }, + { + "ResourceType": "Microsoft.Network/dnsZones", + "Path": "samples/dnszones/main.tf", + "Description": "A basic example of deploying DNS Zone." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/A", + "Path": "samples/dnszones/a/main.tf", + "Description": "A basic example of deploying DNS A Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/AAAA", + "Path": "samples/dnszones/aaaa/main.tf", + "Description": "A basic example of deploying DNS AAAA Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/CAA", + "Path": "samples/dnszones/caa/main.tf", + "Description": "A basic example of deploying DNS CAA Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/CNAME", + "Path": "samples/dnszones/cname/main.tf", + "Description": "A basic example of deploying DNS CNAME Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/MX", + "Path": "samples/dnszones/mx/main.tf", + "Description": "A basic example of deploying DNS MX Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/NS", + "Path": "samples/dnszones/ns/main.tf", + "Description": "A basic example of deploying DNS NS Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/PTR", + "Path": "samples/dnszones/ptr/main.tf", + "Description": "A basic example of deploying DNS PTR Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/SRV", + "Path": "samples/dnszones/srv/main.tf", + "Description": "A basic example of deploying DNS SRV Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/TXT", + "Path": "samples/dnszones/txt/main.tf", + "Description": "A basic example of deploying DNS TXT Record." + }, + { + "ResourceType": "Microsoft.Network/expressRouteCircuits", + "Path": "samples/expressroutecircuits/main.tf", + "Description": "A basic example of deploying ExpressRoute circuit." + }, + { + "ResourceType": "Microsoft.Network/expressRouteCircuits/authorizations", + "Path": "samples/expressroutecircuits/authorizations/main.tf", + "Description": "A basic example of deploying ExpressRoute Circuit Authorization." + }, + { + "ResourceType": "Microsoft.Network/expressRouteCircuits/peerings", + "Path": "samples/expressroutecircuits/peerings/main.tf", + "Description": "A basic example of deploying ExpressRoute Circuit Peering." + }, + { + "ResourceType": "Microsoft.Network/expressRouteCircuits/peerings/connections", + "Path": "samples/expressroutecircuits/peerings/connections/main.tf", + "Description": "A basic example of deploying Express Route Circuit Connection." + }, + { + "ResourceType": "Microsoft.Network/expressRouteGateways", + "Path": "samples/expressroutegateways/main.tf", + "Description": "A basic example of deploying ExpressRoute gateway." + }, + { + "ResourceType": "Microsoft.Network/expressRouteGateways/expressRouteConnections", + "Path": "samples/expressroutegateways/expressrouteconnections/main.tf", + "Description": "A basic example of deploying Express Route Connection." + }, + { + "ResourceType": "Microsoft.Network/expressRoutePorts/authorizations", + "Path": "samples/expressrouteports/authorizations/main.tf", + "Description": "A basic example of deploying ExpressRoute Port Authorization." + }, + { + "ResourceType": "Microsoft.Network/firewallPolicies", + "Path": "samples/firewallpolicies/main.tf", + "Description": "A basic example of deploying Firewall Policy." + }, + { + "ResourceType": "Microsoft.Network/firewallPolicies/ruleCollectionGroups", + "Path": "samples/firewallpolicies/rulecollectiongroups/main.tf", + "Description": "A basic example of deploying Firewall Policy Rule Collection Group." + }, + { + "ResourceType": "Microsoft.Network/frontDoors/rulesEngines", + "Path": "samples/frontdoors/rulesengines/main.tf", + "Description": "A basic example of deploying Azure Front Door (classic) Rules Engine configuration and rules." + }, + { + "ResourceType": "Microsoft.Network/ipGroups", + "Path": "samples/ipgroups/main.tf", + "Description": "A basic example of deploying IP group which contains a list of CIDRs and/or IP addresses." + }, + { + "ResourceType": "Microsoft.Network/loadBalancers", + "Path": "samples/loadbalancers/main.tf", + "Description": "A basic example of deploying Load Balancer Resource." + }, + { + "ResourceType": "Microsoft.Network/loadBalancers/backendAddressPools", + "Path": "samples/loadbalancers/backendaddresspools/main.tf", + "Description": "A basic example of deploying Load Balancer Backend Address Pool." + }, + { + "ResourceType": "Microsoft.Network/localNetworkGateways", + "Path": "samples/localnetworkgateways/main.tf", + "Description": "A basic example of deploying local network gateway connection over which specific connections can be configured." + }, + { + "ResourceType": "Microsoft.Network/natGateways", + "Path": "samples/natgateways/main.tf", + "Description": "A basic example of deploying Azure NAT Gateway." + }, + { + "ResourceType": "Microsoft.Network/networkInterfaces", + "Path": "samples/networkinterfaces/main.tf", + "Description": "A basic example of deploying Network Interface." + }, + { + "ResourceType": "Microsoft.Network/networkManagerConnections", + "Path": "samples/networkmanagerconnections/main.tf", + "Description": "A basic example of deploying Network Manager Management Group Connection." + }, + { + "ResourceType": "Microsoft.Network/networkManagers", + "Path": "samples/networkmanagers/main.tf", + "Description": "A basic example of deploying Network Manager." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/connectivityConfigurations", + "Path": "samples/networkmanagers/connectivityconfigurations/main.tf", + "Description": "A basic example of deploying Network Manager Connectivity Configuration." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/ipamPools", + "Path": "samples/networkmanagers/ipampools/main.tf", + "Description": "A basic example of deploying Network Managers IPAM Pools." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/ipamPools/staticCidr", + "Path": "samples/networkmanagers/ipampools/staticcidr/main.tf", + "Description": "A basic example of deploying Network Managers IPAM Pools Static CIDR." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/networkGroups", + "Path": "samples/networkmanagers/networkgroups/main.tf", + "Description": "A basic example of deploying Network Manager Network Group." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/networkGroups/staticMembers", + "Path": "samples/networkmanagers/networkgroups/staticmembers/main.tf", + "Description": "A basic example of deploying Network Manager Static Member." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/routingConfigurations/ruleCollections/rules", + "Path": "samples/networkmanagers/routingconfigurations/rulecollections/rules/main.tf", + "Description": "A basic example of deploying Network Manager Routing Rule." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/scopeConnections", + "Path": "samples/networkmanagers/scopeconnections/main.tf", + "Description": "A basic example of deploying Network Manager Scope Connection." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations", + "Path": "samples/networkmanagers/securityadminconfigurations/main.tf", + "Description": "A basic example of deploying Network Manager Security Admin Configuration." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections", + "Path": "samples/networkmanagers/securityadminconfigurations/rulecollections/main.tf", + "Description": "A basic example of deploying Network Manager Admin Rule Collection." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules", + "Path": "samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.tf", + "Description": "A basic example of deploying Network Manager Admin Rule." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace", + "Path": "samples/networkmanagers/verifierworkspace/main.tf", + "Description": "A basic example of deploying Network Managers Verifier Workspace." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace/reachabilityAnalysisIntent", + "Path": "samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.tf", + "Description": "A basic example of deploying Network Managers Verifier Workspace Reachability Analysis Intent." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace/reachabilityAnalysisIntent/reachabilityAnalysisRun", + "Path": "samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.tf", + "Description": "A basic example of deploying Network Managers Verifier Workspace Reachability Analysis Run." + }, + { + "ResourceType": "Microsoft.Network/networkProfiles", + "Path": "samples/networkprofiles/main.tf", + "Description": "A basic example of deploying Network Profile." + }, + { + "ResourceType": "Microsoft.Network/networkSecurityGroups", + "Path": "samples/networksecuritygroups/main.tf", + "Description": "A basic example of deploying network security group that contains a list of network security rules. Network security groups enable inbound or outbound traffic to be enabled or denied." + }, + { + "ResourceType": "Microsoft.Network/networkSecurityGroups/securityRules", + "Path": "samples/networksecuritygroups/securityrules/main.tf", + "Description": "A basic example of deploying Network Security Rule." + }, + { + "ResourceType": "Microsoft.Network/networkWatchers/flowLogs", + "Path": "samples/networkwatchers/flowlogs/main.tf", + "Description": "A basic example of deploying Network Watcher Flow Log." + }, + { + "ResourceType": "Microsoft.Network/networkWatchers/packetCaptures", + "Path": "samples/networkwatchers/packetcaptures/main.tf", + "Description": "A basic example of deploying Configures Packet Capturing against a Virtual Machine using a Network Watcher." + }, + { + "ResourceType": "Microsoft.Network/p2svpnGateways", + "Path": "samples/p2svpngateways/main.tf", + "Description": "A basic example of deploying Point-to-Site VPN Gateway." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones", + "Path": "samples/privatednszones/main.tf", + "Description": "A basic example of deploying Private DNS Zone." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/A", + "Path": "samples/privatednszones/a/main.tf", + "Description": "A basic example of deploying Private DNS A Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/AAAA", + "Path": "samples/privatednszones/aaaa/main.tf", + "Description": "A basic example of deploying Private DNS AAAA Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/CNAME", + "Path": "samples/privatednszones/cname/main.tf", + "Description": "A basic example of deploying Private DNS CNAME Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/MX", + "Path": "samples/privatednszones/mx/main.tf", + "Description": "A basic example of deploying Private DNS Zones MX." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/PTR", + "Path": "samples/privatednszones/ptr/main.tf", + "Description": "A basic example of deploying Private DNS PTR Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/SRV", + "Path": "samples/privatednszones/srv/main.tf", + "Description": "A basic example of deploying Private DNS SRV Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/TXT", + "Path": "samples/privatednszones/txt/main.tf", + "Description": "A basic example of deploying Private DNS TXT Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/virtualNetworkLinks", + "Path": "samples/privatednszones/virtualnetworklinks/main.tf", + "Description": "A basic example of deploying Private DNS Zone Virtual Network Link." + }, + { + "ResourceType": "Microsoft.Network/privateEndpoints", + "Path": "samples/privateendpoints/main.tf", + "Description": "A basic example of deploying Private Endpoint." + }, + { + "ResourceType": "Microsoft.Network/privateLinkServices", + "Path": "samples/privatelinkservices/main.tf", + "Description": "A basic example of deploying Private Link Service." + }, + { + "ResourceType": "Microsoft.Network/publicIPAddresses", + "Path": "samples/publicipaddresses/main.tf", + "Description": "A basic example of deploying Public IP Address." + }, + { + "ResourceType": "Microsoft.Network/publicIPPrefixes", + "Path": "samples/publicipprefixes/main.tf", + "Description": "A basic example of deploying Public IP Prefix." + }, + { + "ResourceType": "Microsoft.Network/routeFilters", + "Path": "samples/routefilters/main.tf", + "Description": "A basic example of deploying Route Filter." + }, + { + "ResourceType": "Microsoft.Network/routeTables", + "Path": "samples/routetables/main.tf", + "Description": "A basic example of deploying Route Table." + }, + { + "ResourceType": "Microsoft.Network/routeTables/routes", + "Path": "samples/routetables/routes/main.tf", + "Description": "A basic example of deploying Route within a Route Table." + }, + { + "ResourceType": "Microsoft.Network/securityPartnerProviders", + "Path": "samples/securitypartnerproviders/main.tf", + "Description": "A basic example of deploying Security Partner Provider which could be associated to virtual hub." + }, + { + "ResourceType": "Microsoft.Network/serviceEndpointPolicies", + "Path": "samples/serviceendpointpolicies/main.tf", + "Description": "A basic example of deploying Subnet Service Endpoint Storage Policy." + }, + { + "ResourceType": "Microsoft.Network/trafficManagerProfiles", + "Path": "samples/trafficmanagerprofiles/main.tf", + "Description": "A basic example of deploying Traffic Manager Profile." + }, + { + "ResourceType": "Microsoft.Network/trafficManagerProfiles/AzureEndpoints", + "Path": "samples/trafficmanagerprofiles/azureendpoints/main.tf", + "Description": "A basic example of deploying Azure Endpoint within a Traffic Manager Profile." + }, + { + "ResourceType": "Microsoft.Network/trafficManagerProfiles/ExternalEndpoints", + "Path": "samples/trafficmanagerprofiles/externalendpoints/main.tf", + "Description": "A basic example of deploying External Endpoint within a Traffic Manager Profile." + }, + { + "ResourceType": "Microsoft.Network/trafficManagerProfiles/NestedEndpoints", + "Path": "samples/trafficmanagerprofiles/nestedendpoints/main.tf", + "Description": "A basic example of deploying Nested Endpoint within a Traffic Manager Profile." + }, + { + "ResourceType": "Microsoft.Network/virtualHubs", + "Path": "samples/virtualhubs/main.tf", + "Description": "A basic example of deploying Virtual Hub within a Virtual WAN." + }, + { + "ResourceType": "Microsoft.Network/virtualHubs/hubVirtualNetworkConnections", + "Path": "samples/virtualhubs/hubvirtualnetworkconnections/main.tf", + "Description": "A basic example of deploying Connection for a Virtual Hub." + }, + { + "ResourceType": "Microsoft.Network/virtualHubs/ipConfigurations", + "Path": "samples/virtualhubs/ipconfigurations/main.tf", + "Description": "A basic example of deploying Virtual Hub IP. This resource is also known as a Route Server." + }, + { + "ResourceType": "Microsoft.Network/virtualHubs/routingIntent", + "Path": "samples/virtualhubs/routingintent/main.tf", + "Description": "A basic example of deploying Virtual Hub Routing Intent." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworkGateways", + "Path": "samples/virtualnetworkgateways/main.tf", + "Description": "A basic example of deploying virtual network gateway to establish secure, cross-premises connectivity." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworkGateways/natRules", + "Path": "samples/virtualnetworkgateways/natrules/main.tf", + "Description": "A basic example of deploying Virtual Network Gateway Nat Rule." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks", + "Path": "samples/virtualnetworks/main.tf", + "Description": "A basic example of deploying virtual network including any configured subnets." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks", + "Path": "samples/virtualnetworks/withipampool/main.tf", + "Description": "A withipampool example of deploying virtual network including any configured subnets." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks/subnets", + "Path": "samples/virtualnetworks/subnets/main.tf", + "Description": "A basic example of deploying subnet which represent network segments within the IP space defined by the virtual network." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks/subnets", + "Path": "samples/virtualnetworks/subnets/withipampool/main.tf", + "Description": "A withipampool example of deploying subnet which represent network segments within the IP space defined by the virtual network." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks/virtualNetworkPeerings", + "Path": "samples/virtualnetworks/virtualnetworkpeerings/main.tf", + "Description": "A basic example of deploying virtual network peering which allows resources to access other." + }, + { + "ResourceType": "Microsoft.Network/virtualWans", + "Path": "samples/virtualwans/main.tf", + "Description": "A basic example of deploying Virtual WAN." + }, + { + "ResourceType": "Microsoft.Network/vpnGateways", + "Path": "samples/vpngateways/main.tf", + "Description": "A basic example of deploying VPN Gateway within a Virtual Hub." + }, + { + "ResourceType": "Microsoft.Network/vpnGateways/natRules", + "Path": "samples/vpngateways/natrules/main.tf", + "Description": "A basic example of deploying VPN Gateway NAT Rule." + }, + { + "ResourceType": "Microsoft.Network/vpnGateways/vpnConnections", + "Path": "samples/vpngateways/vpnconnections/main.tf", + "Description": "A basic example of deploying VPN Gateway Connection." + }, + { + "ResourceType": "Microsoft.Network/vpnServerConfigurations", + "Path": "samples/vpnserverconfigurations/main.tf", + "Description": "A basic example of deploying VPN Server Configuration." + }, + { + "ResourceType": "Microsoft.Network/vpnServerConfigurations/configurationPolicyGroups", + "Path": "samples/vpnserverconfigurations/configurationpolicygroups/main.tf", + "Description": "A basic example of deploying VPN Server Configuration Policy Group." + }, + { + "ResourceType": "Microsoft.Network/vpnSites", + "Path": "samples/vpnsites/main.tf", + "Description": "A basic example of deploying VPN Site." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies", + "Path": "samples/applicationgatewaywebapplicationfirewallpolicies/main.bicep", + "Description": "A basic example of deploying Azure Web Application Firewall Policy instance." + }, + { + "ResourceType": "Microsoft.Network/ExpressRoutePorts", + "Path": "samples/expressrouteports/main.bicep", + "Description": "A basic example of deploying Express Route Port." + }, + { + "ResourceType": "Microsoft.Network/FrontDoorWebApplicationFirewallPolicies", + "Path": "samples/frontdoorwebapplicationfirewallpolicies/main.bicep", + "Description": "A basic example of deploying Front Door Firewall Policy instance." + }, + { + "ResourceType": "Microsoft.Network/applicationGateways", + "Path": "samples/applicationgateways/main.bicep", + "Description": "A basic example of deploying Application Gateway." + }, + { + "ResourceType": "Microsoft.Network/applicationSecurityGroups", + "Path": "samples/applicationsecuritygroups/main.bicep", + "Description": "A basic example of deploying Application Security Group." + }, + { + "ResourceType": "Microsoft.Network/azureFirewalls", + "Path": "samples/azurefirewalls/main.bicep", + "Description": "A basic example of deploying Azure Firewall." + }, + { + "ResourceType": "Microsoft.Network/bastionHosts", + "Path": "samples/bastionhosts/main.bicep", + "Description": "A basic example of deploying Bastion Host." + }, + { + "ResourceType": "Microsoft.Network/ddosProtectionPlans", + "Path": "samples/ddosprotectionplans/main.bicep", + "Description": "A basic example of deploying Azure Network DDoS Protection Plan." + }, + { + "ResourceType": "Microsoft.Network/dnsForwardingRulesets", + "Path": "samples/dnsforwardingrulesets/main.bicep", + "Description": "A basic example of deploying Private DNS Resolver Dns Forwarding Ruleset." + }, + { + "ResourceType": "Microsoft.Network/dnsForwardingRulesets/forwardingRules", + "Path": "samples/dnsforwardingrulesets/forwardingrules/main.bicep", + "Description": "A basic example of deploying Private DNS Resolver Forwarding Rule." + }, + { + "ResourceType": "Microsoft.Network/dnsForwardingRulesets/virtualNetworkLinks", + "Path": "samples/dnsforwardingrulesets/virtualnetworklinks/main.bicep", + "Description": "A basic example of deploying Private DNS Resolver Virtual Network Link." + }, + { + "ResourceType": "Microsoft.Network/dnsResolvers", + "Path": "samples/dnsresolvers/main.bicep", + "Description": "A basic example of deploying Private DNS Resolver." + }, + { + "ResourceType": "Microsoft.Network/dnsResolvers/inboundEndpoints", + "Path": "samples/dnsresolvers/inboundendpoints/main.bicep", + "Description": "A basic example of deploying Private DNS Resolver Inbound Endpoint." + }, + { + "ResourceType": "Microsoft.Network/dnsResolvers/outboundEndpoints", + "Path": "samples/dnsresolvers/outboundendpoints/main.bicep", + "Description": "A basic example of deploying Private DNS Resolver Outbound Endpoint." + }, + { + "ResourceType": "Microsoft.Network/dnsZones", + "Path": "samples/dnszones/main.bicep", + "Description": "A basic example of deploying DNS Zone." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/A", + "Path": "samples/dnszones/a/main.bicep", + "Description": "A basic example of deploying DNS A Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/AAAA", + "Path": "samples/dnszones/aaaa/main.bicep", + "Description": "A basic example of deploying DNS AAAA Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/CAA", + "Path": "samples/dnszones/caa/main.bicep", + "Description": "A basic example of deploying DNS CAA Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/CNAME", + "Path": "samples/dnszones/cname/main.bicep", + "Description": "A basic example of deploying DNS CNAME Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/MX", + "Path": "samples/dnszones/mx/main.bicep", + "Description": "A basic example of deploying DNS MX Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/NS", + "Path": "samples/dnszones/ns/main.bicep", + "Description": "A basic example of deploying DNS NS Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/PTR", + "Path": "samples/dnszones/ptr/main.bicep", + "Description": "A basic example of deploying DNS PTR Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/SRV", + "Path": "samples/dnszones/srv/main.bicep", + "Description": "A basic example of deploying DNS SRV Record." + }, + { + "ResourceType": "Microsoft.Network/dnsZones/TXT", + "Path": "samples/dnszones/txt/main.bicep", + "Description": "A basic example of deploying DNS TXT Record." + }, + { + "ResourceType": "Microsoft.Network/expressRouteCircuits", + "Path": "samples/expressroutecircuits/main.bicep", + "Description": "A basic example of deploying ExpressRoute circuit." + }, + { + "ResourceType": "Microsoft.Network/expressRouteCircuits/authorizations", + "Path": "samples/expressroutecircuits/authorizations/main.bicep", + "Description": "A basic example of deploying ExpressRoute Circuit Authorization." + }, + { + "ResourceType": "Microsoft.Network/expressRouteCircuits/peerings", + "Path": "samples/expressroutecircuits/peerings/main.bicep", + "Description": "A basic example of deploying ExpressRoute Circuit Peering." + }, + { + "ResourceType": "Microsoft.Network/expressRouteCircuits/peerings/connections", + "Path": "samples/expressroutecircuits/peerings/connections/main.bicep", + "Description": "A basic example of deploying Express Route Circuit Connection." + }, + { + "ResourceType": "Microsoft.Network/expressRouteGateways", + "Path": "samples/expressroutegateways/main.bicep", + "Description": "A basic example of deploying ExpressRoute gateway." + }, + { + "ResourceType": "Microsoft.Network/expressRouteGateways/expressRouteConnections", + "Path": "samples/expressroutegateways/expressrouteconnections/main.bicep", + "Description": "A basic example of deploying Express Route Connection." + }, + { + "ResourceType": "Microsoft.Network/expressRoutePorts/authorizations", + "Path": "samples/expressrouteports/authorizations/main.bicep", + "Description": "A basic example of deploying ExpressRoute Port Authorization." + }, + { + "ResourceType": "Microsoft.Network/firewallPolicies", + "Path": "samples/firewallpolicies/main.bicep", + "Description": "A basic example of deploying Firewall Policy." + }, + { + "ResourceType": "Microsoft.Network/firewallPolicies/ruleCollectionGroups", + "Path": "samples/firewallpolicies/rulecollectiongroups/main.bicep", + "Description": "A basic example of deploying Firewall Policy Rule Collection Group." + }, + { + "ResourceType": "Microsoft.Network/ipGroups", + "Path": "samples/ipgroups/main.bicep", + "Description": "A basic example of deploying IP group which contains a list of CIDRs and/or IP addresses." + }, + { + "ResourceType": "Microsoft.Network/loadBalancers", + "Path": "samples/loadbalancers/main.bicep", + "Description": "A basic example of deploying Load Balancer Resource." + }, + { + "ResourceType": "Microsoft.Network/loadBalancers/backendAddressPools", + "Path": "samples/loadbalancers/backendaddresspools/main.bicep", + "Description": "A basic example of deploying Load Balancer Backend Address Pool." + }, + { + "ResourceType": "Microsoft.Network/localNetworkGateways", + "Path": "samples/localnetworkgateways/main.bicep", + "Description": "A basic example of deploying local network gateway connection over which specific connections can be configured." + }, + { + "ResourceType": "Microsoft.Network/natGateways", + "Path": "samples/natgateways/main.bicep", + "Description": "A basic example of deploying Azure NAT Gateway." + }, + { + "ResourceType": "Microsoft.Network/networkInterfaces", + "Path": "samples/networkinterfaces/main.bicep", + "Description": "A basic example of deploying Network Interface." + }, + { + "ResourceType": "Microsoft.Network/networkManagers", + "Path": "samples/networkmanagers/main.bicep", + "Description": "A basic example of deploying Network Manager." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/connectivityConfigurations", + "Path": "samples/networkmanagers/connectivityconfigurations/main.bicep", + "Description": "A basic example of deploying Network Manager Connectivity Configuration." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/ipamPools", + "Path": "samples/networkmanagers/ipampools/main.bicep", + "Description": "A basic example of deploying Network Managers IPAM Pools." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/ipamPools/staticCidr", + "Path": "samples/networkmanagers/ipampools/staticcidr/main.bicep", + "Description": "A basic example of deploying Network Managers IPAM Pools Static CIDR." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/networkGroups", + "Path": "samples/networkmanagers/networkgroups/main.bicep", + "Description": "A basic example of deploying Network Manager Network Group." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/networkGroups/staticMembers", + "Path": "samples/networkmanagers/networkgroups/staticmembers/main.bicep", + "Description": "A basic example of deploying Network Manager Static Member." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/scopeConnections", + "Path": "samples/networkmanagers/scopeconnections/main.bicep", + "Description": "A basic example of deploying Network Manager Scope Connection." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations", + "Path": "samples/networkmanagers/securityadminconfigurations/main.bicep", + "Description": "A basic example of deploying Network Manager Security Admin Configuration." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections", + "Path": "samples/networkmanagers/securityadminconfigurations/rulecollections/main.bicep", + "Description": "A basic example of deploying Network Manager Admin Rule Collection." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules", + "Path": "samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.bicep", + "Description": "A basic example of deploying Network Manager Admin Rule." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace", + "Path": "samples/networkmanagers/verifierworkspace/main.bicep", + "Description": "A basic example of deploying Network Managers Verifier Workspace." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace/reachabilityAnalysisIntent", + "Path": "samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.bicep", + "Description": "A basic example of deploying Network Managers Verifier Workspace Reachability Analysis Intent." + }, + { + "ResourceType": "Microsoft.Network/networkManagers/verifierWorkspace/reachabilityAnalysisIntent/reachabilityAnalysisRun", + "Path": "samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.bicep", + "Description": "A basic example of deploying Network Managers Verifier Workspace Reachability Analysis Run." + }, + { + "ResourceType": "Microsoft.Network/networkProfiles", + "Path": "samples/networkprofiles/main.bicep", + "Description": "A basic example of deploying Network Profile." + }, + { + "ResourceType": "Microsoft.Network/networkSecurityGroups", + "Path": "samples/networksecuritygroups/main.bicep", + "Description": "A basic example of deploying network security group that contains a list of network security rules. Network security groups enable inbound or outbound traffic to be enabled or denied." + }, + { + "ResourceType": "Microsoft.Network/networkSecurityGroups/securityRules", + "Path": "samples/networksecuritygroups/securityrules/main.bicep", + "Description": "A basic example of deploying Network Security Rule." + }, + { + "ResourceType": "Microsoft.Network/networkWatchers/flowLogs", + "Path": "samples/networkwatchers/flowlogs/main.bicep", + "Description": "A basic example of deploying Network Watcher Flow Log." + }, + { + "ResourceType": "Microsoft.Network/networkWatchers/packetCaptures", + "Path": "samples/networkwatchers/packetcaptures/main.bicep", + "Description": "A basic example of deploying Configures Packet Capturing against a Virtual Machine using a Network Watcher." + }, + { + "ResourceType": "Microsoft.Network/p2svpnGateways", + "Path": "samples/p2svpngateways/main.bicep", + "Description": "A basic example of deploying Point-to-Site VPN Gateway." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones", + "Path": "samples/privatednszones/main.bicep", + "Description": "A basic example of deploying Private DNS Zone." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/A", + "Path": "samples/privatednszones/a/main.bicep", + "Description": "A basic example of deploying Private DNS A Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/AAAA", + "Path": "samples/privatednszones/aaaa/main.bicep", + "Description": "A basic example of deploying Private DNS AAAA Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/CNAME", + "Path": "samples/privatednszones/cname/main.bicep", + "Description": "A basic example of deploying Private DNS CNAME Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/MX", + "Path": "samples/privatednszones/mx/main.bicep", + "Description": "A basic example of deploying Private DNS Zones MX." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/PTR", + "Path": "samples/privatednszones/ptr/main.bicep", + "Description": "A basic example of deploying Private DNS PTR Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/SRV", + "Path": "samples/privatednszones/srv/main.bicep", + "Description": "A basic example of deploying Private DNS SRV Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/TXT", + "Path": "samples/privatednszones/txt/main.bicep", + "Description": "A basic example of deploying Private DNS TXT Record." + }, + { + "ResourceType": "Microsoft.Network/privateDnsZones/virtualNetworkLinks", + "Path": "samples/privatednszones/virtualnetworklinks/main.bicep", + "Description": "A basic example of deploying Private DNS Zone Virtual Network Link." + }, + { + "ResourceType": "Microsoft.Network/privateEndpoints", + "Path": "samples/privateendpoints/main.bicep", + "Description": "A basic example of deploying Private Endpoint." + }, + { + "ResourceType": "Microsoft.Network/privateLinkServices", + "Path": "samples/privatelinkservices/main.bicep", + "Description": "A basic example of deploying Private Link Service." + }, + { + "ResourceType": "Microsoft.Network/publicIPAddresses", + "Path": "samples/publicipaddresses/main.bicep", + "Description": "A basic example of deploying Public IP Address." + }, + { + "ResourceType": "Microsoft.Network/publicIPPrefixes", + "Path": "samples/publicipprefixes/main.bicep", + "Description": "A basic example of deploying Public IP Prefix." + }, + { + "ResourceType": "Microsoft.Network/routeFilters", + "Path": "samples/routefilters/main.bicep", + "Description": "A basic example of deploying Route Filter." + }, + { + "ResourceType": "Microsoft.Network/routeTables", + "Path": "samples/routetables/main.bicep", + "Description": "A basic example of deploying Route Table." + }, + { + "ResourceType": "Microsoft.Network/routeTables/routes", + "Path": "samples/routetables/routes/main.bicep", + "Description": "A basic example of deploying Route within a Route Table." + }, + { + "ResourceType": "Microsoft.Network/securityPartnerProviders", + "Path": "samples/securitypartnerproviders/main.bicep", + "Description": "A basic example of deploying Security Partner Provider which could be associated to virtual hub." + }, + { + "ResourceType": "Microsoft.Network/serviceEndpointPolicies", + "Path": "samples/serviceendpointpolicies/main.bicep", + "Description": "A basic example of deploying Subnet Service Endpoint Storage Policy." + }, + { + "ResourceType": "Microsoft.Network/trafficManagerProfiles", + "Path": "samples/trafficmanagerprofiles/main.bicep", + "Description": "A basic example of deploying Traffic Manager Profile." + }, + { + "ResourceType": "Microsoft.Network/trafficManagerProfiles/AzureEndpoints", + "Path": "samples/trafficmanagerprofiles/azureendpoints/main.bicep", + "Description": "A basic example of deploying Azure Endpoint within a Traffic Manager Profile." + }, + { + "ResourceType": "Microsoft.Network/trafficManagerProfiles/ExternalEndpoints", + "Path": "samples/trafficmanagerprofiles/externalendpoints/main.bicep", + "Description": "A basic example of deploying External Endpoint within a Traffic Manager Profile." + }, + { + "ResourceType": "Microsoft.Network/trafficManagerProfiles/NestedEndpoints", + "Path": "samples/trafficmanagerprofiles/nestedendpoints/main.bicep", + "Description": "A basic example of deploying Nested Endpoint within a Traffic Manager Profile." + }, + { + "ResourceType": "Microsoft.Network/virtualHubs", + "Path": "samples/virtualhubs/main.bicep", + "Description": "A basic example of deploying Virtual Hub within a Virtual WAN." + }, + { + "ResourceType": "Microsoft.Network/virtualHubs/hubVirtualNetworkConnections", + "Path": "samples/virtualhubs/hubvirtualnetworkconnections/main.bicep", + "Description": "A basic example of deploying Connection for a Virtual Hub." + }, + { + "ResourceType": "Microsoft.Network/virtualHubs/ipConfigurations", + "Path": "samples/virtualhubs/ipconfigurations/main.bicep", + "Description": "A basic example of deploying Virtual Hub IP. This resource is also known as a Route Server." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworkGateways", + "Path": "samples/virtualnetworkgateways/main.bicep", + "Description": "A basic example of deploying virtual network gateway to establish secure, cross-premises connectivity." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworkGateways/natRules", + "Path": "samples/virtualnetworkgateways/natrules/main.bicep", + "Description": "A basic example of deploying Virtual Network Gateway Nat Rule." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks", + "Path": "samples/virtualnetworks/main.bicep", + "Description": "A basic example of deploying virtual network including any configured subnets." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks", + "Path": "samples/virtualnetworks/withipampool/main.bicep", + "Description": "A withipampool example of deploying virtual network including any configured subnets." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks/subnets", + "Path": "samples/virtualnetworks/subnets/main.bicep", + "Description": "A basic example of deploying subnet which represent network segments within the IP space defined by the virtual network." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks/subnets", + "Path": "samples/virtualnetworks/subnets/withipampool/main.bicep", + "Description": "A withipampool example of deploying subnet which represent network segments within the IP space defined by the virtual network." + }, + { + "ResourceType": "Microsoft.Network/virtualNetworks/virtualNetworkPeerings", + "Path": "samples/virtualnetworks/virtualnetworkpeerings/main.bicep", + "Description": "A basic example of deploying virtual network peering which allows resources to access other." + }, + { + "ResourceType": "Microsoft.Network/virtualWans", + "Path": "samples/virtualwans/main.bicep", + "Description": "A basic example of deploying Virtual WAN." + }, + { + "ResourceType": "Microsoft.Network/vpnGateways", + "Path": "samples/vpngateways/main.bicep", + "Description": "A basic example of deploying VPN Gateway within a Virtual Hub." + }, + { + "ResourceType": "Microsoft.Network/vpnGateways/natRules", + "Path": "samples/vpngateways/natrules/main.bicep", + "Description": "A basic example of deploying VPN Gateway NAT Rule." + }, + { + "ResourceType": "Microsoft.Network/vpnGateways/vpnConnections", + "Path": "samples/vpngateways/vpnconnections/main.bicep", + "Description": "A basic example of deploying VPN Gateway Connection." + }, + { + "ResourceType": "Microsoft.Network/vpnServerConfigurations", + "Path": "samples/vpnserverconfigurations/main.bicep", + "Description": "A basic example of deploying VPN Server Configuration." + }, + { + "ResourceType": "Microsoft.Network/vpnServerConfigurations/configurationPolicyGroups", + "Path": "samples/vpnserverconfigurations/configurationpolicygroups/main.bicep", + "Description": "A basic example of deploying VPN Server Configuration Policy Group." + }, + { + "ResourceType": "Microsoft.Network/vpnSites", + "Path": "samples/vpnsites/main.bicep", + "Description": "A basic example of deploying VPN Site." + } + ] +} diff --git a/settings/remarks/microsoft.network/samples/applicationgateways/main.bicep b/settings/remarks/microsoft.network/samples/applicationgateways/main.bicep new file mode 100644 index 00000000..b3e58842 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/applicationgateways/main.bicep @@ -0,0 +1,179 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource applicationGateway 'Microsoft.Network/applicationGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + authenticationCertificates: [] + backendAddressPools: [ + { + name: '\'${virtualNetwork.name}-beap\'' + properties: { + backendAddresses: [] + } + } + ] + backendHttpSettingsCollection: [ + { + name: '\'${virtualNetwork.name}-be-htst\'' + properties: { + authenticationCertificates: [] + cookieBasedAffinity: 'Disabled' + path: '' + pickHostNameFromBackendAddress: false + port: 80 + protocol: 'Http' + requestTimeout: 1 + trustedRootCertificates: [] + } + } + ] + customErrorConfigurations: [] + enableHttp2: false + frontendIPConfigurations: [ + { + name: '\'${virtualNetwork.name}-feip\'' + properties: { + privateIPAllocationMethod: 'Dynamic' + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + frontendPorts: [ + { + name: '\'${virtualNetwork.name}-feport\'' + properties: { + port: 80 + } + } + ] + gatewayIPConfigurations: [ + { + name: 'my-gateway-ip-configuration' + properties: { + subnet: { + id: subnet.id + } + } + } + ] + httpListeners: [ + { + name: '\'${virtualNetwork.name}-httplstn\'' + properties: { + customErrorConfigurations: [] + frontendIPConfiguration: { + id: resourceId( + 'Microsoft.Network/applicationGateways/frontendIPConfigurations', + resourceName, + '${virtualNetwork.name}-feip' + ) + } + frontendPort: { + id: resourceId( + 'Microsoft.Network/applicationGateways/frontendPorts', + resourceName, + '${virtualNetwork.name}-feport' + ) + } + protocol: 'Http' + requireServerNameIndication: false + } + } + ] + privateLinkConfigurations: [] + probes: [] + redirectConfigurations: [] + requestRoutingRules: [ + { + name: '${virtualNetwork.name}-rqrt' + properties: { + backendAddressPool: { + id: resourceId( + 'Microsoft.Network/applicationGateways/backendAddressPools', + resourceName, + '${virtualNetwork.name}-beap' + ) + } + backendHttpSettings: { + id: resourceId( + 'Microsoft.Network/applicationGateways/backendHttpSettingsCollection', + resourceName, + '${virtualNetwork.name}-be-htst' + ) + } + httpListener: { + id: resourceId( + 'Microsoft.Network/applicationGateways/httpListeners', + resourceName, + '${virtualNetwork.name}-httplstn' + ) + } + priority: 10 + ruleType: 'Basic' + } + } + ] + rewriteRuleSets: [] + sku: { + capacity: 2 + name: 'Standard_v2' + tier: 'Standard_v2' + } + sslCertificates: [] + sslPolicy: {} + sslProfiles: [] + trustedClientCertificates: [] + trustedRootCertificates: [] + urlPathMaps: [] + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'subnet-230630033653837171' + properties: { + addressPrefix: '10.0.0.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Disabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/applicationgatewaywebapplicationfirewallpolicies/main.bicep b/settings/remarks/microsoft.network/samples/applicationgatewaywebapplicationfirewallpolicies/main.bicep new file mode 100644 index 00000000..7ed3be50 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/applicationgatewaywebapplicationfirewallpolicies/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource applicationgatewaywebapplicationfirewallpolicy 'Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies@2022-07-01' = { + name: resourceName + location: location + properties: { + customRules: [] + managedRules: { + exclusions: [] + managedRuleSets: [ + { + ruleGroupOverrides: [] + ruleSetType: 'OWASP' + ruleSetVersion: '3.1' + } + ] + } + policySettings: { + fileUploadLimitInMb: 100 + maxRequestBodySizeInKb: 128 + mode: 'Detection' + requestBodyCheck: true + state: 'Enabled' + } + } +} diff --git a/settings/remarks/microsoft.network/samples/applicationsecuritygroups/main.bicep b/settings/remarks/microsoft.network/samples/applicationsecuritygroups/main.bicep new file mode 100644 index 00000000..06c73f8b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/applicationsecuritygroups/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2022-09-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.network/samples/azurefirewalls/main.bicep b/settings/remarks/microsoft.network/samples/azurefirewalls/main.bicep new file mode 100644 index 00000000..8fecc621 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/azurefirewalls/main.bicep @@ -0,0 +1,74 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource azureFirewall 'Microsoft.Network/azureFirewalls@2022-07-01' = { + name: resourceName + location: location + properties: { + additionalProperties: {} + ipConfigurations: [ + { + name: 'configuration' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + } + ] + sku: { + name: 'AZFW_VNet' + tier: 'Standard' + } + threatIntelMode: 'Deny' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'AzureFirewallSubnet' + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/bastionhosts/main.bicep b/settings/remarks/microsoft.network/samples/bastionhosts/main.bicep new file mode 100644 index 00000000..df88de04 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/bastionhosts/main.bicep @@ -0,0 +1,77 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource bastionHost 'Microsoft.Network/bastionHosts@2022-07-01' = { + name: resourceName + location: location + properties: { + disableCopyPaste: false + enableFileCopy: false + enableIpConnect: false + enableShareableLink: false + enableTunneling: false + ipConfigurations: [ + { + name: 'ip-configuration' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + } + ] + scaleUnits: 2 + } + sku: { + name: 'Basic' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '192.168.1.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'AzureBastionSubnet' + properties: { + addressPrefix: '192.168.1.224/27' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/ddosprotectionplans/main.bicep b/settings/remarks/microsoft.network/samples/ddosprotectionplans/main.bicep new file mode 100644 index 00000000..bc42ef13 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/ddosprotectionplans/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2022-07-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/forwardingrules/main.bicep b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/forwardingrules/main.bicep new file mode 100644 index 00000000..73629779 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/forwardingrules/main.bicep @@ -0,0 +1,87 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsForwardingRuleset 'Microsoft.Network/dnsForwardingRulesets@2022-07-01' = { + name: resourceName + location: location + properties: { + dnsResolverOutboundEndpoints: [ + { + id: outboundEndpoint.id + } + ] + } +} + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource forwardingRule 'Microsoft.Network/dnsForwardingRulesets/forwardingRules@2022-07-01' = { + parent: dnsForwardingRuleset + name: resourceName + properties: { + domainName: 'onprem.local.' + forwardingRuleState: 'Enabled' + metadata: null + targetDnsServers: [ + { + ipAddress: '10.10.0.1' + port: 53 + } + ] + } +} + +resource outboundEndpoint 'Microsoft.Network/dnsResolvers/outboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'outbounddns' + properties: { + addressPrefix: '10.0.0.64/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/main.bicep b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/main.bicep new file mode 100644 index 00000000..ffcab7f1 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/main.bicep @@ -0,0 +1,71 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsForwardingRuleset 'Microsoft.Network/dnsForwardingRulesets@2022-07-01' = { + name: resourceName + location: location + properties: { + dnsResolverOutboundEndpoints: [ + { + id: outboundEndpoint.id + } + ] + } +} + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource outboundEndpoint 'Microsoft.Network/dnsResolvers/outboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'outbounddns' + properties: { + addressPrefix: '10.0.0.64/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/virtualnetworklinks/main.bicep b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/virtualnetworklinks/main.bicep new file mode 100644 index 00000000..77846a11 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsforwardingrulesets/virtualnetworklinks/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsForwardingRuleset 'Microsoft.Network/dnsForwardingRulesets@2022-07-01' = { + name: resourceName + location: location + properties: { + dnsResolverOutboundEndpoints: [ + { + id: outboundEndpoint.id + } + ] + } +} + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource outboundEndpoint 'Microsoft.Network/dnsResolvers/outboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'outbounddns' + properties: { + addressPrefix: '10.0.0.64/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource virtualNetworkLink 'Microsoft.Network/dnsForwardingRulesets/virtualNetworkLinks@2022-07-01' = { + parent: dnsForwardingRuleset + name: resourceName + properties: { + metadata: null + virtualNetwork: { + id: virtualNetwork.id + } + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsresolvers/inboundendpoints/main.bicep b/settings/remarks/microsoft.network/samples/dnsresolvers/inboundendpoints/main.bicep new file mode 100644 index 00000000..09f716be --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsresolvers/inboundendpoints/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource inboundEndpoint 'Microsoft.Network/dnsResolvers/inboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + ipConfigurations: [ + { + privateIpAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + ] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'inbounddns' + properties: { + addressPrefix: '10.0.0.0/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsresolvers/main.bicep b/settings/remarks/microsoft.network/samples/dnsresolvers/main.bicep new file mode 100644 index 00000000..3b5fa7ee --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsresolvers/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnsresolvers/outboundendpoints/main.bicep b/settings/remarks/microsoft.network/samples/dnsresolvers/outboundendpoints/main.bicep new file mode 100644 index 00000000..296a2511 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnsresolvers/outboundendpoints/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dnsResolver 'Microsoft.Network/dnsResolvers@2022-07-01' = { + name: resourceName + location: location + properties: { + virtualNetwork: { + id: virtualNetwork.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource outboundEndpoint 'Microsoft.Network/dnsResolvers/outboundEndpoints@2022-07-01' = { + parent: dnsResolver + name: resourceName + location: location + properties: { + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'outbounddns' + properties: { + addressPrefix: '10.0.0.64/28' + delegations: [ + { + name: 'Microsoft.Network.dnsResolvers' + properties: { + serviceName: 'Microsoft.Network/dnsResolvers' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/a/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/a/main.bicep new file mode 100644 index 00000000..5e37ee0f --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/a/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource a 'Microsoft.Network/dnsZones/A@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + ARecords: [ + { + ipv4Address: '1.2.4.5' + } + { + ipv4Address: '1.2.3.4' + } + ] + TTL: 300 + metadata: {} + targetResource: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/aaaa/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/aaaa/main.bicep new file mode 100644 index 00000000..7ef00918 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/aaaa/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource aaaa 'Microsoft.Network/dnsZones/AAAA@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + AAAARecords: [ + { + ipv6Address: '2607:f8b0:4009:1803::1005' + } + { + ipv6Address: '2607:f8b0:4009:1803::1006' + } + ] + TTL: 300 + metadata: {} + targetResource: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/caa/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/caa/main.bicep new file mode 100644 index 00000000..7e7dee80 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/caa/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource caa 'Microsoft.Network/dnsZones/CAA@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + TTL: 300 + caaRecords: [ + { + flags: 1 + tag: 'issuewild' + value: ';' + } + { + flags: 0 + tag: 'iodef' + value: 'mailto:terraform@nonexist.tld' + } + { + flags: 0 + tag: 'issue' + value: 'example.com' + } + { + flags: 0 + tag: 'issue' + value: 'example.net' + } + ] + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/cname/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/cname/main.bicep new file mode 100644 index 00000000..9b298cce --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/cname/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource cname 'Microsoft.Network/dnsZones/CNAME@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + CNAMERecord: { + cname: 'acctest0001.webpubsub.azure.com' + } + TTL: 3600 + metadata: {} + targetResource: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/main.bicep new file mode 100644 index 00000000..c679cccb --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/main.bicep @@ -0,0 +1,6 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/mx/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/mx/main.bicep new file mode 100644 index 00000000..9fa632a5 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/mx/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource mx 'Microsoft.Network/dnsZones/MX@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + MXRecords: [ + { + exchange: 'mail2.contoso.com' + preference: 20 + } + { + exchange: 'mail1.contoso.com' + preference: 10 + } + ] + TTL: 300 + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/ns/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/ns/main.bicep new file mode 100644 index 00000000..7ae8039a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/ns/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource n 'Microsoft.Network/dnsZones/NS@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + NSRecords: [ + { + nsdname: 'ns1.contoso.com' + } + { + nsdname: 'ns2.contoso.com' + } + ] + TTL: 300 + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/ptr/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/ptr/main.bicep new file mode 100644 index 00000000..fe68c394 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/ptr/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource ptr 'Microsoft.Network/dnsZones/PTR@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + PTRRecords: [ + { + ptrdname: 'hashicorp.com' + } + { + ptrdname: 'microsoft.com' + } + ] + TTL: 300 + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/srv/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/srv/main.bicep new file mode 100644 index 00000000..474da0d2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/srv/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource srv 'Microsoft.Network/dnsZones/SRV@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + SRVRecords: [ + { + port: 8080 + priority: 2 + target: 'target2.contoso.com' + weight: 25 + } + { + port: 8080 + priority: 1 + target: 'target1.contoso.com' + weight: 5 + } + ] + TTL: 300 + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/dnszones/txt/main.bicep b/settings/remarks/microsoft.network/samples/dnszones/txt/main.bicep new file mode 100644 index 00000000..9a5392d9 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/dnszones/txt/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' + +resource dnsZone 'Microsoft.Network/dnsZones@2018-05-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource txt 'Microsoft.Network/dnsZones/TXT@2018-05-01' = { + parent: dnsZone + name: resourceName + properties: { + TTL: 300 + TXTRecords: [ + { + value: [ + 'Quick brown fox' + ] + } + { + value: [ + 'A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text.....' + '.A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text....' + '..A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......' + ] + } + ] + metadata: {} + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutecircuits/authorizations/main.bicep b/settings/remarks/microsoft.network/samples/expressroutecircuits/authorizations/main.bicep new file mode 100644 index 00000000..26e91aaf --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutecircuits/authorizations/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + serviceProviderProperties: { + bandwidthInMbps: 50 + peeringLocation: 'Silicon Valley' + serviceProviderName: 'Equinix' + } + } + sku: { + family: 'MeteredData' + name: 'Standard_MeteredData' + tier: 'Standard' + } + tags: { + Environment: 'production' + Purpose: 'AcceptanceTests' + } +} + +resource authorization 'Microsoft.Network/expressRouteCircuits/authorizations@2022-07-01' = { + parent: expressRouteCircuit + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/expressroutecircuits/main.bicep b/settings/remarks/microsoft.network/samples/expressroutecircuits/main.bicep new file mode 100644 index 00000000..a23d01ca --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutecircuits/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'CDC-Canberra' + } +} + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport.id + } + } + sku: { + family: 'MeteredData' + name: 'Premium_MeteredData' + tier: 'Premium' + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/connections/main.bicep b/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/connections/main.bicep new file mode 100644 index 00000000..7d22f90e --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/connections/main.bicep @@ -0,0 +1,105 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The shared key for the Express Route circuit peering connections') +param expressRouteConnectionSharedKey string + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'Airtel-Chennai2-CLS' + } +} + +resource expressrouteport2 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'CDC-Canberra' + } +} + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport.id + } + } + sku: { + family: 'MeteredData' + name: 'Standard_MeteredData' + tier: 'Standard' + } +} + +resource expressRouteCircuit2 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport2.id + } + } + sku: { + family: 'MeteredData' + name: 'Standard_MeteredData' + tier: 'Standard' + } +} + +resource peering 'Microsoft.Network/expressRouteCircuits/peerings@2022-07-01' = { + parent: expressRouteCircuit + name: 'AzurePrivatePeering' + properties: { + azureASN: 12076 + gatewayManagerEtag: '' + peerASN: 100 + peeringType: 'AzurePrivatePeering' + primaryPeerAddressPrefix: '192.168.1.0/30' + secondaryPeerAddressPrefix: '192.168.1.0/30' + sharedKey: null + state: 'Enabled' + vlanId: 100 + } +} + +resource peering2 'Microsoft.Network/expressRouteCircuits/peerings@2022-07-01' = { + parent: expressRouteCircuit2 + name: 'AzurePrivatePeering' + properties: { + azureASN: 12076 + gatewayManagerEtag: '' + peerASN: 100 + peeringType: 'AzurePrivatePeering' + primaryPeerAddressPrefix: '192.168.1.0/30' + secondaryPeerAddressPrefix: '192.168.1.0/30' + sharedKey: null + state: 'Enabled' + vlanId: 100 + } +} + +resource connection 'Microsoft.Network/expressRouteCircuits/peerings/connections@2022-07-01' = { + parent: peering + name: resourceName + properties: { + addressPrefix: '192.169.8.0/29' + expressRouteCircuitPeering: { + id: peering.id + } + peerExpressRouteCircuitPeering: { + id: peering2.id + } + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/main.bicep b/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/main.bicep new file mode 100644 index 00000000..a5a2ac9e --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutecircuits/peerings/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The shared key for the Express Route circuit peering') +param expressRouteSharedKey string + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'CDC-Canberra' + } +} + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport.id + } + } + sku: { + family: 'MeteredData' + name: 'Premium_MeteredData' + tier: 'Premium' + } +} + +resource peering 'Microsoft.Network/expressRouteCircuits/peerings@2022-07-01' = { + parent: expressRouteCircuit + name: 'AzurePrivatePeering' + properties: { + azureASN: 12076 + gatewayManagerEtag: '' + peerASN: 100 + peeringType: 'AzurePrivatePeering' + primaryPeerAddressPrefix: '192.168.1.0/30' + secondaryPeerAddressPrefix: '192.168.2.0/30' + sharedKey: null + state: 'Enabled' + vlanId: 100 + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutegateways/expressrouteconnections/main.bicep b/settings/remarks/microsoft.network/samples/expressroutegateways/expressrouteconnections/main.bicep new file mode 100644 index 00000000..28ecfe4b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutegateways/expressrouteconnections/main.bicep @@ -0,0 +1,104 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The shared key for the ExpressRoute connection') +param sharedKey string + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + encapsulation: 'Dot1Q' + peeringLocation: 'CDC-Canberra' + } +} + +resource expressRouteCircuit 'Microsoft.Network/expressRouteCircuits@2022-07-01' = { + name: resourceName + location: location + properties: { + authorizationKey: '' + bandwidthInGbps: 5 + expressRoutePort: { + id: expressrouteport.id + } + } + sku: { + family: 'MeteredData' + name: 'Premium_MeteredData' + tier: 'Premium' + } +} + +resource expressRouteGateway 'Microsoft.Network/expressRouteGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + allowNonVirtualWanTraffic: false + autoScaleConfiguration: { + bounds: { + min: 1 + } + } + virtualHub: { + id: virtualHub.id + } + } +} + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.1.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource expressRouteConnection 'Microsoft.Network/expressRouteGateways/expressRouteConnections@2022-07-01' = { + parent: expressRouteGateway + name: resourceName + properties: { + enableInternetSecurity: false + expressRouteCircuitPeering: { + id: peering.id + } + expressRouteGatewayBypass: false + routingConfiguration: {} + routingWeight: 0 + } +} + +resource peering 'Microsoft.Network/expressRouteCircuits/peerings@2022-07-01' = { + parent: expressRouteCircuit + name: 'AzurePrivatePeering' + properties: { + azureASN: 12076 + gatewayManagerEtag: '' + peerASN: 100 + peeringType: 'AzurePrivatePeering' + primaryPeerAddressPrefix: '192.168.1.0/30' + secondaryPeerAddressPrefix: '192.168.2.0/30' + sharedKey: null + state: 'Enabled' + vlanId: 100 + } +} diff --git a/settings/remarks/microsoft.network/samples/expressroutegateways/main.bicep b/settings/remarks/microsoft.network/samples/expressroutegateways/main.bicep new file mode 100644 index 00000000..4cafea75 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressroutegateways/main.bicep @@ -0,0 +1,44 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressRouteGateway 'Microsoft.Network/expressRouteGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + allowNonVirtualWanTraffic: false + autoScaleConfiguration: { + bounds: { + min: 1 + } + } + virtualHub: { + id: virtualHub.id + } + } +} + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.1.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} diff --git a/settings/remarks/microsoft.network/samples/expressrouteports/authorizations/main.bicep b/settings/remarks/microsoft.network/samples/expressrouteports/authorizations/main.bicep new file mode 100644 index 00000000..478a50c6 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressrouteports/authorizations/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + billingType: 'MeteredData' + encapsulation: 'Dot1Q' + peeringLocation: 'Airtel-Chennai2-CLS' + } + tags: { + ENV: 'Test' + } +} + +resource authorization 'Microsoft.Network/expressRoutePorts/authorizations@2022-07-01' = { + parent: expressrouteport + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/expressrouteports/main.bicep b/settings/remarks/microsoft.network/samples/expressrouteports/main.bicep new file mode 100644 index 00000000..9d7e723e --- /dev/null +++ b/settings/remarks/microsoft.network/samples/expressrouteports/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource expressrouteport 'Microsoft.Network/ExpressRoutePorts@2022-07-01' = { + name: resourceName + location: location + properties: { + bandwidthInGbps: 10 + billingType: 'MeteredData' + encapsulation: 'Dot1Q' + peeringLocation: 'Airtel-Chennai2-CLS' + } + tags: { + ENV: 'Test' + } +} diff --git a/settings/remarks/microsoft.network/samples/firewallpolicies/main.bicep b/settings/remarks/microsoft.network/samples/firewallpolicies/main.bicep new file mode 100644 index 00000000..1bccefe4 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/firewallpolicies/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource firewallPolicy 'Microsoft.Network/firewallPolicies@2022-07-01' = { + name: resourceName + location: location + properties: { + threatIntelMode: 'Alert' + } +} diff --git a/settings/remarks/microsoft.network/samples/firewallpolicies/rulecollectiongroups/main.bicep b/settings/remarks/microsoft.network/samples/firewallpolicies/rulecollectiongroups/main.bicep new file mode 100644 index 00000000..98a2a5c8 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/firewallpolicies/rulecollectiongroups/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource firewallPolicy 'Microsoft.Network/firewallPolicies@2022-07-01' = { + name: resourceName + location: location + properties: { + threatIntelMode: 'Alert' + } +} + +resource ruleCollectionGroup 'Microsoft.Network/firewallPolicies/ruleCollectionGroups@2022-07-01' = { + parent: firewallPolicy + name: resourceName + properties: { + priority: 500 + ruleCollections: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/frontdoorwebapplicationfirewallpolicies/main.bicep b/settings/remarks/microsoft.network/samples/frontdoorwebapplicationfirewallpolicies/main.bicep new file mode 100644 index 00000000..dc42f543 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/frontdoorwebapplicationfirewallpolicies/main.bicep @@ -0,0 +1,68 @@ +param resourceName string = 'acctest0001' + +resource frontdoorwebapplicationfirewallpolicy 'Microsoft.Network/FrontDoorWebApplicationFirewallPolicies@2020-11-01' = { + name: resourceName + location: 'global' + properties: { + customRules: { + rules: [ + { + action: 'Block' + enabledState: 'Enabled' + matchConditions: [ + { + matchValue: [ + '192.168.1.0/24' + '10.0.0.0/24' + ] + matchVariable: 'RemoteAddr' + negateCondition: false + operator: 'IPMatch' + } + ] + name: 'Rule1' + priority: 1 + rateLimitDurationInMinutes: 1 + rateLimitThreshold: 10 + ruleType: 'MatchRule' + } + ] + } + managedRules: { + managedRuleSets: [ + { + ruleGroupOverrides: [ + { + ruleGroupName: 'PHP' + rules: [ + { + action: 'Block' + enabledState: 'Disabled' + ruleId: '933111' + } + ] + } + ] + ruleSetAction: 'Block' + ruleSetType: 'DefaultRuleSet' + ruleSetVersion: 'preview-0.1' + } + { + ruleSetAction: 'Block' + ruleSetType: 'BotProtection' + ruleSetVersion: 'preview-0.1' + } + ] + } + policySettings: { + customBlockResponseBody: 'PGh0bWw+CjxoZWFkZXI+PHRpdGxlPkhlbGxvPC90aXRsZT48L2hlYWRlcj4KPGJvZHk+CkhlbGxvIHdvcmxkCjwvYm9keT4KPC9odG1sPg==' + customBlockResponseStatusCode: 403 + enabledState: 'Enabled' + mode: 'Prevention' + redirectUrl: 'https://www.fabrikam.com' + } + } + sku: { + name: 'Premium_AzureFrontDoor' + } +} diff --git a/settings/remarks/microsoft.network/samples/ipgroups/main.bicep b/settings/remarks/microsoft.network/samples/ipgroups/main.bicep new file mode 100644 index 00000000..6c99633a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/ipgroups/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource ipGroup 'Microsoft.Network/ipGroups@2022-07-01' = { + name: resourceName + location: location + properties: { + ipAddresses: [] + } + tags: { + env: 'prod' + } +} diff --git a/settings/remarks/microsoft.network/samples/loadbalancers/backendaddresspools/main.bicep b/settings/remarks/microsoft.network/samples/loadbalancers/backendaddresspools/main.bicep new file mode 100644 index 00000000..fee10c46 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/loadbalancers/backendaddresspools/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadBalancer 'Microsoft.Network/loadBalancers@2022-07-01' = { + name: resourceName + location: location + properties: { + frontendIPConfigurations: [ + { + name: 'internal' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource backendAddressPool 'Microsoft.Network/loadBalancers/backendAddressPools@2022-07-01' = { + parent: loadBalancer + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/loadbalancers/main.bicep b/settings/remarks/microsoft.network/samples/loadbalancers/main.bicep new file mode 100644 index 00000000..7801264f --- /dev/null +++ b/settings/remarks/microsoft.network/samples/loadbalancers/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadBalancer 'Microsoft.Network/loadBalancers@2022-07-01' = { + name: resourceName + location: location + properties: { + frontendIPConfigurations: [ + { + name: 'acctest0001' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} diff --git a/settings/remarks/microsoft.network/samples/localnetworkgateways/main.bicep b/settings/remarks/microsoft.network/samples/localnetworkgateways/main.bicep new file mode 100644 index 00000000..2fa2ca78 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/localnetworkgateways/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + gatewayIpAddress: '168.62.225.23' + localNetworkAddressSpace: { + addressPrefixes: [ + '10.1.1.0/24' + ] + } + } +} diff --git a/settings/remarks/microsoft.network/samples/natgateways/main.bicep b/settings/remarks/microsoft.network/samples/natgateways/main.bicep new file mode 100644 index 00000000..f4e9e9ed --- /dev/null +++ b/settings/remarks/microsoft.network/samples/natgateways/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource natGateway 'Microsoft.Network/natGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + idleTimeoutInMinutes: 10 + } + sku: { + name: 'Standard' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkinterfaces/main.bicep b/settings/remarks/microsoft.network/samples/networkinterfaces/main.bicep new file mode 100644 index 00000000..0411f1b8 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkinterfaces/main.bicep @@ -0,0 +1,53 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/connectivityconfigurations/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/connectivityconfigurations/main.bicep new file mode 100644 index 00000000..0a397dfa --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/connectivityconfigurations/main.bicep @@ -0,0 +1,67 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + 'Connectivity' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + flowTimeoutInMinutes: 10 + subnets: [] + } +} + +resource connectivityConfiguration 'Microsoft.Network/networkManagers/connectivityConfigurations@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + appliesToGroups: [ + { + groupConnectivity: 'None' + isGlobal: 'False' + networkGroupId: networkGroup.id + useHubGateway: 'False' + } + ] + connectivityTopology: 'HubAndSpoke' + deleteExistingPeering: 'False' + hubs: [ + { + resourceId: virtualNetwork.id + resourceType: virtualNetwork.properties.type + } + ] + isGlobal: 'False' + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2022-09-01' = { + parent: networkManager + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/main.bicep new file mode 100644 index 00000000..587710f5 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource ipamPool 'Microsoft.Network/networkManagers/ipamPools@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + description: 'Test description.' + displayName: 'testDisplayName' + parentPoolName: '' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/staticcidr/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/staticcidr/main.bicep new file mode 100644 index 00000000..22d1ace2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/ipampools/staticcidr/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource ipamPool 'Microsoft.Network/networkManagers/ipamPools@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + description: 'Test description.' + displayName: 'testDisplayName' + parentPoolName: '' + } +} + +resource staticCidr 'Microsoft.Network/networkManagers/ipamPools/staticCidrs@2024-01-01-preview' = { + parent: ipamPool + name: resourceName + properties: { + addressPrefixes: [ + '10.0.0.0/25' + ] + description: 'test description' + numberOfIPAddressesToAllocate: '' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/main.bicep new file mode 100644 index 00000000..86adb528 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/main.bicep new file mode 100644 index 00000000..da16b09b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2024-10-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'Routing' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2024-10-01' = { + parent: networkManager + name: resourceName + properties: { + description: 'example network group' + memberType: 'VirtualNetwork' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/staticmembers/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/staticmembers/main.bicep new file mode 100644 index 00000000..7ae3f2df --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/networkgroups/staticmembers/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2024-10-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'Routing' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-10-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/22' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2024-10-01' = { + parent: networkManager + name: resourceName + properties: {} +} + +resource networkGroupForSubnet 'Microsoft.Network/networkManagers/networkGroups@2024-10-01' = { + parent: networkManager + name: '${resourceName}-subnet' + properties: { + description: 'example network group' + memberType: 'Subnet' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-10-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + } +} + +resource staticMember 'Microsoft.Network/networkManagers/networkGroups/staticMembers@2024-10-01' = { + parent: networkGroup + name: resourceName + properties: { + resourceId: virtualNetwork.id + } +} + +resource staticMemberForSubnet 'Microsoft.Network/networkManagers/networkGroups/staticMembers@2024-10-01' = { + parent: networkGroupForSubnet + name: '${resourceName}-subnet' + properties: { + resourceId: subnet.id + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/scopeconnections/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/scopeconnections/main.bicep new file mode 100644 index 00000000..a0170ea0 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/scopeconnections/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource scopeConnection 'Microsoft.Network/networkManagers/scopeConnections@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + resourceId: subscription().id + tenantId: tenant().tenantId + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/main.bicep new file mode 100644 index 00000000..f8699de4 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource securityAdminConfiguration 'Microsoft.Network/networkManagers/securityAdminConfigurations@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + applyOnNetworkIntentPolicyBasedServices: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/main.bicep new file mode 100644 index 00000000..b519e9f1 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2022-09-01' = { + parent: networkManager + name: resourceName + properties: {} +} + +resource securityAdminConfiguration 'Microsoft.Network/networkManagers/securityAdminConfigurations@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + applyOnNetworkIntentPolicyBasedServices: [] + } +} + +resource ruleCollection 'Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections@2022-09-01' = { + parent: securityAdminConfiguration + name: resourceName + properties: { + appliesToGroups: [ + { + networkGroupId: networkGroup.id + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.bicep new file mode 100644 index 00000000..d0a631b8 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/securityadminconfigurations/rulecollections/rules/main.bicep @@ -0,0 +1,61 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + subscription().id + ] + } + } +} + +resource networkGroup 'Microsoft.Network/networkManagers/networkGroups@2022-09-01' = { + parent: networkManager + name: resourceName + properties: {} +} + +resource securityAdminConfiguration 'Microsoft.Network/networkManagers/securityAdminConfigurations@2022-09-01' = { + parent: networkManager + name: resourceName + properties: { + applyOnNetworkIntentPolicyBasedServices: [] + } +} + +resource ruleCollection 'Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections@2022-09-01' = { + parent: securityAdminConfiguration + name: resourceName + properties: { + appliesToGroups: [ + { + networkGroupId: networkGroup.id + } + ] + } +} + +resource rule 'Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules@2022-09-01' = { + parent: ruleCollection + name: resourceName + kind: 'Custom' + properties: { + access: 'Deny' + destinationPortRanges: [] + destinations: [] + direction: 'Outbound' + priority: 1 + protocol: 'Tcp' + sourcePortRanges: [] + sources: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/main.bicep new file mode 100644 index 00000000..4c463ad7 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource verifierWorkspace 'Microsoft.Network/networkManagers/verifierWorkspaces@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + description: 'A sample workspace' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.bicep new file mode 100644 index 00000000..4f07bad5 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/main.bicep @@ -0,0 +1,162 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The admin username for the virtual machine') +param adminUsername string +@secure() +@description('The admin password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: null + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: 'myosdisk1' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource verifierWorkspace 'Microsoft.Network/networkManagers/verifierWorkspaces@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + description: 'A sample workspace' + } +} + +resource reachabilityAnalysisIntent 'Microsoft.Network/networkManagers/verifierWorkspaces/reachabilityAnalysisIntents@2024-01-01-preview' = { + parent: verifierWorkspace + name: resourceName + properties: { + description: 'A sample reachability analysis intent' + destinationResourceId: virtualMachine.id + ipTraffic: { + destinationIps: [ + '10.4.0.1' + ] + destinationPorts: [ + '0' + ] + protocols: [ + 'Any' + ] + sourceIps: [ + '10.4.0.0' + ] + sourcePorts: [ + '0' + ] + } + sourceResourceId: virtualMachine.id + } +} + +resource reachabilityAnalysisRun 'Microsoft.Network/networkManagers/verifierWorkspaces/reachabilityAnalysisRuns@2024-01-01-preview' = { + parent: verifierWorkspace + name: resourceName + properties: { + description: 'A sample reachability analysis run' + intentId: reachabilityAnalysisIntent.id + } +} diff --git a/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.bicep b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.bicep new file mode 100644 index 00000000..f2927748 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkmanagers/verifierworkspace/reachabilityanalysisintent/reachabilityanalysisrun/main.bicep @@ -0,0 +1,151 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the virtual machine') +param vmAdminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2022-07-01' = { + name: resourceName + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource networkManager 'Microsoft.Network/networkManagers@2022-09-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [ + 'SecurityAdmin' + ] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2023-03-01' = { + name: resourceName + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_F2' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + computerName: 'hostname230630032848831819' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: 'UbuntuServer' + publisher: 'Canonical' + sku: '16.04-LTS' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + name: 'myosdisk1' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource verifierWorkspace 'Microsoft.Network/networkManagers/verifierWorkspaces@2024-01-01-preview' = { + parent: networkManager + name: resourceName + location: location + properties: { + description: 'A sample workspace' + } +} + +resource reachabilityAnalysisIntent 'Microsoft.Network/networkManagers/verifierWorkspaces/reachabilityAnalysisIntents@2024-01-01-preview' = { + parent: verifierWorkspace + name: resourceName + properties: { + description: 'A sample reachability analysis intent' + destinationResourceId: virtualMachine.id + ipTraffic: { + destinationIps: [ + '10.4.0.1' + ] + destinationPorts: [ + '0' + ] + protocols: [ + 'Any' + ] + sourceIps: [ + '10.4.0.0' + ] + sourcePorts: [ + '0' + ] + } + sourceResourceId: virtualMachine.id + } +} diff --git a/settings/remarks/microsoft.network/samples/networkprofiles/main.bicep b/settings/remarks/microsoft.network/samples/networkprofiles/main.bicep new file mode 100644 index 00000000..d379f646 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkprofiles/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkProfile 'Microsoft.Network/networkProfiles@2022-07-01' = { + name: resourceName + location: location + properties: { + containerNetworkInterfaceConfigurations: [ + { + name: 'acctesteth-230630033653886950' + properties: { + ipConfigurations: [ + { + name: 'acctestipconfig-230630033653886950' + properties: { + subnet: { + id: subnet.id + } + } + } + ] + } + } + ] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.1.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.1.0.0/24' + delegations: [ + { + name: 'acctestdelegation-230630033653886950' + properties: { + serviceName: 'Microsoft.ContainerInstance/containerGroups' + } + } + ] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networksecuritygroups/main.bicep b/settings/remarks/microsoft.network/samples/networksecuritygroups/main.bicep new file mode 100644 index 00000000..d3af0a1a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networksecuritygroups/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2022-07-01' = { + name: resourceName + location: location + properties: { + securityRules: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/networksecuritygroups/securityrules/main.bicep b/settings/remarks/microsoft.network/samples/networksecuritygroups/securityrules/main.bicep new file mode 100644 index 00000000..320ba3a8 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networksecuritygroups/securityrules/main.bicep @@ -0,0 +1,31 @@ +param location string = 'westeurope' + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2022-07-01' = { + name: 'mi-security-group1-230630034008554952' + location: location + properties: { + securityRules: [] + } +} + +resource securityRule 'Microsoft.Network/networkSecurityGroups/securityRules@2022-09-01' = { + parent: networkSecurityGroup + name: 'allow_management_inbound' + properties: { + access: 'Allow' + destinationAddressPrefix: '*' + destinationPortRange: '' + destinationPortRanges: [ + '9000' + '1438' + '1440' + '9003' + '1452' + ] + direction: 'Inbound' + priority: 106 + protocol: 'Tcp' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } +} diff --git a/settings/remarks/microsoft.network/samples/networkwatchers/flowlogs/main.bicep b/settings/remarks/microsoft.network/samples/networkwatchers/flowlogs/main.bicep new file mode 100644 index 00000000..cdd8bc20 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkwatchers/flowlogs/main.bicep @@ -0,0 +1,84 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2' + +resource networkWatchers 'Microsoft.Network/networkWatchers@2023-11-01' = { + name: resourceName + location: location + properties: {} +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource flowLog 'Microsoft.Network/networkWatchers/flowLogs@2023-11-01' = { + parent: networkWatchers + name: resourceName + location: location + properties: { + enabled: true + flowAnalyticsConfiguration: { + networkWatcherFlowAnalyticsConfiguration: { + enabled: false + } + } + format: { + type: 'JSON' + version: 2 + } + retentionPolicy: { + days: 7 + enabled: true + } + storageId: storageAccount.id + targetResourceId: virtualNetwork.id + } +} diff --git a/settings/remarks/microsoft.network/samples/networkwatchers/packetcaptures/main.bicep b/settings/remarks/microsoft.network/samples/networkwatchers/packetcaptures/main.bicep new file mode 100644 index 00000000..44ec5cb2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/networkwatchers/packetcaptures/main.bicep @@ -0,0 +1,136 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator password for the virtual machine') +param adminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: '${resourceName}-nic' + location: location + properties: { + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'ipconfig1' + properties: { + primary: true + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + } +} + +resource networkWatcher 'Microsoft.Network/networkWatchers@2024-05-01' = { + name: '${resourceName}-nw' + location: location +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-03-01' = { + name: '${resourceName}-vm' + location: location + properties: { + hardwareProfile: { + vmSize: 'Standard_B1s' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: true + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + computerName: 'acctest0001-vm' + linuxConfiguration: { + disablePasswordAuthentication: false + } + } + storageProfile: { + imageReference: { + offer: '0001-com-ubuntu-server-jammy' + publisher: 'Canonical' + sku: '22_04-lts' + version: 'latest' + } + osDisk: { + caching: 'ReadWrite' + createOption: 'FromImage' + managedDisk: { + storageAccountType: 'Standard_LRS' + } + name: 'acctest0001-osdisk' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + } +} + +resource extension 'Microsoft.Compute/virtualMachines/extensions@2024-03-01' = { + parent: virtualMachine + name: 'network-watcher' + location: location + properties: { + autoUpgradeMinorVersion: true + enableAutomaticUpgrade: false + publisher: 'Microsoft.Azure.NetworkWatcher' + suppressFailures: false + type: 'NetworkWatcherAgentLinux' + typeHandlerVersion: '1.4' + } +} + +resource packetCapture 'Microsoft.Network/networkWatchers/packetCaptures@2024-05-01' = { + parent: networkWatcher + name: '${resourceName}-pc' + properties: { + bytesToCapturePerPacket: 0 + storageLocation: { + filePath: '/var/captures/packet.cap' + } + target: virtualMachine.id + targetType: 'AzureVM' + timeLimitInSeconds: 18000 + totalBytesPerSession: 1073741824 + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: 'internal' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/p2svpngateways/main.bicep b/settings/remarks/microsoft.network/samples/p2svpngateways/main.bicep new file mode 100644 index 00000000..e984562a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/p2svpngateways/main.bicep @@ -0,0 +1,98 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource p2svpnGateway 'Microsoft.Network/p2svpnGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + isRoutingPreferenceInternet: false + p2SConnectionConfigurations: [ + { + name: 'first' + properties: { + enableInternetSecurity: false + vpnClientAddressPool: { + addressPrefixes: [ + '172.100.0.0/14' + ] + } + } + } + ] + virtualHub: { + id: virtualHub.id + } + vpnGatewayScaleUnit: 1 + vpnServerConfiguration: { + id: vpnServerConfiguration.id + } + } +} + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.1.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnServerConfiguration 'Microsoft.Network/vpnServerConfigurations@2022-07-01' = { + name: resourceName + location: location + properties: { + vpnAuthenticationTypes: [ + 'Certificate' + ] + vpnClientIpsecPolicies: [] + vpnClientRevokedCertificates: [] + vpnClientRootCertificates: [ + { + name: 'DigiCert-Federated-ID-Root-CA' + publicCertData: '''MIIDuzCCAqOgAwIBAgIQCHTZWCM+IlfFIRXIvyKSrjANBgkqhkiG9w0BAQsFADBn +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSYwJAYDVQQDEx1EaWdpQ2VydCBGZWRlcmF0ZWQgSUQg +Um9vdCBDQTAeFw0xMzAxMTUxMjAwMDBaFw0zMzAxMTUxMjAwMDBaMGcxCzAJBgNV +BAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdp +Y2VydC5jb20xJjAkBgNVBAMTHURpZ2lDZXJ0IEZlZGVyYXRlZCBJRCBSb290IENB +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvAEB4pcCqnNNOWE6Ur5j +QPUH+1y1F9KdHTRSza6k5iDlXq1kGS1qAkuKtw9JsiNRrjltmFnzMZRBbX8Tlfl8 +zAhBmb6dDduDGED01kBsTkgywYPxXVTKec0WxYEEF0oMn4wSYNl0lt2eJAKHXjNf +GTwiibdP8CUR2ghSM2sUTI8Nt1Omfc4SMHhGhYD64uJMbX98THQ/4LMGuYegou+d +GTiahfHtjn7AboSEknwAMJHCh5RlYZZ6B1O4QbKJ+34Q0eKgnI3X6Vc9u0zf6DH8 +Dk+4zQDYRRTqTnVO3VT8jzqDlCRuNtq6YvryOWN74/dq8LQhUnXHvFyrsdMaE1X2 +DwIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNV +HQ4EFgQUGRdkFnbGt1EWjKwbUne+5OaZvRYwHwYDVR0jBBgwFoAUGRdkFnbGt1EW +jKwbUne+5OaZvRYwDQYJKoZIhvcNAQELBQADggEBAHcqsHkrjpESqfuVTRiptJfP +9JbdtWqRTmOf6uJi2c8YVqI6XlKXsD8C1dUUaaHKLUJzvKiazibVuBwMIT84AyqR +QELn3e0BtgEymEygMU569b01ZPxoFSnNXc7qDZBDef8WfqAV/sxkTi8L9BkmFYfL +uGLOhRJOFprPdoDIUBB+tmCl3oDcBy3vnUeOEioz8zAkprcb3GHwHAK+vHmmfgcn +WsfMLH4JCLa/tRYL+Rw/N3ybCkDp00s0WUZ+AoDywSl0Q/ZEnNY0MsFiw6LyIdbq +M/s/1JRtO3bDSzD9TazRVzn2oBqzSa8VgIo5C1nOnoAKJTlsClJKvIhnRlaLQqk= +''' + } + ] + vpnProtocols: [ + 'OpenVPN' + 'IkeV2' + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/a/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/a/main.bicep new file mode 100644 index 00000000..7bb08d43 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/a/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource a 'Microsoft.Network/privateDnsZones/A@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + aRecords: [ + { + ipv4Address: '1.2.4.5' + } + { + ipv4Address: '1.2.3.4' + } + ] + metadata: {} + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/aaaa/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/aaaa/main.bicep new file mode 100644 index 00000000..99fc0e37 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/aaaa/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource aaaa 'Microsoft.Network/privateDnsZones/AAAA@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + aaaaRecords: [ + { + ipv6Address: 'fd5d:70bc:930e:d008:0000:0000:0000:7334' + } + { + ipv6Address: 'fd5d:70bc:930e:d008::7335' + } + ] + metadata: {} + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/cname/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/cname/main.bicep new file mode 100644 index 00000000..65cbb0f0 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/cname/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource cname 'Microsoft.Network/privateDnsZones/CNAME@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + cnameRecord: { + cname: 'contoso.com' + } + metadata: {} + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/main.bicep new file mode 100644 index 00000000..99dce4b2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/main.bicep @@ -0,0 +1,6 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/mx/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/mx/main.bicep new file mode 100644 index 00000000..b05473d2 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/mx/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource mx 'Microsoft.Network/privateDnsZones/MX@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + metadata: {} + mxRecords: [ + { + exchange: 'mx1.contoso.com' + preference: 10 + } + { + exchange: 'mx2.contoso.com' + preference: 10 + } + ] + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/ptr/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/ptr/main.bicep new file mode 100644 index 00000000..8ecd0b9d --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/ptr/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '230630033756174960.0.10.in-addr.arpa' + location: 'global' +} + +resource ptr 'Microsoft.Network/privateDnsZones/PTR@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + metadata: {} + ptrRecords: [ + { + ptrdname: 'test2.contoso.com' + } + { + ptrdname: 'test.contoso.com' + } + ] + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/srv/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/srv/main.bicep new file mode 100644 index 00000000..87ccaa37 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/srv/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource srv 'Microsoft.Network/privateDnsZones/SRV@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + metadata: {} + srvRecords: [ + { + port: 8080 + priority: 10 + target: 'target2.contoso.com' + weight: 10 + } + { + port: 8080 + priority: 1 + target: 'target1.contoso.com' + weight: 5 + } + ] + ttl: 300 + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/txt/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/txt/main.bicep new file mode 100644 index 00000000..7aa2e867 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/txt/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource txt 'Microsoft.Network/privateDnsZones/TXT@2018-09-01' = { + parent: privateDnsZone + name: resourceName + properties: { + metadata: {} + ttl: 300 + txtRecords: [ + { + value: [ + 'Quick brown fox' + ] + } + { + value: [ + 'A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text.....' + '.A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text....' + '..A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......A long text......' + ] + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/privatednszones/virtualnetworklinks/main.bicep b/settings/remarks/microsoft.network/samples/privatednszones/virtualnetworklinks/main.bicep new file mode 100644 index 00000000..7ab26db9 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatednszones/virtualnetworklinks/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' = { + name: '${resourceName}.com' + location: 'global' +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [ + { + name: 'subnet1' + properties: { + addressPrefix: '10.0.1.0/24' + } + } + ] + } +} + +resource virtualNetworkLink 'Microsoft.Network/privateDnsZones/virtualNetworkLinks@2018-09-01' = { + parent: privateDnsZone + name: resourceName + location: 'global' + properties: { + registrationEnabled: false + virtualNetwork: { + id: virtualNetwork.id + } + } +} diff --git a/settings/remarks/microsoft.network/samples/privateendpoints/main.bicep b/settings/remarks/microsoft.network/samples/privateendpoints/main.bicep new file mode 100644 index 00000000..5b34231c --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privateendpoints/main.bicep @@ -0,0 +1,121 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadBalancer 'Microsoft.Network/loadBalancers@2022-07-01' = { + name: resourceName + location: location + properties: { + frontendIPConfigurations: [ + { + name: 'acctest0001' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource privateEndpoint 'Microsoft.Network/privateEndpoints@2022-07-01' = { + name: resourceName + location: location + properties: { + privateLinkServiceConnections: [ + { + name: privateLinkService.name + properties: { + privateLinkServiceId: privateLinkService.id + } + } + ] + subnet: { + id: subnet.id + } + } +} + +resource privateLinkService 'Microsoft.Network/privateLinkServices@2022-07-01' = { + name: resourceName + location: location + properties: { + autoApproval: { + subscriptions: [] + } + enableProxyProtocol: false + fqdns: [] + ipConfigurations: [ + { + name: 'primaryIpConfiguration-230630033653892379' + properties: { + primary: true + privateIPAddress: '' + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + loadBalancerFrontendIpConfigurations: [ + { + id: loadBalancer.properties.frontendIPConfigurations[0].id + } + ] + visibility: { + subscriptions: [] + } + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.5.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.5.4.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Disabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/privatelinkservices/main.bicep b/settings/remarks/microsoft.network/samples/privatelinkservices/main.bicep new file mode 100644 index 00000000..c7599831 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/privatelinkservices/main.bicep @@ -0,0 +1,103 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource loadBalancer 'Microsoft.Network/loadBalancers@2022-07-01' = { + name: resourceName + location: location + properties: { + frontendIPConfigurations: [ + { + name: 'acctest0001' + properties: { + publicIPAddress: { + id: publicIPAddress.id + } + } + } + ] + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource privateLinkService 'Microsoft.Network/privateLinkServices@2022-07-01' = { + name: resourceName + location: location + properties: { + autoApproval: { + subscriptions: [] + } + enableProxyProtocol: false + fqdns: [] + ipConfigurations: [ + { + name: 'primaryIpConfiguration-230630033653892379' + properties: { + primary: true + privateIPAddress: '' + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + subnet: { + id: subnet.id + } + } + } + ] + loadBalancerFrontendIpConfigurations: [ + { + id: loadBalancer.properties.frontendIPConfigurations[0].id + } + ] + visibility: { + subscriptions: [] + } + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.5.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.5.4.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Disabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/publicipaddresses/main.bicep b/settings/remarks/microsoft.network/samples/publicipaddresses/main.bicep new file mode 100644 index 00000000..29e4848b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/publicipaddresses/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} diff --git a/settings/remarks/microsoft.network/samples/publicipprefixes/main.bicep b/settings/remarks/microsoft.network/samples/publicipprefixes/main.bicep new file mode 100644 index 00000000..0dd39432 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/publicipprefixes/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource publicIPPrefix 'Microsoft.Network/publicIPPrefixes@2022-07-01' = { + name: resourceName + location: location + properties: { + prefixLength: 30 + publicIPAddressVersion: 'IPv4' + } + sku: { + name: 'Standard' + } + zones: [ + '1' + ] +} diff --git a/settings/remarks/microsoft.network/samples/routefilters/main.bicep b/settings/remarks/microsoft.network/samples/routefilters/main.bicep new file mode 100644 index 00000000..7fa79b76 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/routefilters/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource routeFilter 'Microsoft.Network/routeFilters@2022-09-01' = { + name: resourceName + location: location + properties: { + rules: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/routetables/main.bicep b/settings/remarks/microsoft.network/samples/routetables/main.bicep new file mode 100644 index 00000000..c17b7426 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/routetables/main.bicep @@ -0,0 +1,20 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource routeTable 'Microsoft.Network/routeTables@2022-09-01' = { + name: resourceName + location: location + properties: { + disableBgpRoutePropagation: false + routes: [ + { + name: 'first' + properties: { + addressPrefix: '10.100.0.0/14' + nextHopIpAddress: '10.10.1.1' + nextHopType: 'VirtualAppliance' + } + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/routetables/routes/main.bicep b/settings/remarks/microsoft.network/samples/routetables/routes/main.bicep new file mode 100644 index 00000000..fbbc0620 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/routetables/routes/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource routeTable 'Microsoft.Network/routeTables@2022-09-01' = { + name: resourceName + location: location + properties: { + disableBgpRoutePropagation: false + } +} + +resource route 'Microsoft.Network/routeTables/routes@2022-09-01' = { + parent: routeTable + name: resourceName + properties: { + addressPrefix: '10.1.0.0/16' + nextHopType: 'VnetLocal' + } +} diff --git a/settings/remarks/microsoft.network/samples/securitypartnerproviders/main.bicep b/settings/remarks/microsoft.network/samples/securitypartnerproviders/main.bicep new file mode 100644 index 00000000..067ac732 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/securitypartnerproviders/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource securityPartnerProvider 'Microsoft.Network/securityPartnerProviders@2022-07-01' = { + name: resourceName + location: location + properties: { + securityProviderName: 'ZScaler' + } +} diff --git a/settings/remarks/microsoft.network/samples/serviceendpointpolicies/main.bicep b/settings/remarks/microsoft.network/samples/serviceendpointpolicies/main.bicep new file mode 100644 index 00000000..82823612 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/serviceendpointpolicies/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serviceEndpointPolicy 'Microsoft.Network/serviceEndpointPolicies@2022-07-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/azureendpoints/main.bicep b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/azureendpoints/main.bicep new file mode 100644 index 00000000..70fa6158 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/azureendpoints/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + dnsSettings: { + domainNameLabel: 'acctestpublicip-230630034107607730' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Basic' + tier: 'Regional' + } +} + +resource trafficManagerProfile 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctest-tmp-230630034107607730' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Weighted' + } +} + +resource azureendpoint 'Microsoft.Network/trafficManagerProfiles/AzureEndpoints@2018-08-01' = { + parent: trafficManagerProfile + name: resourceName + properties: { + customHeaders: [] + endpointStatus: 'Enabled' + subnets: [] + targetResourceId: publicIPAddress.id + weight: 3 + } +} diff --git a/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/externalendpoints/main.bicep b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/externalendpoints/main.bicep new file mode 100644 index 00000000..c36d8655 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/externalendpoints/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' + +resource trafficManagerProfile 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctest-tmp-230630034107608613' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Weighted' + } +} + +resource externalendpoint 'Microsoft.Network/trafficManagerProfiles/ExternalEndpoints@2018-08-01' = { + parent: trafficManagerProfile + name: resourceName + properties: { + customHeaders: [] + endpointStatus: 'Enabled' + subnets: [] + target: 'www.example.com' + weight: 3 + } +} diff --git a/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/main.bicep b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/main.bicep new file mode 100644 index 00000000..949706d6 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' + +resource trafficManagerProfile 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctest-tmp-230630034107605443' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Weighted' + } +} diff --git a/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/nestedendpoints/main.bicep b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/nestedendpoints/main.bicep new file mode 100644 index 00000000..d212ad08 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/trafficmanagerprofiles/nestedendpoints/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' + +resource trafficManagerProfile 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctest-tmp-230630034107605443' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Weighted' + } +} + +resource trafficManagerProfile2 'Microsoft.Network/trafficManagerProfiles@2018-08-01' = { + name: resourceName + location: 'global' + properties: { + dnsConfig: { + relativeName: 'acctesttmpchild230630034107605443' + ttl: 30 + } + monitorConfig: { + expectedStatusCodeRanges: [] + intervalInSeconds: 30 + path: '/' + port: 443 + protocol: 'HTTPS' + timeoutInSeconds: 10 + toleratedNumberOfFailures: 3 + } + trafficRoutingMethod: 'Priority' + } +} + +resource nestedendpoint 'Microsoft.Network/trafficManagerProfiles/NestedEndpoints@2018-08-01' = { + parent: trafficManagerProfile + name: resourceName + properties: { + customHeaders: [] + endpointStatus: 'Enabled' + minChildEndpoints: 5 + subnets: [] + targetResourceId: trafficManagerProfile2.id + weight: 3 + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualhubs/hubvirtualnetworkconnections/main.bicep b/settings/remarks/microsoft.network/samples/virtualhubs/hubvirtualnetworkconnections/main.bicep new file mode 100644 index 00000000..7a49570d --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualhubs/hubvirtualnetworkconnections/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.2.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.5.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource hubVirtualNetworkConnection 'Microsoft.Network/virtualHubs/hubVirtualNetworkConnections@2022-07-01' = { + parent: virtualHub + name: resourceName + properties: { + enableInternetSecurity: false + remoteVirtualNetwork: { + id: virtualNetwork.id + } + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualhubs/ipconfigurations/main.bicep b/settings/remarks/microsoft.network/samples/virtualhubs/ipconfigurations/main.bicep new file mode 100644 index 00000000..253cb161 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualhubs/ipconfigurations/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + hubRoutingPreference: 'ExpressRoute' + sku: 'Standard' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.5.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource ipConfiguration 'Microsoft.Network/virtualHubs/ipConfigurations@2022-07-01' = { + parent: virtualHub + name: resourceName + properties: { + privateIPAddress: '10.5.1.18' + privateIPAllocationMethod: 'Static' + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'RouteServerSubnet' + properties: { + addressPrefix: '10.5.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualhubs/main.bicep b/settings/remarks/microsoft.network/samples/virtualhubs/main.bicep new file mode 100644 index 00000000..db3e41d4 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualhubs/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.0.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworkgateways/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworkgateways/main.bicep new file mode 100644 index 00000000..0700cc08 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworkgateways/main.bicep @@ -0,0 +1,81 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.6.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } + tags: { + SkipASMAzSecPack: 'true' + } +} + +resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + activeActive: false + enableBgp: false + enablePrivateIpAddress: false + gatewayType: 'ExpressRoute' + ipConfigurations: [ + { + name: 'vnetGatewayConfig' + properties: { + privateIPAllocationMethod: 'Dynamic' + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + } + ] + sku: { + name: 'Standard' + tier: 'Standard' + } + vpnType: 'RouteBased' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'GatewaySubnet' + properties: { + addressPrefix: '10.6.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworkgateways/natrules/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworkgateways/natrules/main.bicep new file mode 100644 index 00000000..04af3a1b --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworkgateways/natrules/main.bicep @@ -0,0 +1,97 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' = { + name: resourceName + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Dynamic' + } + sku: { + name: 'Basic' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + activeActive: false + enableBgp: false + enablePrivateIpAddress: false + gatewayType: 'Vpn' + ipConfigurations: [ + { + name: 'vnetGatewayConfig' + properties: { + privateIPAllocationMethod: 'Dynamic' + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + } + ] + sku: { + name: 'Basic' + tier: 'Basic' + } + vpnType: 'RouteBased' + } +} + +resource natRule 'Microsoft.Network/virtualNetworkGateways/natRules@2022-07-01' = { + parent: virtualNetworkGateway + name: resourceName + properties: { + externalMappings: [ + { + addressSpace: '10.1.0.0/26' + } + ] + internalMappings: [ + { + addressSpace: '10.3.0.0/26' + } + ] + mode: 'EgressSnat' + type: 'Static' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: 'GatewaySubnet' + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/main.bicep new file mode 100644 index 00000000..18df0706 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/main.bicep new file mode 100644 index 00000000..0e4b671a --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/withipampool/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/withipampool/main.bicep new file mode 100644 index 00000000..2b635d67 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/subnets/withipampool/main.bicep @@ -0,0 +1,63 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2024-05-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource vnetWithipam 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + ipamPoolPrefixAllocations: [ + { + numberOfIpAddresses: '100' + pool: { + id: ipamPool.id + } + } + ] + } + } +} + +resource ipamPool 'Microsoft.Network/networkManagers/ipamPools@2024-05-01' = { + parent: networkManager + name: resourceName + location: location + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + description: 'Test description.' + displayName: 'testDisplayName' + parentPoolName: '' + } +} + +resource subnetWithipam 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: vnetWithipam + name: resourceName + properties: { + ipamPoolPrefixAllocations: [ + { + numberOfIpAddresses: '100' + pool: { + id: ipamPool.id + } + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/virtualnetworkpeerings/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/virtualnetworkpeerings/main.bicep new file mode 100644 index 00000000..47562156 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/virtualnetworkpeerings/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource workspace 'Microsoft.Databricks/workspaces@2023-02-01' = { + name: resourceName + location: location + properties: { + managedResourceGroupId: resourceId('Microsoft.Resources/resourceGroups', 'databricks-rg-${resourceName}') + parameters: { + prepareEncryption: { + value: false + } + requireInfrastructureEncryption: { + value: false + } + } + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'standard' + } +} + +resource virtualNetworkPeering 'Microsoft.Databricks/workspaces/virtualNetworkPeerings@2023-02-01' = { + parent: workspace + name: resourceName + properties: { + allowForwardedTraffic: false + allowGatewayTransit: false + allowVirtualNetworkAccess: true + databricksAddressSpace: { + addressPrefixes: [ + '10.139.0.0/16' + ] + } + remoteAddressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + remoteVirtualNetwork: { + id: virtualNetwork.id + } + useRemoteGateways: false + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualnetworks/withipampool/main.bicep b/settings/remarks/microsoft.network/samples/virtualnetworks/withipampool/main.bicep new file mode 100644 index 00000000..e4b6953c --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualnetworks/withipampool/main.bicep @@ -0,0 +1,48 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource networkManager 'Microsoft.Network/networkManagers@2024-05-01' = { + name: resourceName + location: location + properties: { + description: '' + networkManagerScopeAccesses: [] + networkManagerScopes: { + managementGroups: [] + subscriptions: [ + '/subscriptions/subscription().subscriptionId' + ] + } + } +} + +resource vnetWithipam 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + ipamPoolPrefixAllocations: [ + { + numberOfIpAddresses: '100' + pool: { + id: ipamPool.id + } + } + ] + } + } +} + +resource ipamPool 'Microsoft.Network/networkManagers/ipamPools@2024-05-01' = { + parent: networkManager + name: resourceName + location: location + properties: { + addressPrefixes: [ + '10.0.0.0/24' + ] + description: 'Test description.' + displayName: 'testDisplayName' + parentPoolName: '' + } +} diff --git a/settings/remarks/microsoft.network/samples/virtualwans/main.bicep b/settings/remarks/microsoft.network/samples/virtualwans/main.bicep new file mode 100644 index 00000000..8552f4bf --- /dev/null +++ b/settings/remarks/microsoft.network/samples/virtualwans/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} diff --git a/settings/remarks/microsoft.network/samples/vpngateways/main.bicep b/settings/remarks/microsoft.network/samples/vpngateways/main.bicep new file mode 100644 index 00000000..dc050d57 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpngateways/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.0.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnGateway 'Microsoft.Network/vpnGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + enableBgpRouteTranslationForNat: false + isRoutingPreferenceInternet: false + virtualHub: { + id: virtualHub.id + } + vpnGatewayScaleUnit: 1 + } +} diff --git a/settings/remarks/microsoft.network/samples/vpngateways/natrules/main.bicep b/settings/remarks/microsoft.network/samples/vpngateways/natrules/main.bicep new file mode 100644 index 00000000..64be60e1 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpngateways/natrules/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.0.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnGateway 'Microsoft.Network/vpnGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + enableBgpRouteTranslationForNat: false + isRoutingPreferenceInternet: false + virtualHub: { + id: virtualHub.id + } + vpnGatewayScaleUnit: 1 + } +} + +resource natRule 'Microsoft.Network/vpnGateways/natRules@2022-07-01' = { + parent: vpnGateway + name: resourceName + properties: { + externalMappings: [ + { + addressSpace: '192.168.21.0/26' + } + ] + internalMappings: [ + { + addressSpace: '10.4.0.0/26' + } + ] + mode: 'EgressSnat' + type: 'Static' + } +} diff --git a/settings/remarks/microsoft.network/samples/vpngateways/vpnconnections/main.bicep b/settings/remarks/microsoft.network/samples/vpngateways/vpnconnections/main.bicep new file mode 100644 index 00000000..df767738 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpngateways/vpnconnections/main.bicep @@ -0,0 +1,127 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualHub 'Microsoft.Network/virtualHubs@2022-07-01' = { + name: resourceName + location: location + properties: { + addressPrefix: '10.0.0.0/24' + hubRoutingPreference: 'ExpressRoute' + virtualRouterAutoScaleConfiguration: { + minCapacity: 2 + } + virtualWan: { + id: virtualWan.id + } + } +} + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnGateway 'Microsoft.Network/vpnGateways@2022-07-01' = { + name: resourceName + location: location + properties: { + enableBgpRouteTranslationForNat: false + isRoutingPreferenceInternet: false + virtualHub: { + id: virtualHub.id + } + vpnGatewayScaleUnit: 1 + } +} + +resource vpnSite 'Microsoft.Network/vpnSites@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + virtualWan: { + id: virtualWan.id + } + vpnSiteLinks: [ + { + name: 'link1' + properties: { + fqdn: '' + ipAddress: '10.0.1.1' + linkProperties: { + linkProviderName: '' + linkSpeedInMbps: 0 + } + } + } + { + name: 'link2' + properties: { + fqdn: '' + ipAddress: '10.0.1.2' + linkProperties: { + linkProviderName: '' + linkSpeedInMbps: 0 + } + } + } + ] + } +} + +resource vpnConnection 'Microsoft.Network/vpnGateways/vpnConnections@2022-07-01' = { + parent: vpnGateway + name: resourceName + properties: { + enableInternetSecurity: false + remoteVpnSite: { + id: vpnSite.id + } + vpnLinkConnections: [ + { + name: 'link1' + properties: { + connectionBandwidth: 10 + enableBgp: false + enableRateLimiting: false + routingWeight: 0 + useLocalAzureIpAddress: false + usePolicyBasedTrafficSelectors: false + vpnConnectionProtocolType: 'IKEv2' + vpnGatewayCustomBgpAddresses: [] + vpnLinkConnectionMode: 'Default' + vpnSiteLink: { + id: resourceId('Microsoft.Network/vpnSites/vpnSiteLinks', vpnSite.name, 'link1') + } + } + } + { + name: 'link2' + properties: { + connectionBandwidth: 10 + enableBgp: false + enableRateLimiting: false + routingWeight: 0 + useLocalAzureIpAddress: false + usePolicyBasedTrafficSelectors: false + vpnConnectionProtocolType: 'IKEv2' + vpnGatewayCustomBgpAddresses: [] + vpnLinkConnectionMode: 'Default' + vpnSiteLink: { + id: resourceId('Microsoft.Network/vpnSites/vpnSiteLinks', vpnSite.name, 'link2') + } + } + } + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/vpnserverconfigurations/configurationpolicygroups/main.bicep b/settings/remarks/microsoft.network/samples/vpnserverconfigurations/configurationpolicygroups/main.bicep new file mode 100644 index 00000000..0d5158ba --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpnserverconfigurations/configurationpolicygroups/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The RADIUS server secret for VPN authentication') +param radiusServerSecret string + +resource vpnServerConfiguration 'Microsoft.Network/vpnServerConfigurations@2022-07-01' = { + name: resourceName + location: location + properties: { + radiusClientRootCertificates: [] + radiusServerAddress: '' + radiusServerRootCertificates: [] + radiusServerSecret: '' + radiusServers: [ + { + radiusServerAddress: '10.105.1.1' + radiusServerScore: 15 + radiusServerSecret: null + } + ] + vpnAuthenticationTypes: [ + 'Radius' + ] + vpnClientIpsecPolicies: [] + vpnClientRevokedCertificates: [] + vpnClientRootCertificates: [] + vpnProtocols: [ + 'OpenVPN' + 'IkeV2' + ] + } +} + +resource configurationPolicyGroup 'Microsoft.Network/vpnServerConfigurations/configurationPolicyGroups@2022-07-01' = { + parent: vpnServerConfiguration + name: resourceName + properties: { + isDefault: false + policyMembers: [ + { + attributeType: 'RadiusAzureGroupId' + attributeValue: '6ad1bd08' + name: 'policy1' + } + ] + priority: 0 + } +} diff --git a/settings/remarks/microsoft.network/samples/vpnserverconfigurations/main.bicep b/settings/remarks/microsoft.network/samples/vpnserverconfigurations/main.bicep new file mode 100644 index 00000000..74eefeea --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpnserverconfigurations/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The RADIUS server secret for VPN server configuration') +param radiusServerSecret string + +resource vpnServerConfiguration 'Microsoft.Network/vpnServerConfigurations@2022-07-01' = { + name: resourceName + location: location + properties: { + radiusClientRootCertificates: [] + radiusServerAddress: '' + radiusServerRootCertificates: [] + radiusServerSecret: null + radiusServers: [ + { + radiusServerAddress: '10.105.1.1' + radiusServerScore: 15 + radiusServerSecret: null + } + ] + vpnAuthenticationTypes: [ + 'Radius' + ] + vpnClientIpsecPolicies: [] + vpnClientRevokedCertificates: [] + vpnClientRootCertificates: [] + vpnProtocols: [ + 'OpenVPN' + 'IkeV2' + ] + } +} diff --git a/settings/remarks/microsoft.network/samples/vpnsites/main.bicep b/settings/remarks/microsoft.network/samples/vpnsites/main.bicep new file mode 100644 index 00000000..088159a6 --- /dev/null +++ b/settings/remarks/microsoft.network/samples/vpnsites/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource virtualWan 'Microsoft.Network/virtualWans@2022-07-01' = { + name: resourceName + location: location + properties: { + allowBranchToBranchTraffic: true + disableVpnEncryption: false + office365LocalBreakoutCategory: 'None' + type: 'Standard' + } +} + +resource vpnSite 'Microsoft.Network/vpnSites@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.1.0/24' + ] + } + virtualWan: { + id: virtualWan.id + } + vpnSiteLinks: [ + { + name: 'link1' + properties: { + fqdn: '' + ipAddress: '10.0.1.1' + linkProperties: { + linkProviderName: '' + linkSpeedInMbps: 0 + } + } + } + { + name: 'link2' + properties: { + fqdn: '' + ipAddress: '10.0.1.2' + linkProperties: { + linkProviderName: '' + linkSpeedInMbps: 0 + } + } + } + ] + } +} diff --git a/settings/remarks/microsoft.networkfunction/remarks.json b/settings/remarks/microsoft.networkfunction/remarks.json index 5750408a..ccc41a7c 100644 --- a/settings/remarks/microsoft.networkfunction/remarks.json +++ b/settings/remarks/microsoft.networkfunction/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.NetworkFunction/azureTrafficCollectors", - "Path": "samples/azuretrafficcollectors/main.tf", - "Description": "A basic example of deploying Network Function Azure Traffic Collector." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.NetworkFunction/azureTrafficCollectors", + "Path": "samples/azuretrafficcollectors/main.tf", + "Description": "A basic example of deploying Network Function Azure Traffic Collector." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.NetworkFunction/azureTrafficCollectors", + "Path": "samples/azuretrafficcollectors/main.bicep", + "Description": "A basic example of deploying Network Function Azure Traffic Collector." + } + ] +} diff --git a/settings/remarks/microsoft.networkfunction/samples/azuretrafficcollectors/main.bicep b/settings/remarks/microsoft.networkfunction/samples/azuretrafficcollectors/main.bicep new file mode 100644 index 00000000..58a64dd3 --- /dev/null +++ b/settings/remarks/microsoft.networkfunction/samples/azuretrafficcollectors/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource azureTrafficCollector 'Microsoft.NetworkFunction/azureTrafficCollectors@2022-11-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.notificationhubs/remarks.json b/settings/remarks/microsoft.notificationhubs/remarks.json index 22624b9d..627fd5f3 100644 --- a/settings/remarks/microsoft.notificationhubs/remarks.json +++ b/settings/remarks/microsoft.notificationhubs/remarks.json @@ -1,20 +1,37 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.NotificationHubs/namespaces", - "Path": "samples/namespaces/main.tf", - "Description": "A basic example of deploying Notification Hub Namespace." - }, - { - "ResourceType": "Microsoft.NotificationHubs/namespaces/notificationHubs", - "Path": "samples/namespaces/notificationhubs/main.tf", - "Description": "A basic example of deploying Notification Hub within a Notification Hub Namespace." - }, - { - "ResourceType": "Microsoft.NotificationHubs/namespaces/notificationHubs/authorizationRules", - "Path": "samples/namespaces/notificationhubs/authorizationrules/main.tf", - "Description": "A basic example of deploying Authorization Rule associated with a Notification Hub within a Notification Hub Namespace." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.NotificationHubs/namespaces", + "Path": "samples/namespaces/main.tf", + "Description": "A basic example of deploying Notification Hub Namespace." + }, + { + "ResourceType": "Microsoft.NotificationHubs/namespaces/notificationHubs", + "Path": "samples/namespaces/notificationhubs/main.tf", + "Description": "A basic example of deploying Notification Hub within a Notification Hub Namespace." + }, + { + "ResourceType": "Microsoft.NotificationHubs/namespaces/notificationHubs/authorizationRules", + "Path": "samples/namespaces/notificationhubs/authorizationrules/main.tf", + "Description": "A basic example of deploying Authorization Rule associated with a Notification Hub within a Notification Hub Namespace." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.NotificationHubs/namespaces", + "Path": "samples/namespaces/main.bicep", + "Description": "A basic example of deploying Notification Hub Namespace." + }, + { + "ResourceType": "Microsoft.NotificationHubs/namespaces/notificationHubs", + "Path": "samples/namespaces/notificationhubs/main.bicep", + "Description": "A basic example of deploying Notification Hub within a Notification Hub Namespace." + }, + { + "ResourceType": "Microsoft.NotificationHubs/namespaces/notificationHubs/authorizationRules", + "Path": "samples/namespaces/notificationhubs/authorizationrules/main.bicep", + "Description": "A basic example of deploying Authorization Rule associated with a Notification Hub within a Notification Hub Namespace." + } + ] +} diff --git a/settings/remarks/microsoft.notificationhubs/samples/namespaces/main.bicep b/settings/remarks/microsoft.notificationhubs/samples/namespaces/main.bicep new file mode 100644 index 00000000..0f5e42f9 --- /dev/null +++ b/settings/remarks/microsoft.notificationhubs/samples/namespaces/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.NotificationHubs/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: { + enabled: true + namespaceType: 'NotificationHub' + region: 'westeurope' + } + sku: { + name: 'Free' + } +} diff --git a/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/authorizationrules/main.bicep b/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/authorizationrules/main.bicep new file mode 100644 index 00000000..a0ecd04f --- /dev/null +++ b/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/authorizationrules/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.NotificationHubs/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: { + enabled: true + namespaceType: 'NotificationHub' + region: 'westeurope' + } + sku: { + name: 'Free' + } +} + +resource notificationHub 'Microsoft.NotificationHubs/namespaces/notificationHubs@2017-04-01' = { + parent: namespace + name: resourceName + location: location + properties: {} +} + +resource authorizationRule 'Microsoft.NotificationHubs/namespaces/notificationHubs/authorizationRules@2017-04-01' = { + parent: notificationHub + name: resourceName + properties: { + rights: [ + 'Listen' + ] + } +} diff --git a/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/main.bicep b/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/main.bicep new file mode 100644 index 00000000..a64a6b66 --- /dev/null +++ b/settings/remarks/microsoft.notificationhubs/samples/namespaces/notificationhubs/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.NotificationHubs/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: { + enabled: true + namespaceType: 'NotificationHub' + region: 'westeurope' + } + sku: { + name: 'Free' + } +} + +resource notificationHub 'Microsoft.NotificationHubs/namespaces/notificationHubs@2017-04-01' = { + parent: namespace + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.operationalinsights/remarks.json b/settings/remarks/microsoft.operationalinsights/remarks.json index a8007cf1..15a98df1 100644 --- a/settings/remarks/microsoft.operationalinsights/remarks.json +++ b/settings/remarks/microsoft.operationalinsights/remarks.json @@ -1,78 +1,145 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "For guidance on deploying monitoring solutions, see [Create monitoring resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-monitoring).", - "ResourceTypes": [ - "microsoft.operationalinsights/workspaces" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.OperationalInsights/clusters", - "Path": "samples/clusters/main.tf", - "Description": "A basic example of deploying Log Analytics Cluster." - }, - { - "ResourceType": "Microsoft.OperationalInsights/queryPacks", - "Path": "samples/querypacks/main.tf", - "Description": "A basic example of deploying Log Analytics Query Pack." - }, - { - "ResourceType": "Microsoft.OperationalInsights/queryPacks/queries", - "Path": "samples/querypacks/queries/main.tf", - "Description": "A basic example of deploying Log Analytics Query Pack Query." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces", - "Path": "samples/workspaces/main.tf", - "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Workspace." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/dataExports", - "Path": "samples/workspaces/dataexports/main.tf", - "Description": "A basic example of deploying log analytics Data Export Rule." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/dataSources", - "Path": "samples/workspaces/datasources/main.tf", - "Description": "A basic example of deploying Log Analytics (formally Operational Insights) DataSource." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/linkedServices", - "Path": "samples/workspaces/linkedservices/main.tf", - "Description": "A basic example of deploying Log Analytics Linked Service." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/linkedStorageAccounts", - "Path": "samples/workspaces/linkedstorageaccounts/main.tf", - "Description": "A basic example of deploying Log Analytics Linked Storage Account." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/savedSearches", - "Path": "samples/workspaces/savedsearches/main.tf", - "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Saved Search." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/storageInsightConfigs", - "Path": "samples/workspaces/storageinsightconfigs/main.tf", - "Description": "A basic example of deploying Log Analytics Storage Insights resource." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", - "Path": "samples/workspaces/tables/auditlog/main.tf", - "Description": "A auditlog example of deploying Operational Insights Workspaces Tables." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", - "Path": "samples/workspaces/tables/basic/main.tf", - "Description": "A basic example of deploying Operational Insights Workspaces Tables." - }, - { - "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", - "Path": "samples/workspaces/tables/datacollectionlogs/main.tf", - "Description": "A datacollectionlogs example of deploying Operational Insights Workspaces Tables." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "For guidance on deploying monitoring solutions, see [Create monitoring resources by using Bicep](/azure/azure-resource-manager/bicep/scenarios-monitoring).", + "ResourceTypes": [ + "microsoft.operationalinsights/workspaces" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.OperationalInsights/clusters", + "Path": "samples/clusters/main.tf", + "Description": "A basic example of deploying Log Analytics Cluster." + }, + { + "ResourceType": "Microsoft.OperationalInsights/queryPacks", + "Path": "samples/querypacks/main.tf", + "Description": "A basic example of deploying Log Analytics Query Pack." + }, + { + "ResourceType": "Microsoft.OperationalInsights/queryPacks/queries", + "Path": "samples/querypacks/queries/main.tf", + "Description": "A basic example of deploying Log Analytics Query Pack Query." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces", + "Path": "samples/workspaces/main.tf", + "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Workspace." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/dataExports", + "Path": "samples/workspaces/dataexports/main.tf", + "Description": "A basic example of deploying log analytics Data Export Rule." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/dataSources", + "Path": "samples/workspaces/datasources/main.tf", + "Description": "A basic example of deploying Log Analytics (formally Operational Insights) DataSource." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/linkedServices", + "Path": "samples/workspaces/linkedservices/main.tf", + "Description": "A basic example of deploying Log Analytics Linked Service." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/linkedStorageAccounts", + "Path": "samples/workspaces/linkedstorageaccounts/main.tf", + "Description": "A basic example of deploying Log Analytics Linked Storage Account." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/savedSearches", + "Path": "samples/workspaces/savedsearches/main.tf", + "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Saved Search." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/storageInsightConfigs", + "Path": "samples/workspaces/storageinsightconfigs/main.tf", + "Description": "A basic example of deploying Log Analytics Storage Insights resource." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", + "Path": "samples/workspaces/tables/auditlog/main.tf", + "Description": "A auditlog example of deploying Operational Insights Workspaces Tables." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", + "Path": "samples/workspaces/tables/basic/main.tf", + "Description": "A basic example of deploying Operational Insights Workspaces Tables." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", + "Path": "samples/workspaces/tables/datacollectionlogs/main.tf", + "Description": "A datacollectionlogs example of deploying Operational Insights Workspaces Tables." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.OperationalInsights/clusters", + "Path": "samples/clusters/main.bicep", + "Description": "A basic example of deploying Log Analytics Cluster." + }, + { + "ResourceType": "Microsoft.OperationalInsights/queryPacks", + "Path": "samples/querypacks/main.bicep", + "Description": "A basic example of deploying Log Analytics Query Pack." + }, + { + "ResourceType": "Microsoft.OperationalInsights/queryPacks/queries", + "Path": "samples/querypacks/queries/main.bicep", + "Description": "A basic example of deploying Log Analytics Query Pack Query." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces", + "Path": "samples/workspaces/main.bicep", + "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Workspace." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/dataExports", + "Path": "samples/workspaces/dataexports/main.bicep", + "Description": "A basic example of deploying log analytics Data Export Rule." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/dataSources", + "Path": "samples/workspaces/datasources/main.bicep", + "Description": "A basic example of deploying Log Analytics (formally Operational Insights) DataSource." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/linkedServices", + "Path": "samples/workspaces/linkedservices/main.bicep", + "Description": "A basic example of deploying Log Analytics Linked Service." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/linkedStorageAccounts", + "Path": "samples/workspaces/linkedstorageaccounts/main.bicep", + "Description": "A basic example of deploying Log Analytics Linked Storage Account." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/savedSearches", + "Path": "samples/workspaces/savedsearches/main.bicep", + "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Saved Search." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/storageInsightConfigs", + "Path": "samples/workspaces/storageinsightconfigs/main.bicep", + "Description": "A basic example of deploying Log Analytics Storage Insights resource." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", + "Path": "samples/workspaces/tables/auditlog/main.bicep", + "Description": "A auditlog example of deploying Operational Insights Workspaces Tables." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", + "Path": "samples/workspaces/tables/basic/main.bicep", + "Description": "A basic example of deploying Operational Insights Workspaces Tables." + }, + { + "ResourceType": "Microsoft.OperationalInsights/workspaces/tables", + "Path": "samples/workspaces/tables/datacollectionlogs/main.bicep", + "Description": "A datacollectionlogs example of deploying Operational Insights Workspaces Tables." + } + ] +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/clusters/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/clusters/main.bicep new file mode 100644 index 00000000..1accf041 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/clusters/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.OperationalInsights/clusters@2020-08-01' = { + name: resourceName + location: location + sku: { + capacity: 1000 + name: 'CapacityReservation' + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/querypacks/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/querypacks/main.bicep new file mode 100644 index 00000000..6000b7c6 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/querypacks/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource queryPack 'Microsoft.OperationalInsights/queryPacks@2019-09-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/querypacks/queries/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/querypacks/queries/main.bicep new file mode 100644 index 00000000..45473f5d --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/querypacks/queries/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource queryPack 'Microsoft.OperationalInsights/queryPacks@2019-09-01' = { + name: resourceName + location: location + properties: {} +} + +resource query 'Microsoft.OperationalInsights/queryPacks/queries@2019-09-01' = { + parent: queryPack + name: 'aca50e92-d3e6-8f7d-1f70-2ec7adc1a926' + properties: { + body: ''' let newExceptionsTimeRange = 1d; + let timeRangeToCheckBefore = 7d; + exceptions + | where timestamp < ago(timeRangeToCheckBefore) + | summarize count() by problemId + | join kind= rightanti ( + exceptions + | where timestamp >= ago(newExceptionsTimeRange) + | extend stack = tostring(details[0].rawStack) + | summarize count(), dcount(user_AuthenticatedId), min(timestamp), max(timestamp), any(stack) by problemId + ) on problemId + | order by count_ desc +''' + displayName: 'Exceptions - New in the last 24 hours' + related: {} + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/dataexports/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/dataexports/main.bicep new file mode 100644 index 00000000..c2af68a5 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/dataexports/main.bicep @@ -0,0 +1,72 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource dataExport 'Microsoft.OperationalInsights/workspaces/dataExports@2020-08-01' = { + parent: workspace + name: resourceName + properties: { + destination: { + resourceId: storageAccount.id + } + enable: false + tableNames: [ + 'Heartbeat' + ] + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/datasources/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/datasources/main.bicep new file mode 100644 index 00000000..5ba8c4da --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/datasources/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource dataSource 'Microsoft.OperationalInsights/workspaces/dataSources@2020-08-01' = { + parent: workspace + name: resourceName + kind: 'WindowsPerformanceCounter' + properties: { + counterName: 'CPU' + instanceName: '*' + intervalSeconds: 10 + objectName: 'CPU' + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedservices/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedservices/main.bicep new file mode 100644 index 00000000..c25e31ac --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedservices/main.bicep @@ -0,0 +1,44 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationAccount 'Microsoft.Automation/automationAccounts@2021-06-22' = { + name: resourceName + location: location + properties: { + encryption: { + keySource: 'Microsoft.Automation' + } + publicNetworkAccess: true + sku: { + name: 'Basic' + } + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource linkedService 'Microsoft.OperationalInsights/workspaces/linkedServices@2020-08-01' = { + parent: workspace + name: 'Automation' + properties: { + resourceId: automationAccount.id + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedstorageaccounts/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedstorageaccounts/main.bicep new file mode 100644 index 00000000..05d122f7 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/linkedstorageaccounts/main.bicep @@ -0,0 +1,68 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_GRS' + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource linkedStorageAccount 'Microsoft.OperationalInsights/workspaces/linkedStorageAccounts@2020-08-01' = { + parent: workspace + name: 'CustomLogs' + properties: { + storageAccountIds: [ + storageAccount.id + ] + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/main.bicep new file mode 100644 index 00000000..9079a531 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/savedsearches/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/savedsearches/main.bicep new file mode 100644 index 00000000..f51a1484 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/savedsearches/main.bicep @@ -0,0 +1,34 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource savedSearch 'Microsoft.OperationalInsights/workspaces/savedSearches@2020-08-01' = { + parent: workspace + name: resourceName + properties: { + category: 'Saved Search Test Category' + displayName: 'Create or Update Saved Search Test' + functionAlias: '' + query: 'Heartbeat | summarize Count() by Computer | take a' + tags: [] + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/storageinsightconfigs/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/storageinsightconfigs/main.bicep new file mode 100644 index 00000000..d1e20186 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/storageinsightconfigs/main.bicep @@ -0,0 +1,69 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource storageInsightConfig 'Microsoft.OperationalInsights/workspaces/storageInsightConfigs@2020-08-01' = { + parent: workspace + name: resourceName + properties: { + storageAccount: { + id: storageAccount.id + key: storageAccount.listKeys().keys[0].value + } + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/auditlog/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/auditlog/main.bicep new file mode 100644 index 00000000..c12edf51 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/auditlog/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +var auditLogTableName = 'AuditLog_CL' +var auditLogColumns = {} // TODO: Complex type needs manual conversion + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource table 'Microsoft.OperationalInsights/workspaces/tables@2022-10-01' = { + parent: workspace + name: auditLogTableName + properties: { + schema: { + name: auditLogTableName + columns: auditLogColumns + } + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/basic/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/basic/main.bicep new file mode 100644 index 00000000..3625aa63 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/basic/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +var sentinelTiAlertsTableName = 'SentinelTIAlerts_CL' +var sentinelTiAlertsColumns = {} // TODO: Complex type needs manual conversion + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource table 'Microsoft.OperationalInsights/workspaces/tables@2022-10-01' = { + parent: workspace + name: sentinelTiAlertsTableName + properties: { + schema: { + name: sentinelTiAlertsTableName + columns: sentinelTiAlertsColumns + } + retentionInDays: 30 + totalRetentionInDays: 30 + } +} diff --git a/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/datacollectionlogs/main.bicep b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/datacollectionlogs/main.bicep new file mode 100644 index 00000000..b47ae2d2 --- /dev/null +++ b/settings/remarks/microsoft.operationalinsights/samples/workspaces/tables/datacollectionlogs/main.bicep @@ -0,0 +1,36 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +var dataCollectionLogTableName = 'DataCollectionLog_CL' +var dataCollectionLogColumns = {} // TODO: Complex type needs manual conversion + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource table 'Microsoft.OperationalInsights/workspaces/tables@2022-10-01' = { + parent: workspace + name: dataCollectionLogTableName + properties: { + schema: { + name: dataCollectionLogTableName + columns: dataCollectionLogColumns + } + } +} diff --git a/settings/remarks/microsoft.operationsmanagement/remarks.json b/settings/remarks/microsoft.operationsmanagement/remarks.json index 2cd20360..5b738052 100644 --- a/settings/remarks/microsoft.operationsmanagement/remarks.json +++ b/settings/remarks/microsoft.operationsmanagement/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.OperationsManagement/solutions", - "Path": "samples/solutions/main.tf", - "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Solution." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.OperationsManagement/solutions", + "Path": "samples/solutions/main.tf", + "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Solution." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.OperationsManagement/solutions", + "Path": "samples/solutions/main.bicep", + "Description": "A basic example of deploying Log Analytics (formally Operational Insights) Solution." + } + ] +} diff --git a/settings/remarks/microsoft.operationsmanagement/samples/solutions/main.bicep b/settings/remarks/microsoft.operationsmanagement/samples/solutions/main.bicep new file mode 100644 index 00000000..d2fa20f2 --- /dev/null +++ b/settings/remarks/microsoft.operationsmanagement/samples/solutions/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource solution 'Microsoft.OperationsManagement/solutions@2015-11-01-preview' = { + name: 'ContainerInsights(${resourceName})' + location: location + plan: { + name: 'ContainerInsights(acctest0001)' + product: 'OMSGallery/ContainerInsights' + promotionCode: '' + publisher: 'Microsoft' + } + properties: { + workspaceResourceId: workspace.id + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + sku: { + name: 'PerGB2018' + } + } +} diff --git a/settings/remarks/microsoft.orbital/remarks.json b/settings/remarks/microsoft.orbital/remarks.json index ff34d561..183e2bbe 100644 --- a/settings/remarks/microsoft.orbital/remarks.json +++ b/settings/remarks/microsoft.orbital/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Orbital/spacecrafts", - "Path": "samples/spacecrafts/main.tf", - "Description": "A basic example of deploying Spacecraft resource." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Orbital/spacecrafts", + "Path": "samples/spacecrafts/main.tf", + "Description": "A basic example of deploying Spacecraft resource." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Orbital/spacecrafts", + "Path": "samples/spacecrafts/main.bicep", + "Description": "A basic example of deploying Spacecraft resource." + } + ] +} diff --git a/settings/remarks/microsoft.orbital/samples/spacecrafts/main.bicep b/settings/remarks/microsoft.orbital/samples/spacecrafts/main.bicep new file mode 100644 index 00000000..9fea2ed7 --- /dev/null +++ b/settings/remarks/microsoft.orbital/samples/spacecrafts/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource spacecraft 'Microsoft.Orbital/spacecrafts@2022-11-01' = { + name: resourceName + location: location + properties: { + links: [ + { + bandwidthMHz: 100 + centerFrequencyMHz: 101 + direction: 'Uplink' + name: 'linkname' + polarization: 'LHCP' + } + ] + noradId: '12345' + titleLine: 'AQUA' + tleLine1: '1 23455U 94089A 97320.90946019 .00000140 00000-0 10191-3 0 2621' + tleLine2: '2 23455 99.0090 272.6745 0008546 223.1686 136.8816 14.11711747148495' + } +} diff --git a/settings/remarks/microsoft.policyinsights/remarks.json b/settings/remarks/microsoft.policyinsights/remarks.json index 10edf984..b6cecb7a 100644 --- a/settings/remarks/microsoft.policyinsights/remarks.json +++ b/settings/remarks/microsoft.policyinsights/remarks.json @@ -1,15 +1,22 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.PolicyInsights/policyStates", - "Path": "samples/policystates/main.tf", - "Description": "A basic example of deploying Policy Insights Policy States." - }, - { - "ResourceType": "Microsoft.PolicyInsights/remediations", - "Path": "samples/remediations/main.tf", - "Description": "A basic example of deploying Azure Policy Remediation." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.PolicyInsights/policyStates", + "Path": "samples/policystates/main.tf", + "Description": "A basic example of deploying Policy Insights Policy States." + }, + { + "ResourceType": "Microsoft.PolicyInsights/remediations", + "Path": "samples/remediations/main.tf", + "Description": "A basic example of deploying Azure Policy Remediation." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.PolicyInsights/remediations", + "Path": "samples/remediations/main.bicep", + "Description": "A basic example of deploying Azure Policy Remediation." + } + ] +} diff --git a/settings/remarks/microsoft.policyinsights/samples/remediations/main.bicep b/settings/remarks/microsoft.policyinsights/samples/remediations/main.bicep new file mode 100644 index 00000000..416c116c --- /dev/null +++ b/settings/remarks/microsoft.policyinsights/samples/remediations/main.bicep @@ -0,0 +1,34 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource policyAssignment 'Microsoft.Authorization/policyAssignments@2022-06-01' = { + name: resourceName + properties: { + displayName: '' + enforcementMode: 'Default' + parameters: { + listOfAllowedLocations: { + value: [ + 'West Europe' + 'West US 2' + 'East US 2' + ] + } + } + policyDefinitionId: '/providers/Microsoft.Authorization/policyDefinitions/e56962a6-4747-49cd-b67b-bf8b01975c4c' + scope: subscription().id + } +} + +resource remediation 'Microsoft.PolicyInsights/remediations@2021-10-01' = { + name: resourceName + properties: { + filters: { + locations: [] + } + policyAssignmentId: policyAssignment.id + policyDefinitionReferenceId: '' + resourceDiscoveryMode: 'ExistingNonCompliant' + } +} diff --git a/settings/remarks/microsoft.portal/remarks.json b/settings/remarks/microsoft.portal/remarks.json index a9a32bfd..5d26cad0 100644 --- a/settings/remarks/microsoft.portal/remarks.json +++ b/settings/remarks/microsoft.portal/remarks.json @@ -1,18 +1,25 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "For more information about creating dashboards, see [The structure of Azure dashboards](/azure/azure-portal/azure-portal-dashboards-structure).", - "ResourceTypes": [ - "microsoft.portal/dashboards" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Portal/dashboards", - "Path": "samples/dashboards/main.tf", - "Description": "A basic example of deploying shared dashboard in the Azure Portal." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "For more information about creating dashboards, see [The structure of Azure dashboards](/azure/azure-portal/azure-portal-dashboards-structure).", + "ResourceTypes": [ + "microsoft.portal/dashboards" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Portal/dashboards", + "Path": "samples/dashboards/main.tf", + "Description": "A basic example of deploying shared dashboard in the Azure Portal." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Portal/dashboards", + "Path": "samples/dashboards/main.bicep", + "Description": "A basic example of deploying shared dashboard in the Azure Portal." + } + ] +} diff --git a/settings/remarks/microsoft.portal/samples/dashboards/main.bicep b/settings/remarks/microsoft.portal/samples/dashboards/main.bicep new file mode 100644 index 00000000..18c8f0ca --- /dev/null +++ b/settings/remarks/microsoft.portal/samples/dashboards/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dashboard 'Microsoft.Portal/dashboards@2019-01-01-preview' = { + name: resourceName + location: location + properties: { + lenses: {} + } +} diff --git a/settings/remarks/microsoft.powerbidedicated/remarks.json b/settings/remarks/microsoft.powerbidedicated/remarks.json index cb121516..696eea0b 100644 --- a/settings/remarks/microsoft.powerbidedicated/remarks.json +++ b/settings/remarks/microsoft.powerbidedicated/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.PowerBIDedicated/capacities", - "Path": "samples/capacities/main.tf", - "Description": "A basic example of deploying PowerBI Embedded." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.PowerBIDedicated/capacities", + "Path": "samples/capacities/main.tf", + "Description": "A basic example of deploying PowerBI Embedded." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.PowerBIDedicated/capacities", + "Path": "samples/capacities/main.bicep", + "Description": "A basic example of deploying PowerBI Embedded." + } + ] +} diff --git a/settings/remarks/microsoft.powerbidedicated/samples/capacities/main.bicep b/settings/remarks/microsoft.powerbidedicated/samples/capacities/main.bicep new file mode 100644 index 00000000..f9f6c53c --- /dev/null +++ b/settings/remarks/microsoft.powerbidedicated/samples/capacities/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource capacity 'Microsoft.PowerBIDedicated/capacities@2021-01-01' = { + name: resourceName + location: location + properties: { + administration: { + members: [ + deployer().objectId + ] + } + mode: 'Gen2' + } + sku: { + name: 'A1' + } +} diff --git a/settings/remarks/microsoft.purview/remarks.json b/settings/remarks/microsoft.purview/remarks.json index 0e53bb0a..63fe5fa8 100644 --- a/settings/remarks/microsoft.purview/remarks.json +++ b/settings/remarks/microsoft.purview/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Purview/accounts", - "Path": "samples/accounts/main.tf", - "Description": "A basic example of deploying Purview Account." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Purview/accounts", + "Path": "samples/accounts/main.tf", + "Description": "A basic example of deploying Purview Account." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Purview/accounts", + "Path": "samples/accounts/main.bicep", + "Description": "A basic example of deploying Purview Account." + } + ] +} diff --git a/settings/remarks/microsoft.purview/samples/accounts/main.bicep b/settings/remarks/microsoft.purview/samples/accounts/main.bicep new file mode 100644 index 00000000..0f6843fe --- /dev/null +++ b/settings/remarks/microsoft.purview/samples/accounts/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource account 'Microsoft.Purview/accounts@2021-07-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.recoveryservices/remarks.json b/settings/remarks/microsoft.recoveryservices/remarks.json index da4081af..0409a0a6 100644 --- a/settings/remarks/microsoft.recoveryservices/remarks.json +++ b/settings/remarks/microsoft.recoveryservices/remarks.json @@ -1,65 +1,117 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.RecoveryServices/vaults", - "Path": "samples/vaults/main.tf", - "Description": "A basic example of deploying Recovery Services Vault." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/backupFabrics/protectionContainers", - "Path": "samples/vaults/backupfabrics/protectioncontainers/main.tf", - "Description": "A basic example of deploying storage account container in an Azure Recovery Vault." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/backupFabrics/protectionContainers/protectedItems", - "Path": "samples/vaults/backupfabrics/protectioncontainers/protecteditems/main.tf", - "Description": "A basic example of deploying Azure Backup Protected Item." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/backupPolicies", - "Path": "samples/vaults/backuppolicies/main.tf", - "Description": "A basic example of deploying Backup Policy." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/backupResourceGuardProxies", - "Path": "samples/vaults/backupresourceguardproxies/main.tf", - "Description": "A basic example of deploying association of a Resource Guard and Recovery Services Vault." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/backupStorageConfig", - "Path": "samples/vaults/backupstorageconfig/main.tf", - "Description": "A basic example of deploying Azure Backup Storage Configuration." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/backupconfig", - "Path": "samples/vaults/backupconfig/main.tf", - "Description": "A basic example of deploying Recovery Services Vaults Backup Config." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics", - "Path": "samples/vaults/replicationfabrics/main.tf", - "Description": "A basic example of deploying Site Recovery Replication Fabric on Azure." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings", - "Path": "samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.tf", - "Description": "A basic example of deploying site recovery network mapping on Azure." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers", - "Path": "samples/vaults/replicationfabrics/replicationprotectioncontainers/main.tf", - "Description": "A basic example of deploying site recovery services protection container on Azure." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings", - "Path": "samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.tf", - "Description": "A basic example of deploying Site Recovery protection container mapping on Azure." - }, - { - "ResourceType": "Microsoft.RecoveryServices/vaults/replicationPolicies", - "Path": "samples/vaults/replicationpolicies/main.tf", - "Description": "A basic example of deploying Azure Site Recovery replication policy on Azure." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.RecoveryServices/vaults", + "Path": "samples/vaults/main.tf", + "Description": "A basic example of deploying Recovery Services Vault." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupFabrics/protectionContainers", + "Path": "samples/vaults/backupfabrics/protectioncontainers/main.tf", + "Description": "A basic example of deploying storage account container in an Azure Recovery Vault." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupFabrics/protectionContainers/protectedItems", + "Path": "samples/vaults/backupfabrics/protectioncontainers/protecteditems/main.tf", + "Description": "A basic example of deploying Azure Backup Protected Item." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupPolicies", + "Path": "samples/vaults/backuppolicies/main.tf", + "Description": "A basic example of deploying Backup Policy." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupResourceGuardProxies", + "Path": "samples/vaults/backupresourceguardproxies/main.tf", + "Description": "A basic example of deploying association of a Resource Guard and Recovery Services Vault." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupStorageConfig", + "Path": "samples/vaults/backupstorageconfig/main.tf", + "Description": "A basic example of deploying Azure Backup Storage Configuration." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupconfig", + "Path": "samples/vaults/backupconfig/main.tf", + "Description": "A basic example of deploying Recovery Services Vaults Backup Config." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics", + "Path": "samples/vaults/replicationfabrics/main.tf", + "Description": "A basic example of deploying Site Recovery Replication Fabric on Azure." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings", + "Path": "samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.tf", + "Description": "A basic example of deploying site recovery network mapping on Azure." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers", + "Path": "samples/vaults/replicationfabrics/replicationprotectioncontainers/main.tf", + "Description": "A basic example of deploying site recovery services protection container on Azure." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings", + "Path": "samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.tf", + "Description": "A basic example of deploying Site Recovery protection container mapping on Azure." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationPolicies", + "Path": "samples/vaults/replicationpolicies/main.tf", + "Description": "A basic example of deploying Azure Site Recovery replication policy on Azure." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.RecoveryServices/vaults", + "Path": "samples/vaults/main.bicep", + "Description": "A basic example of deploying Recovery Services Vault." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupPolicies", + "Path": "samples/vaults/backuppolicies/main.bicep", + "Description": "A basic example of deploying Backup Policy." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupResourceGuardProxies", + "Path": "samples/vaults/backupresourceguardproxies/main.bicep", + "Description": "A basic example of deploying association of a Resource Guard and Recovery Services Vault." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupStorageConfig", + "Path": "samples/vaults/backupstorageconfig/main.bicep", + "Description": "A basic example of deploying Azure Backup Storage Configuration." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/backupconfig", + "Path": "samples/vaults/backupconfig/main.bicep", + "Description": "A basic example of deploying Recovery Services Vaults Backup Config." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics", + "Path": "samples/vaults/replicationfabrics/main.bicep", + "Description": "A basic example of deploying Site Recovery Replication Fabric on Azure." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings", + "Path": "samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.bicep", + "Description": "A basic example of deploying site recovery network mapping on Azure." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers", + "Path": "samples/vaults/replicationfabrics/replicationprotectioncontainers/main.bicep", + "Description": "A basic example of deploying site recovery services protection container on Azure." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings", + "Path": "samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.bicep", + "Description": "A basic example of deploying Site Recovery protection container mapping on Azure." + }, + { + "ResourceType": "Microsoft.RecoveryServices/vaults/replicationPolicies", + "Path": "samples/vaults/replicationpolicies/main.bicep", + "Description": "A basic example of deploying Azure Site Recovery replication policy on Azure." + } + ] +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/backupconfig/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupconfig/main.bicep new file mode 100644 index 00000000..da8cea45 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupconfig/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2024-04-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource softDeleteRetentionPeriodInDays 'Microsoft.RecoveryServices/vaults/backupconfig@2024-04-01' = { + parent: vault + name: 'vaultconfig' + properties: { + softDeleteRetentionPeriodInDays: 14 + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/backuppolicies/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/backuppolicies/main.bicep new file mode 100644 index 00000000..7401e9df --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/backuppolicies/main.bicep @@ -0,0 +1,42 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource backupPolicy 'Microsoft.RecoveryServices/vaults/backupPolicies@2023-02-01' = { + parent: vault + name: resourceName + properties: { + backupManagementType: 'AzureStorage' + retentionPolicy: { + dailySchedule: { + retentionDuration: { + count: 10 + durationType: 'Days' + } + retentionTimes: [ + '2018-07-30T23:00:00Z' + ] + } + retentionPolicyType: 'LongTermRetentionPolicy' + } + schedulePolicy: { + schedulePolicyType: 'SimpleSchedulePolicy' + scheduleRunFrequency: 'Daily' + scheduleRunTimes: [ + '2018-07-30T23:00:00Z' + ] + } + timeZone: 'UTC' + workLoadType: 'AzureFileShare' + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/backupresourceguardproxies/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupresourceguardproxies/main.bicep new file mode 100644 index 00000000..376afd38 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupresourceguardproxies/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource resourceGuard 'Microsoft.DataProtection/resourceGuards@2022-04-01' = { + name: resourceName + location: location + properties: { + vaultCriticalOperationExclusionList: [] + } +} + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource backupResourceGuardProxy 'Microsoft.RecoveryServices/vaults/backupResourceGuardProxies@2023-02-01' = { + parent: vault + name: resourceName + properties: { + resourceGuardResourceId: resourceGuard.id + } + type: 'Microsoft.RecoveryServices/vaults/backupResourceGuardProxies' +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/backupstorageconfig/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupstorageconfig/main.bicep new file mode 100644 index 00000000..8e5323d9 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/backupstorageconfig/main.bicep @@ -0,0 +1,22 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource backupStorageConfig 'Microsoft.RecoveryServices/vaults/backupStorageConfig@2023-02-01' = { + parent: vault + name: 'vaultstorageconfig' + properties: { + crossRegionRestoreFlag: false + storageModelType: 'GeoRedundant' + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/main.bicep new file mode 100644 index 00000000..002b46b9 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/main.bicep new file mode 100644 index 00000000..66e5d2b2 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westus2' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource replicationFabric2 'Microsoft.RecoveryServices/vaults/replicationFabrics@2022-10-01' = { + parent: vault + name: resourceName + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westus2' + } + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.bicep new file mode 100644 index 00000000..a692b184 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationnetworks/replicationnetworkmappings/main.bicep @@ -0,0 +1,91 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource vault 'Microsoft.RecoveryServices/vaults@2024-01-01' = { + name: '${resourceName}-rsv' + location: location + properties: { + publicNetworkAccess: 'Enabled' + redundancySettings: { + crossRegionRestore: 'Disabled' + standardTierStorageRedundancy: 'GeoRedundant' + } + } + sku: { + name: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet1' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '192.168.1.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource virtualnetwork1 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet2' + properties: { + addressSpace: { + addressPrefixes: [ + '192.168.2.0/24' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource replicationFabric 'Microsoft.RecoveryServices/vaults/replicationFabrics@2024-04-01' = { + parent: vault + name: '${resourceName}-fabric1' + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westus' + } + } +} + +resource replicationfabric1 'Microsoft.RecoveryServices/vaults/replicationFabrics@2024-04-01' = { + parent: vault + name: '${resourceName}-fabric2' + properties: { + customDetails: { + instanceType: 'Azure' + location: 'centralus' + } + } +} + +// The replication network is an intermediate resource under the replication fabric +resource replicationNetwork 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks@2024-04-01' existing = { + parent: replicationFabric + name: virtualNetwork.name +} + +resource replicationNetworkMapping 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings@2024-04-01' = { + parent: replicationNetwork + name: '${resourceName}-mapping' + properties: { + fabricSpecificDetails: { + instanceType: 'AzureToAzure' + primaryNetworkId: virtualNetwork.id + } + recoveryFabricName: replicationfabric1.name + recoveryNetworkId: virtualnetwork1.id + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/main.bicep new file mode 100644 index 00000000..042f4c10 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource replicationFabric 'Microsoft.RecoveryServices/vaults/replicationFabrics@2022-10-01' = { + parent: vault + name: resourceName + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westeurope' + } + } +} + +resource replicationProtectionContainer 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers@2022-10-01' = { + parent: replicationFabric + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.bicep new file mode 100644 index 00000000..5d719654 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationfabrics/replicationprotectioncontainers/replicationprotectioncontainermappings/main.bicep @@ -0,0 +1,75 @@ +param location string = 'westus' + +resource vault 'Microsoft.RecoveryServices/vaults@2024-01-01' = { + name: 'acctest-vault-250703130022502990' + location: location + properties: { + publicNetworkAccess: 'Enabled' + redundancySettings: { + crossRegionRestore: 'Disabled' + standardTierStorageRedundancy: 'GeoRedundant' + } + } + sku: { + name: 'Standard' + } +} + +resource replicationFabric 'Microsoft.RecoveryServices/vaults/replicationFabrics@2024-04-01' = { + parent: vault + name: 'acctest-fabric1-250703130022502990' + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westeurope' + } + } +} + +resource replicationfabric1 'Microsoft.RecoveryServices/vaults/replicationFabrics@2024-04-01' = { + parent: vault + name: 'acctest-fabric2b-250703130022502990' + properties: { + customDetails: { + instanceType: 'Azure' + location: 'westus2' + } + } +} + +resource replicationPolicy 'Microsoft.RecoveryServices/vaults/replicationPolicies@2024-04-01' = { + parent: vault + name: 'acctest-policy-250703130022502990' + properties: { + providerSpecificInput: { + appConsistentFrequencyInMinutes: 240 + instanceType: 'A2A' + multiVmSyncStatus: 'Enable' + recoveryPointHistory: 1440 + } + } +} + +resource replicationProtectionContainer 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers@2024-04-01' = { + parent: replicationFabric + name: 'acctest-protection-cont1-250703130022502990' + properties: {} +} + +resource replicationprotectioncontainer1 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers@2024-04-01' = { + parent: replicationfabric1 + name: 'acctest-protection-cont2-250703130022502990' + properties: {} +} + +resource replicationProtectionContainerMapping 'Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings@2024-04-01' = { + parent: replicationProtectionContainer + name: 'mapping-250703130022502990' + properties: { + policyId: replicationPolicy.id + providerSpecificInput: { + instanceType: 'A2A' + } + targetProtectionContainerId: replicationprotectioncontainer1.id + } +} diff --git a/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationpolicies/main.bicep b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationpolicies/main.bicep new file mode 100644 index 00000000..11adf063 --- /dev/null +++ b/settings/remarks/microsoft.recoveryservices/samples/vaults/replicationpolicies/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.RecoveryServices/vaults@2022-10-01' = { + name: resourceName + location: location + properties: { + publicNetworkAccess: 'Enabled' + } + sku: { + name: 'Standard' + } +} + +resource replicationPolicy 'Microsoft.RecoveryServices/vaults/replicationPolicies@2022-10-01' = { + parent: vault + name: resourceName + properties: { + providerSpecificInput: { + appConsistentFrequencyInMinutes: 240 + crashConsistentFrequencyInMinutes: 10 + enableMultiVmSync: 'True' + instanceType: 'InMageRcm' + recoveryPointHistoryInMinutes: 1440 + } + } +} diff --git a/settings/remarks/microsoft.relay/remarks.json b/settings/remarks/microsoft.relay/remarks.json index c38ca546..ac8d3fb0 100644 --- a/settings/remarks/microsoft.relay/remarks.json +++ b/settings/remarks/microsoft.relay/remarks.json @@ -1,25 +1,47 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Relay/namespaces", - "Path": "samples/namespaces/main.tf", - "Description": "A basic example of deploying Azure Relay Namespace." - }, - { - "ResourceType": "Microsoft.Relay/namespaces/authorizationRules", - "Path": "samples/namespaces/authorizationrules/main.tf", - "Description": "A basic example of deploying Azure Relay Namespace Authorization Rule." - }, - { - "ResourceType": "Microsoft.Relay/namespaces/hybridConnections", - "Path": "samples/namespaces/hybridconnections/main.tf", - "Description": "A basic example of deploying Azure Relay Hybrid Connection." - }, - { - "ResourceType": "Microsoft.Relay/namespaces/hybridConnections/authorizationRules", - "Path": "samples/namespaces/hybridconnections/authorizationrules/main.tf", - "Description": "A basic example of deploying Azure Relay Hybrid Connection Authorization Rule." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Relay/namespaces", + "Path": "samples/namespaces/main.tf", + "Description": "A basic example of deploying Azure Relay Namespace." + }, + { + "ResourceType": "Microsoft.Relay/namespaces/authorizationRules", + "Path": "samples/namespaces/authorizationrules/main.tf", + "Description": "A basic example of deploying Azure Relay Namespace Authorization Rule." + }, + { + "ResourceType": "Microsoft.Relay/namespaces/hybridConnections", + "Path": "samples/namespaces/hybridconnections/main.tf", + "Description": "A basic example of deploying Azure Relay Hybrid Connection." + }, + { + "ResourceType": "Microsoft.Relay/namespaces/hybridConnections/authorizationRules", + "Path": "samples/namespaces/hybridconnections/authorizationrules/main.tf", + "Description": "A basic example of deploying Azure Relay Hybrid Connection Authorization Rule." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Relay/namespaces", + "Path": "samples/namespaces/main.bicep", + "Description": "A basic example of deploying Azure Relay Namespace." + }, + { + "ResourceType": "Microsoft.Relay/namespaces/authorizationRules", + "Path": "samples/namespaces/authorizationrules/main.bicep", + "Description": "A basic example of deploying Azure Relay Namespace Authorization Rule." + }, + { + "ResourceType": "Microsoft.Relay/namespaces/hybridConnections", + "Path": "samples/namespaces/hybridconnections/main.bicep", + "Description": "A basic example of deploying Azure Relay Hybrid Connection." + }, + { + "ResourceType": "Microsoft.Relay/namespaces/hybridConnections/authorizationRules", + "Path": "samples/namespaces/hybridconnections/authorizationrules/main.bicep", + "Description": "A basic example of deploying Azure Relay Hybrid Connection Authorization Rule." + } + ] +} diff --git a/settings/remarks/microsoft.relay/samples/namespaces/authorizationrules/main.bicep b/settings/remarks/microsoft.relay/samples/namespaces/authorizationrules/main.bicep new file mode 100644 index 00000000..030dcb85 --- /dev/null +++ b/settings/remarks/microsoft.relay/samples/namespaces/authorizationrules/main.bicep @@ -0,0 +1,23 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.Relay/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource authorizationRule 'Microsoft.Relay/namespaces/authorizationRules@2017-04-01' = { + parent: namespace + name: resourceName + properties: { + rights: [ + 'Listen' + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/authorizationrules/main.bicep b/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/authorizationrules/main.bicep new file mode 100644 index 00000000..517463c3 --- /dev/null +++ b/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/authorizationrules/main.bicep @@ -0,0 +1,32 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.Relay/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource hybridConnection 'Microsoft.Relay/namespaces/hybridConnections@2017-04-01' = { + parent: namespace + name: resourceName + properties: { + requiresClientAuthorization: true + userMetadata: '' + } +} + +resource authorizationRule 'Microsoft.Relay/namespaces/hybridConnections/authorizationRules@2017-04-01' = { + parent: hybridConnection + name: resourceName + properties: { + rights: [ + 'Listen' + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/main.bicep b/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/main.bicep new file mode 100644 index 00000000..0be00b55 --- /dev/null +++ b/settings/remarks/microsoft.relay/samples/namespaces/hybridconnections/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.Relay/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + tier: 'Standard' + } +} + +resource hybridConnection 'Microsoft.Relay/namespaces/hybridConnections@2017-04-01' = { + parent: namespace + name: resourceName + properties: { + requiresClientAuthorization: true + userMetadata: 'metadatatest' + } +} diff --git a/settings/remarks/microsoft.relay/samples/namespaces/main.bicep b/settings/remarks/microsoft.relay/samples/namespaces/main.bicep new file mode 100644 index 00000000..1abbe644 --- /dev/null +++ b/settings/remarks/microsoft.relay/samples/namespaces/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.Relay/namespaces@2017-04-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.resourceconnector/remarks.json b/settings/remarks/microsoft.resourceconnector/remarks.json index b9e412f0..37cb71c2 100644 --- a/settings/remarks/microsoft.resourceconnector/remarks.json +++ b/settings/remarks/microsoft.resourceconnector/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ResourceConnector/appliances", - "Path": "samples/appliances/main.tf", - "Description": "A basic example of deploying Arc Resource Bridge Appliance." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ResourceConnector/appliances", + "Path": "samples/appliances/main.tf", + "Description": "A basic example of deploying Arc Resource Bridge Appliance." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ResourceConnector/appliances", + "Path": "samples/appliances/main.bicep", + "Description": "A basic example of deploying Arc Resource Bridge Appliance." + } + ] +} diff --git a/settings/remarks/microsoft.resourceconnector/samples/appliances/main.bicep b/settings/remarks/microsoft.resourceconnector/samples/appliances/main.bicep new file mode 100644 index 00000000..cbe8ac53 --- /dev/null +++ b/settings/remarks/microsoft.resourceconnector/samples/appliances/main.bicep @@ -0,0 +1,13 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource appliance 'Microsoft.ResourceConnector/appliances@2022-10-27' = { + name: '${resourceName}-appliance' + location: location + properties: { + distro: 'AKSEdge' + infrastructureConfig: { + provider: 'VMWare' + } + } +} diff --git a/settings/remarks/microsoft.resources/remarks.json b/settings/remarks/microsoft.resources/remarks.json index 2857efc4..133ca202 100644 --- a/settings/remarks/microsoft.resources/remarks.json +++ b/settings/remarks/microsoft.resources/remarks.json @@ -1,59 +1,69 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "BicepSamples": [ - { - "Description": "A basic example of deploying a resource group.", - "Path": "samples/resourceGroups/basic.bicep", - "ResourceType": "microsoft.resources/resourceGroups" - } - ], - "ResourceRemarks": [ - { - "Description": "To learn about executing scripts during deployment, see [Use deployment scripts in Bicep](/azure/azure-resource-manager/bicep/deployment-script-bicep) or [Use deployment scripts in ARM templates](/azure/azure-resource-manager/templates/deployment-script-template).", - "ResourceTypes": [ - "microsoft.resources/deploymentscripts" - ] - }, - { - "Description": "For Bicep, consider [using modules](/azure/azure-resource-manager/bicep/modules) instead of this resource type.", - "ResourceTypes": [ - "microsoft.resources/deployments" - ] - }, - { - "Description": "To learn about applying tags through ARM templates or Bicep files, see [Use tags to organize your Azure resources and management hierarchy](/azure/azure-resource-manager/management/tag-resources?tabs=json#arm-templates).", - "ResourceTypes": [ - "microsoft.resources/tags" - ] - }, - { - "Description": "Instead of using an ARM template or Bicep file to define the template spec, we recommend that you use [New-AzTemplateSpec](/powershell/module/az.resources/new-aztemplatespec) in Azure PowerShell or [az ts create](/cli/azure/ts#az-ts-create) in Azure CLI to create your template spec. Those commands automatically convert linked templates to artifacts connected to your main template. When you use an ARM template to create the template spec, you must manually add those linked templates as artifacts, which can be complicated. For more information, see [Quickstart: Create and deploy template spec](/azure/azure-resource-manager/templates/quickstart-create-template-specs).", - "ResourceTypes": [ - "microsoft.resources/templatespecs" - ] - }, - { - "Description": "For information about creating portal forms, see [Tutorial: Create Azure portal forms for a template spec](/azure/azure-resource-manager/templates/template-specs-create-portal-forms).", - "ResourceTypes": [ - "microsoft.resources/templatespecs/versions" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Resources/deploymentScripts", - "Path": "samples/deploymentscripts/main.tf", - "Description": "A basic example of deploying Resource Deployment Script." - }, - { - "ResourceType": "Microsoft.Resources/deployments", - "Path": "samples/deployments/main.tf", - "Description": "A basic example of deploying Template Deployment." - }, - { - "ResourceType": "Microsoft.Resources/resourceGroups", - "Path": "samples/resourceGroups/main.tf", - "Description": "A basic example of deploying Resource Group." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "BicepSamples": [ + { + "Description": "A basic example of deploying a resource group.", + "Path": "samples/resourceGroups/basic.bicep", + "ResourceType": "microsoft.resources/resourceGroups" + }, + { + "ResourceType": "Microsoft.Resources/deploymentScripts", + "Path": "samples/deploymentscripts/main.bicep", + "Description": "A basic example of deploying Resource Deployment Script." + }, + { + "ResourceType": "Microsoft.Resources/resourceGroups", + "Path": "samples/resourceGroups/main.bicep", + "Description": "A basic example of deploying Resource Group." + } + ], + "ResourceRemarks": [ + { + "Description": "To learn about executing scripts during deployment, see [Use deployment scripts in Bicep](/azure/azure-resource-manager/bicep/deployment-script-bicep) or [Use deployment scripts in ARM templates](/azure/azure-resource-manager/templates/deployment-script-template).", + "ResourceTypes": [ + "microsoft.resources/deploymentscripts" + ] + }, + { + "Description": "For Bicep, consider [using modules](/azure/azure-resource-manager/bicep/modules) instead of this resource type.", + "ResourceTypes": [ + "microsoft.resources/deployments" + ] + }, + { + "Description": "To learn about applying tags through ARM templates or Bicep files, see [Use tags to organize your Azure resources and management hierarchy](/azure/azure-resource-manager/management/tag-resources?tabs=json#arm-templates).", + "ResourceTypes": [ + "microsoft.resources/tags" + ] + }, + { + "Description": "Instead of using an ARM template or Bicep file to define the template spec, we recommend that you use [New-AzTemplateSpec](/powershell/module/az.resources/new-aztemplatespec) in Azure PowerShell or [az ts create](/cli/azure/ts#az-ts-create) in Azure CLI to create your template spec. Those commands automatically convert linked templates to artifacts connected to your main template. When you use an ARM template to create the template spec, you must manually add those linked templates as artifacts, which can be complicated. For more information, see [Quickstart: Create and deploy template spec](/azure/azure-resource-manager/templates/quickstart-create-template-specs).", + "ResourceTypes": [ + "microsoft.resources/templatespecs" + ] + }, + { + "Description": "For information about creating portal forms, see [Tutorial: Create Azure portal forms for a template spec](/azure/azure-resource-manager/templates/template-specs-create-portal-forms).", + "ResourceTypes": [ + "microsoft.resources/templatespecs/versions" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Resources/deploymentScripts", + "Path": "samples/deploymentscripts/main.tf", + "Description": "A basic example of deploying Resource Deployment Script." + }, + { + "ResourceType": "Microsoft.Resources/deployments", + "Path": "samples/deployments/main.tf", + "Description": "A basic example of deploying Template Deployment." + }, + { + "ResourceType": "Microsoft.Resources/resourceGroups", + "Path": "samples/resourceGroups/main.tf", + "Description": "A basic example of deploying Resource Group." + } + ] +} diff --git a/settings/remarks/microsoft.resources/samples/deploymentscripts/main.bicep b/settings/remarks/microsoft.resources/samples/deploymentscripts/main.bicep new file mode 100644 index 00000000..88cf13d0 --- /dev/null +++ b/settings/remarks/microsoft.resources/samples/deploymentscripts/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource deploymentScript 'Microsoft.Resources/deploymentScripts@2020-10-01' = { + name: resourceName + location: location + kind: 'AzurePowerShell' + properties: { + azPowerShellVersion: '8.3' + cleanupPreference: 'Always' + environmentVariables: null + retentionInterval: 'P1D' + scriptContent: ''' $output = ''Hello'' + Write-Output $output + $DeploymentScriptOutputs = @{} + $DeploymentScriptOutputs[''text''] = $output +''' + supportingScriptUris: null + timeout: 'P1D' + } +} diff --git a/settings/remarks/microsoft.resources/samples/resourceGroups/main.bicep b/settings/remarks/microsoft.resources/samples/resourceGroups/main.bicep new file mode 100644 index 00000000..e9189e3f --- /dev/null +++ b/settings/remarks/microsoft.resources/samples/resourceGroups/main.bicep @@ -0,0 +1,9 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource resourceGroup 'Microsoft.Resources/resourceGroups@2020-06-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.search/remarks.json b/settings/remarks/microsoft.search/remarks.json index 7fdf341c..2da5a627 100644 --- a/settings/remarks/microsoft.search/remarks.json +++ b/settings/remarks/microsoft.search/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Search/searchServices", - "Path": "samples/searchservices/main.tf", - "Description": "A basic example of deploying Search Service." - }, - { - "ResourceType": "Microsoft.Search/searchServices/sharedPrivateLinkResources", - "Path": "samples/searchservices/sharedprivatelinkresources/main.tf", - "Description": "A basic example of deploying Shared Private Link Service for an Azure Search Service." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Search/searchServices", + "Path": "samples/searchservices/main.tf", + "Description": "A basic example of deploying Search Service." + }, + { + "ResourceType": "Microsoft.Search/searchServices/sharedPrivateLinkResources", + "Path": "samples/searchservices/sharedprivatelinkresources/main.tf", + "Description": "A basic example of deploying Shared Private Link Service for an Azure Search Service." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Search/searchServices", + "Path": "samples/searchservices/main.bicep", + "Description": "A basic example of deploying Search Service." + }, + { + "ResourceType": "Microsoft.Search/searchServices/sharedPrivateLinkResources", + "Path": "samples/searchservices/sharedprivatelinkresources/main.bicep", + "Description": "A basic example of deploying Shared Private Link Service for an Azure Search Service." + } + ] +} diff --git a/settings/remarks/microsoft.search/samples/searchservices/main.bicep b/settings/remarks/microsoft.search/samples/searchservices/main.bicep new file mode 100644 index 00000000..4cba26a1 --- /dev/null +++ b/settings/remarks/microsoft.search/samples/searchservices/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource searchService 'Microsoft.Search/searchServices@2022-09-01' = { + name: resourceName + location: location + properties: { + authOptions: { + apiKeyOnly: {} + } + disableLocalAuth: false + encryptionWithCmk: { + enforcement: 'Disabled' + } + hostingMode: 'default' + networkRuleSet: { + ipRules: [] + } + partitionCount: 1 + publicNetworkAccess: 'Enabled' + replicaCount: 1 + } + sku: { + name: 'standard' + } + tags: { + environment: 'staging' + } +} diff --git a/settings/remarks/microsoft.search/samples/searchservices/sharedprivatelinkresources/main.bicep b/settings/remarks/microsoft.search/samples/searchservices/sharedprivatelinkresources/main.bicep new file mode 100644 index 00000000..49098a5c --- /dev/null +++ b/settings/remarks/microsoft.search/samples/searchservices/sharedprivatelinkresources/main.bicep @@ -0,0 +1,75 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource searchService 'Microsoft.Search/searchServices@2022-09-01' = { + name: resourceName + location: location + properties: { + authOptions: { + apiKeyOnly: {} + } + disableLocalAuth: false + encryptionWithCmk: { + enforcement: 'Disabled' + } + hostingMode: 'default' + networkRuleSet: { + ipRules: [] + } + partitionCount: 1 + publicNetworkAccess: 'Enabled' + replicaCount: 1 + } + sku: { + name: 'standard' + } + tags: { + environment: 'staging' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource sharedPrivateLinkResource 'Microsoft.Search/searchServices/sharedPrivateLinkResources@2022-09-01' = { + parent: searchService + name: resourceName + properties: { + groupId: 'blob' + privateLinkResourceId: storageAccount.id + requestMessage: 'please approve' + } +} diff --git a/settings/remarks/microsoft.security/remarks.json b/settings/remarks/microsoft.security/remarks.json index 431c888a..4b218098 100644 --- a/settings/remarks/microsoft.security/remarks.json +++ b/settings/remarks/microsoft.security/remarks.json @@ -1,45 +1,77 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Security/advancedThreatProtectionSettings", - "Path": "samples/advancedthreatprotectionsettings/main.tf", - "Description": "A basic example of deploying resources Advanced Threat Protection setting." - }, - { - "ResourceType": "Microsoft.Security/assessmentMetadata", - "Path": "samples/assessmentmetadata/main.tf", - "Description": "A basic example of deploying Security Center Assessment Metadata for Azure Security Center." - }, - { - "ResourceType": "Microsoft.Security/assessments", - "Path": "samples/assessments/main.tf", - "Description": "A basic example of deploying Security Center Assessment for Azure Security Center." - }, - { - "ResourceType": "Microsoft.Security/automations", - "Path": "samples/automations/main.tf", - "Description": "A basic example of deploying Security Center Automation and Continuous Export." - }, - { - "ResourceType": "Microsoft.Security/defenderForStorageSettings", - "Path": "samples/defenderforstoragesettings/main.tf", - "Description": "A basic example of deploying Microsoft Defender for Storage." - }, - { - "ResourceType": "Microsoft.Security/iotSecuritySolutions", - "Path": "samples/iotsecuritysolutions/main.tf", - "Description": "A basic example of deploying iot security solution." - }, - { - "ResourceType": "Microsoft.Security/securityContacts", - "Path": "samples/securitycontacts/main.tf", - "Description": "A basic example of deploying subscription's Security Center Contact." - }, - { - "ResourceType": "Microsoft.Security/workspaceSettings", - "Path": "samples/workspacesettings/main.tf", - "Description": "A basic example of deploying subscription's Security Center Workspace." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Security/advancedThreatProtectionSettings", + "Path": "samples/advancedthreatprotectionsettings/main.tf", + "Description": "A basic example of deploying resources Advanced Threat Protection setting." + }, + { + "ResourceType": "Microsoft.Security/assessmentMetadata", + "Path": "samples/assessmentmetadata/main.tf", + "Description": "A basic example of deploying Security Center Assessment Metadata for Azure Security Center." + }, + { + "ResourceType": "Microsoft.Security/assessments", + "Path": "samples/assessments/main.tf", + "Description": "A basic example of deploying Security Center Assessment for Azure Security Center." + }, + { + "ResourceType": "Microsoft.Security/automations", + "Path": "samples/automations/main.tf", + "Description": "A basic example of deploying Security Center Automation and Continuous Export." + }, + { + "ResourceType": "Microsoft.Security/defenderForStorageSettings", + "Path": "samples/defenderforstoragesettings/main.tf", + "Description": "A basic example of deploying Microsoft Defender for Storage." + }, + { + "ResourceType": "Microsoft.Security/iotSecuritySolutions", + "Path": "samples/iotsecuritysolutions/main.tf", + "Description": "A basic example of deploying iot security solution." + }, + { + "ResourceType": "Microsoft.Security/securityContacts", + "Path": "samples/securitycontacts/main.tf", + "Description": "A basic example of deploying subscription's Security Center Contact." + }, + { + "ResourceType": "Microsoft.Security/workspaceSettings", + "Path": "samples/workspacesettings/main.tf", + "Description": "A basic example of deploying subscription's Security Center Workspace." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Security/advancedThreatProtectionSettings", + "Path": "samples/advancedthreatprotectionsettings/main.bicep", + "Description": "A basic example of deploying resources Advanced Threat Protection setting." + }, + { + "ResourceType": "Microsoft.Security/assessmentMetadata", + "Path": "samples/assessmentmetadata/main.bicep", + "Description": "A basic example of deploying Security Center Assessment Metadata for Azure Security Center." + }, + { + "ResourceType": "Microsoft.Security/automations", + "Path": "samples/automations/main.bicep", + "Description": "A basic example of deploying Security Center Automation and Continuous Export." + }, + { + "ResourceType": "Microsoft.Security/defenderForStorageSettings", + "Path": "samples/defenderforstoragesettings/main.bicep", + "Description": "A basic example of deploying Microsoft Defender for Storage." + }, + { + "ResourceType": "Microsoft.Security/iotSecuritySolutions", + "Path": "samples/iotsecuritysolutions/main.bicep", + "Description": "A basic example of deploying iot security solution." + }, + { + "ResourceType": "Microsoft.Security/securityContacts", + "Path": "samples/securitycontacts/main.bicep", + "Description": "A basic example of deploying subscription's Security Center Contact." + } + ] +} diff --git a/settings/remarks/microsoft.security/samples/advancedthreatprotectionsettings/main.bicep b/settings/remarks/microsoft.security/samples/advancedthreatprotectionsettings/main.bicep new file mode 100644 index 00000000..34547249 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/advancedthreatprotectionsettings/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0002' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } + tags: { + environment: 'production' + } +} + +resource updateAdvancedthreatprotectionsetting 'Microsoft.Security/advancedThreatProtectionSettings@2019-01-01' = { + scope: storageAccount + name: 'current' + properties: { + isEnabled: true + } +} diff --git a/settings/remarks/microsoft.security/samples/assessmentmetadata/main.bicep b/settings/remarks/microsoft.security/samples/assessmentmetadata/main.bicep new file mode 100644 index 00000000..e1df1985 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/assessmentmetadata/main.bicep @@ -0,0 +1,11 @@ +targetScope = 'subscription' + +resource assessmentMetadatum 'Microsoft.Security/assessmentMetadata@2020-01-01' = { + name: '95c7a001-d595-43af-9754-1310c740d34c' + properties: { + assessmentType: 'CustomerManaged' + description: 'Test Description' + displayName: 'Test Display Name' + severity: 'Medium' + } +} diff --git a/settings/remarks/microsoft.security/samples/automations/main.bicep b/settings/remarks/microsoft.security/samples/automations/main.bicep new file mode 100644 index 00000000..2124cda6 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/automations/main.bicep @@ -0,0 +1,142 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automation 'Microsoft.Security/automations@2019-01-01-preview' = { + name: 'ExportToWorkspace' + properties: { + actions: [ + { + actionType: 'Workspace' + workspaceResourceId: workspace.id + } + ] + isEnabled: true + scopes: [ + { + description: 'Security Export for the subscription' + scopePath: resourceGroup().id + } + ] + sources: [ + { + eventSource: 'Assessments' + ruleSets: [ + { + rules: [ + { + expectedValue: 'Microsoft.Security/assessments' + operator: 'Contains' + propertyJPath: 'type' + propertyType: 'String' + } + ] + } + ] + } + { + eventSource: 'AssessmentsSnapshot' + ruleSets: [ + { + rules: [ + { + expectedValue: 'Microsoft.Security/assessments' + operator: 'Contains' + propertyJPath: 'type' + propertyType: 'String' + } + ] + } + ] + } + { + eventSource: 'SubAssessments' + } + { + eventSource: 'SubAssessmentsSnapshot' + } + { + eventSource: 'Alerts' + ruleSets: [ + { + rules: [ + { + expectedValue: 'low' + operator: 'Equals' + propertyJPath: 'Severity' + propertyType: 'String' + } + ] + } + { + rules: [ + { + expectedValue: 'medium' + operator: 'Equals' + propertyJPath: 'Severity' + propertyType: 'String' + } + ] + } + { + rules: [ + { + expectedValue: 'high' + operator: 'Equals' + propertyJPath: 'Severity' + propertyType: 'String' + } + ] + } + { + rules: [ + { + expectedValue: 'informational' + operator: 'Equals' + propertyJPath: 'Severity' + propertyType: 'String' + } + ] + } + ] + } + { + eventSource: 'SecureScores' + } + { + eventSource: 'SecureScoresSnapshot' + } + { + eventSource: 'SecureScoreControls' + } + { + eventSource: 'SecureScoreControlsSnapshot' + } + { + eventSource: 'RegulatoryComplianceAssessment' + } + { + eventSource: 'RegulatoryComplianceAssessmentSnapshot' + } + ] + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.security/samples/defenderforstoragesettings/main.bicep b/settings/remarks/microsoft.security/samples/defenderforstoragesettings/main.bicep new file mode 100644 index 00000000..9dbe3c19 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/defenderforstoragesettings/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource defenderForStorageSetting 'Microsoft.Security/defenderForStorageSettings@2022-12-01-preview' = { + scope: storageAccount + name: 'current' + properties: { + isEnabled: true + malwareScanning: { + onUpload: { + capGBPerMonth: 5000 + isEnabled: true + } + } + overrideSubscriptionLevelSettings: true + sensitiveDataDiscovery: { + isEnabled: true + } + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.security/samples/iotsecuritysolutions/main.bicep b/settings/remarks/microsoft.security/samples/iotsecuritysolutions/main.bicep new file mode 100644 index 00000000..57985dc0 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/iotsecuritysolutions/main.bicep @@ -0,0 +1,40 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource iotSecuritySolution 'Microsoft.Security/iotSecuritySolutions@2019-08-01' = { + name: resourceName + location: location + properties: { + displayName: 'Iot Security Solution' + iotHubs: [ + iothub.id + ] + status: 'Enabled' + unmaskedIpLoggingStatus: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.security/samples/securitycontacts/main.bicep b/settings/remarks/microsoft.security/samples/securitycontacts/main.bicep new file mode 100644 index 00000000..0251d4a3 --- /dev/null +++ b/settings/remarks/microsoft.security/samples/securitycontacts/main.bicep @@ -0,0 +1,13 @@ +targetScope = 'subscription' + +param resourceName string = 'acctest0001' + +resource securityContact 'Microsoft.Security/securityContacts@2017-08-01-preview' = { + name: resourceName + properties: { + alertNotifications: 'On' + alertsToAdmins: 'On' + email: 'basic@example.com' + phone: '+1-555-555-5555' + } +} diff --git a/settings/remarks/microsoft.securityinsights/remarks.json b/settings/remarks/microsoft.securityinsights/remarks.json index bb973bfc..dc4f5b49 100644 --- a/settings/remarks/microsoft.securityinsights/remarks.json +++ b/settings/remarks/microsoft.securityinsights/remarks.json @@ -1,40 +1,77 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.SecurityInsights/alertRules", - "Path": "samples/alertrules/main.tf", - "Description": "A basic example of deploying Sentinel Alert Rule." - }, - { - "ResourceType": "Microsoft.SecurityInsights/automationRules", - "Path": "samples/automationrules/main.tf", - "Description": "A basic example of deploying Sentinel Automation Rule." - }, - { - "ResourceType": "Microsoft.SecurityInsights/dataConnectors", - "Path": "samples/dataconnectors/main.tf", - "Description": "A basic example of deploying Data Connector." - }, - { - "ResourceType": "Microsoft.SecurityInsights/metadata", - "Path": "samples/metadata/main.tf", - "Description": "A basic example of deploying Sentinel Metadata." - }, - { - "ResourceType": "Microsoft.SecurityInsights/onboardingStates", - "Path": "samples/onboardingstates/main.tf", - "Description": "A basic example of deploying Security Insights Sentinel Onboarding States." - }, - { - "ResourceType": "Microsoft.SecurityInsights/watchlists", - "Path": "samples/watchlists/main.tf", - "Description": "A basic example of deploying Sentinel Watchlist." - }, - { - "ResourceType": "Microsoft.SecurityInsights/watchlists/watchlistItems", - "Path": "samples/watchlists/watchlistitems/main.tf", - "Description": "A basic example of deploying Sentinel Watchlist Item." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.SecurityInsights/alertRules", + "Path": "samples/alertrules/main.tf", + "Description": "A basic example of deploying Sentinel Alert Rule." + }, + { + "ResourceType": "Microsoft.SecurityInsights/automationRules", + "Path": "samples/automationrules/main.tf", + "Description": "A basic example of deploying Sentinel Automation Rule." + }, + { + "ResourceType": "Microsoft.SecurityInsights/dataConnectors", + "Path": "samples/dataconnectors/main.tf", + "Description": "A basic example of deploying Data Connector." + }, + { + "ResourceType": "Microsoft.SecurityInsights/metadata", + "Path": "samples/metadata/main.tf", + "Description": "A basic example of deploying Sentinel Metadata." + }, + { + "ResourceType": "Microsoft.SecurityInsights/onboardingStates", + "Path": "samples/onboardingstates/main.tf", + "Description": "A basic example of deploying Security Insights Sentinel Onboarding States." + }, + { + "ResourceType": "Microsoft.SecurityInsights/watchlists", + "Path": "samples/watchlists/main.tf", + "Description": "A basic example of deploying Sentinel Watchlist." + }, + { + "ResourceType": "Microsoft.SecurityInsights/watchlists/watchlistItems", + "Path": "samples/watchlists/watchlistitems/main.tf", + "Description": "A basic example of deploying Sentinel Watchlist Item." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.SecurityInsights/alertRules", + "Path": "samples/alertrules/main.bicep", + "Description": "A basic example of deploying Sentinel Alert Rule." + }, + { + "ResourceType": "Microsoft.SecurityInsights/automationRules", + "Path": "samples/automationrules/main.bicep", + "Description": "A basic example of deploying Sentinel Automation Rule." + }, + { + "ResourceType": "Microsoft.SecurityInsights/dataConnectors", + "Path": "samples/dataconnectors/main.bicep", + "Description": "A basic example of deploying Data Connector." + }, + { + "ResourceType": "Microsoft.SecurityInsights/metadata", + "Path": "samples/metadata/main.bicep", + "Description": "A basic example of deploying Sentinel Metadata." + }, + { + "ResourceType": "Microsoft.SecurityInsights/onboardingStates", + "Path": "samples/onboardingstates/main.bicep", + "Description": "A basic example of deploying Security Insights Sentinel Onboarding States." + }, + { + "ResourceType": "Microsoft.SecurityInsights/watchlists", + "Path": "samples/watchlists/main.bicep", + "Description": "A basic example of deploying Sentinel Watchlist." + }, + { + "ResourceType": "Microsoft.SecurityInsights/watchlists/watchlistItems", + "Path": "samples/watchlists/watchlistitems/main.bicep", + "Description": "A basic example of deploying Sentinel Watchlist Item." + } + ] +} diff --git a/settings/remarks/microsoft.securityinsights/samples/alertrules/main.bicep b/settings/remarks/microsoft.securityinsights/samples/alertrules/main.bicep new file mode 100644 index 00000000..dd9d4787 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/alertrules/main.bicep @@ -0,0 +1,54 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource alertRule 'Microsoft.SecurityInsights/alertRules@2022-10-01-preview' = { + scope: workspace + name: resourceName + kind: 'NRT' + properties: { + description: '' + displayName: 'Some Rule' + enabled: true + query: '''AzureActivity | + where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment" | + where ActivityStatus == "Succeeded" | + make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller +''' + severity: 'High' + suppressionDuration: 'PT5H' + suppressionEnabled: false + tactics: [] + techniques: [] + } + dependsOn: [ + onboardingState + ] +} + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2023-06-01-preview' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/automationrules/main.bicep b/settings/remarks/microsoft.securityinsights/samples/automationrules/main.bicep new file mode 100644 index 00000000..cf9fc9b2 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/automationrules/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource automationRule 'Microsoft.SecurityInsights/automationRules@2022-10-01-preview' = { + scope: workspace + name: '3b862818-ad7b-409e-83be-8812f2a06d37' + properties: { + actions: [ + { + actionConfiguration: { + classification: '' + classificationComment: '' + classificationReason: '' + severity: '' + status: 'Active' + } + actionType: 'ModifyProperties' + order: 1 + } + ] + displayName: 'acctest-SentinelAutoRule-230630033910945846' + order: 1 + triggeringLogic: { + isEnabled: true + triggersOn: 'Incidents' + triggersWhen: 'Created' + } + } + dependsOn: [ + onboardingState + ] +} + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2023-06-01-preview' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/dataconnectors/main.bicep b/settings/remarks/microsoft.securityinsights/samples/dataconnectors/main.bicep new file mode 100644 index 00000000..88cc042e --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/dataconnectors/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource dataConnector 'Microsoft.SecurityInsights/dataConnectors@2022-10-01-preview' = { + scope: workspace + name: resourceName + kind: 'MicrosoftThreatIntelligence' + properties: { + dataTypes: { + bingSafetyPhishingURL: { + lookbackPeriod: '' + state: 'Disabled' + } + microsoftEmergingThreatFeed: { + lookbackPeriod: '1970-01-01T00:00:00Z' + state: 'enabled' + } + } + tenantId: deployer().tenantId + } + dependsOn: [ + onboardingState + ] +} + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2023-06-01-preview' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/metadata/main.bicep b/settings/remarks/microsoft.securityinsights/samples/metadata/main.bicep new file mode 100644 index 00000000..22d4ad0a --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/metadata/main.bicep @@ -0,0 +1,65 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource alertRule 'Microsoft.SecurityInsights/alertRules@2022-10-01-preview' = { + scope: workspace + name: resourceName + kind: 'NRT' + properties: { + description: '' + displayName: 'Some Rule' + enabled: true + query: '''AzureActivity | + where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment" | + where ActivityStatus == "Succeeded" | + make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller +''' + severity: 'High' + suppressionDuration: 'PT5H' + suppressionEnabled: false + tactics: [] + techniques: [] + } + dependsOn: [ + onboardingState + ] +} + +resource metadata 'Microsoft.SecurityInsights/metadata@2022-10-01-preview' = { + scope: workspace + name: resourceName + properties: { + contentId: 'acctest0001' + contentSchemaVersion: '2.0' + kind: 'AnalyticsRule' + parentId: alertRule.id + } +} + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2023-06-01-preview' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/onboardingstates/main.bicep b/settings/remarks/microsoft.securityinsights/samples/onboardingstates/main.bicep new file mode 100644 index 00000000..d37e2336 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/onboardingstates/main.bicep @@ -0,0 +1,30 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2022-11-01' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/watchlists/main.bicep b/settings/remarks/microsoft.securityinsights/samples/watchlists/main.bicep new file mode 100644 index 00000000..670b0966 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/watchlists/main.bicep @@ -0,0 +1,44 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2022-11-01' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource watchlist 'Microsoft.SecurityInsights/watchlists@2022-11-01' = { + scope: workspace + name: resourceName + properties: { + displayName: 'test' + itemsSearchKey: 'k1' + provider: 'Microsoft' + source: '' + } + dependsOn: [ + onboardingState + ] +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} diff --git a/settings/remarks/microsoft.securityinsights/samples/watchlists/watchlistitems/main.bicep b/settings/remarks/microsoft.securityinsights/samples/watchlists/watchlistitems/main.bicep new file mode 100644 index 00000000..9c412d24 --- /dev/null +++ b/settings/remarks/microsoft.securityinsights/samples/watchlists/watchlistitems/main.bicep @@ -0,0 +1,54 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource onboardingState 'Microsoft.SecurityInsights/onboardingStates@2022-11-01' = { + scope: workspace + name: 'default' + properties: { + customerManagedKey: false + } +} + +resource watchlist 'Microsoft.SecurityInsights/watchlists@2022-11-01' = { + scope: workspace + name: resourceName + properties: { + displayName: 'test' + itemsSearchKey: 'k1' + provider: 'Microsoft' + source: '' + } + dependsOn: [ + onboardingState + ] +} + +resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { + name: resourceName + location: location + properties: { + features: { + disableLocalAuth: false + enableLogAccessUsingOnlyResourcePermissions: true + } + publicNetworkAccessForIngestion: 'Enabled' + publicNetworkAccessForQuery: 'Enabled' + retentionInDays: 30 + sku: { + name: 'PerGB2018' + } + workspaceCapping: { + dailyQuotaGb: -1 + } + } +} + +resource watchlistItem 'Microsoft.SecurityInsights/watchlists/watchlistItems@2022-11-01' = { + parent: watchlist + name: '196abd06-eb4e-4322-9c70-37c32e1a588a' + properties: { + itemsKeyValue: { + k1: 'v1' + } + } +} diff --git a/settings/remarks/microsoft.servicebus/remarks.json b/settings/remarks/microsoft.servicebus/remarks.json index dee90709..242c7f48 100644 --- a/settings/remarks/microsoft.servicebus/remarks.json +++ b/settings/remarks/microsoft.servicebus/remarks.json @@ -1,50 +1,92 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ServiceBus/namespaces", - "Path": "samples/namespaces/main.tf", - "Description": "A basic example of deploying ServiceBus Namespace." - }, - { - "ResourceType": "Microsoft.ServiceBus/namespaces/authorizationRules", - "Path": "samples/namespaces/authorizationrules/main.tf", - "Description": "A basic example of deploying ServiceBus Namespace authorization Rule within a ServiceBus." - }, - { - "ResourceType": "Microsoft.ServiceBus/namespaces/disasterRecoveryConfigs", - "Path": "samples/namespaces/disasterrecoveryconfigs/main.tf", - "Description": "A basic example of deploying Disaster Recovery Config for a Service Bus Namespace." - }, - { - "ResourceType": "Microsoft.ServiceBus/namespaces/queues", - "Path": "samples/namespaces/queues/main.tf", - "Description": "A basic example of deploying ServiceBus Queue." - }, - { - "ResourceType": "Microsoft.ServiceBus/namespaces/queues/authorizationRules", - "Path": "samples/namespaces/queues/authorizationrules/main.tf", - "Description": "A basic example of deploying Authorization Rule for a ServiceBus Queue." - }, - { - "ResourceType": "Microsoft.ServiceBus/namespaces/topics", - "Path": "samples/namespaces/topics/main.tf", - "Description": "A basic example of deploying ServiceBus Topic." - }, - { - "ResourceType": "Microsoft.ServiceBus/namespaces/topics/authorizationRules", - "Path": "samples/namespaces/topics/authorizationrules/main.tf", - "Description": "A basic example of deploying ServiceBus Topic authorization Rule within a ServiceBus Topic." - }, - { - "ResourceType": "Microsoft.ServiceBus/namespaces/topics/subscriptions", - "Path": "samples/namespaces/topics/subscriptions/main.tf", - "Description": "A basic example of deploying ServiceBus Subscription." - }, - { - "ResourceType": "Microsoft.ServiceBus/namespaces/topics/subscriptions/rules", - "Path": "samples/namespaces/topics/subscriptions/rules/main.tf", - "Description": "A basic example of deploying ServiceBus Subscription Rule." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ServiceBus/namespaces", + "Path": "samples/namespaces/main.tf", + "Description": "A basic example of deploying ServiceBus Namespace." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/authorizationRules", + "Path": "samples/namespaces/authorizationrules/main.tf", + "Description": "A basic example of deploying ServiceBus Namespace authorization Rule within a ServiceBus." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/disasterRecoveryConfigs", + "Path": "samples/namespaces/disasterrecoveryconfigs/main.tf", + "Description": "A basic example of deploying Disaster Recovery Config for a Service Bus Namespace." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/queues", + "Path": "samples/namespaces/queues/main.tf", + "Description": "A basic example of deploying ServiceBus Queue." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/queues/authorizationRules", + "Path": "samples/namespaces/queues/authorizationrules/main.tf", + "Description": "A basic example of deploying Authorization Rule for a ServiceBus Queue." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/topics", + "Path": "samples/namespaces/topics/main.tf", + "Description": "A basic example of deploying ServiceBus Topic." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/topics/authorizationRules", + "Path": "samples/namespaces/topics/authorizationrules/main.tf", + "Description": "A basic example of deploying ServiceBus Topic authorization Rule within a ServiceBus Topic." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/topics/subscriptions", + "Path": "samples/namespaces/topics/subscriptions/main.tf", + "Description": "A basic example of deploying ServiceBus Subscription." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/topics/subscriptions/rules", + "Path": "samples/namespaces/topics/subscriptions/rules/main.tf", + "Description": "A basic example of deploying ServiceBus Subscription Rule." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ServiceBus/namespaces", + "Path": "samples/namespaces/main.bicep", + "Description": "A basic example of deploying ServiceBus Namespace." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/authorizationRules", + "Path": "samples/namespaces/authorizationrules/main.bicep", + "Description": "A basic example of deploying ServiceBus Namespace authorization Rule within a ServiceBus." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/queues", + "Path": "samples/namespaces/queues/main.bicep", + "Description": "A basic example of deploying ServiceBus Queue." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/queues/authorizationRules", + "Path": "samples/namespaces/queues/authorizationrules/main.bicep", + "Description": "A basic example of deploying Authorization Rule for a ServiceBus Queue." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/topics", + "Path": "samples/namespaces/topics/main.bicep", + "Description": "A basic example of deploying ServiceBus Topic." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/topics/authorizationRules", + "Path": "samples/namespaces/topics/authorizationrules/main.bicep", + "Description": "A basic example of deploying ServiceBus Topic authorization Rule within a ServiceBus Topic." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/topics/subscriptions", + "Path": "samples/namespaces/topics/subscriptions/main.bicep", + "Description": "A basic example of deploying ServiceBus Subscription." + }, + { + "ResourceType": "Microsoft.ServiceBus/namespaces/topics/subscriptions/rules", + "Path": "samples/namespaces/topics/subscriptions/rules/main.bicep", + "Description": "A basic example of deploying ServiceBus Subscription Rule." + } + ] +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/authorizationrules/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/authorizationrules/main.bicep new file mode 100644 index 00000000..1eb0d005 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/authorizationrules/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource authorizationRule 'Microsoft.ServiceBus/namespaces/authorizationRules@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + rights: [ + 'Listen' + ] + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/main.bicep new file mode 100644 index 00000000..6ce84253 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/main.bicep @@ -0,0 +1,17 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/queues/authorizationrules/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/queues/authorizationrules/main.bicep new file mode 100644 index 00000000..27597805 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/queues/authorizationrules/main.bicep @@ -0,0 +1,43 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource queue 'Microsoft.ServiceBus/namespaces/queues@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + deadLetteringOnMessageExpiration: false + enableBatchedOperations: true + enableExpress: false + enablePartitioning: true + maxDeliveryCount: 10 + maxSizeInMegabytes: 81920 + requiresDuplicateDetection: false + requiresSession: false + status: 'Active' + } +} + +resource authorizationRule 'Microsoft.ServiceBus/namespaces/queues/authorizationRules@2021-06-01-preview' = { + parent: queue + name: resourceName + properties: { + rights: [ + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/queues/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/queues/main.bicep new file mode 100644 index 00000000..bf7f1a65 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/queues/main.bicep @@ -0,0 +1,33 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource queue 'Microsoft.ServiceBus/namespaces/queues@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + deadLetteringOnMessageExpiration: false + enableBatchedOperations: true + enableExpress: false + enablePartitioning: true + maxDeliveryCount: 10 + maxSizeInMegabytes: 81920 + requiresDuplicateDetection: false + requiresSession: false + status: 'Active' + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/topics/authorizationrules/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/authorizationrules/main.bicep new file mode 100644 index 00000000..186d84d2 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/authorizationrules/main.bicep @@ -0,0 +1,41 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: false + maxSizeInMegabytes: 5120 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} + +resource authorizationRule 'Microsoft.ServiceBus/namespaces/topics/authorizationRules@2021-06-01-preview' = { + parent: topic + name: resourceName + properties: { + rights: [ + 'Send' + ] + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/topics/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/main.bicep new file mode 100644 index 00000000..402630bf --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: true + maxSizeInMegabytes: 81920 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/main.bicep new file mode 100644 index 00000000..21d9fb63 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: false + maxSizeInMegabytes: 5120 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} + +resource subscription 'Microsoft.ServiceBus/namespaces/topics/subscriptions@2021-06-01-preview' = { + parent: topic + name: resourceName + properties: { + clientAffineProperties: {} + deadLetteringOnFilterEvaluationExceptions: true + deadLetteringOnMessageExpiration: false + enableBatchedOperations: false + isClientAffine: false + maxDeliveryCount: 10 + requiresSession: false + status: 'Active' + } +} diff --git a/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/rules/main.bicep b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/rules/main.bicep new file mode 100644 index 00000000..1175d8a0 --- /dev/null +++ b/settings/remarks/microsoft.servicebus/samples/namespaces/topics/subscriptions/rules/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource namespace 'Microsoft.ServiceBus/namespaces@2022-01-01-preview' = { + name: resourceName + location: location + properties: { + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + zoneRedundant: false + } + sku: { + capacity: 0 + name: 'Standard' + tier: 'Standard' + } +} + +resource topic 'Microsoft.ServiceBus/namespaces/topics@2021-06-01-preview' = { + parent: namespace + name: resourceName + properties: { + enableBatchedOperations: false + enableExpress: false + enablePartitioning: false + maxSizeInMegabytes: 5120 + requiresDuplicateDetection: false + status: 'Active' + supportOrdering: false + } +} + +resource subscription 'Microsoft.ServiceBus/namespaces/topics/subscriptions@2021-06-01-preview' = { + parent: topic + name: resourceName + properties: { + clientAffineProperties: {} + deadLetteringOnFilterEvaluationExceptions: true + deadLetteringOnMessageExpiration: false + enableBatchedOperations: false + isClientAffine: false + maxDeliveryCount: 10 + requiresSession: false + status: 'Active' + } +} + +resource rule 'Microsoft.ServiceBus/namespaces/topics/subscriptions/rules@2021-06-01-preview' = { + parent: subscription + name: resourceName + properties: { + correlationFilter: { + contentType: 'test_content_type' + correlationId: 'test_correlation_id' + label: 'test_label' + messageId: 'test_message_id' + replyTo: 'test_reply_to' + replyToSessionId: 'test_reply_to_session_id' + sessionId: 'test_session_id' + to: 'test_to' + } + filterType: 'CorrelationFilter' + } +} diff --git a/settings/remarks/microsoft.servicefabric/remarks.json b/settings/remarks/microsoft.servicefabric/remarks.json index b283a02a..ede9f9ed 100644 --- a/settings/remarks/microsoft.servicefabric/remarks.json +++ b/settings/remarks/microsoft.servicefabric/remarks.json @@ -1,20 +1,37 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ServiceFabric/clusters", - "Path": "samples/clusters/main.tf", - "Description": "A basic example of deploying Service Fabric Cluster." - }, - { - "ResourceType": "Microsoft.ServiceFabric/managedClusters", - "Path": "samples/managedclusters/main.tf", - "Description": "A basic example of deploying Resource Group." - }, - { - "ResourceType": "Microsoft.ServiceFabric/managedClusters/nodeTypes", - "Path": "samples/managedclusters/nodetypes/main.tf", - "Description": "A basic example of deploying Service Fabric Managed Clusters Node Types." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ServiceFabric/clusters", + "Path": "samples/clusters/main.tf", + "Description": "A basic example of deploying Service Fabric Cluster." + }, + { + "ResourceType": "Microsoft.ServiceFabric/managedClusters", + "Path": "samples/managedclusters/main.tf", + "Description": "A basic example of deploying Resource Group." + }, + { + "ResourceType": "Microsoft.ServiceFabric/managedClusters/nodeTypes", + "Path": "samples/managedclusters/nodetypes/main.tf", + "Description": "A basic example of deploying Service Fabric Managed Clusters Node Types." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ServiceFabric/clusters", + "Path": "samples/clusters/main.bicep", + "Description": "A basic example of deploying Service Fabric Cluster." + }, + { + "ResourceType": "Microsoft.ServiceFabric/managedClusters", + "Path": "samples/managedclusters/main.bicep", + "Description": "A basic example of deploying Resource Group." + }, + { + "ResourceType": "Microsoft.ServiceFabric/managedClusters/nodeTypes", + "Path": "samples/managedclusters/nodetypes/main.bicep", + "Description": "A basic example of deploying Service Fabric Managed Clusters Node Types." + } + ] +} diff --git a/settings/remarks/microsoft.servicefabric/samples/clusters/main.bicep b/settings/remarks/microsoft.servicefabric/samples/clusters/main.bicep new file mode 100644 index 00000000..de2f7d17 --- /dev/null +++ b/settings/remarks/microsoft.servicefabric/samples/clusters/main.bicep @@ -0,0 +1,29 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.ServiceFabric/clusters@2021-06-01' = { + name: resourceName + location: location + properties: { + addOnFeatures: [] + fabricSettings: [] + managementEndpoint: 'http://example:80' + nodeTypes: [ + { + capacities: {} + clientConnectionEndpointPort: 2020 + durabilityLevel: 'Bronze' + httpGatewayEndpointPort: 80 + isPrimary: true + isStateless: false + multipleAvailabilityZones: false + name: 'first' + placementProperties: {} + vmInstanceCount: 3 + } + ] + reliabilityLevel: 'Bronze' + upgradeMode: 'Automatic' + vmImage: 'Windows' + } +} diff --git a/settings/remarks/microsoft.servicefabric/samples/managedclusters/main.bicep b/settings/remarks/microsoft.servicefabric/samples/managedclusters/main.bicep new file mode 100644 index 00000000..ddf6bc1b --- /dev/null +++ b/settings/remarks/microsoft.servicefabric/samples/managedclusters/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the Service Fabric managed cluster') +param adminUsername string +@secure() +@description('The administrator password for the Service Fabric managed cluster') +param adminPassword string + +resource managedCluster 'Microsoft.ServiceFabric/managedClusters@2021-05-01' = { + name: resourceName + location: location + properties: { + addonFeatures: [ + 'DnsService' + ] + adminPassword: null + adminUserName: null + clientConnectionPort: 12345 + clusterUpgradeCadence: 'Wave0' + dnsName: 'acctest0001' + httpGatewayConnectionPort: 23456 + loadBalancingRules: [ + { + backendPort: 8000 + frontendPort: 443 + probeProtocol: 'http' + probeRequestPath: '/' + protocol: 'tcp' + } + ] + networkSecurityRules: [ + { + access: 'allow' + destinationAddressPrefixes: [ + '0.0.0.0/0' + ] + destinationPortRanges: [ + '443' + ] + direction: 'inbound' + name: 'rule443-allow-fe' + priority: 1000 + protocol: 'tcp' + sourceAddressPrefixes: [ + '0.0.0.0/0' + ] + sourcePortRanges: [ + '1-65535' + ] + } + ] + } + sku: { + name: 'Standard' + } + tags: { + Test: 'value' + } +} diff --git a/settings/remarks/microsoft.servicefabric/samples/managedclusters/nodetypes/main.bicep b/settings/remarks/microsoft.servicefabric/samples/managedclusters/nodetypes/main.bicep new file mode 100644 index 00000000..9eb60689 --- /dev/null +++ b/settings/remarks/microsoft.servicefabric/samples/managedclusters/nodetypes/main.bicep @@ -0,0 +1,88 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the Service Fabric managed cluster') +param adminUsername string +@secure() +@description('The administrator password for the Service Fabric managed cluster') +param adminPassword string + +resource managedCluster 'Microsoft.ServiceFabric/managedClusters@2021-05-01' = { + name: resourceName + location: location + properties: { + addonFeatures: [ + 'DnsService' + ] + adminPassword: null + adminUserName: null + clientConnectionPort: 12345 + clusterUpgradeCadence: 'Wave0' + dnsName: 'acctest0001' + httpGatewayConnectionPort: 23456 + loadBalancingRules: [ + { + backendPort: 8000 + frontendPort: 443 + probeProtocol: 'http' + probeRequestPath: '/' + protocol: 'tcp' + } + ] + networkSecurityRules: [ + { + access: 'allow' + destinationAddressPrefixes: [ + '0.0.0.0/0' + ] + destinationPortRanges: [ + '443' + ] + direction: 'inbound' + name: 'rule443-allow-fe' + priority: 1000 + protocol: 'tcp' + sourceAddressPrefixes: [ + '0.0.0.0/0' + ] + sourcePortRanges: [ + '1-65535' + ] + } + ] + } + sku: { + name: 'Standard' + } + tags: { + Test: 'value' + } +} + +resource nodeType 'Microsoft.ServiceFabric/managedClusters/nodeTypes@2021-05-01' = { + parent: managedCluster + name: resourceName + properties: { + applicationPorts: { + endPort: 9000 + startPort: 7000 + } + capacities: {} + dataDiskSizeGB: 130 + dataDiskType: 'Standard_LRS' + ephemeralPorts: { + endPort: 20000 + startPort: 10000 + } + isPrimary: true + isStateless: false + multiplePlacementGroups: false + placementProperties: {} + vmImageOffer: 'WindowsServer' + vmImagePublisher: 'MicrosoftWindowsServer' + vmImageSku: '2016-Datacenter' + vmImageVersion: 'latest' + vmInstanceCount: 5 + vmSecrets: [] + vmSize: 'Standard_DS2_v2' + } +} diff --git a/settings/remarks/microsoft.servicelinker/remarks.json b/settings/remarks/microsoft.servicelinker/remarks.json index 329c97a6..bb540287 100644 --- a/settings/remarks/microsoft.servicelinker/remarks.json +++ b/settings/remarks/microsoft.servicelinker/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ServiceLinker/linkers", - "Path": "samples/linkers/main.tf", - "Description": "A basic example of deploying service connector." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ServiceLinker/linkers", + "Path": "samples/linkers/main.tf", + "Description": "A basic example of deploying service connector." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ServiceLinker/linkers", + "Path": "samples/linkers/main.bicep", + "Description": "A basic example of deploying service connector." + } + ] +} diff --git a/settings/remarks/microsoft.servicelinker/samples/linkers/main.bicep b/settings/remarks/microsoft.servicelinker/samples/linkers/main.bicep new file mode 100644 index 00000000..e5fa0c24 --- /dev/null +++ b/settings/remarks/microsoft.servicelinker/samples/linkers/main.bicep @@ -0,0 +1,113 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource spring 'Microsoft.AppPlatform/Spring@2023-05-01-preview' = { + name: resourceName + location: location + properties: { + zoneRedundant: false + } + sku: { + name: 'S0' + } +} + +resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2021-10-15' = { + name: resourceName + location: location + kind: 'GlobalDocumentDB' + properties: { + capabilities: [] + consistencyPolicy: { + defaultConsistencyLevel: 'BoundedStaleness' + maxIntervalInSeconds: 10 + maxStalenessPrefix: 200 + } + databaseAccountOfferType: 'Standard' + defaultIdentity: 'FirstPartyIdentity' + disableKeyBasedMetadataWriteAccess: false + disableLocalAuth: false + enableAnalyticalStorage: false + enableAutomaticFailover: false + enableFreeTier: false + enableMultipleWriteLocations: false + ipRules: [] + isVirtualNetworkFilterEnabled: false + locations: [ + { + failoverPriority: 0 + isZoneRedundant: false + locationName: 'West Europe' + } + ] + networkAclBypass: 'None' + networkAclBypassResourceIds: [] + publicNetworkAccess: 'Enabled' + virtualNetworkRules: [] + } +} + +resource linker 'Microsoft.ServiceLinker/linkers@2022-05-01' = { + scope: deployment + name: resourceName + properties: { + authInfo: { + authType: 'systemAssignedIdentity' + } + clientType: 'none' + targetService: { + id: sqlDatabase.id + resourceProperties: null + type: 'AzureResource' + } + } +} + +resource app 'Microsoft.AppPlatform/Spring/apps@2023-05-01-preview' = { + parent: spring + name: resourceName + location: location + properties: { + customPersistentDisks: [] + enableEndToEndTLS: false + public: false + } +} + +resource sqlDatabase 'Microsoft.DocumentDB/databaseAccounts/sqlDatabases@2021-10-15' = { + parent: databaseAccount + name: resourceName + properties: { + options: { + throughput: 400 + } + resource: { + id: 'acctest0001' + } + } +} + +resource deployment 'Microsoft.AppPlatform/Spring/apps/deployments@2023-05-01-preview' = { + parent: app + name: 'deploy-q4uff' + properties: { + deploymentSettings: { + environmentVariables: {} + resourceRequests: { + cpu: '1' + memory: '1Gi' + } + } + source: { + jvmOptions: '' + relativePath: '' + runtimeVersion: 'Java_8' + type: 'Jar' + } + } + sku: { + capacity: 1 + name: 'S0' + tier: 'Standard' + } +} diff --git a/settings/remarks/microsoft.servicenetworking/remarks.json b/settings/remarks/microsoft.servicenetworking/remarks.json index 874de15e..39d01bbb 100644 --- a/settings/remarks/microsoft.servicenetworking/remarks.json +++ b/settings/remarks/microsoft.servicenetworking/remarks.json @@ -1,20 +1,37 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.ServiceNetworking/trafficControllers", - "Path": "samples/trafficcontrollers/main.tf", - "Description": "A basic example of deploying Application Gateway for Containers (ALB)." - }, - { - "ResourceType": "Microsoft.ServiceNetworking/trafficControllers/associations", - "Path": "samples/trafficcontrollers/associations/main.tf", - "Description": "A basic example of deploying association between an Application Gateway for Containers and a Subnet." - }, - { - "ResourceType": "Microsoft.ServiceNetworking/trafficControllers/frontends", - "Path": "samples/trafficcontrollers/frontends/main.tf", - "Description": "A basic example of deploying Application Gateway for Containers Frontend." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.ServiceNetworking/trafficControllers", + "Path": "samples/trafficcontrollers/main.tf", + "Description": "A basic example of deploying Application Gateway for Containers (ALB)." + }, + { + "ResourceType": "Microsoft.ServiceNetworking/trafficControllers/associations", + "Path": "samples/trafficcontrollers/associations/main.tf", + "Description": "A basic example of deploying association between an Application Gateway for Containers and a Subnet." + }, + { + "ResourceType": "Microsoft.ServiceNetworking/trafficControllers/frontends", + "Path": "samples/trafficcontrollers/frontends/main.tf", + "Description": "A basic example of deploying Application Gateway for Containers Frontend." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.ServiceNetworking/trafficControllers", + "Path": "samples/trafficcontrollers/main.bicep", + "Description": "A basic example of deploying Application Gateway for Containers (ALB)." + }, + { + "ResourceType": "Microsoft.ServiceNetworking/trafficControllers/associations", + "Path": "samples/trafficcontrollers/associations/main.bicep", + "Description": "A basic example of deploying association between an Application Gateway for Containers and a Subnet." + }, + { + "ResourceType": "Microsoft.ServiceNetworking/trafficControllers/frontends", + "Path": "samples/trafficcontrollers/frontends/main.bicep", + "Description": "A basic example of deploying Application Gateway for Containers Frontend." + } + ] +} diff --git a/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/associations/main.bicep b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/associations/main.bicep new file mode 100644 index 00000000..1b9932b2 --- /dev/null +++ b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/associations/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource trafficController 'Microsoft.ServiceNetworking/trafficControllers@2023-11-01' = { + name: '${resourceName}-tc' + location: location +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource association 'Microsoft.ServiceNetworking/trafficControllers/associations@2023-11-01' = { + parent: trafficController + name: '${resourceName}-assoc' + location: location + properties: { + associationType: 'subnets' + subnet: { + id: subnet.id + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.1.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + serviceName: 'Microsoft.ServiceNetworking/trafficControllers' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/frontends/main.bicep b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/frontends/main.bicep new file mode 100644 index 00000000..1d959084 --- /dev/null +++ b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/frontends/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource trafficController 'Microsoft.ServiceNetworking/trafficControllers@2023-11-01' = { + name: resourceName + location: location +} + +resource frontend 'Microsoft.ServiceNetworking/trafficControllers/frontends@2023-11-01' = { + parent: trafficController + name: '${resourceName}-frontend' + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/main.bicep b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/main.bicep new file mode 100644 index 00000000..d64277a2 --- /dev/null +++ b/settings/remarks/microsoft.servicenetworking/samples/trafficcontrollers/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource trafficController 'Microsoft.ServiceNetworking/trafficControllers@2023-11-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.signalrservice/remarks.json b/settings/remarks/microsoft.signalrservice/remarks.json index dda2dcc5..c2af9f3a 100644 --- a/settings/remarks/microsoft.signalrservice/remarks.json +++ b/settings/remarks/microsoft.signalrservice/remarks.json @@ -1,30 +1,57 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.SignalRService/signalR", - "Path": "samples/signalr/main.tf", - "Description": "A basic example of deploying Azure SignalR service." - }, - { - "ResourceType": "Microsoft.SignalRService/signalR/sharedPrivateLinkResources", - "Path": "samples/signalr/sharedprivatelinkresources/main.tf", - "Description": "A basic example of deploying Shared Private Link Resource for a Signalr service." - }, - { - "ResourceType": "Microsoft.SignalRService/webPubSub", - "Path": "samples/webpubsub/main.tf", - "Description": "A basic example of deploying Azure Web PubSub service." - }, - { - "ResourceType": "Microsoft.SignalRService/webPubSub/hubs", - "Path": "samples/webpubsub/hubs/main.tf", - "Description": "A basic example of deploying hub settings for a Web Pubsub service." - }, - { - "ResourceType": "Microsoft.SignalRService/webPubSub/sharedPrivateLinkResources", - "Path": "samples/webpubsub/sharedprivatelinkresources/main.tf", - "Description": "A basic example of deploying Shared Private Link Resource for a Web Pubsub service." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.SignalRService/signalR", + "Path": "samples/signalr/main.tf", + "Description": "A basic example of deploying Azure SignalR service." + }, + { + "ResourceType": "Microsoft.SignalRService/signalR/sharedPrivateLinkResources", + "Path": "samples/signalr/sharedprivatelinkresources/main.tf", + "Description": "A basic example of deploying Shared Private Link Resource for a Signalr service." + }, + { + "ResourceType": "Microsoft.SignalRService/webPubSub", + "Path": "samples/webpubsub/main.tf", + "Description": "A basic example of deploying Azure Web PubSub service." + }, + { + "ResourceType": "Microsoft.SignalRService/webPubSub/hubs", + "Path": "samples/webpubsub/hubs/main.tf", + "Description": "A basic example of deploying hub settings for a Web Pubsub service." + }, + { + "ResourceType": "Microsoft.SignalRService/webPubSub/sharedPrivateLinkResources", + "Path": "samples/webpubsub/sharedprivatelinkresources/main.tf", + "Description": "A basic example of deploying Shared Private Link Resource for a Web Pubsub service." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.SignalRService/signalR", + "Path": "samples/signalr/main.bicep", + "Description": "A basic example of deploying Azure SignalR service." + }, + { + "ResourceType": "Microsoft.SignalRService/signalR/sharedPrivateLinkResources", + "Path": "samples/signalr/sharedprivatelinkresources/main.bicep", + "Description": "A basic example of deploying Shared Private Link Resource for a Signalr service." + }, + { + "ResourceType": "Microsoft.SignalRService/webPubSub", + "Path": "samples/webpubsub/main.bicep", + "Description": "A basic example of deploying Azure Web PubSub service." + }, + { + "ResourceType": "Microsoft.SignalRService/webPubSub/hubs", + "Path": "samples/webpubsub/hubs/main.bicep", + "Description": "A basic example of deploying hub settings for a Web Pubsub service." + }, + { + "ResourceType": "Microsoft.SignalRService/webPubSub/sharedPrivateLinkResources", + "Path": "samples/webpubsub/sharedprivatelinkresources/main.bicep", + "Description": "A basic example of deploying Shared Private Link Resource for a Web Pubsub service." + } + ] +} diff --git a/settings/remarks/microsoft.signalrservice/samples/signalr/main.bicep b/settings/remarks/microsoft.signalrservice/samples/signalr/main.bicep new file mode 100644 index 00000000..cf280b4f --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/signalr/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource signalR 'Microsoft.SignalRService/signalR@2023-02-01' = { + name: resourceName + location: location + properties: { + cors: {} + disableAadAuth: false + disableLocalAuth: false + features: [ + { + flag: 'ServiceMode' + value: 'Default' + } + { + flag: 'EnableConnectivityLogs' + value: 'False' + } + { + flag: 'EnableMessagingLogs' + value: 'False' + } + { + flag: 'EnableLiveTrace' + value: 'False' + } + ] + publicNetworkAccess: 'Enabled' + resourceLogConfiguration: { + categories: [ + { + enabled: 'false' + name: 'MessagingLogs' + } + { + enabled: 'false' + name: 'ConnectivityLogs' + } + { + enabled: 'false' + name: 'HttpRequestLogs' + } + ] + } + serverless: { + connectionTimeoutInSeconds: 30 + } + tls: { + clientCertEnabled: false + } + upstream: { + templates: [] + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} diff --git a/settings/remarks/microsoft.signalrservice/samples/signalr/sharedprivatelinkresources/main.bicep b/settings/remarks/microsoft.signalrservice/samples/signalr/sharedprivatelinkresources/main.bicep new file mode 100644 index 00000000..8e2ebab2 --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/signalr/sharedprivatelinkresources/main.bicep @@ -0,0 +1,108 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource signalR 'Microsoft.SignalRService/signalR@2023-02-01' = { + name: resourceName + location: location + properties: { + cors: {} + disableAadAuth: false + disableLocalAuth: false + features: [ + { + flag: 'ServiceMode' + value: 'Default' + } + { + flag: 'EnableConnectivityLogs' + value: 'False' + } + { + flag: 'EnableMessagingLogs' + value: 'False' + } + { + flag: 'EnableLiveTrace' + value: 'False' + } + ] + publicNetworkAccess: 'Enabled' + resourceLogConfiguration: { + categories: [ + { + enabled: 'false' + name: 'MessagingLogs' + } + { + enabled: 'false' + name: 'ConnectivityLogs' + } + { + enabled: 'false' + name: 'HttpRequestLogs' + } + ] + } + serverless: { + connectionTimeoutInSeconds: 30 + } + tls: { + clientCertEnabled: false + } + upstream: { + templates: [] + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Create' + ] + secrets: [ + 'Set' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} + +resource sharedPrivateLinkResource 'Microsoft.SignalRService/signalR/sharedPrivateLinkResources@2023-02-01' = { + parent: signalR + name: resourceName + properties: { + groupId: 'vault' + privateLinkResourceId: vault.id + requestMessage: 'please approve' + } +} diff --git a/settings/remarks/microsoft.signalrservice/samples/webpubsub/hubs/main.bicep b/settings/remarks/microsoft.signalrservice/samples/webpubsub/hubs/main.bicep new file mode 100644 index 00000000..fe288f3f --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/webpubsub/hubs/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource webPubSub 'Microsoft.SignalRService/webPubSub@2023-02-01' = { + name: resourceName + location: location + properties: { + disableAadAuth: false + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + tls: { + clientCertEnabled: false + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} + +resource hub 'Microsoft.SignalRService/webPubSub/hubs@2023-02-01' = { + parent: webPubSub + name: resourceName + properties: { + anonymousConnectPolicy: 'Deny' + eventListeners: [] + } +} diff --git a/settings/remarks/microsoft.signalrservice/samples/webpubsub/main.bicep b/settings/remarks/microsoft.signalrservice/samples/webpubsub/main.bicep new file mode 100644 index 00000000..9e647d23 --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/webpubsub/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource webPubSub 'Microsoft.SignalRService/webPubSub@2023-02-01' = { + name: resourceName + location: location + properties: { + disableAadAuth: false + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + tls: { + clientCertEnabled: false + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} diff --git a/settings/remarks/microsoft.signalrservice/samples/webpubsub/sharedprivatelinkresources/main.bicep b/settings/remarks/microsoft.signalrservice/samples/webpubsub/sharedprivatelinkresources/main.bicep new file mode 100644 index 00000000..054ee992 --- /dev/null +++ b/settings/remarks/microsoft.signalrservice/samples/webpubsub/sharedprivatelinkresources/main.bicep @@ -0,0 +1,66 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource vault 'Microsoft.KeyVault/vaults@2021-10-01' = { + name: resourceName + location: location + properties: { + accessPolicies: [ + { + objectId: deployer().objectId + permissions: { + certificates: [ + 'ManageContacts' + ] + keys: [ + 'Create' + ] + secrets: [ + 'Set' + ] + storage: [] + } + tenantId: deployer().tenantId + } + ] + createMode: 'default' + enableRbacAuthorization: false + enableSoftDelete: true + enabledForDeployment: false + enabledForDiskEncryption: false + enabledForTemplateDeployment: false + publicNetworkAccess: 'Enabled' + sku: { + family: 'A' + name: 'standard' + } + softDeleteRetentionInDays: 7 + tenantId: deployer().tenantId + } +} + +resource webPubSub 'Microsoft.SignalRService/webPubSub@2023-02-01' = { + name: resourceName + location: location + properties: { + disableAadAuth: false + disableLocalAuth: false + publicNetworkAccess: 'Enabled' + tls: { + clientCertEnabled: false + } + } + sku: { + capacity: 1 + name: 'Standard_S1' + } +} + +resource sharedPrivateLinkResource 'Microsoft.SignalRService/webPubSub/sharedPrivateLinkResources@2023-02-01' = { + parent: webPubSub + name: resourceName + properties: { + groupId: 'vault' + privateLinkResourceId: vault.id + } +} diff --git a/settings/remarks/microsoft.solutions/remarks.json b/settings/remarks/microsoft.solutions/remarks.json index 527b5b6b..98a43e30 100644 --- a/settings/remarks/microsoft.solutions/remarks.json +++ b/settings/remarks/microsoft.solutions/remarks.json @@ -1,15 +1,22 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Solutions/applicationDefinitions", - "Path": "samples/applicationdefinitions/main.tf", - "Description": "A basic example of deploying Managed Application Definition." - }, - { - "ResourceType": "Microsoft.Solutions/applications", - "Path": "samples/applications/main.tf", - "Description": "A basic example of deploying Managed Application." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Solutions/applicationDefinitions", + "Path": "samples/applicationdefinitions/main.tf", + "Description": "A basic example of deploying Managed Application Definition." + }, + { + "ResourceType": "Microsoft.Solutions/applications", + "Path": "samples/applications/main.tf", + "Description": "A basic example of deploying Managed Application." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Solutions/applications", + "Path": "samples/applications/main.bicep", + "Description": "A basic example of deploying Managed Application." + } + ] +} diff --git a/settings/remarks/microsoft.solutions/samples/applications/main.bicep b/settings/remarks/microsoft.solutions/samples/applications/main.bicep new file mode 100644 index 00000000..70a405e6 --- /dev/null +++ b/settings/remarks/microsoft.solutions/samples/applications/main.bicep @@ -0,0 +1,129 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource application 'Microsoft.Solutions/applications@2021-07-01' = { + name: '${resourceName}-app' + location: location + kind: 'ServiceCatalog' + properties: { + applicationDefinitionId: applicationDefinition.id + managedResourceGroupId: '/subscriptions/subscription().subscriptionId/resourceGroups/acctest0001-infragroup' + parameters: { + arrayParameter: { + value: [ + 'value_1' + 'value_2' + ] + } + boolParameter: { + value: true + } + intParameter: { + value: 100 + } + objectParameter: { + value: { + nested_array: [ + 'value_1' + 'value_2' + ] + nested_bool: true + nested_object: { + key_0: 0 + } + } + } + secureStringParameter: { + value: '' + } + stringParameter: { + value: 'value_1' + } + } + } +} + +resource applicationDefinition 'Microsoft.Solutions/applicationDefinitions@2021-07-01' = { + name: '${resourceName}-appdef' + location: location + properties: { + authorizations: [ + { + principalId: deployer().objectId + roleDefinitionId: 'b24988ac-6180-42a0-ab88-20f7382dd24c' + } + ] + createUiDefinition: ''' { + "$schema": "https://schema.management.azure.com/schemas/0.1.2-preview/CreateUIDefinition.MultiVm.json#", + "handler": "Microsoft.Azure.CreateUIDef", + "version": "0.1.2-preview", + "parameters": { + "basics": [], + "steps": [], + "outputs": {} + } + } +''' + description: 'Test Managed App Definition' + displayName: 'TestManagedAppDefinition' + isEnabled: true + lockLevel: 'ReadOnly' + mainTemplate: ''' { + "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "parameters": { + + "boolParameter": { + "type": "bool" + }, + "intParameter": { + "type": "int" + }, + "stringParameter": { + "type": "string" + }, + "secureStringParameter": { + "type": "secureString" + }, + "objectParameter": { + "type": "object" + }, + "arrayParameter": { + "type": "array" + } + + }, + "variables": {}, + "resources": [], + "outputs": { + "boolOutput": { + "type": "bool", + "value": true + }, + "intOutput": { + "type": "int", + "value": 100 + }, + "stringOutput": { + "type": "string", + "value": "stringOutputValue" + }, + "objectOutput": { + "type": "object", + "value": { + "nested_bool": true, + "nested_array": ["value_1", "value_2"], + "nested_object": { + "key_0": 0 + } + } + }, + "arrayOutput": { + "type": "array", + "value": ["value_1", "value_2"] + } + } + } +''' + } +} diff --git a/settings/remarks/microsoft.sql/remarks.json b/settings/remarks/microsoft.sql/remarks.json index 6da7b201..fa85c932 100644 --- a/settings/remarks/microsoft.sql/remarks.json +++ b/settings/remarks/microsoft.sql/remarks.json @@ -1,155 +1,262 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Sql/instancePools", - "Path": "samples/instancepools/main.tf", - "Description": "A basic example of deploying SQL Instance Pools." - }, - { - "ResourceType": "Microsoft.Sql/servers", - "Path": "samples/servers/main.tf", - "Description": "A basic example of deploying Microsoft SQL Azure Database Server." - }, - { - "ResourceType": "Microsoft.Sql/servers/administrators", - "Path": "samples/servers/administrators/main.tf", - "Description": "A basic example of deploying SQL Server Administrators." - }, - { - "ResourceType": "Microsoft.Sql/servers/auditingSettings", - "Path": "samples/servers/auditingsettings/main.tf", - "Description": "A basic example of deploying SQL Server Auditing Settings." - }, - { - "ResourceType": "Microsoft.Sql/servers/automaticTuning", - "Path": "samples/servers/automatictuning/main.tf", - "Description": "A basic example of deploying SQL Server Automatic Tuning." - }, - { - "ResourceType": "Microsoft.Sql/servers/connectionPolicies", - "Path": "samples/servers/connectionpolicies/main.tf", - "Description": "A basic example of deploying SQL Server Connection Policies." - }, - { - "ResourceType": "Microsoft.Sql/servers/databases", - "Path": "samples/servers/databases/main.tf", - "Description": "A basic example of deploying MS SQL Database." - }, - { - "ResourceType": "Microsoft.Sql/servers/databases", - "Path": "samples/servers/databases/main.tf", - "Description": "A basic example of deploying MS SQL Database." - }, - { - "ResourceType": "Microsoft.Sql/servers/databases/extendedAuditingSettings", - "Path": "samples/servers/databases/extendedauditingsettings/main.tf", - "Description": "A basic example of deploying MS SQL Database Extended Auditing Policy." - }, - { - "ResourceType": "Microsoft.Sql/servers/databases/securityAlertPolicies", - "Path": "samples/servers/databases/securityalertpolicies/main.tf", - "Description": "A basic example of deploying SQL Server Databases Security Alert Policies." - }, - { - "ResourceType": "Microsoft.Sql/servers/databases/securityAlertPolicies", - "Path": "samples/servers/databases/securityalertpolicies/main.tf", - "Description": "A basic example of deploying SQL Server Databases Security Alert Policies." - }, - { - "ResourceType": "Microsoft.Sql/servers/databases/transparentDataEncryption", - "Path": "samples/servers/databases/transparentdataencryption/main.tf", - "Description": "A basic example of deploying SQL Server Databases Transparent Data Encryption." - }, - { - "ResourceType": "Microsoft.Sql/servers/dnsAliases", - "Path": "samples/servers/dnsaliases/main.tf", - "Description": "A basic example of deploying MS SQL Server DNS Alias." - }, - { - "ResourceType": "Microsoft.Sql/servers/elasticPools", - "Path": "samples/servers/elasticpools/main.tf", - "Description": "A basic example of deploying Azure SQL Elastic Pool." - }, - { - "ResourceType": "Microsoft.Sql/servers/elasticPools", - "Path": "samples/servers/elasticpools/main.tf", - "Description": "A basic example of deploying Azure SQL Elastic Pool." - }, - { - "ResourceType": "Microsoft.Sql/servers/encryptionProtector", - "Path": "samples/servers/encryptionprotector/main.tf", - "Description": "A basic example of deploying transparent data encryption configuration for a MSSQL Server." - }, - { - "ResourceType": "Microsoft.Sql/servers/extendedAuditingSettings", - "Path": "samples/servers/extendedauditingsettings/main.tf", - "Description": "A basic example of deploying MS SQL Server Extended Auditing Policy." - }, - { - "ResourceType": "Microsoft.Sql/servers/failoverGroups", - "Path": "samples/servers/failovergroups/main.tf", - "Description": "A basic example of deploying Microsoft Azure SQL Failover Group." - }, - { - "ResourceType": "Microsoft.Sql/servers/firewallRules", - "Path": "samples/servers/firewallrules/main.tf", - "Description": "A basic example of deploying Azure SQL Firewall Rule." - }, - { - "ResourceType": "Microsoft.Sql/servers/firewallRules", - "Path": "samples/servers/firewallrules/main.tf", - "Description": "A basic example of deploying Azure SQL Firewall Rule." - }, - { - "ResourceType": "Microsoft.Sql/servers/jobAgents", - "Path": "samples/servers/jobagents/main.tf", - "Description": "A basic example of deploying Elastic Job Agent." - }, - { - "ResourceType": "Microsoft.Sql/servers/jobAgents/credentials", - "Path": "samples/servers/jobagents/credentials/main.tf", - "Description": "A basic example of deploying Elastic Job Credential." - }, - { - "ResourceType": "Microsoft.Sql/servers/jobAgents/jobs", - "Path": "samples/servers/jobagents/jobs/main.tf", - "Description": "A basic example of deploying Elastic Job." - }, - { - "ResourceType": "Microsoft.Sql/servers/jobAgents/jobs/steps", - "Path": "samples/servers/jobagents/jobs/steps/main.tf", - "Description": "A basic example of deploying Elastic Job Step." - }, - { - "ResourceType": "Microsoft.Sql/servers/jobAgents/targetGroups", - "Path": "samples/servers/jobagents/targetgroups/main.tf", - "Description": "A basic example of deploying Elastic Job Target Group." - }, - { - "ResourceType": "Microsoft.Sql/servers/outboundFirewallRules", - "Path": "samples/servers/outboundfirewallrules/main.tf", - "Description": "A basic example of deploying Azure SQL Outbound Firewall Rule." - }, - { - "ResourceType": "Microsoft.Sql/servers/securityAlertPolicies", - "Path": "samples/servers/securityalertpolicies/main.tf", - "Description": "A basic example of deploying Security Alert Policy for a MS SQL Server." - }, - { - "ResourceType": "Microsoft.Sql/servers/sqlVulnerabilityAssessments", - "Path": "samples/servers/sqlvulnerabilityassessments/main.tf", - "Description": "A basic example of deploying SQL Server Vulnerability Assessments." - }, - { - "ResourceType": "Microsoft.Sql/servers/virtualNetworkRules", - "Path": "samples/servers/virtualnetworkrules/main.tf", - "Description": "A basic example of deploying Azure SQL Virtual Network Rule." - }, - { - "ResourceType": "Microsoft.Sql/servers/vulnerabilityAssessments", - "Path": "samples/servers/vulnerabilityassessments/main.tf", - "Description": "A basic example of deploying Vulnerability Assessment for an MS SQL Server." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Sql/instancePools", + "Path": "samples/instancepools/main.tf", + "Description": "A basic example of deploying SQL Instance Pools." + }, + { + "ResourceType": "Microsoft.Sql/servers", + "Path": "samples/servers/main.tf", + "Description": "A basic example of deploying Microsoft SQL Azure Database Server." + }, + { + "ResourceType": "Microsoft.Sql/servers/administrators", + "Path": "samples/servers/administrators/main.tf", + "Description": "A basic example of deploying SQL Server Administrators." + }, + { + "ResourceType": "Microsoft.Sql/servers/auditingSettings", + "Path": "samples/servers/auditingsettings/main.tf", + "Description": "A basic example of deploying SQL Server Auditing Settings." + }, + { + "ResourceType": "Microsoft.Sql/servers/automaticTuning", + "Path": "samples/servers/automatictuning/main.tf", + "Description": "A basic example of deploying SQL Server Automatic Tuning." + }, + { + "ResourceType": "Microsoft.Sql/servers/connectionPolicies", + "Path": "samples/servers/connectionpolicies/main.tf", + "Description": "A basic example of deploying SQL Server Connection Policies." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases", + "Path": "samples/servers/databases/main.tf", + "Description": "A basic example of deploying MS SQL Database." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases", + "Path": "samples/servers/databases/main.tf", + "Description": "A basic example of deploying MS SQL Database." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases/extendedAuditingSettings", + "Path": "samples/servers/databases/extendedauditingsettings/main.tf", + "Description": "A basic example of deploying MS SQL Database Extended Auditing Policy." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases/securityAlertPolicies", + "Path": "samples/servers/databases/securityalertpolicies/main.tf", + "Description": "A basic example of deploying SQL Server Databases Security Alert Policies." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases/securityAlertPolicies", + "Path": "samples/servers/databases/securityalertpolicies/main.tf", + "Description": "A basic example of deploying SQL Server Databases Security Alert Policies." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases/transparentDataEncryption", + "Path": "samples/servers/databases/transparentdataencryption/main.tf", + "Description": "A basic example of deploying SQL Server Databases Transparent Data Encryption." + }, + { + "ResourceType": "Microsoft.Sql/servers/dnsAliases", + "Path": "samples/servers/dnsaliases/main.tf", + "Description": "A basic example of deploying MS SQL Server DNS Alias." + }, + { + "ResourceType": "Microsoft.Sql/servers/elasticPools", + "Path": "samples/servers/elasticpools/main.tf", + "Description": "A basic example of deploying Azure SQL Elastic Pool." + }, + { + "ResourceType": "Microsoft.Sql/servers/elasticPools", + "Path": "samples/servers/elasticpools/main.tf", + "Description": "A basic example of deploying Azure SQL Elastic Pool." + }, + { + "ResourceType": "Microsoft.Sql/servers/encryptionProtector", + "Path": "samples/servers/encryptionprotector/main.tf", + "Description": "A basic example of deploying transparent data encryption configuration for a MSSQL Server." + }, + { + "ResourceType": "Microsoft.Sql/servers/extendedAuditingSettings", + "Path": "samples/servers/extendedauditingsettings/main.tf", + "Description": "A basic example of deploying MS SQL Server Extended Auditing Policy." + }, + { + "ResourceType": "Microsoft.Sql/servers/failoverGroups", + "Path": "samples/servers/failovergroups/main.tf", + "Description": "A basic example of deploying Microsoft Azure SQL Failover Group." + }, + { + "ResourceType": "Microsoft.Sql/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.tf", + "Description": "A basic example of deploying Azure SQL Firewall Rule." + }, + { + "ResourceType": "Microsoft.Sql/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.tf", + "Description": "A basic example of deploying Azure SQL Firewall Rule." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents", + "Path": "samples/servers/jobagents/main.tf", + "Description": "A basic example of deploying Elastic Job Agent." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents/credentials", + "Path": "samples/servers/jobagents/credentials/main.tf", + "Description": "A basic example of deploying Elastic Job Credential." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents/jobs", + "Path": "samples/servers/jobagents/jobs/main.tf", + "Description": "A basic example of deploying Elastic Job." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents/jobs/steps", + "Path": "samples/servers/jobagents/jobs/steps/main.tf", + "Description": "A basic example of deploying Elastic Job Step." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents/targetGroups", + "Path": "samples/servers/jobagents/targetgroups/main.tf", + "Description": "A basic example of deploying Elastic Job Target Group." + }, + { + "ResourceType": "Microsoft.Sql/servers/outboundFirewallRules", + "Path": "samples/servers/outboundfirewallrules/main.tf", + "Description": "A basic example of deploying Azure SQL Outbound Firewall Rule." + }, + { + "ResourceType": "Microsoft.Sql/servers/securityAlertPolicies", + "Path": "samples/servers/securityalertpolicies/main.tf", + "Description": "A basic example of deploying Security Alert Policy for a MS SQL Server." + }, + { + "ResourceType": "Microsoft.Sql/servers/sqlVulnerabilityAssessments", + "Path": "samples/servers/sqlvulnerabilityassessments/main.tf", + "Description": "A basic example of deploying SQL Server Vulnerability Assessments." + }, + { + "ResourceType": "Microsoft.Sql/servers/virtualNetworkRules", + "Path": "samples/servers/virtualnetworkrules/main.tf", + "Description": "A basic example of deploying Azure SQL Virtual Network Rule." + }, + { + "ResourceType": "Microsoft.Sql/servers/vulnerabilityAssessments", + "Path": "samples/servers/vulnerabilityassessments/main.tf", + "Description": "A basic example of deploying Vulnerability Assessment for an MS SQL Server." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Sql/instancePools", + "Path": "samples/instancepools/main.bicep", + "Description": "A basic example of deploying SQL Instance Pools." + }, + { + "ResourceType": "Microsoft.Sql/servers", + "Path": "samples/servers/main.bicep", + "Description": "A basic example of deploying Microsoft SQL Azure Database Server." + }, + { + "ResourceType": "Microsoft.Sql/servers/administrators", + "Path": "samples/servers/administrators/main.bicep", + "Description": "A basic example of deploying SQL Server Administrators." + }, + { + "ResourceType": "Microsoft.Sql/servers/auditingSettings", + "Path": "samples/servers/auditingsettings/main.bicep", + "Description": "A basic example of deploying SQL Server Auditing Settings." + }, + { + "ResourceType": "Microsoft.Sql/servers/connectionPolicies", + "Path": "samples/servers/connectionpolicies/main.bicep", + "Description": "A basic example of deploying SQL Server Connection Policies." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases", + "Path": "samples/servers/databases/main.bicep", + "Description": "A basic example of deploying MS SQL Database." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases/securityAlertPolicies", + "Path": "samples/servers/databases/securityalertpolicies/main.bicep", + "Description": "A basic example of deploying SQL Server Databases Security Alert Policies." + }, + { + "ResourceType": "Microsoft.Sql/servers/databases/transparentDataEncryption", + "Path": "samples/servers/databases/transparentdataencryption/main.bicep", + "Description": "A basic example of deploying SQL Server Databases Transparent Data Encryption." + }, + { + "ResourceType": "Microsoft.Sql/servers/dnsAliases", + "Path": "samples/servers/dnsaliases/main.bicep", + "Description": "A basic example of deploying MS SQL Server DNS Alias." + }, + { + "ResourceType": "Microsoft.Sql/servers/elasticPools", + "Path": "samples/servers/elasticpools/main.bicep", + "Description": "A basic example of deploying Azure SQL Elastic Pool." + }, + { + "ResourceType": "Microsoft.Sql/servers/encryptionProtector", + "Path": "samples/servers/encryptionprotector/main.bicep", + "Description": "A basic example of deploying transparent data encryption configuration for a MSSQL Server." + }, + { + "ResourceType": "Microsoft.Sql/servers/failoverGroups", + "Path": "samples/servers/failovergroups/main.bicep", + "Description": "A basic example of deploying Microsoft Azure SQL Failover Group." + }, + { + "ResourceType": "Microsoft.Sql/servers/firewallRules", + "Path": "samples/servers/firewallrules/main.bicep", + "Description": "A basic example of deploying Azure SQL Firewall Rule." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents", + "Path": "samples/servers/jobagents/main.bicep", + "Description": "A basic example of deploying Elastic Job Agent." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents/credentials", + "Path": "samples/servers/jobagents/credentials/main.bicep", + "Description": "A basic example of deploying Elastic Job Credential." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents/jobs", + "Path": "samples/servers/jobagents/jobs/main.bicep", + "Description": "A basic example of deploying Elastic Job." + }, + { + "ResourceType": "Microsoft.Sql/servers/jobAgents/targetGroups", + "Path": "samples/servers/jobagents/targetgroups/main.bicep", + "Description": "A basic example of deploying Elastic Job Target Group." + }, + { + "ResourceType": "Microsoft.Sql/servers/outboundFirewallRules", + "Path": "samples/servers/outboundfirewallrules/main.bicep", + "Description": "A basic example of deploying Azure SQL Outbound Firewall Rule." + }, + { + "ResourceType": "Microsoft.Sql/servers/securityAlertPolicies", + "Path": "samples/servers/securityalertpolicies/main.bicep", + "Description": "A basic example of deploying Security Alert Policy for a MS SQL Server." + }, + { + "ResourceType": "Microsoft.Sql/servers/sqlVulnerabilityAssessments", + "Path": "samples/servers/sqlvulnerabilityassessments/main.bicep", + "Description": "A basic example of deploying SQL Server Vulnerability Assessments." + }, + { + "ResourceType": "Microsoft.Sql/servers/virtualNetworkRules", + "Path": "samples/servers/virtualnetworkrules/main.bicep", + "Description": "A basic example of deploying Azure SQL Virtual Network Rule." + } + ] +} diff --git a/settings/remarks/microsoft.sql/samples/instancepools/main.bicep b/settings/remarks/microsoft.sql/samples/instancepools/main.bicep new file mode 100644 index 00000000..b18f9384 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/instancepools/main.bicep @@ -0,0 +1,186 @@ +param resourceName string = 'acctest0001' + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2023-04-01' existing = { + parent: virtualNetwork + name: resourceName +} + +resource instancePool 'Microsoft.Sql/instancePools@2022-05-01-preview' = { + name: resourceName + properties: { + licenseType: 'LicenseIncluded' + subnetId: subnet.id + vCores: 8 + } + sku: { + family: 'Gen5' + name: 'GP_Gen5' + tier: 'GeneralPurpose' + } +} + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2023-04-01' = { + name: resourceName + properties: { + securityRules: [ + { + name: 'allow_tds_inbound' + properties: { + access: 'Allow' + description: 'Allow access to data' + destinationAddressPrefix: '*' + destinationPortRange: '1433' + direction: 'Inbound' + priority: 1000 + protocol: 'TCP' + sourceAddressPrefix: 'VirtualNetwork' + sourcePortRange: '*' + } + } + { + name: 'allow_redirect_inbound' + properties: { + access: 'Allow' + description: 'Allow inbound redirect traffic to Managed Instance inside the virtual network' + destinationAddressPrefix: '*' + destinationPortRange: '11000-11999' + direction: 'Inbound' + priority: 1100 + protocol: 'Tcp' + sourceAddressPrefix: 'VirtualNetwork' + sourcePortRange: '*' + } + } + { + name: 'allow_geodr_inbound' + properties: { + access: 'Allow' + description: 'Allow inbound geodr traffic inside the virtual network' + destinationAddressPrefix: '*' + destinationPortRange: '5022' + direction: 'Inbound' + priority: 1200 + protocol: 'Tcp' + sourceAddressPrefix: 'VirtualNetwork' + sourcePortRange: '*' + } + } + { + name: 'deny_all_inbound' + properties: { + access: 'Deny' + description: 'Deny all other inbound traffic' + destinationAddressPrefix: '*' + destinationPortRange: '*' + direction: 'Inbound' + priority: 4096 + protocol: '*' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + { + name: 'allow_linkedserver_outbound' + properties: { + access: 'Allow' + description: 'Allow outbound linkedserver traffic inside the virtual network' + destinationAddressPrefix: 'VirtualNetwork' + destinationPortRange: '1433' + direction: 'Outbound' + priority: 1000 + protocol: 'Tcp' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + { + name: 'allow_redirect_outbound' + properties: { + access: 'Allow' + description: 'Allow outbound redirect traffic to Managed Instance inside the virtual network' + destinationAddressPrefix: 'VirtualNetwork' + destinationPortRange: '11000-11999' + direction: 'Outbound' + priority: 1100 + protocol: 'Tcp' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + { + name: 'allow_geodr_outbound' + properties: { + access: 'Allow' + description: 'Allow outbound geodr traffic inside the virtual network' + destinationAddressPrefix: 'VirtualNetwork' + destinationPortRange: '5022' + direction: 'Outbound' + priority: 1200 + protocol: 'Tcp' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + { + name: 'deny_all_outbound' + properties: { + access: 'Deny' + description: 'Deny all other outbound traffic' + destinationAddressPrefix: '*' + destinationPortRange: '*' + direction: 'Outbound' + priority: 4096 + protocol: '*' + sourceAddressPrefix: '*' + sourcePortRange: '*' + } + } + ] + } +} + +resource routeTable 'Microsoft.Network/routeTables@2023-04-01' = { + name: resourceName + properties: { + disableBgpRoutePropagation: false + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2023-04-01' = { + name: resourceName + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + subnets: [ + { + name: 'Default' + properties: { + addressPrefix: '10.0.0.0/24' + } + } + { + name: 'acctest0001' + properties: { + addressPrefix: '10.0.1.0/24' + delegations: [ + { + name: 'miDelegation' + properties: { + serviceName: 'Microsoft.Sql/managedInstances' + } + } + ] + networkSecurityGroup: { + id: networkSecurityGroup.id + } + routeTable: { + id: routeTable.id + } + } + } + ] + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/administrators/main.bicep b/settings/remarks/microsoft.sql/samples/servers/administrators/main.bicep new file mode 100644 index 00000000..ebcec94e --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/administrators/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2015-05-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + version: '12.0' + } +} + +resource administrator 'Microsoft.Sql/servers/administrators@2020-11-01-preview' = { + parent: server + name: 'ActiveDirectory' + properties: { + administratorType: 'ActiveDirectory' + login: 'sqladmin' + sid: deployer().objectId + tenantId: deployer().tenantId + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/auditingsettings/main.bicep b/settings/remarks/microsoft.sql/samples/servers/auditingsettings/main.bicep new file mode 100644 index 00000000..b8a48ccd --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/auditingsettings/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2022-05-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource auditingSettings 'Microsoft.Sql/servers/auditingSettings@2022-05-01-preview' = { + parent: server + name: 'default' + properties: { + auditActionsAndGroups: [ + 'FAILED_DATABASE_AUTHENTICATION_GROUP' + 'SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP' + ] + isAzureMonitorTargetEnabled: true + state: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/connectionpolicies/main.bicep b/settings/remarks/microsoft.sql/samples/servers/connectionpolicies/main.bicep new file mode 100644 index 00000000..80a772ec --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/connectionpolicies/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the SQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource connectionPolicy 'Microsoft.Sql/servers/connectionPolicies@2014-04-01' = { + parent: server + name: 'default' + properties: { + connectionType: 'Default' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/databases/main.bicep b/settings/remarks/microsoft.sql/samples/servers/databases/main.bicep new file mode 100644 index 00000000..b6fb2f83 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/databases/main.bicep @@ -0,0 +1,37 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: 'LicenseIncluded' + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/databases/securityalertpolicies/main.bicep b/settings/remarks/microsoft.sql/samples/servers/databases/securityalertpolicies/main.bicep new file mode 100644 index 00000000..3250298c --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/databases/securityalertpolicies/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: 'LicenseIncluded' + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} + +resource securityAlertPolicy 'Microsoft.Sql/servers/databases/securityAlertPolicies@2020-11-01-preview' = { + parent: database + name: 'default' + properties: { + state: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/databases/transparentdataencryption/main.bicep b/settings/remarks/microsoft.sql/samples/servers/databases/transparentdataencryption/main.bicep new file mode 100644 index 00000000..a2dfb33b --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/databases/transparentdataencryption/main.bicep @@ -0,0 +1,45 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: 'LicenseIncluded' + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} + +resource transparentDataEncryption 'Microsoft.Sql/servers/databases/transparentDataEncryption@2014-04-01' = { + parent: database + name: 'current' + properties: { + status: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/dnsaliases/main.bicep b/settings/remarks/microsoft.sql/samples/servers/dnsaliases/main.bicep new file mode 100644 index 00000000..6401087e --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/dnsaliases/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the SQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource dnsAlias 'Microsoft.Sql/servers/dnsAliases@2020-11-01-preview' = { + parent: server + name: resourceName +} diff --git a/settings/remarks/microsoft.sql/samples/servers/elasticpools/main.bicep b/settings/remarks/microsoft.sql/samples/servers/elasticpools/main.bicep new file mode 100644 index 00000000..9051a2ab --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/elasticpools/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: '4dm1n157r470r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource elasticPool 'Microsoft.Sql/servers/elasticPools@2020-11-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + maxSizeBytes: 5242880000 + perDatabaseSettings: { + maxCapacity: 5 + minCapacity: 0 + } + zoneRedundant: false + } + sku: { + capacity: 50 + family: '' + name: 'BasicPool' + tier: 'Basic' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/encryptionprotector/main.bicep b/settings/remarks/microsoft.sql/samples/servers/encryptionprotector/main.bicep new file mode 100644 index 00000000..15f96329 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/encryptionprotector/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource encryptionProtector 'Microsoft.Sql/servers/encryptionProtector@2023-08-01-preview' = { + parent: server + name: 'current' + properties: { + autoRotationEnabled: false + serverKeyName: '' + serverKeyType: 'ServiceManaged' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/failovergroups/main.bicep b/settings/remarks/microsoft.sql/samples/servers/failovergroups/main.bicep new file mode 100644 index 00000000..c7a6ba1c --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/failovergroups/main.bicep @@ -0,0 +1,79 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +param secondaryLocation string = 'eastus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: '${resourceName}-primary' + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource server1 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: '${resourceName}-secondary' + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2023-08-01-preview' = { + parent: server + name: '${resourceName}-db' + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + encryptionProtectorAutoRotation: false + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: '' + maxSizeBytes: 214748364800 + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + sampleName: '' + secondaryType: '' + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource failoverGroup 'Microsoft.Sql/servers/failoverGroups@2023-08-01-preview' = { + parent: server + name: '${resourceName}-fg' + properties: { + databases: [ + database.id + ] + partnerServers: [ + { + id: server1.id + } + ] + readOnlyEndpoint: { + failoverPolicy: 'Disabled' + } + readWriteEndpoint: { + failoverPolicy: 'Automatic' + failoverWithDataLossGracePeriodMinutes: 60 + } + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/firewallrules/main.bicep b/settings/remarks/microsoft.sql/samples/servers/firewallrules/main.bicep new file mode 100644 index 00000000..aa411a36 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/firewallrules/main.bicep @@ -0,0 +1,27 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'msincredible' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource firewallRule 'Microsoft.Sql/servers/firewallRules@2020-11-01-preview' = { + parent: server + name: resourceName + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/jobagents/credentials/main.bicep b/settings/remarks/microsoft.sql/samples/servers/jobagents/credentials/main.bicep new file mode 100644 index 00000000..1520d8b1 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/jobagents/credentials/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator username for the SQL server credential') +param sqlAdminUsername string +@secure() +@description('The administrator password for the SQL server credential') +param sqlAdminPassword string +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: '4dministr4t0r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} + +resource jobAgent 'Microsoft.Sql/servers/jobAgents@2020-11-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + databaseId: database.id + } +} + +resource credential 'Microsoft.Sql/servers/jobAgents/credentials@2020-11-01-preview' = { + parent: jobAgent + name: resourceName + properties: { + password: null + username: null + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/jobagents/jobs/main.bicep b/settings/remarks/microsoft.sql/samples/servers/jobagents/jobs/main.bicep new file mode 100644 index 00000000..67bbb970 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/jobagents/jobs/main.bicep @@ -0,0 +1,64 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: '${resourceName}-server' + location: location + properties: { + administratorLogin: '4dm1n157r470r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2023-08-01-preview' = { + parent: server + name: '${resourceName}-db' + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + encryptionProtectorAutoRotation: false + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: '' + maintenanceConfigurationId: '/subscriptions/subscription().subscriptionId/providers/Microsoft.Maintenance/publicMaintenanceConfigurations/SQL_Default' + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + sampleName: '' + secondaryType: '' + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource jobAgent 'Microsoft.Sql/servers/jobAgents@2023-08-01-preview' = { + parent: server + name: '${resourceName}-job-agent' + location: location + properties: { + databaseId: database.id + } + sku: { + name: 'JA100' + } +} + +resource job 'Microsoft.Sql/servers/jobAgents/jobs@2023-08-01-preview' = { + parent: jobAgent + name: '${resourceName}-job' + properties: { + description: '' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/jobagents/main.bicep b/settings/remarks/microsoft.sql/samples/servers/jobagents/main.bicep new file mode 100644 index 00000000..a30fcdd9 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/jobagents/main.bicep @@ -0,0 +1,46 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the SQL server') +param sqlAdministratorPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: '4dministr4t0r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2021-02-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + highAvailabilityReplicaCount: 0 + isLedgerOn: false + maintenanceConfigurationId: resourceId('Microsoft.Maintenance/publicMaintenanceConfigurations', 'SQL_Default') + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + zoneRedundant: false + } +} + +resource jobAgent 'Microsoft.Sql/servers/jobAgents@2020-11-01-preview' = { + parent: server + name: resourceName + location: location + properties: { + databaseId: database.id + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/jobagents/targetgroups/main.bicep b/settings/remarks/microsoft.sql/samples/servers/jobagents/targetgroups/main.bicep new file mode 100644 index 00000000..008aa16c --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/jobagents/targetgroups/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'centralus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string +@secure() +@description('The password for the SQL job credential') +param jobCredentialPassword string + +resource server 'Microsoft.Sql/servers@2023-08-01-preview' = { + name: '${resourceName}-server' + location: location + properties: { + administratorLogin: '4dm1n157r470r' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource database 'Microsoft.Sql/servers/databases@2023-08-01-preview' = { + parent: server + name: '${resourceName}-db' + location: location + properties: { + autoPauseDelay: 0 + collation: 'SQL_Latin1_General_CP1_CI_AS' + createMode: 'Default' + elasticPoolId: '' + encryptionProtectorAutoRotation: false + highAvailabilityReplicaCount: 0 + isLedgerOn: false + licenseType: '' + maintenanceConfigurationId: '/subscriptions/subscription().subscriptionId/providers/Microsoft.Maintenance/publicMaintenanceConfigurations/SQL_Default' + minCapacity: 0 + readScale: 'Disabled' + requestedBackupStorageRedundancy: 'Geo' + sampleName: '' + secondaryType: '' + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource jobAgent 'Microsoft.Sql/servers/jobAgents@2023-08-01-preview' = { + parent: server + name: '${resourceName}-job-agent' + location: location + properties: { + databaseId: database.id + } + sku: { + name: 'JA100' + } +} + +resource credential 'Microsoft.Sql/servers/jobAgents/credentials@2023-08-01-preview' = { + parent: jobAgent + name: '${resourceName}-job-credential' + properties: { + password: null + username: 'testusername' + } +} + +resource targetGroup 'Microsoft.Sql/servers/jobAgents/targetGroups@2023-08-01-preview' = { + parent: jobAgent + name: '${resourceName}-target-group' + properties: { + members: [] + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/main.bicep b/settings/remarks/microsoft.sql/samples/servers/main.bicep new file mode 100644 index 00000000..2df7ea10 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/main.bicep @@ -0,0 +1,18 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the SQL server') +param sqlAdministratorPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/outboundfirewallrules/main.bicep b/settings/remarks/microsoft.sql/samples/servers/outboundfirewallrules/main.bicep new file mode 100644 index 00000000..9e3d5381 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/outboundfirewallrules/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('Admin password for the database') +param adminPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'msincredible' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Enabled' + version: '12.0' + } +} + +resource outboundFirewallRule 'Microsoft.Sql/servers/outboundFirewallRules@2021-02-01-preview' = { + parent: server + name: 'sql230630033612934212.database.windows.net' + properties: {} +} diff --git a/settings/remarks/microsoft.sql/samples/servers/securityalertpolicies/main.bicep b/settings/remarks/microsoft.sql/samples/servers/securityalertpolicies/main.bicep new file mode 100644 index 00000000..e63e42f1 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/securityalertpolicies/main.bicep @@ -0,0 +1,25 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The administrator login name for the SQL server') +param administratorLogin string +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2015-05-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: null + administratorLoginPassword: null + version: '12.0' + } +} + +resource securityAlertPolicy 'Microsoft.Sql/servers/securityAlertPolicies@2017-03-01-preview' = { + parent: server + name: 'Default' + properties: { + state: 'Disabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/sqlvulnerabilityassessments/main.bicep b/settings/remarks/microsoft.sql/samples/servers/sqlvulnerabilityassessments/main.bicep new file mode 100644 index 00000000..ba2ba40a --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/sqlvulnerabilityassessments/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@secure() +@description('The administrator login password for the SQL server') +param administratorLoginPassword string + +resource server 'Microsoft.Sql/servers@2022-05-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'mradministrator' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource sqlVulnerabilityAssessments 'Microsoft.Sql/servers/sqlVulnerabilityAssessments@2022-05-01-preview' = { + parent: server + name: 'default' + properties: { + state: 'Enabled' + } +} diff --git a/settings/remarks/microsoft.sql/samples/servers/virtualnetworkrules/main.bicep b/settings/remarks/microsoft.sql/samples/servers/virtualnetworkrules/main.bicep new file mode 100644 index 00000000..9cab05b5 --- /dev/null +++ b/settings/remarks/microsoft.sql/samples/servers/virtualnetworkrules/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the SQL server') +param sqlAdministratorPassword string + +resource server 'Microsoft.Sql/servers@2021-02-01-preview' = { + name: resourceName + location: location + properties: { + administratorLogin: 'missadmin' + administratorLoginPassword: null + minimalTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + restrictOutboundNetworkAccess: 'Disabled' + version: '12.0' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.7.28.0/23' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.7.28.0/25' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [ + { + service: 'Microsoft.Sql' + } + ] + } +} + +resource virtualNetworkRule 'Microsoft.Sql/servers/virtualNetworkRules@2020-11-01-preview' = { + parent: server + name: resourceName + properties: { + ignoreMissingVnetServiceEndpoint: false + virtualNetworkSubnetId: subnet.id + } +} diff --git a/settings/remarks/microsoft.sqlvirtualmachine/remarks.json b/settings/remarks/microsoft.sqlvirtualmachine/remarks.json index 0919ed3e..aafe1d6b 100644 --- a/settings/remarks/microsoft.sqlvirtualmachine/remarks.json +++ b/settings/remarks/microsoft.sqlvirtualmachine/remarks.json @@ -1,20 +1,32 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.SqlVirtualMachine/sqlVirtualMachineGroups", - "Path": "samples/sqlvirtualmachinegroups/main.tf", - "Description": "A basic example of deploying Microsoft SQL Virtual Machine Group." - }, - { - "ResourceType": "Microsoft.SqlVirtualMachine/sqlVirtualMachines", - "Path": "samples/sqlvirtualmachines/basic/main.tf", - "Description": "A basic example of deploying Microsoft SQL Virtual Machine." - }, - { - "ResourceType": "Microsoft.SqlVirtualMachine/sqlVirtualMachines", - "Path": "samples/sqlvirtualmachines/sqlbestpracticesassessment/main.tf", - "Description": "A sqlbestpracticesassessment example of deploying Microsoft SQL Virtual Machine." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.SqlVirtualMachine/sqlVirtualMachineGroups", + "Path": "samples/sqlvirtualmachinegroups/main.tf", + "Description": "A basic example of deploying Microsoft SQL Virtual Machine Group." + }, + { + "ResourceType": "Microsoft.SqlVirtualMachine/sqlVirtualMachines", + "Path": "samples/sqlvirtualmachines/basic/main.tf", + "Description": "A basic example of deploying Microsoft SQL Virtual Machine." + }, + { + "ResourceType": "Microsoft.SqlVirtualMachine/sqlVirtualMachines", + "Path": "samples/sqlvirtualmachines/sqlbestpracticesassessment/main.tf", + "Description": "A sqlbestpracticesassessment example of deploying Microsoft SQL Virtual Machine." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.SqlVirtualMachine/sqlVirtualMachineGroups", + "Path": "samples/sqlvirtualmachinegroups/main.bicep", + "Description": "A basic example of deploying Microsoft SQL Virtual Machine Group." + }, + { + "ResourceType": "Microsoft.SqlVirtualMachine/sqlVirtualMachines", + "Path": "samples/sqlvirtualmachines/basic/main.bicep", + "Description": "A basic example of deploying Microsoft SQL Virtual Machine." + } + ] +} diff --git a/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachinegroups/main.bicep b/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachinegroups/main.bicep new file mode 100644 index 00000000..386b1a28 --- /dev/null +++ b/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachinegroups/main.bicep @@ -0,0 +1,21 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource sqlVirtualMachineGroup 'Microsoft.SqlVirtualMachine/sqlVirtualMachineGroups@2023-10-01' = { + name: resourceName + location: location + properties: { + sqlImageOffer: 'SQL2017-WS2016' + sqlImageSku: 'Developer' + wsfcDomainProfile: { + clusterBootstrapAccount: '' + clusterOperatorAccount: '' + clusterSubnetType: 'SingleSubnet' + domainFqdn: 'testdomain.com' + ouPath: '' + sqlServiceAccount: '' + storageAccountPrimaryKey: '' + storageAccountUrl: '' + } + } +} diff --git a/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachines/basic/main.bicep b/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachines/basic/main.bicep new file mode 100644 index 00000000..dc0fcf1d --- /dev/null +++ b/settings/remarks/microsoft.sqlvirtualmachine/samples/sqlvirtualmachines/basic/main.bicep @@ -0,0 +1,172 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrator password for the SQL virtual machine') +param vmAdminPassword string + +resource networkInterface 'Microsoft.Network/networkInterfaces@2024-05-01' = { + name: resourceName + properties: { + auxiliaryMode: 'None' + auxiliarySku: 'None' + disableTcpStateTracking: false + dnsSettings: { + dnsServers: [] + } + enableAcceleratedNetworking: false + enableIPForwarding: false + ipConfigurations: [ + { + name: 'testconfiguration1' + properties: { + primary: true + privateIPAddress: '10.0.0.4' + privateIPAddressVersion: 'IPv4' + privateIPAllocationMethod: 'Dynamic' + publicIPAddress: { + id: publicIPAddress.id + } + subnet: { + id: subnet.id + } + } + type: 'Microsoft.Network/networkInterfaces/ipConfigurations' + } + ] + nicType: 'Standard' + } +} + +resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2024-05-01' = { + name: resourceName + properties: { + securityRules: [ + { + name: 'MSSQLRule' + properties: { + access: 'Allow' + destinationAddressPrefix: '*' + destinationAddressPrefixes: [] + destinationPortRange: '1433' + destinationPortRanges: [] + direction: 'Inbound' + priority: 1001 + protocol: 'Tcp' + sourceAddressPrefix: '167.220.255.0/25' + sourceAddressPrefixes: [] + sourcePortRange: '*' + sourcePortRanges: [] + } + } + ] + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2024-05-01' = { + name: resourceName + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + ipTags: [] + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Dynamic' + } + sku: { + name: 'Basic' + tier: 'Regional' + } +} + +resource sqlvirtualMachine 'Microsoft.SqlVirtualMachine/sqlVirtualMachines@2023-10-01' = { + name: 'virtualMachine.name' + properties: { + enableAutomaticUpgrade: true + leastPrivilegeMode: 'Enabled' + sqlImageOffer: 'SQL2017-WS2016' + sqlImageSku: 'Developer' + sqlManagement: 'Full' + sqlServerLicenseType: 'PAYG' + virtualMachineResourceId: virtualMachine.id + } +} + +resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-07-01' = { + name: resourceName + properties: { + hardwareProfile: { + vmSize: 'Standard_F2s' + } + networkProfile: { + networkInterfaces: [ + { + id: networkInterface.id + properties: { + primary: false + } + } + ] + } + osProfile: { + adminPassword: null + adminUsername: 'testadmin' + allowExtensionOperations: true + computerName: 'winhost01' + secrets: [] + windowsConfiguration: { + enableAutomaticUpdates: true + patchSettings: { + assessmentMode: 'ImageDefault' + patchMode: 'AutomaticByOS' + } + provisionVMAgent: true + timeZone: 'Pacific Standard Time' + } + } + storageProfile: { + dataDisks: [] + imageReference: { + offer: 'SQL2017-WS2016' + publisher: 'MicrosoftSQLServer' + sku: 'SQLDEV' + version: 'latest' + } + osDisk: { + caching: 'ReadOnly' + createOption: 'FromImage' + deleteOption: 'Detach' + diskSizeGB: 127 + managedDisk: { + storageAccountType: 'Premium_LRS' + } + name: 'acctvm-250116171212663925OSDisk' + osType: 'Windows' + writeAcceleratorEnabled: false + } + } + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.0.0/24' + networkSecurityGroup: { + id: networkSecurityGroup.id + } + } +} diff --git a/settings/remarks/microsoft.standbypool/remarks.json b/settings/remarks/microsoft.standbypool/remarks.json index 58cf4042..1d27906e 100644 --- a/settings/remarks/microsoft.standbypool/remarks.json +++ b/settings/remarks/microsoft.standbypool/remarks.json @@ -1,15 +1,22 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.StandbyPool/standbyContainerGroupPools", - "Path": "samples/standbycontainergrouppools/basic/main.tf", - "Description": "A basic example of deploying Microsoft Standby pools for Container Groups." - }, - { - "ResourceType": "Microsoft.StandbyPool/standbyvirtualmachinepools", - "Path": "samples/standbyvirtualmachinepools/main.tf", - "Description": "A basic example of deploying Microsoft Standby pools for Virtual Machine Scale Sets." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.StandbyPool/standbyContainerGroupPools", + "Path": "samples/standbycontainergrouppools/basic/main.tf", + "Description": "A basic example of deploying Microsoft Standby pools for Container Groups." + }, + { + "ResourceType": "Microsoft.StandbyPool/standbyvirtualmachinepools", + "Path": "samples/standbyvirtualmachinepools/main.tf", + "Description": "A basic example of deploying Microsoft Standby pools for Virtual Machine Scale Sets." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.StandbyPool/standbyContainerGroupPools", + "Path": "samples/standbycontainergrouppools/basic/main.bicep", + "Description": "A basic example of deploying Microsoft Standby pools for Container Groups." + } + ] +} diff --git a/settings/remarks/microsoft.standbypool/samples/standbycontainergrouppools/basic/main.bicep b/settings/remarks/microsoft.standbypool/samples/standbycontainergrouppools/basic/main.bicep new file mode 100644 index 00000000..05908b4d --- /dev/null +++ b/settings/remarks/microsoft.standbypool/samples/standbycontainergrouppools/basic/main.bicep @@ -0,0 +1,98 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource containerGroupProfile 'Microsoft.ContainerInstance/containerGroupProfiles@2024-05-01-preview' = { + name: '${resourceName}-contianerGroup' + location: location + properties: { + containers: [ + { + name: 'mycontainergroupprofile' + properties: { + command: [] + environmentVariables: [] + image: 'mcr.microsoft.com/azuredocs/aci-helloworld:latest' + ports: [ + { + port: 8000 + } + ] + resources: { + requests: { + cpu: 1 + memoryInGB: any('1.5') + } + } + } + } + ] + imageRegistryCredentials: [] + ipAddress: { + ports: [ + { + port: 8000 + protocol: 'TCP' + } + ] + type: 'Public' + } + osType: 'Linux' + sku: 'Standard' + } +} + +resource standbyContainerGroupPool 'Microsoft.StandbyPool/standbyContainerGroupPools@2025-03-01' = { + name: '${resourceName}-CGPool' + location: 'eastus' + properties: { + containerGroupProperties: { + containerGroupProfile: { + id: containerGroupProfile.id + revision: 1 + } + subnetIds: [ + { + id: subnet.id + } + ] + } + elasticityProfile: { + maxReadyCapacity: 5 + refillPolicy: 'always' + } + zones: [ + '1' + '2' + '3' + ] + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.storage/remarks.json b/settings/remarks/microsoft.storage/remarks.json index edfd3573..935dc033 100644 --- a/settings/remarks/microsoft.storage/remarks.json +++ b/settings/remarks/microsoft.storage/remarks.json @@ -1,65 +1,112 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Storage/storageAccounts", - "Path": "samples/storageaccounts/basic/main.tf", - "Description": "A basic example of deploying Azure Storage Account." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts", - "Path": "samples/storageaccounts/withprivateendpoint/main.tf", - "Description": "A withprivateendpoint example of deploying Azure Storage Account." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/blobServices", - "Path": "samples/storageaccounts/blobservices/main.tf", - "Description": "A basic example of deploying Blob Service within Azure Storage." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/blobServices/containers", - "Path": "samples/storageaccounts/blobservices/containers/main.tf", - "Description": "A basic example of deploying Blob Container within Azure Storage." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/blobServices/containers/immutabilityPolicies", - "Path": "samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.tf", - "Description": "A basic example of deploying Immutability Policy for a Container within an Azure Storage Account." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/encryptionScopes", - "Path": "samples/storageaccounts/encryptionscopes/main.tf", - "Description": "A basic example of deploying Storage Encryption Scope." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/fileServices/shares", - "Path": "samples/storageaccounts/fileservices/shares/main.tf", - "Description": "A basic example of deploying File Share within Azure Storage." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/localUsers", - "Path": "samples/storageaccounts/localusers/basic/main.tf", - "Description": "A basic example of deploying Storage Account Local User." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/localUsers", - "Path": "samples/storageaccounts/localusers/generatepassword/main.tf", - "Description": "A generatepassword example of deploying Storage Account Local User." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/managementPolicies", - "Path": "samples/storageaccounts/managementpolicies/main.tf", - "Description": "A basic example of deploying Azure Storage Account Management Policy." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/queueServices/queues", - "Path": "samples/storageaccounts/queueservices/queues/main.tf", - "Description": "A basic example of deploying Queue within Azure Storage." - }, - { - "ResourceType": "Microsoft.Storage/storageAccounts/tableServices/tables", - "Path": "samples/storageaccounts/tableservices/tables/main.tf", - "Description": "A basic example of deploying Table within Azure Storage." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Storage/storageAccounts", + "Path": "samples/storageaccounts/basic/main.tf", + "Description": "A basic example of deploying Azure Storage Account." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts", + "Path": "samples/storageaccounts/withprivateendpoint/main.tf", + "Description": "A withprivateendpoint example of deploying Azure Storage Account." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/blobServices", + "Path": "samples/storageaccounts/blobservices/main.tf", + "Description": "A basic example of deploying Blob Service within Azure Storage." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/blobServices/containers", + "Path": "samples/storageaccounts/blobservices/containers/main.tf", + "Description": "A basic example of deploying Blob Container within Azure Storage." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/blobServices/containers/immutabilityPolicies", + "Path": "samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.tf", + "Description": "A basic example of deploying Immutability Policy for a Container within an Azure Storage Account." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/encryptionScopes", + "Path": "samples/storageaccounts/encryptionscopes/main.tf", + "Description": "A basic example of deploying Storage Encryption Scope." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/fileServices/shares", + "Path": "samples/storageaccounts/fileservices/shares/main.tf", + "Description": "A basic example of deploying File Share within Azure Storage." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/localUsers", + "Path": "samples/storageaccounts/localusers/basic/main.tf", + "Description": "A basic example of deploying Storage Account Local User." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/localUsers", + "Path": "samples/storageaccounts/localusers/generatepassword/main.tf", + "Description": "A generatepassword example of deploying Storage Account Local User." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/managementPolicies", + "Path": "samples/storageaccounts/managementpolicies/main.tf", + "Description": "A basic example of deploying Azure Storage Account Management Policy." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/queueServices/queues", + "Path": "samples/storageaccounts/queueservices/queues/main.tf", + "Description": "A basic example of deploying Queue within Azure Storage." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/tableServices/tables", + "Path": "samples/storageaccounts/tableservices/tables/main.tf", + "Description": "A basic example of deploying Table within Azure Storage." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Storage/storageAccounts", + "Path": "samples/storageaccounts/basic/main.bicep", + "Description": "A basic example of deploying Azure Storage Account." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/blobServices", + "Path": "samples/storageaccounts/blobservices/main.bicep", + "Description": "A basic example of deploying Blob Service within Azure Storage." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/blobServices/containers", + "Path": "samples/storageaccounts/blobservices/containers/main.bicep", + "Description": "A basic example of deploying Blob Container within Azure Storage." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/blobServices/containers/immutabilityPolicies", + "Path": "samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.bicep", + "Description": "A basic example of deploying Immutability Policy for a Container within an Azure Storage Account." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/fileServices/shares", + "Path": "samples/storageaccounts/fileservices/shares/main.bicep", + "Description": "A basic example of deploying File Share within Azure Storage." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/localUsers", + "Path": "samples/storageaccounts/localusers/basic/main.bicep", + "Description": "A basic example of deploying Storage Account Local User." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/managementPolicies", + "Path": "samples/storageaccounts/managementpolicies/main.bicep", + "Description": "A basic example of deploying Azure Storage Account Management Policy." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/queueServices/queues", + "Path": "samples/storageaccounts/queueservices/queues/main.bicep", + "Description": "A basic example of deploying Queue within Azure Storage." + }, + { + "ResourceType": "Microsoft.Storage/storageAccounts/tableServices/tables", + "Path": "samples/storageaccounts/tableservices/tables/main.bicep", + "Description": "A basic example of deploying Table within Azure Storage." + } + ] +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/basic/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/basic/main.bicep new file mode 100644 index 00000000..5c7e206f --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/basic/main.bicep @@ -0,0 +1,38 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.bicep new file mode 100644 index 00000000..c7c59b53 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/immutabilitypolicies/main.bicep @@ -0,0 +1,35 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} + +resource immutabilityPolicy 'Microsoft.Storage/storageAccounts/blobServices/containers/immutabilityPolicies@2023-05-01' = { + parent: container + name: 'default' + properties: { + allowProtectedAppendWrites: false + immutabilityPeriodSinceCreationInDays: 4 + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/main.bicep new file mode 100644 index 00000000..4efc6c29 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/containers/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/main.bicep new file mode 100644 index 00000000..e53e1805 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/blobservices/main.bicep @@ -0,0 +1,62 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2021-09-01' = { + parent: storageAccount + name: 'default' + properties: { + changeFeed: { + enabled: true + } + containerDeleteRetentionPolicy: { + enabled: false + } + cors: {} + deleteRetentionPolicy: { + enabled: false + } + isVersioningEnabled: true + lastAccessTimeTrackingPolicy: { + enable: false + } + restorePolicy: { + enabled: false + } + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/fileservices/shares/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/fileservices/shares/main.bicep new file mode 100644 index 00000000..0ba2cdcb --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/fileservices/shares/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource fileService 'Microsoft.Storage/storageAccounts/fileServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource share 'Microsoft.Storage/storageAccounts/fileServices/shares@2022-09-01' = { + parent: fileService + name: resourceName + properties: { + accessTier: 'Cool' + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/localusers/basic/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/localusers/basic/main.bicep new file mode 100644 index 00000000..3575fd63 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/localusers/basic/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource localUser 'Microsoft.Storage/storageAccounts/localUsers@2021-09-01' = { + parent: storageAccount + name: resourceName + properties: { + hasSharedKey: true + hasSshKey: false + hasSshPassword: false + homeDirectory: 'containername/' + permissionScopes: [ + { + permissions: 'cwl' + resourceName: 'containername' + service: 'blob' + } + ] + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/managementpolicies/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/managementpolicies/main.bicep new file mode 100644 index 00000000..7464c6f1 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/managementpolicies/main.bicep @@ -0,0 +1,82 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'BlobStorage' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource managementPolicy 'Microsoft.Storage/storageAccounts/managementPolicies@2021-09-01' = { + parent: storageAccount + name: 'default' + properties: { + policy: { + rules: [ + { + definition: { + actions: { + baseBlob: { + delete: { + daysAfterModificationGreaterThan: 100 + } + tierToArchive: { + daysAfterModificationGreaterThan: 50 + } + tierToCool: { + daysAfterModificationGreaterThan: 10 + } + } + snapshot: { + delete: { + daysAfterCreationGreaterThan: 30 + } + } + } + filters: { + blobTypes: [ + 'blockBlob' + ] + prefixMatch: [ + 'container1/prefix1' + ] + } + } + enabled: true + name: 'rule-1' + type: 'Lifecycle' + } + ] + } + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/queueservices/queues/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/queueservices/queues/main.bicep new file mode 100644 index 00000000..4a063a33 --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/queueservices/queues/main.bicep @@ -0,0 +1,26 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource queueService 'Microsoft.Storage/storageAccounts/queueServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource queue 'Microsoft.Storage/storageAccounts/queueServices/queues@2022-09-01' = { + parent: queueService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.storage/samples/storageaccounts/tableservices/tables/main.bicep b/settings/remarks/microsoft.storage/samples/storageaccounts/tableservices/tables/main.bicep new file mode 100644 index 00000000..a5e05ede --- /dev/null +++ b/settings/remarks/microsoft.storage/samples/storageaccounts/tableservices/tables/main.bicep @@ -0,0 +1,24 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource tableService 'Microsoft.Storage/storageAccounts/tableServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource table 'Microsoft.Storage/storageAccounts/tableServices/tables@2022-09-01' = { + parent: tableService + name: resourceName + properties: { + signedIdentifiers: [] + } +} diff --git a/settings/remarks/microsoft.storagecache/remarks.json b/settings/remarks/microsoft.storagecache/remarks.json index 25653600..c27d30af 100644 --- a/settings/remarks/microsoft.storagecache/remarks.json +++ b/settings/remarks/microsoft.storagecache/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.StorageCache/amlFilesystems", - "Path": "samples/amlfilesystems/main.tf", - "Description": "A basic example of deploying Azure Managed Lustre File System." - }, - { - "ResourceType": "Microsoft.StorageCache/caches", - "Path": "samples/caches/main.tf", - "Description": "A basic example of deploying HPC Cache." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.StorageCache/amlFilesystems", + "Path": "samples/amlfilesystems/main.tf", + "Description": "A basic example of deploying Azure Managed Lustre File System." + }, + { + "ResourceType": "Microsoft.StorageCache/caches", + "Path": "samples/caches/main.tf", + "Description": "A basic example of deploying HPC Cache." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.StorageCache/amlFilesystems", + "Path": "samples/amlfilesystems/main.bicep", + "Description": "A basic example of deploying Azure Managed Lustre File System." + }, + { + "ResourceType": "Microsoft.StorageCache/caches", + "Path": "samples/caches/main.bicep", + "Description": "A basic example of deploying HPC Cache." + } + ] +} diff --git a/settings/remarks/microsoft.storagecache/samples/amlfilesystems/main.bicep b/settings/remarks/microsoft.storagecache/samples/amlfilesystems/main.bicep new file mode 100644 index 00000000..6eb0dde6 --- /dev/null +++ b/settings/remarks/microsoft.storagecache/samples/amlfilesystems/main.bicep @@ -0,0 +1,52 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource amlFilesystem 'Microsoft.StorageCache/amlFilesystems@2024-07-01' = { + name: '${resourceName}-amlfs' + location: location + properties: { + filesystemSubnet: subnet.id + maintenanceWindow: { + dayOfWeek: 'Friday' + timeOfDayUTC: '22:00' + } + storageCapacityTiB: 8 + } + sku: { + name: 'AMLFS-Durable-Premium-250' + } + zones: [ + '1' + ] +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.storagecache/samples/caches/main.bicep b/settings/remarks/microsoft.storagecache/samples/caches/main.bicep new file mode 100644 index 00000000..459e9c0d --- /dev/null +++ b/settings/remarks/microsoft.storagecache/samples/caches/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cach 'Microsoft.StorageCache/caches@2023-01-01' = { + name: resourceName + location: location + properties: { + cacheSizeGB: 3072 + networkSettings: { + mtu: 1500 + ntpServer: 'time.windows.com' + } + subnet: subnet.id + } + sku: { + name: 'Standard_2G' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-07-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' = { + parent: virtualNetwork + name: resourceName + properties: { + addressPrefix: '10.0.2.0/24' + delegations: [] + privateEndpointNetworkPolicies: 'Enabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/microsoft.storagemover/remarks.json b/settings/remarks/microsoft.storagemover/remarks.json index fda88659..1486022b 100644 --- a/settings/remarks/microsoft.storagemover/remarks.json +++ b/settings/remarks/microsoft.storagemover/remarks.json @@ -1,20 +1,37 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.StorageMover/storageMovers", - "Path": "samples/storagemovers/main.tf", - "Description": "A basic example of deploying Storage Mover." - }, - { - "ResourceType": "Microsoft.StorageMover/storageMovers/endpoints", - "Path": "samples/storagemovers/endpoints/main.tf", - "Description": "A basic example of deploying Storage Mover Source Endpoint." - }, - { - "ResourceType": "Microsoft.StorageMover/storageMovers/projects", - "Path": "samples/storagemovers/projects/main.tf", - "Description": "A basic example of deploying Storage Mover Project." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.StorageMover/storageMovers", + "Path": "samples/storagemovers/main.tf", + "Description": "A basic example of deploying Storage Mover." + }, + { + "ResourceType": "Microsoft.StorageMover/storageMovers/endpoints", + "Path": "samples/storagemovers/endpoints/main.tf", + "Description": "A basic example of deploying Storage Mover Source Endpoint." + }, + { + "ResourceType": "Microsoft.StorageMover/storageMovers/projects", + "Path": "samples/storagemovers/projects/main.tf", + "Description": "A basic example of deploying Storage Mover Project." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.StorageMover/storageMovers", + "Path": "samples/storagemovers/main.bicep", + "Description": "A basic example of deploying Storage Mover." + }, + { + "ResourceType": "Microsoft.StorageMover/storageMovers/endpoints", + "Path": "samples/storagemovers/endpoints/main.bicep", + "Description": "A basic example of deploying Storage Mover Source Endpoint." + }, + { + "ResourceType": "Microsoft.StorageMover/storageMovers/projects", + "Path": "samples/storagemovers/projects/main.bicep", + "Description": "A basic example of deploying Storage Mover Project." + } + ] +} diff --git a/settings/remarks/microsoft.storagemover/samples/storagemovers/endpoints/main.bicep b/settings/remarks/microsoft.storagemover/samples/storagemovers/endpoints/main.bicep new file mode 100644 index 00000000..7163200e --- /dev/null +++ b/settings/remarks/microsoft.storagemover/samples/storagemovers/endpoints/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource storageMover 'Microsoft.StorageMover/storageMovers@2023-03-01' = { + name: resourceName + location: location + properties: {} +} + +resource endpoint 'Microsoft.StorageMover/storageMovers/endpoints@2023-03-01' = { + parent: storageMover + name: resourceName + properties: { + endpointType: 'NfsMount' + export: '' + host: '192.168.0.1' + nfsVersion: 'NFSauto' + } +} diff --git a/settings/remarks/microsoft.storagemover/samples/storagemovers/main.bicep b/settings/remarks/microsoft.storagemover/samples/storagemovers/main.bicep new file mode 100644 index 00000000..1fdd4632 --- /dev/null +++ b/settings/remarks/microsoft.storagemover/samples/storagemovers/main.bicep @@ -0,0 +1,8 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource storageMover 'Microsoft.StorageMover/storageMovers@2023-03-01' = { + name: resourceName + location: location + properties: {} +} diff --git a/settings/remarks/microsoft.storagemover/samples/storagemovers/projects/main.bicep b/settings/remarks/microsoft.storagemover/samples/storagemovers/projects/main.bicep new file mode 100644 index 00000000..f621af83 --- /dev/null +++ b/settings/remarks/microsoft.storagemover/samples/storagemovers/projects/main.bicep @@ -0,0 +1,14 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' + +resource storageMover 'Microsoft.StorageMover/storageMovers@2023-03-01' = { + name: resourceName + location: location + properties: {} +} + +resource project 'Microsoft.StorageMover/storageMovers/projects@2023-03-01' = { + parent: storageMover + name: resourceName + properties: {} +} diff --git a/settings/remarks/microsoft.storagesync/remarks.json b/settings/remarks/microsoft.storagesync/remarks.json index 70ad3016..a721b8cb 100644 --- a/settings/remarks/microsoft.storagesync/remarks.json +++ b/settings/remarks/microsoft.storagesync/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.StorageSync/storageSyncServices", - "Path": "samples/storagesyncservices/main.tf", - "Description": "A basic example of deploying Storage Sync." - }, - { - "ResourceType": "Microsoft.StorageSync/storageSyncServices/syncGroups", - "Path": "samples/storagesyncservices/syncgroups/main.tf", - "Description": "A basic example of deploying Storage Sync Group." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.StorageSync/storageSyncServices", + "Path": "samples/storagesyncservices/main.tf", + "Description": "A basic example of deploying Storage Sync." + }, + { + "ResourceType": "Microsoft.StorageSync/storageSyncServices/syncGroups", + "Path": "samples/storagesyncservices/syncgroups/main.tf", + "Description": "A basic example of deploying Storage Sync Group." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.StorageSync/storageSyncServices", + "Path": "samples/storagesyncservices/main.bicep", + "Description": "A basic example of deploying Storage Sync." + }, + { + "ResourceType": "Microsoft.StorageSync/storageSyncServices/syncGroups", + "Path": "samples/storagesyncservices/syncgroups/main.bicep", + "Description": "A basic example of deploying Storage Sync Group." + } + ] +} diff --git a/settings/remarks/microsoft.storagesync/samples/storagesyncservices/main.bicep b/settings/remarks/microsoft.storagesync/samples/storagesyncservices/main.bicep new file mode 100644 index 00000000..e808c55f --- /dev/null +++ b/settings/remarks/microsoft.storagesync/samples/storagesyncservices/main.bicep @@ -0,0 +1,10 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageSyncService 'Microsoft.StorageSync/storageSyncServices@2020-03-01' = { + name: resourceName + location: location + properties: { + incomingTrafficPolicy: 'AllowAllTraffic' + } +} diff --git a/settings/remarks/microsoft.storagesync/samples/storagesyncservices/syncgroups/main.bicep b/settings/remarks/microsoft.storagesync/samples/storagesyncservices/syncgroups/main.bicep new file mode 100644 index 00000000..cc582be8 --- /dev/null +++ b/settings/remarks/microsoft.storagesync/samples/storagesyncservices/syncgroups/main.bicep @@ -0,0 +1,15 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageSyncService 'Microsoft.StorageSync/storageSyncServices@2020-03-01' = { + name: resourceName + location: location + properties: { + incomingTrafficPolicy: 'AllowAllTraffic' + } +} + +resource syncGroup 'Microsoft.StorageSync/storageSyncServices/syncGroups@2020-03-01' = { + parent: storageSyncService + name: resourceName +} diff --git a/settings/remarks/microsoft.streamanalytics/remarks.json b/settings/remarks/microsoft.streamanalytics/remarks.json index b71ab76c..c70ae011 100644 --- a/settings/remarks/microsoft.streamanalytics/remarks.json +++ b/settings/remarks/microsoft.streamanalytics/remarks.json @@ -1,30 +1,57 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.StreamAnalytics/clusters", - "Path": "samples/clusters/main.tf", - "Description": "A basic example of deploying Stream Analytics Cluster." - }, - { - "ResourceType": "Microsoft.StreamAnalytics/streamingJobs", - "Path": "samples/streamingjobs/main.tf", - "Description": "A basic example of deploying Stream Analytics Job." - }, - { - "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/functions", - "Path": "samples/streamingjobs/functions/main.tf", - "Description": "A basic example of deploying JavaScript UDA Function within a Stream Analytics Streaming Job." - }, - { - "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/inputs", - "Path": "samples/streamingjobs/inputs/main.tf", - "Description": "A basic example of deploying Stream Analytics Reference Input." - }, - { - "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/outputs", - "Path": "samples/streamingjobs/outputs/main.tf", - "Description": "A basic example of deploying Stream Analytics Output Table." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.StreamAnalytics/clusters", + "Path": "samples/clusters/main.tf", + "Description": "A basic example of deploying Stream Analytics Cluster." + }, + { + "ResourceType": "Microsoft.StreamAnalytics/streamingJobs", + "Path": "samples/streamingjobs/main.tf", + "Description": "A basic example of deploying Stream Analytics Job." + }, + { + "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/functions", + "Path": "samples/streamingjobs/functions/main.tf", + "Description": "A basic example of deploying JavaScript UDA Function within a Stream Analytics Streaming Job." + }, + { + "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/inputs", + "Path": "samples/streamingjobs/inputs/main.tf", + "Description": "A basic example of deploying Stream Analytics Reference Input." + }, + { + "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/outputs", + "Path": "samples/streamingjobs/outputs/main.tf", + "Description": "A basic example of deploying Stream Analytics Output Table." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.StreamAnalytics/clusters", + "Path": "samples/clusters/main.bicep", + "Description": "A basic example of deploying Stream Analytics Cluster." + }, + { + "ResourceType": "Microsoft.StreamAnalytics/streamingJobs", + "Path": "samples/streamingjobs/main.bicep", + "Description": "A basic example of deploying Stream Analytics Job." + }, + { + "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/functions", + "Path": "samples/streamingjobs/functions/main.bicep", + "Description": "A basic example of deploying JavaScript UDA Function within a Stream Analytics Streaming Job." + }, + { + "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/inputs", + "Path": "samples/streamingjobs/inputs/main.bicep", + "Description": "A basic example of deploying Stream Analytics Reference Input." + }, + { + "ResourceType": "Microsoft.StreamAnalytics/streamingJobs/outputs", + "Path": "samples/streamingjobs/outputs/main.bicep", + "Description": "A basic example of deploying Stream Analytics Output Table." + } + ] +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/clusters/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/clusters/main.bicep new file mode 100644 index 00000000..4dd506c0 --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/clusters/main.bicep @@ -0,0 +1,11 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource cluster 'Microsoft.StreamAnalytics/clusters@2020-03-01' = { + name: resourceName + location: location + sku: { + capacity: 36 + name: 'Default' + } +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/functions/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/functions/main.bicep new file mode 100644 index 00000000..1e464e7a --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/functions/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource streamingJob 'Microsoft.StreamAnalytics/streamingJobs@2020-03-01' = { + name: resourceName + location: location + properties: { + cluster: {} + compatibilityLevel: '1.0' + contentStoragePolicy: 'SystemAccount' + dataLocale: 'en-GB' + eventsLateArrivalMaxDelayInSeconds: 60 + eventsOutOfOrderMaxDelayInSeconds: 50 + eventsOutOfOrderPolicy: 'Adjust' + jobType: 'Cloud' + outputErrorPolicy: 'Drop' + sku: { + name: 'Standard' + } + transformation: { + name: 'main' + properties: { + query: ''' SELECT * + INTO [YourOutputAlias] + FROM [YourInputAlias] +''' + streamingUnits: 3 + } + } + } +} + +resource function 'Microsoft.StreamAnalytics/streamingJobs/functions@2020-03-01' = { + parent: streamingJob + name: resourceName + properties: { + properties: { + binding: { + properties: { + script: '''function getRandomNumber(in) { + return in; +} +''' + } + type: 'Microsoft.StreamAnalytics/JavascriptUdf' + } + inputs: [ + { + dataType: 'bigint' + isConfigurationParameter: false + } + ] + output: { + dataType: 'bigint' + } + } + type: 'Scalar' + } +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/inputs/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/inputs/main.bicep new file mode 100644 index 00000000..444d70e6 --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/inputs/main.bicep @@ -0,0 +1,78 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource streamingJob 'Microsoft.StreamAnalytics/streamingJobs@2020-03-01' = { + name: resourceName + location: location + properties: { + cluster: {} + compatibilityLevel: '1.0' + contentStoragePolicy: 'SystemAccount' + dataLocale: 'en-GB' + eventsLateArrivalMaxDelayInSeconds: 60 + eventsOutOfOrderMaxDelayInSeconds: 50 + eventsOutOfOrderPolicy: 'Adjust' + jobType: 'Cloud' + outputErrorPolicy: 'Drop' + sku: { + name: 'Standard' + } + transformation: { + name: 'main' + properties: { + query: ''' SELECT * + INTO [YourOutputAlias] + FROM [YourInputAlias] +''' + streamingUnits: 3 + } + } + } +} + +resource input 'Microsoft.StreamAnalytics/streamingJobs/inputs@2020-03-01' = { + parent: streamingJob + name: resourceName + properties: { + datasource: { + properties: { + consumerGroupName: '$Default' + endpoint: 'messages/events' + iotHubNamespace: iothub.name + sharedAccessPolicyKey: iothub.listkeys().value[0].primaryKey + sharedAccessPolicyName: 'iothubowner' + } + type: 'Microsoft.Devices/IotHubs' + } + serialization: { + properties: {} + type: 'Avro' + } + type: 'Stream' + } +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/main.bicep new file mode 100644 index 00000000..d84d889c --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource streamingJob 'Microsoft.StreamAnalytics/streamingJobs@2020-03-01' = { + name: resourceName + location: location + properties: { + cluster: {} + compatibilityLevel: '1.0' + contentStoragePolicy: 'SystemAccount' + dataLocale: 'en-GB' + eventsLateArrivalMaxDelayInSeconds: 60 + eventsOutOfOrderMaxDelayInSeconds: 50 + eventsOutOfOrderPolicy: 'Adjust' + jobType: 'Cloud' + outputErrorPolicy: 'Drop' + sku: { + name: 'Standard' + } + transformation: { + name: 'main' + properties: { + query: ''' SELECT * + INTO [YourOutputAlias] + FROM [YourInputAlias] +''' + streamingUnits: 3 + } + } + } +} diff --git a/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/outputs/main.bicep b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/outputs/main.bicep new file mode 100644 index 00000000..a164e7d9 --- /dev/null +++ b/settings/remarks/microsoft.streamanalytics/samples/streamingjobs/outputs/main.bicep @@ -0,0 +1,86 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource streamingJob 'Microsoft.StreamAnalytics/streamingJobs@2020-03-01' = { + name: resourceName + location: location + properties: { + cluster: {} + compatibilityLevel: '1.0' + contentStoragePolicy: 'SystemAccount' + dataLocale: 'en-GB' + eventsLateArrivalMaxDelayInSeconds: 60 + eventsOutOfOrderMaxDelayInSeconds: 50 + eventsOutOfOrderPolicy: 'Adjust' + jobType: 'Cloud' + outputErrorPolicy: 'Drop' + sku: { + name: 'Standard' + } + transformation: { + name: 'main' + properties: { + query: ''' SELECT * + INTO [YourOutputAlias] + FROM [YourInputAlias] +''' + streamingUnits: 3 + } + } + } +} + +resource output 'Microsoft.StreamAnalytics/streamingJobs/outputs@2021-10-01-preview' = { + parent: streamingJob + name: resourceName + properties: { + datasource: { + properties: { + accountKey: storageAccount.listKeys().keys[0].value + accountName: storageAccount.name + batchSize: 100 + partitionKey: 'foo' + rowKey: 'bar' + table: 'foobar' + } + type: 'Microsoft.Storage/Table' + } + serialization: null + } +} diff --git a/settings/remarks/microsoft.synapse/remarks.json b/settings/remarks/microsoft.synapse/remarks.json index 82f12f69..9d952605 100644 --- a/settings/remarks/microsoft.synapse/remarks.json +++ b/settings/remarks/microsoft.synapse/remarks.json @@ -1,80 +1,142 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Synapse/privateLinkHubs", - "Path": "samples/privatelinkhubs/main.tf", - "Description": "A basic example of deploying Synapse Private Link Hub." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces", - "Path": "samples/workspaces/main.tf", - "Description": "A basic example of deploying Synapse Workspace." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/azureADOnlyAuthentications", - "Path": "samples/workspaces/azureadonlyauthentications/main.tf", - "Description": "A basic example of deploying Synapse Workspaces Azure AD Only Authentications." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/bigDataPools", - "Path": "samples/workspaces/bigdatapools/main.tf", - "Description": "A basic example of deploying Synapse Spark Pool." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/firewallRules", - "Path": "samples/workspaces/firewallrules/main.tf", - "Description": "A basic example of deploying Synapse Firewall Rule." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/integrationRuntimes", - "Path": "samples/workspaces/integrationruntimes/main.tf", - "Description": "A basic example of deploying Synapse Azure Integration Runtime." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/managedIdentitySqlControlSettings", - "Path": "samples/workspaces/managedidentitysqlcontrolsettings/main.tf", - "Description": "A basic example of deploying Synapse Workspaces Managed Identity SQL Control Settings." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/securityAlertPolicies", - "Path": "samples/workspaces/securityalertpolicies/main.tf", - "Description": "A basic example of deploying Security Alert Policy for a Synapse Workspace." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/sqlPools", - "Path": "samples/workspaces/sqlpools/main.tf", - "Description": "A basic example of deploying Synapse SQL Pool." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/extendedAuditingSettings", - "Path": "samples/workspaces/sqlpools/extendedauditingsettings/main.tf", - "Description": "A basic example of deploying Synapse SQL Pool Extended Auditing Policy." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/securityAlertPolicies", - "Path": "samples/workspaces/sqlpools/securityalertpolicies/main.tf", - "Description": "A basic example of deploying Security Alert Policy for a Synapse SQL Pool." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments", - "Path": "samples/workspaces/sqlpools/vulnerabilityassessments/main.tf", - "Description": "A basic example of deploying Vulnerability Assessment for a Synapse SQL Pool." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/workloadGroups", - "Path": "samples/workspaces/sqlpools/workloadgroups/main.tf", - "Description": "A basic example of deploying Synapse SQL Pool Workload Group." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/workloadGroups/workloadClassifiers", - "Path": "samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.tf", - "Description": "A basic example of deploying Synapse SQL Pool Workload Classifier." - }, - { - "ResourceType": "Microsoft.Synapse/workspaces/vulnerabilityAssessments", - "Path": "samples/workspaces/vulnerabilityassessments/main.tf", - "Description": "A basic example of deploying Vulnerability Assessment for a Synapse Workspace." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Synapse/privateLinkHubs", + "Path": "samples/privatelinkhubs/main.tf", + "Description": "A basic example of deploying Synapse Private Link Hub." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces", + "Path": "samples/workspaces/main.tf", + "Description": "A basic example of deploying Synapse Workspace." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/azureADOnlyAuthentications", + "Path": "samples/workspaces/azureadonlyauthentications/main.tf", + "Description": "A basic example of deploying Synapse Workspaces Azure AD Only Authentications." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/bigDataPools", + "Path": "samples/workspaces/bigdatapools/main.tf", + "Description": "A basic example of deploying Synapse Spark Pool." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/firewallRules", + "Path": "samples/workspaces/firewallrules/main.tf", + "Description": "A basic example of deploying Synapse Firewall Rule." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/integrationRuntimes", + "Path": "samples/workspaces/integrationruntimes/main.tf", + "Description": "A basic example of deploying Synapse Azure Integration Runtime." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/managedIdentitySqlControlSettings", + "Path": "samples/workspaces/managedidentitysqlcontrolsettings/main.tf", + "Description": "A basic example of deploying Synapse Workspaces Managed Identity SQL Control Settings." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/securityAlertPolicies", + "Path": "samples/workspaces/securityalertpolicies/main.tf", + "Description": "A basic example of deploying Security Alert Policy for a Synapse Workspace." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools", + "Path": "samples/workspaces/sqlpools/main.tf", + "Description": "A basic example of deploying Synapse SQL Pool." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/extendedAuditingSettings", + "Path": "samples/workspaces/sqlpools/extendedauditingsettings/main.tf", + "Description": "A basic example of deploying Synapse SQL Pool Extended Auditing Policy." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/securityAlertPolicies", + "Path": "samples/workspaces/sqlpools/securityalertpolicies/main.tf", + "Description": "A basic example of deploying Security Alert Policy for a Synapse SQL Pool." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments", + "Path": "samples/workspaces/sqlpools/vulnerabilityassessments/main.tf", + "Description": "A basic example of deploying Vulnerability Assessment for a Synapse SQL Pool." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/workloadGroups", + "Path": "samples/workspaces/sqlpools/workloadgroups/main.tf", + "Description": "A basic example of deploying Synapse SQL Pool Workload Group." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/workloadGroups/workloadClassifiers", + "Path": "samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.tf", + "Description": "A basic example of deploying Synapse SQL Pool Workload Classifier." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/vulnerabilityAssessments", + "Path": "samples/workspaces/vulnerabilityassessments/main.tf", + "Description": "A basic example of deploying Vulnerability Assessment for a Synapse Workspace." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Synapse/privateLinkHubs", + "Path": "samples/privatelinkhubs/main.bicep", + "Description": "A basic example of deploying Synapse Private Link Hub." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces", + "Path": "samples/workspaces/main.bicep", + "Description": "A basic example of deploying Synapse Workspace." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/azureADOnlyAuthentications", + "Path": "samples/workspaces/azureadonlyauthentications/main.bicep", + "Description": "A basic example of deploying Synapse Workspaces Azure AD Only Authentications." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/bigDataPools", + "Path": "samples/workspaces/bigdatapools/main.bicep", + "Description": "A basic example of deploying Synapse Spark Pool." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/firewallRules", + "Path": "samples/workspaces/firewallrules/main.bicep", + "Description": "A basic example of deploying Synapse Firewall Rule." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/integrationRuntimes", + "Path": "samples/workspaces/integrationruntimes/main.bicep", + "Description": "A basic example of deploying Synapse Azure Integration Runtime." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/managedIdentitySqlControlSettings", + "Path": "samples/workspaces/managedidentitysqlcontrolsettings/main.bicep", + "Description": "A basic example of deploying Synapse Workspaces Managed Identity SQL Control Settings." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/securityAlertPolicies", + "Path": "samples/workspaces/securityalertpolicies/main.bicep", + "Description": "A basic example of deploying Security Alert Policy for a Synapse Workspace." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools", + "Path": "samples/workspaces/sqlpools/main.bicep", + "Description": "A basic example of deploying Synapse SQL Pool." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments", + "Path": "samples/workspaces/sqlpools/vulnerabilityassessments/main.bicep", + "Description": "A basic example of deploying Vulnerability Assessment for a Synapse SQL Pool." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/workloadGroups", + "Path": "samples/workspaces/sqlpools/workloadgroups/main.bicep", + "Description": "A basic example of deploying Synapse SQL Pool Workload Group." + }, + { + "ResourceType": "Microsoft.Synapse/workspaces/sqlPools/workloadGroups/workloadClassifiers", + "Path": "samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.bicep", + "Description": "A basic example of deploying Synapse SQL Pool Workload Classifier." + } + ] +} diff --git a/settings/remarks/microsoft.synapse/samples/privatelinkhubs/main.bicep b/settings/remarks/microsoft.synapse/samples/privatelinkhubs/main.bicep new file mode 100644 index 00000000..8670b092 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/privatelinkhubs/main.bicep @@ -0,0 +1,7 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource privateLinkHub 'Microsoft.Synapse/privateLinkHubs@2021-06-01' = { + name: resourceName + location: location +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/azureadonlyauthentications/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/azureadonlyauthentications/main.bicep new file mode 100644 index 00000000..9c13441c --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/azureadonlyauthentications/main.bicep @@ -0,0 +1,55 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource synapseAzureadOnlyAuthentication 'Microsoft.Synapse/workspaces/azureADOnlyAuthentications@2021-06-01-preview' = { + parent: workspace + name: 'default' + properties: { + azureADOnlyAuthentication: true + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/bigdatapools/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/bigdatapools/main.bicep new file mode 100644 index 00000000..8414c368 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/bigdatapools/main.bicep @@ -0,0 +1,76 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource bigDataPool 'Microsoft.Synapse/workspaces/bigDataPools@2021-06-01-preview' = { + parent: workspace + name: resourceName + location: location + properties: { + autoPause: { + enabled: false + } + autoScale: { + enabled: false + } + cacheSize: 0 + defaultSparkLogFolder: '/logs' + dynamicExecutorAllocation: { + enabled: false + maxExecutors: 0 + minExecutors: 0 + } + isComputeIsolationEnabled: false + nodeCount: 3 + nodeSize: 'Small' + nodeSizeFamily: 'MemoryOptimized' + sessionLevelPackagesEnabled: false + sparkEventsFolder: '/events' + sparkVersion: '2.4' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/firewallrules/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/firewallrules/main.bicep new file mode 100644 index 00000000..b556f446 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/firewallrules/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource firewallRule 'Microsoft.Synapse/workspaces/firewallRules@2021-06-01' = { + parent: workspace + name: 'AllowAll' + properties: { + endIpAddress: '255.255.255.255' + startIpAddress: '0.0.0.0' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/integrationruntimes/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/integrationruntimes/main.bicep new file mode 100644 index 00000000..32629f13 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/integrationruntimes/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: 'default' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource integrationRuntime 'Microsoft.Synapse/workspaces/integrationRuntimes@2021-06-01-preview' = { + parent: workspace + name: resourceName + properties: { + description: 'test' + type: 'SelfHosted' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/main.bicep new file mode 100644 index 00000000..63bdfeb2 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/main.bicep @@ -0,0 +1,47 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login name for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/managedidentitysqlcontrolsettings/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/managedidentitysqlcontrolsettings/main.bicep new file mode 100644 index 00000000..2b54ab6d --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/managedidentitysqlcontrolsettings/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login name for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource managedIdentitySqlControlSetting 'Microsoft.Synapse/workspaces/managedIdentitySqlControlSettings@2021-06-01' = { + parent: workspace + name: 'default' + properties: { + grantSqlControlToManagedIdentity: { + desiredState: 'Disabled' + } + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/securityalertpolicies/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/securityalertpolicies/main.bicep new file mode 100644 index 00000000..2a327d4b --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/securityalertpolicies/main.bicep @@ -0,0 +1,58 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login name for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource securityAlertPolicy 'Microsoft.Synapse/workspaces/securityAlertPolicies@2021-06-01' = { + parent: workspace + name: 'Default' + properties: { + state: 'Enabled' + storageAccountAccessKey: storageAccount.listKeys().keys[0].value + storageEndpoint: storageAccount.properties.primaryEndpoints.blob + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/main.bicep new file mode 100644 index 00000000..b6f07408 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login name for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource sqlPool 'Microsoft.Synapse/workspaces/sqlPools@2021-06-01' = { + parent: workspace + name: resourceName + location: location + properties: { + createMode: 'Default' + } + sku: { + name: 'DW100c' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/vulnerabilityassessments/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/vulnerabilityassessments/main.bicep new file mode 100644 index 00000000..efbceb15 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/vulnerabilityassessments/main.bicep @@ -0,0 +1,68 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource sqlPool 'Microsoft.Synapse/workspaces/sqlPools@2021-06-01' = { + parent: workspace + name: resourceName + location: location + properties: { + createMode: 'Default' + } + sku: { + name: 'DW100c' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} + +resource vulnerabilityAssessment 'Microsoft.Synapse/workspaces/sqlPools/vulnerabilityAssessments@2021-06-01' = { + parent: sqlPool + name: 'default' + properties: { + storageAccountAccessKey: storageAccount.listKeys().keys[0].value + storageContainerPath: 'https://${storageAccount.name}.blob.core.windows.net/${container.name}/' + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/main.bicep new file mode 100644 index 00000000..b92ed4a2 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/main.bicep @@ -0,0 +1,71 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource sqlPool 'Microsoft.Synapse/workspaces/sqlPools@2021-06-01' = { + parent: workspace + name: resourceName + location: location + properties: { + createMode: 'Default' + } + sku: { + name: 'DW100c' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} + +resource workloadGroup 'Microsoft.Synapse/workspaces/sqlPools/workloadGroups@2021-06-01' = { + parent: sqlPool + name: resourceName + properties: { + importance: 'normal' + maxResourcePercent: 100 + maxResourcePercentPerRequest: 3 + minResourcePercent: 0 + minResourcePercentPerRequest: 3 + } +} diff --git a/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.bicep b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.bicep new file mode 100644 index 00000000..54aadcb8 --- /dev/null +++ b/settings/remarks/microsoft.synapse/samples/workspaces/sqlpools/workloadgroups/workloadclassifiers/main.bicep @@ -0,0 +1,80 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@description('The SQL administrator login for the Synapse workspace') +param sqlAdministratorLogin string +@secure() +@description('The SQL administrator login password for the Synapse workspace') +param sqlAdministratorLoginPassword string + +resource blobService 'Microsoft.Storage/storageAccounts/blobServices@2022-09-01' existing = { + parent: storageAccount + name: 'default' +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: {} + sku: { + name: 'Standard_LRS' + } +} + +resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { + name: resourceName + location: location + properties: { + defaultDataLakeStorage: { + accountUrl: storageAccount.properties.primaryEndpoints.dfs + filesystem: container.name + } + + managedVirtualNetwork: '' + publicNetworkAccess: 'Enabled' + sqlAdministratorLogin: sqlAdministratorLogin + sqlAdministratorLoginPassword: sqlAdministratorLoginPassword + } +} + +resource sqlPool 'Microsoft.Synapse/workspaces/sqlPools@2021-06-01' = { + parent: workspace + name: resourceName + location: location + properties: { + createMode: 'Default' + } + sku: { + name: 'DW100c' + } +} + +resource container 'Microsoft.Storage/storageAccounts/blobServices/containers@2022-09-01' = { + parent: blobService + name: resourceName + properties: { + metadata: { + key: 'value' + } + } +} + +resource workloadGroup 'Microsoft.Synapse/workspaces/sqlPools/workloadGroups@2021-06-01' = { + parent: sqlPool + name: resourceName + properties: { + importance: 'normal' + maxResourcePercent: 100 + maxResourcePercentPerRequest: 3 + minResourcePercent: 0 + minResourcePercentPerRequest: 3 + } +} + +resource workloadClassifier 'Microsoft.Synapse/workspaces/sqlPools/workloadGroups/workloadClassifiers@2021-06-01' = { + parent: workloadGroup + name: resourceName + properties: { + memberName: 'dbo' + } +} diff --git a/settings/remarks/microsoft.timeseriesinsights/remarks.json b/settings/remarks/microsoft.timeseriesinsights/remarks.json index 39042a37..9677f51a 100644 --- a/settings/remarks/microsoft.timeseriesinsights/remarks.json +++ b/settings/remarks/microsoft.timeseriesinsights/remarks.json @@ -1,25 +1,47 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.TimeSeriesInsights/environments", - "Path": "samples/environments/main.tf", - "Description": "A basic example of deploying Time Series Insights Environments." - }, - { - "ResourceType": "Microsoft.TimeSeriesInsights/environments/accessPolicies", - "Path": "samples/environments/accesspolicies/main.tf", - "Description": "A basic example of deploying Time Series Insights Environments Access Policies." - }, - { - "ResourceType": "Microsoft.TimeSeriesInsights/environments/eventSources", - "Path": "samples/environments/eventsources/main.tf", - "Description": "A basic example of deploying Time Series Insights Environments Event Sources." - }, - { - "ResourceType": "Microsoft.TimeSeriesInsights/environments/referenceDataSets", - "Path": "samples/environments/referencedatasets/main.tf", - "Description": "A basic example of deploying Time Series Insights Environments Reference Data Sets." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.TimeSeriesInsights/environments", + "Path": "samples/environments/main.tf", + "Description": "A basic example of deploying Time Series Insights Environments." + }, + { + "ResourceType": "Microsoft.TimeSeriesInsights/environments/accessPolicies", + "Path": "samples/environments/accesspolicies/main.tf", + "Description": "A basic example of deploying Time Series Insights Environments Access Policies." + }, + { + "ResourceType": "Microsoft.TimeSeriesInsights/environments/eventSources", + "Path": "samples/environments/eventsources/main.tf", + "Description": "A basic example of deploying Time Series Insights Environments Event Sources." + }, + { + "ResourceType": "Microsoft.TimeSeriesInsights/environments/referenceDataSets", + "Path": "samples/environments/referencedatasets/main.tf", + "Description": "A basic example of deploying Time Series Insights Environments Reference Data Sets." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.TimeSeriesInsights/environments", + "Path": "samples/environments/main.bicep", + "Description": "A basic example of deploying Time Series Insights Environments." + }, + { + "ResourceType": "Microsoft.TimeSeriesInsights/environments/accessPolicies", + "Path": "samples/environments/accesspolicies/main.bicep", + "Description": "A basic example of deploying Time Series Insights Environments Access Policies." + }, + { + "ResourceType": "Microsoft.TimeSeriesInsights/environments/eventSources", + "Path": "samples/environments/eventsources/main.bicep", + "Description": "A basic example of deploying Time Series Insights Environments Event Sources." + }, + { + "ResourceType": "Microsoft.TimeSeriesInsights/environments/referenceDataSets", + "Path": "samples/environments/referencedatasets/main.bicep", + "Description": "A basic example of deploying Time Series Insights Environments Reference Data Sets." + } + ] +} diff --git a/settings/remarks/microsoft.timeseriesinsights/samples/environments/accesspolicies/main.bicep b/settings/remarks/microsoft.timeseriesinsights/samples/environments/accesspolicies/main.bicep new file mode 100644 index 00000000..da33ae18 --- /dev/null +++ b/settings/remarks/microsoft.timeseriesinsights/samples/environments/accesspolicies/main.bicep @@ -0,0 +1,28 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource environment 'Microsoft.TimeSeriesInsights/environments@2020-05-15' = { + name: resourceName + location: location + kind: 'Gen1' + properties: { + dataRetentionTime: 'P30D' + storageLimitExceededBehavior: 'PurgeOldData' + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource accessPolicy 'Microsoft.TimeSeriesInsights/environments/accessPolicies@2020-05-15' = { + parent: environment + name: resourceName + properties: { + description: '' + principalObjectId: 'aGUID' + roles: [ + 'Reader' + ] + } +} diff --git a/settings/remarks/microsoft.timeseriesinsights/samples/environments/eventsources/main.bicep b/settings/remarks/microsoft.timeseriesinsights/samples/environments/eventsources/main.bicep new file mode 100644 index 00000000..9d649fbb --- /dev/null +++ b/settings/remarks/microsoft.timeseriesinsights/samples/environments/eventsources/main.bicep @@ -0,0 +1,103 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource iothub 'Microsoft.Devices/IotHubs@2022-04-30-preview' = { + name: resourceName + location: location + properties: { + cloudToDevice: {} + enableFileUploadNotifications: false + messagingEndpoints: {} + routing: { + fallbackRoute: { + condition: 'true' + endpointNames: [ + 'events' + ] + isEnabled: true + source: 'DeviceMessages' + } + } + storageEndpoints: {} + } + sku: { + capacity: 1 + name: 'B1' + } + tags: { + purpose: 'testing' + } +} + +resource environment 'Microsoft.TimeSeriesInsights/environments@2020-05-15' = { + name: resourceName + location: location + kind: 'Gen2' + properties: { + storageConfiguration: { + accountName: storageAccount.name + managementKey: storageAccount.listKeys().keys[0].value + } + timeSeriesIdProperties: [ + { + name: 'id' + type: 'String' + } + ] + } + sku: { + capacity: 1 + name: 'L1' + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2021-09-01' = { + name: resourceName + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: true + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + defaultAction: 'Allow' + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource eventSource 'Microsoft.TimeSeriesInsights/environments/eventSources@2020-05-15' = { + parent: environment + name: resourceName + location: location + kind: 'Microsoft.IoTHub' + properties: { + consumerGroupName: 'test' + eventSourceResourceId: iothub.id + iotHubName: iothub.name + keyName: 'iothubowner' + sharedAccessKey: iothub.listkeys().value[0].primaryKey + timestampPropertyName: '' + } +} diff --git a/settings/remarks/microsoft.timeseriesinsights/samples/environments/main.bicep b/settings/remarks/microsoft.timeseriesinsights/samples/environments/main.bicep new file mode 100644 index 00000000..773185ef --- /dev/null +++ b/settings/remarks/microsoft.timeseriesinsights/samples/environments/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource environment 'Microsoft.TimeSeriesInsights/environments@2020-05-15' = { + name: resourceName + location: location + kind: 'Gen1' + properties: { + dataRetentionTime: 'P30D' + storageLimitExceededBehavior: 'PurgeOldData' + } + sku: { + capacity: 1 + name: 'S1' + } +} diff --git a/settings/remarks/microsoft.timeseriesinsights/samples/environments/referencedatasets/main.bicep b/settings/remarks/microsoft.timeseriesinsights/samples/environments/referencedatasets/main.bicep new file mode 100644 index 00000000..f7bf257f --- /dev/null +++ b/settings/remarks/microsoft.timeseriesinsights/samples/environments/referencedatasets/main.bicep @@ -0,0 +1,31 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource environment 'Microsoft.TimeSeriesInsights/environments@2020-05-15' = { + name: resourceName + location: location + kind: 'Gen1' + properties: { + dataRetentionTime: 'P30D' + storageLimitExceededBehavior: 'PurgeOldData' + } + sku: { + capacity: 1 + name: 'S1' + } +} + +resource referenceDataSet 'Microsoft.TimeSeriesInsights/environments/referenceDataSets@2020-05-15' = { + parent: environment + name: resourceName + location: location + properties: { + dataStringComparisonBehavior: 'Ordinal' + keyProperties: [ + { + name: 'keyProperty1' + type: 'String' + } + ] + } +} diff --git a/settings/remarks/microsoft.videoindexer/remarks.json b/settings/remarks/microsoft.videoindexer/remarks.json index 8e30a0b3..3cc4e027 100644 --- a/settings/remarks/microsoft.videoindexer/remarks.json +++ b/settings/remarks/microsoft.videoindexer/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.VideoIndexer/accounts", - "Path": "samples/accounts/main.tf", - "Description": "A basic example of deploying Video Indexer Account." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.VideoIndexer/accounts", + "Path": "samples/accounts/main.tf", + "Description": "A basic example of deploying Video Indexer Account." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.VideoIndexer/accounts", + "Path": "samples/accounts/main.bicep", + "Description": "A basic example of deploying Video Indexer Account." + } + ] +} diff --git a/settings/remarks/microsoft.videoindexer/samples/accounts/main.bicep b/settings/remarks/microsoft.videoindexer/samples/accounts/main.bicep new file mode 100644 index 00000000..305a02af --- /dev/null +++ b/settings/remarks/microsoft.videoindexer/samples/accounts/main.bicep @@ -0,0 +1,60 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource account 'Microsoft.VideoIndexer/accounts@2025-04-01' = { + name: '${resourceName}-vi' + location: location + properties: { + storageServices: { + resourceId: storageAccount.id + userAssignedIdentity: '' + } + } +} + +resource storageAccount 'Microsoft.Storage/storageAccounts@2023-05-01' = { + name: '${replace(resourceName, '-', '')}sa' + location: location + kind: 'StorageV2' + properties: { + accessTier: 'Hot' + allowBlobPublicAccess: true + allowCrossTenantReplication: false + allowSharedKeyAccess: true + defaultToOAuthAuthentication: false + dnsEndpointType: 'Standard' + encryption: { + keySource: 'Microsoft.Storage' + services: { + queue: { + keyType: 'Service' + } + table: { + keyType: 'Service' + } + } + } + isHnsEnabled: false + isLocalUserEnabled: true + isNfsV3Enabled: false + isSftpEnabled: false + minimumTlsVersion: 'TLS1_2' + networkAcls: { + bypass: 'AzureServices' + defaultAction: 'Allow' + ipRules: [] + resourceAccessRules: [] + virtualNetworkRules: [] + } + publicNetworkAccess: 'Enabled' + supportsHttpsTrafficOnly: true + } + sku: { + name: 'Standard_LRS' + } +} + +resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { + name: '${resourceName}-identity' + location: location +} diff --git a/settings/remarks/microsoft.voiceservices/remarks.json b/settings/remarks/microsoft.voiceservices/remarks.json index 30499944..838ee832 100644 --- a/settings/remarks/microsoft.voiceservices/remarks.json +++ b/settings/remarks/microsoft.voiceservices/remarks.json @@ -1,15 +1,27 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Microsoft.VoiceServices/communicationsGateways", - "Path": "samples/communicationsgateways/main.tf", - "Description": "A basic example of deploying Voice Services Communications Gateways." - }, - { - "ResourceType": "Microsoft.VoiceServices/communicationsGateways/testLines", - "Path": "samples/communicationsgateways/testlines/main.tf", - "Description": "A basic example of deploying Voice Services Communications Gateway Test Line." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Microsoft.VoiceServices/communicationsGateways", + "Path": "samples/communicationsgateways/main.tf", + "Description": "A basic example of deploying Voice Services Communications Gateways." + }, + { + "ResourceType": "Microsoft.VoiceServices/communicationsGateways/testLines", + "Path": "samples/communicationsgateways/testlines/main.tf", + "Description": "A basic example of deploying Voice Services Communications Gateway Test Line." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.VoiceServices/communicationsGateways", + "Path": "samples/communicationsgateways/main.bicep", + "Description": "A basic example of deploying Voice Services Communications Gateways." + }, + { + "ResourceType": "Microsoft.VoiceServices/communicationsGateways/testLines", + "Path": "samples/communicationsgateways/testlines/main.bicep", + "Description": "A basic example of deploying Voice Services Communications Gateway Test Line." + } + ] +} diff --git a/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/main.bicep b/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/main.bicep new file mode 100644 index 00000000..259c0806 --- /dev/null +++ b/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/main.bicep @@ -0,0 +1,49 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2euap' + +resource communicationsGateway 'Microsoft.VoiceServices/communicationsGateways@2023-01-31' = { + name: resourceName + location: location + properties: { + autoGeneratedDomainNameLabelScope: 'NoReuse' + codecs: [ + 'PCMA' + ] + connectivity: 'PublicAddress' + e911Type: 'Standard' + platforms: [ + 'OperatorConnect' + ] + serviceLocations: [ + { + name: 'useast' + primaryRegionProperties: { + allowedMediaSourceAddressPrefixes: [ + '10.1.2.0/24' + ] + allowedSignalingSourceAddressPrefixes: [ + '10.1.1.0/24' + ] + operatorAddresses: [ + '198.51.100.1' + ] + } + } + { + name: 'useast2' + primaryRegionProperties: { + allowedMediaSourceAddressPrefixes: [ + '10.2.2.0/24' + ] + allowedSignalingSourceAddressPrefixes: [ + '10.2.1.0/24' + ] + operatorAddresses: [ + '198.51.100.2' + ] + } + } + ] + teamsVoicemailPilotNumber: '1234567890' + } +} diff --git a/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/testlines/main.bicep b/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/testlines/main.bicep new file mode 100644 index 00000000..66d475f3 --- /dev/null +++ b/settings/remarks/microsoft.voiceservices/samples/communicationsgateways/testlines/main.bicep @@ -0,0 +1,59 @@ +param resourceName string = 'acctest0001' +param location string = 'eastus2euap' + +resource communicationsGateway 'Microsoft.VoiceServices/communicationsGateways@2023-01-31' = { + name: resourceName + location: location + properties: { + autoGeneratedDomainNameLabelScope: 'NoReuse' + codecs: [ + 'PCMA' + ] + connectivity: 'PublicAddress' + e911Type: 'Standard' + platforms: [ + 'OperatorConnect' + ] + serviceLocations: [ + { + name: 'useast' + primaryRegionProperties: { + allowedMediaSourceAddressPrefixes: [ + '10.1.2.0/24' + ] + allowedSignalingSourceAddressPrefixes: [ + '10.1.1.0/24' + ] + operatorAddresses: [ + '198.51.100.1' + ] + } + } + { + name: 'useast2' + primaryRegionProperties: { + allowedMediaSourceAddressPrefixes: [ + '10.2.2.0/24' + ] + allowedSignalingSourceAddressPrefixes: [ + '10.2.1.0/24' + ] + operatorAddresses: [ + '198.51.100.2' + ] + } + } + ] + teamsVoicemailPilotNumber: '1234567890' + } +} + +resource testline 'Microsoft.VoiceServices/communicationsGateways/testLines@2023-01-31' = { + parent: communicationsGateway + name: resourceName + location: location + properties: { + phoneNumber: '123456789' + purpose: 'Automated' + } +} diff --git a/settings/remarks/microsoft.web/remarks.json b/settings/remarks/microsoft.web/remarks.json index 3c8d1534..85173249 100644 --- a/settings/remarks/microsoft.web/remarks.json +++ b/settings/remarks/microsoft.web/remarks.json @@ -1,79 +1,126 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "ResourceRemarks": [ - { - "Description": "This resource type has migrated to the **Microsoft.App** namespace. For the new resource type, see [Microsoft.App containerApps](../../../microsoft.app/containerapps.md).\n\nFor information about the migration, see [Action Required: Namespace migration from Microsoft.Web to Microsoft.App in March 2022](https://github.com/microsoft/azure-container-apps/issues/109).", - "ResourceTypes": [ - "microsoft.web/containerapps" - ] - }, - { - "Description": "This resource type has migrated to the **Microsoft.App** namespace. For the new resource type, see [Microsoft.App managedEnvironments](../../../Microsoft.App/managedEnvironments.md).\n\nFor information about the migration, see [Action Required: Namespace migration from Microsoft.Web to Microsoft.App in March 2022](https://github.com/microsoft/azure-container-apps/issues/109).", - "ResourceTypes": [ - "microsoft.web/kubeenvironments" - ] - } - ], - "TerraformSamples": [ - { - "ResourceType": "Microsoft.Web/certificates", - "Path": "samples/certificates/main.tf", - "Description": "A basic example of deploying App Service certificate." - }, - { - "ResourceType": "Microsoft.Web/connections", - "Path": "samples/connections/main.tf", - "Description": "A basic example of deploying API Connection." - }, - { - "ResourceType": "Microsoft.Web/serverfarms", - "Path": "samples/serverfarms/main.tf", - "Description": "A basic example of deploying App Service: Service Plan." - }, - { - "ResourceType": "Microsoft.Web/sites", - "Path": "samples/sites/main.tf", - "Description": "A basic example of deploying Function App, Web App, or Logic App." - }, - { - "ResourceType": "Microsoft.Web/sites/config", - "Path": "samples/sites/config/main.tf", - "Description": "A basic example of deploying App Service Virtual Network Association." - }, - { - "ResourceType": "Microsoft.Web/sites/publicCertificates", - "Path": "samples/sites/publiccertificates/main.tf", - "Description": "A basic example of deploying App Service Public Certificate." - }, - { - "ResourceType": "Microsoft.Web/sites/siteextensions", - "Path": "samples/sites/siteextensions/main.tf", - "Description": "A basic example of deploying Web Sites Site Extensions." - }, - { - "ResourceType": "Microsoft.Web/sites/slots", - "Path": "samples/sites/slots/main.tf", - "Description": "A basic example of deploying App Service Slot (within an App Service)." - }, - { - "ResourceType": "Microsoft.Web/sites/slots/config", - "Path": "samples/sites/slots/config/main.tf", - "Description": "A basic example of deploying App Service's Slot Virtual Network Association." - }, - { - "ResourceType": "Microsoft.Web/sourcecontrols", - "Path": "samples/sourcecontrols/main.tf", - "Description": "A basic example of deploying App Service GitHub Token." - }, - { - "ResourceType": "Microsoft.Web/staticSites", - "Path": "samples/staticsites/main.tf", - "Description": "A basic example of deploying Static Web App." - }, - { - "ResourceType": "Microsoft.Web/staticSites/customDomains", - "Path": "samples/staticsites/customdomains/main.tf", - "Description": "A basic example of deploying Static Web App Custom Domain." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "ResourceRemarks": [ + { + "Description": "This resource type has migrated to the **Microsoft.App** namespace. For the new resource type, see [Microsoft.App containerApps](../../../microsoft.app/containerapps.md).\n\nFor information about the migration, see [Action Required: Namespace migration from Microsoft.Web to Microsoft.App in March 2022](https://github.com/microsoft/azure-container-apps/issues/109).", + "ResourceTypes": [ + "microsoft.web/containerapps" + ] + }, + { + "Description": "This resource type has migrated to the **Microsoft.App** namespace. For the new resource type, see [Microsoft.App managedEnvironments](../../../Microsoft.App/managedEnvironments.md).\n\nFor information about the migration, see [Action Required: Namespace migration from Microsoft.Web to Microsoft.App in March 2022](https://github.com/microsoft/azure-container-apps/issues/109).", + "ResourceTypes": [ + "microsoft.web/kubeenvironments" + ] + } + ], + "TerraformSamples": [ + { + "ResourceType": "Microsoft.Web/certificates", + "Path": "samples/certificates/main.tf", + "Description": "A basic example of deploying App Service certificate." + }, + { + "ResourceType": "Microsoft.Web/connections", + "Path": "samples/connections/main.tf", + "Description": "A basic example of deploying API Connection." + }, + { + "ResourceType": "Microsoft.Web/serverfarms", + "Path": "samples/serverfarms/main.tf", + "Description": "A basic example of deploying App Service: Service Plan." + }, + { + "ResourceType": "Microsoft.Web/sites", + "Path": "samples/sites/main.tf", + "Description": "A basic example of deploying Function App, Web App, or Logic App." + }, + { + "ResourceType": "Microsoft.Web/sites/config", + "Path": "samples/sites/config/main.tf", + "Description": "A basic example of deploying App Service Virtual Network Association." + }, + { + "ResourceType": "Microsoft.Web/sites/publicCertificates", + "Path": "samples/sites/publiccertificates/main.tf", + "Description": "A basic example of deploying App Service Public Certificate." + }, + { + "ResourceType": "Microsoft.Web/sites/siteextensions", + "Path": "samples/sites/siteextensions/main.tf", + "Description": "A basic example of deploying Web Sites Site Extensions." + }, + { + "ResourceType": "Microsoft.Web/sites/slots", + "Path": "samples/sites/slots/main.tf", + "Description": "A basic example of deploying App Service Slot (within an App Service)." + }, + { + "ResourceType": "Microsoft.Web/sites/slots/config", + "Path": "samples/sites/slots/config/main.tf", + "Description": "A basic example of deploying App Service's Slot Virtual Network Association." + }, + { + "ResourceType": "Microsoft.Web/sourcecontrols", + "Path": "samples/sourcecontrols/main.tf", + "Description": "A basic example of deploying App Service GitHub Token." + }, + { + "ResourceType": "Microsoft.Web/staticSites", + "Path": "samples/staticsites/main.tf", + "Description": "A basic example of deploying Static Web App." + }, + { + "ResourceType": "Microsoft.Web/staticSites/customDomains", + "Path": "samples/staticsites/customdomains/main.tf", + "Description": "A basic example of deploying Static Web App Custom Domain." + } + ], + "BicepSamples": [ + { + "ResourceType": "Microsoft.Web/serverfarms", + "Path": "samples/serverfarms/main.bicep", + "Description": "A basic example of deploying App Service: Service Plan." + }, + { + "ResourceType": "Microsoft.Web/sites", + "Path": "samples/sites/main.bicep", + "Description": "A basic example of deploying Function App, Web App, or Logic App." + }, + { + "ResourceType": "Microsoft.Web/sites/config", + "Path": "samples/sites/config/main.bicep", + "Description": "A basic example of deploying App Service Virtual Network Association." + }, + { + "ResourceType": "Microsoft.Web/sites/publicCertificates", + "Path": "samples/sites/publiccertificates/main.bicep", + "Description": "A basic example of deploying App Service Public Certificate." + }, + { + "ResourceType": "Microsoft.Web/sites/siteextensions", + "Path": "samples/sites/siteextensions/main.bicep", + "Description": "A basic example of deploying Web Sites Site Extensions." + }, + { + "ResourceType": "Microsoft.Web/sites/slots", + "Path": "samples/sites/slots/main.bicep", + "Description": "A basic example of deploying App Service Slot (within an App Service)." + }, + { + "ResourceType": "Microsoft.Web/sites/slots/config", + "Path": "samples/sites/slots/config/main.bicep", + "Description": "A basic example of deploying App Service's Slot Virtual Network Association." + }, + { + "ResourceType": "Microsoft.Web/staticSites", + "Path": "samples/staticsites/main.bicep", + "Description": "A basic example of deploying Static Web App." + }, + { + "ResourceType": "Microsoft.Web/staticSites/customDomains", + "Path": "samples/staticsites/customdomains/main.bicep", + "Description": "A basic example of deploying Static Web App Custom Domain." + } + ] +} diff --git a/settings/remarks/microsoft.web/samples/serverfarms/main.bicep b/settings/remarks/microsoft.web/samples/serverfarms/main.bicep new file mode 100644 index 00000000..ac77f6af --- /dev/null +++ b/settings/remarks/microsoft.web/samples/serverfarms/main.bicep @@ -0,0 +1,16 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} diff --git a/settings/remarks/microsoft.web/samples/sites/config/main.bicep b/settings/remarks/microsoft.web/samples/sites/config/main.bicep new file mode 100644 index 00000000..bdfaa837 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/config/main.bicep @@ -0,0 +1,56 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource config 'Microsoft.Web/sites/config@2022-09-01' = { + parent: site + name: 'azurestorageaccounts' + properties: {} +} diff --git a/settings/remarks/microsoft.web/samples/sites/main.bicep b/settings/remarks/microsoft.web/samples/sites/main.bicep new file mode 100644 index 00000000..84754e11 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/main.bicep @@ -0,0 +1,50 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} diff --git a/settings/remarks/microsoft.web/samples/sites/publiccertificates/main.bicep b/settings/remarks/microsoft.web/samples/sites/publiccertificates/main.bicep new file mode 100644 index 00000000..b98d9d7a --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/publiccertificates/main.bicep @@ -0,0 +1,39 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2021-02-01' = { + name: resourceName + location: location + kind: 'Windows' + properties: { + isXenon: false + } + sku: { + capacity: 1 + name: 'S1' + size: 'S1' + tier: 'Standard' + } +} + +resource site 'Microsoft.Web/sites@2021-02-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + enabled: true + httpsOnly: false + serverFarmId: serverfarm.id + siteConfig: {} + } +} + +resource publicCertificate 'Microsoft.Web/sites/publicCertificates@2022-09-01' = { + parent: site + name: resourceName + properties: { + blob: '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' + publicCertificateLocation: 'Unknown' + } +} diff --git a/settings/remarks/microsoft.web/samples/sites/siteextensions/main.bicep b/settings/remarks/microsoft.web/samples/sites/siteextensions/main.bicep new file mode 100644 index 00000000..94f2c216 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/siteextensions/main.bicep @@ -0,0 +1,57 @@ +param resourceName string = 'acctest0001' +param resourceSiteName string = 'acctestsite0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceSiteName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource dynatraceSiteExtension 'Microsoft.Web/sites/siteextensions@2022-09-01' = { + parent: site + name: 'Dynatrace' + location: location +} diff --git a/settings/remarks/microsoft.web/samples/sites/slots/config/main.bicep b/settings/remarks/microsoft.web/samples/sites/slots/config/main.bicep new file mode 100644 index 00000000..a261a10d --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/slots/config/main.bicep @@ -0,0 +1,92 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource slot 'Microsoft.Web/sites/slots@2022-09-01' = { + parent: site + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertExclusionPaths: '' + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: false + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource config 'Microsoft.Web/sites/slots/config@2022-09-01' = { + parent: slot + name: 'azurestorageaccounts' + properties: {} +} diff --git a/settings/remarks/microsoft.web/samples/sites/slots/main.bicep b/settings/remarks/microsoft.web/samples/sites/slots/main.bicep new file mode 100644 index 00000000..a38c7b91 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/sites/slots/main.bicep @@ -0,0 +1,86 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource serverfarm 'Microsoft.Web/serverfarms@2022-09-01' = { + name: resourceName + location: location + properties: { + hyperV: false + perSiteScaling: false + reserved: false + zoneRedundant: false + } + sku: { + name: 'S1' + } +} + +resource site 'Microsoft.Web/sites@2022-09-01' = { + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: true + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} + +resource slot 'Microsoft.Web/sites/slots@2022-09-01' = { + parent: site + name: resourceName + location: location + properties: { + clientAffinityEnabled: false + clientCertEnabled: false + clientCertExclusionPaths: '' + clientCertMode: 'Required' + enabled: true + httpsOnly: false + publicNetworkAccess: 'Enabled' + serverFarmId: serverfarm.id + siteConfig: { + acrUseManagedIdentityCreds: false + alwaysOn: true + autoHealEnabled: false + ftpsState: 'Disabled' + http20Enabled: false + loadBalancing: 'LeastRequests' + localMySqlEnabled: false + managedPipelineMode: 'Integrated' + minTlsVersion: '1.2' + publicNetworkAccess: 'Enabled' + remoteDebuggingEnabled: false + scmIpSecurityRestrictionsUseMain: false + scmMinTlsVersion: '1.2' + use32BitWorkerProcess: false + vnetRouteAllEnabled: false + webSocketsEnabled: false + windowsFxVersion: '' + } + vnetRouteAllEnabled: false + } +} diff --git a/settings/remarks/microsoft.web/samples/staticsites/customdomains/main.bicep b/settings/remarks/microsoft.web/samples/staticsites/customdomains/main.bicep new file mode 100644 index 00000000..a9b765ba --- /dev/null +++ b/settings/remarks/microsoft.web/samples/staticsites/customdomains/main.bicep @@ -0,0 +1,19 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource staticSite 'Microsoft.Web/staticSites@2021-02-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Free' + } +} + +resource customDomain 'Microsoft.Web/staticSites/customDomains@2021-02-01' = { + parent: staticSite + name: '${resourceName}.contoso.com' + properties: { + validationMethod: 'dns-txt-token' + } +} diff --git a/settings/remarks/microsoft.web/samples/staticsites/main.bicep b/settings/remarks/microsoft.web/samples/staticsites/main.bicep new file mode 100644 index 00000000..722c6511 --- /dev/null +++ b/settings/remarks/microsoft.web/samples/staticsites/main.bicep @@ -0,0 +1,12 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' + +resource staticSite 'Microsoft.Web/staticSites@2021-02-01' = { + name: resourceName + location: location + properties: {} + sku: { + name: 'Free' + tier: 'Free' + } +} diff --git a/settings/remarks/nginx.nginxplus/remarks.json b/settings/remarks/nginx.nginxplus/remarks.json index e84f3ae6..8b942291 100644 --- a/settings/remarks/nginx.nginxplus/remarks.json +++ b/settings/remarks/nginx.nginxplus/remarks.json @@ -1,20 +1,32 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Nginx.NginxPlus/nginxDeployments", - "Path": "samples/nginxdeployments/main.tf", - "Description": "A basic example of deploying NGINX Deployment." - }, - { - "ResourceType": "Nginx.NginxPlus/nginxDeployments/certificates", - "Path": "samples/nginxdeployments/certificates/main.tf", - "Description": "A basic example of deploying Certificate for an NGINX Deployment." - }, - { - "ResourceType": "Nginx.NginxPlus/nginxDeployments/configurations", - "Path": "samples/nginxdeployments/configurations/main.tf", - "Description": "A basic example of deploying configuration for a Nginx Deployment." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Nginx.NginxPlus/nginxDeployments", + "Path": "samples/nginxdeployments/main.tf", + "Description": "A basic example of deploying NGINX Deployment." + }, + { + "ResourceType": "Nginx.NginxPlus/nginxDeployments/certificates", + "Path": "samples/nginxdeployments/certificates/main.tf", + "Description": "A basic example of deploying Certificate for an NGINX Deployment." + }, + { + "ResourceType": "Nginx.NginxPlus/nginxDeployments/configurations", + "Path": "samples/nginxdeployments/configurations/main.tf", + "Description": "A basic example of deploying configuration for a Nginx Deployment." + } + ], + "BicepSamples": [ + { + "ResourceType": "Nginx.NginxPlus/nginxDeployments", + "Path": "samples/nginxdeployments/main.bicep", + "Description": "A basic example of deploying NGINX Deployment." + }, + { + "ResourceType": "Nginx.NginxPlus/nginxDeployments/configurations", + "Path": "samples/nginxdeployments/configurations/main.bicep", + "Description": "A basic example of deploying configuration for a Nginx Deployment." + } + ] +} diff --git a/settings/remarks/nginx.nginxplus/samples/nginxdeployments/configurations/main.bicep b/settings/remarks/nginx.nginxplus/samples/nginxdeployments/configurations/main.bicep new file mode 100644 index 00000000..ea30bb24 --- /dev/null +++ b/settings/remarks/nginx.nginxplus/samples/nginxdeployments/configurations/main.bicep @@ -0,0 +1,105 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource nginxDeployment 'Nginx.NginxPlus/nginxDeployments@2024-11-01-preview' = { + name: '${resourceName}-nginx' + location: location + properties: { + autoUpgradeProfile: { + upgradeChannel: 'stable' + } + enableDiagnosticsSupport: false + networkProfile: { + frontEndIPConfiguration: { + publicIPAddresses: [ + { + id: publicIPAddress.id + } + ] + } + networkInterfaceConfiguration: { + subnetId: subnet.id + } + } + scalingProperties: { + capacity: 10 + } + } + sku: { + name: 'standardv2_Monthly' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2024-05-01' = { + name: '${resourceName}-pip' + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource configuration 'Nginx.NginxPlus/nginxDeployments/configurations@2024-11-01-preview' = { + parent: nginxDeployment + name: 'default' + properties: { + files: [ + { + content: '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' + virtualPath: '/etc/nginx/nginx.conf' + } + ] + protectedFiles: [ + { + content: 'dXNlcjokYXByMSRWZVVBNWt0LiRJampSay8vOG1pUnhEc1p2RDRkYUYxCg==' + virtualPath: '/opt/.htpasswd' + } + ] + rootFile: '/etc/nginx/nginx.conf' + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + serviceName: 'NGINX.NGINXPLUS/nginxDeployments' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/nginx.nginxplus/samples/nginxdeployments/main.bicep b/settings/remarks/nginx.nginxplus/samples/nginxdeployments/main.bicep new file mode 100644 index 00000000..21aa7c31 --- /dev/null +++ b/settings/remarks/nginx.nginxplus/samples/nginxdeployments/main.bicep @@ -0,0 +1,137 @@ +param resourceName string = 'acctest0001' +param location string = 'westus' + +resource nginxDeployment 'Nginx.NginxPlus/nginxDeployments@2024-11-01-preview' = { + name: '${resourceName}-nginx' + location: location + properties: { + autoUpgradeProfile: { + upgradeChannel: 'stable' + } + enableDiagnosticsSupport: false + networkProfile: { + frontEndIPConfiguration: { + publicIPAddresses: [ + { + id: publicIPAddress.id + } + ] + } + networkInterfaceConfiguration: { + subnetId: subnet.id + } + } + scalingProperties: { + autoScaleSettings: { + profiles: [ + { + capacity: { + max: 30 + min: 10 + } + name: 'test' + } + ] + } + } + userProfile: { + preferredEmail: 'test@test.com' + } + } + sku: { + name: 'standardv2_Monthly' + } +} + +resource publicIPAddress 'Microsoft.Network/publicIPAddresses@2024-05-01' = { + name: '${resourceName}-pip' + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource publicipaddress1 'Microsoft.Network/publicIPAddresses@2024-05-01' = { + name: '${resourceName}-pip2' + location: location + properties: { + ddosSettings: { + protectionMode: 'VirtualNetworkInherited' + } + idleTimeoutInMinutes: 4 + publicIPAddressVersion: 'IPv4' + publicIPAllocationMethod: 'Static' + } + sku: { + name: 'Standard' + tier: 'Regional' + } +} + +resource virtualNetwork 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: '${resourceName}-vnet' + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + dhcpOptions: { + dnsServers: [] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet' + properties: { + addressPrefix: '10.0.2.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + serviceName: 'NGINX.NGINXPLUS/nginxDeployments' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} + +resource subnet1 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: virtualNetwork + name: '${resourceName}-subnet2' + properties: { + addressPrefix: '10.0.3.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + serviceName: 'NGINX.NGINXPLUS/nginxDeployments' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + serviceEndpointPolicies: [] + serviceEndpoints: [] + } +} diff --git a/settings/remarks/qumulo.storage/remarks.json b/settings/remarks/qumulo.storage/remarks.json index 368c31d3..89c721df 100644 --- a/settings/remarks/qumulo.storage/remarks.json +++ b/settings/remarks/qumulo.storage/remarks.json @@ -1,10 +1,17 @@ -{ - "$schema": "../../schemas/remarks.schema.json", - "TerraformSamples": [ - { - "ResourceType": "Qumulo.Storage/fileSystems", - "Path": "samples/filesystems/main.tf", - "Description": "A basic example of deploying Qumulo File System." - } - ] -} +{ + "$schema": "../../schemas/remarks.schema.json", + "TerraformSamples": [ + { + "ResourceType": "Qumulo.Storage/fileSystems", + "Path": "samples/filesystems/main.tf", + "Description": "A basic example of deploying Qumulo File System." + } + ], + "BicepSamples": [ + { + "ResourceType": "Qumulo.Storage/fileSystems", + "Path": "samples/filesystems/main.bicep", + "Description": "A basic example of deploying Qumulo File System." + } + ] +} diff --git a/settings/remarks/qumulo.storage/samples/filesystems/main.bicep b/settings/remarks/qumulo.storage/samples/filesystems/main.bicep new file mode 100644 index 00000000..526a60f7 --- /dev/null +++ b/settings/remarks/qumulo.storage/samples/filesystems/main.bicep @@ -0,0 +1,61 @@ +param resourceName string = 'acctest0001' +param location string = 'westeurope' +@secure() +@description('The administrative password for the Qumulo file system') +param qumuloPassword string + +resource qumuloFileSystem 'Qumulo.Storage/fileSystems@2024-06-19' = { + name: resourceName + location: location + properties: { + adminPassword: null + availabilityZone: '1' + delegatedSubnetId: subnet.id + marketplaceDetails: { + offerId: 'qumulo-saas-mpp' + planId: 'azure-native-qumulo-v3' + publisherId: 'qumulo1584033880660' + } + storageSku: 'Cold_LRS' + userDetails: { + email: 'test@test.com' + } + } +} + +resource vnet 'Microsoft.Network/virtualNetworks@2024-05-01' = { + name: resourceName + location: location + properties: { + addressSpace: { + addressPrefixes: [ + '10.0.0.0/16' + ] + } + privateEndpointVNetPolicies: 'Disabled' + subnets: [] + } +} + +resource subnet 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' = { + parent: vnet + name: resourceName + location: location + properties: { + addressPrefix: '10.0.1.0/24' + defaultOutboundAccess: true + delegations: [ + { + name: 'delegation' + properties: { + actions: [ + 'Microsoft.Network/virtualNetworks/subnets/join/action' + ] + serviceName: 'Qumulo.Storage/fileSystems' + } + } + ] + privateEndpointNetworkPolicies: 'Disabled' + privateLinkServiceNetworkPolicies: 'Enabled' + } +}