You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/bicep/patterns-shared-variable-file.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: johndowns
5
5
ms.author: jodowns
6
6
ms.topic: conceptual
7
7
ms.custom: devx-track-bicep
8
-
ms.date: 07/01/2022
8
+
ms.date: 07/28/2023
9
9
---
10
10
# Shared variable file pattern
11
11
@@ -39,7 +39,7 @@ When you define your resource names, use string interpolation to concatenate the
39
39
40
40
## Example 2: Network security group rules
41
41
42
-
Suppose you have multiple Bicep file that define their own network security groups (NSG). You have a common set of security rules that must be applied to each NSG, and then you have application-specific rules that must be added.
42
+
Suppose you have multiple Bicep files that define their own network security groups (NSG). You have a common set of security rules that must be applied to each NSG, and then you have application-specific rules that must be added.
43
43
44
44
Define a JSON file that includes the common security rules that apply across your company:
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/bicep/scenarios-monitoring.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,16 @@
1
1
---
2
2
title: Create monitoring resources by using Bicep
3
3
description: Describes how to create monitoring resources by using Bicep.
4
-
author: willvelida
5
-
ms.author: willvelida
6
4
ms.topic: conceptual
7
5
ms.custom: devx-track-bicep
8
-
ms.date: 07/01/2022
6
+
ms.date: 07/28/2023
9
7
---
8
+
10
9
# Create monitoring resources by using Bicep
11
10
12
11
Azure has a comprehensive suite of tools that can monitor your applications and services. You can programmatically create your monitoring resources using Bicep to automate the creation of rules, diagnostic settings, and alerts when provisioning your Azure infrastructure.
13
12
14
-
Bringing your monitoring configuration into your Bicep code might seem unusual, considering that there are tools available inside the Azure portal to set up alert rules, diagnostic settings and dashboards.
13
+
Bringing your monitoring configuration into your Bicep code might seem unusual, considering that there are tools available inside the Azure portal to set up alert rules, diagnostic settings and dashboards.
15
14
16
15
However, alerts and diagnostic settings are essentially the same as your other infrastructure resources. By including them in your Bicep code, you can deploy and test your alerting resources as you would for other Azure resources.
17
16
@@ -27,7 +26,7 @@ Diagnostic settings enable you to configure Azure Monitor to export your logs an
27
26
28
27
When creating [diagnostic settings](../../azure-monitor/essentials/diagnostic-settings.md) in Bicep, remember that this resource is an [extension resource](scope-extension-resources.md), which means it's applied to another resource. You can create diagnostic settings in Bicep by using the resource type [Microsoft.Insights/diagnosticSettings](/azure/templates/microsoft.insights/diagnosticsettings?tabs=bicep).
29
28
30
-
When creating diagnostic settings in Bicep, you need to apply the scope of the diagnostic setting. The diagnostic setting can be applied at the management, subscription, or resource group level. [Use the scope property on this resource to set the scope for this resource](../../azure-resource-manager/bicep/scope-extension-resources.md).
29
+
When creating diagnostic settings in Bicep, you need to apply the scope of the diagnostic setting. The diagnostic setting can be applied at the management, subscription, or resource group level. [Use the scope property on this resource to set the scope for this resource](../../azure-resource-manager/bicep/scope-extension-resources.md).
31
30
32
31
Consider the following example:
33
32
@@ -87,7 +86,7 @@ Metric alerts notify you when one of your metrics crosses a defined threshold. Y
87
86
88
87
The [Azure activity log](../../azure-monitor/essentials/activity-log.md) is a platform log in Azure that provides insights into events at the subscription level. This includes information such as when a resource in Azure is modified.
89
88
90
-
Activity log alerts are alerts that are activated when a new activity log event occurs that matches the conditions that are specified in the alert.
89
+
Activity log alerts are alerts that are activated when a new activity log event occurs that matches the conditions that are specified in the alert.
91
90
92
91
You can use the `scope` property within the type [Microsoft.Insights/activityLogAlerts](/azure/templates/microsoft.insights/activitylogalerts?tabs=bicep) to create activity log alerts on a specific resource or a list of resources using the resource IDs as a prefix.
93
92
@@ -120,11 +119,11 @@ For more information about creating dashboards with code, see [Programmatically
120
119
121
120
## Autoscale rules
122
121
123
-
To create an autoscaling setting, you define these using the resource type [Microsoft.Insights/autoscaleSettings](/azure/templates/microsoft.insights/autoscalesettings?tabs=bicep).
122
+
To create an autoscaling setting, you define these using the resource type [Microsoft.Insights/autoscaleSettings](/azure/templates/microsoft.insights/autoscalesettings?tabs=bicep).
124
123
125
124
To target the resource that you want to apply the autoscaling setting to, you need to provide the target resource identifier of the resource that the setting should be added to.
126
125
127
-
In this example, a *scale out* condition for the App Service plan based on the average CPU percentage over a 10 minute time period. If the App Service plan exceeds 70% average CPU consumption over 10 minutes, the autoscale engine scales out the plan by adding one instance.
126
+
In this example, a *scale out* condition for the App Service plan based on the average CPU percentage over a 10 minute time period. If the App Service plan exceeds 70% average CPU consumption over 10 minutes, the autoscale engine scales out the plan by adding one instance.
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/templates/template-tutorial-create-first-template.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,7 +117,7 @@ az account set --subscription SubscriptionName
117
117
118
118
## Create resource group
119
119
120
-
When you deploy a template, you can specify a resource group to contain the resources. Before running the deployment command, create the resource group with either the Bash Azure CLI or Azure PowerShell.
120
+
When you deploy a template, you can specify a resource group to contain the resources. Before running the deployment command, create the resource group with either the Bash Azure CLI or Azure PowerShell.
121
121
122
122
> [!NOTE]
123
123
> Samples for the Azure CLI are written for the bash shell. To run this sample in Windows PowerShell or the Command Prompt, you may need to remove the back slashes and write the command as one line such as:
@@ -52,7 +53,7 @@ More Azure Container Registry template samples can be found in the [quickstart t
52
53
***Region**: select a location for the resource group. Example: **Central US**.
53
54
***Acr Name**: accept the generated name for the registry, or enter a name. It must be globally unique.
54
55
***Acr Admin User Enabled**: accept the default value.
55
-
***Location**: accept the generated location for the registry's home replica, or enter a location such as **Central US**.
56
+
***Location**: accept the generated location for the registry's home replica, or enter a location such as **Central US**.
56
57
***Acr Sku**: accept the default value.
57
58
***Acr Replica Location**: enter a location for the registry replica, using the region's short name. It must be different from the home registry location. Example: **westeurope**.
Copy file name to clipboardExpand all lines: articles/private-5g-core/deploy-private-mobile-network-with-site-arm-template.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,10 +2,11 @@
2
2
title: Deploy a private mobile network and site - ARM template
3
3
titleSuffix: Azure Private 5G Core
4
4
description: Learn how to deploy a private mobile network and site using an Azure Resource Manager template (ARM template).
5
-
services: azure-resource-manager
5
+
services: azure-resource-manager
6
6
author: djrmetaswitch
7
7
ms.author: drichards
8
-
ms.service: azure-resource-manager
8
+
ms.service: private-5g-core
9
+
tags: azure-resource-manager
9
10
ms.topic: quickstart
10
11
ms.custom: subject-armqs, devx-track-arm-template
11
12
ms.date: 03/23/2022
@@ -62,7 +63,7 @@ The following Azure resources are defined in the template.
62
63
63
64
1. Select or enter the following values, using the information you retrieved in [Prerequisites](#prerequisites).
64
65
65
-
66
+
66
67
|Field |Value |
67
68
|---------|---------|
68
69
|**Subscription**| Select the Azure subscription you want to use to create your private mobile network. |
@@ -85,11 +86,11 @@ The following Azure resources are defined in the template.
85
86
|**User Plane Data Interface Name**| Enter the virtual network name on port 6 on your Azure Stack Edge Pro device corresponding to the user plane interface on the data network. For 5G, this interface is the N6 interface; for 4G, it's the SGi interface. |
86
87
|**User Equipment Address Pool Prefix**| Enter the network address of the subnet from which dynamic IP addresses must be allocated to User Equipment (UEs) in CIDR notation. You can omit this if you don't want to support dynamic IP address allocation. |
87
88
|**User Equipment Static Address Pool Prefix**| Enter the network address of the subnet from which static IP addresses must be allocated to User Equipment (UEs) in CIDR notation. You can omit this if you don't want to support static IP address allocation. |
88
-
|**Data Network Name**| Enter the name of the data network. |
89
+
|**Data Network Name**| Enter the name of the data network. |
89
90
|**Core Network Technology**| Enter *5GC* for 5G, or *EPC* for 4G. |
90
91
|**Napt Enabled**| Set this field depending on whether Network Address and Port Translation (NAPT) should be enabled for the data network.|
91
92
|**Dns Addresses**| Enter the DNS server addresses. You should only omit this if you don't need the UEs to perform DNS resolution, or if all UEs in the network will use their own locally configured DNS servers. |
92
-
|**Custom Location**| Enter the resource ID of the custom location that targets the Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) cluster on the Azure Stack Edge Pro device in the site.|
93
+
|**Custom Location**| Enter the resource ID of the custom location that targets the Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) cluster on the Azure Stack Edge Pro device in the site.|
93
94
94
95
2. Select **Review + create**.
95
96
3. Azure will now validate the configuration values you've entered. You should see a message indicating that your values have passed validation.
@@ -113,9 +114,9 @@ The following Azure resources are defined in the template.
113
114
- A **Packet Core Control Plane** resource representing the control plane function of the packet core instance in the site.
114
115
- A **Packet Core Data Plane** resource representing the data plane function of the packet core instance in the site.
115
116
- An **Attached Data Network** resource representing the site's view of the data network.
116
-
- A **Service** resource representing the default service.
117
+
- A **Service** resource representing the default service.
117
118
- A **SIM Policy** resource representing the allow-all SIM policy.
118
-
- A **SIM Group** resource (if you provisioned any SIMs).
119
+
- A **SIM Group** resource (if you provisioned any SIMs).
119
120
120
121
:::image type="content" source="media/create-full-private-5g-core-deployment-arm-template/full-deployment-resource-group.png" alt-text="Screenshot of the Azure portal showing a resource group containing the resources for a full Azure Private 5G Core deployment." lightbox="media/create-full-private-5g-core-deployment-arm-template/full-deployment-resource-group.png":::
Copy file name to clipboardExpand all lines: articles/synapse-analytics/sql-data-warehouse/quickstart-arm-template.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,9 @@ title: Create a dedicated SQL pool (formerly SQL DW) by using Azure Resource Man
3
3
description: Learn how to create an Azure Synapse Analytics SQL pool by using Azure Resource Manager template.
4
4
services: azure-resource-manager
5
5
author: WilliamDAssafMSFT
6
-
ms.service: azure-resource-manager
6
+
ms.service: synapse-analytics
7
+
ms.subservice: sql-dw
8
+
tags: azure-resource-manager
7
9
ms.topic: quickstart
8
10
ms.author: wiassaf
9
11
ms.date: 06/09/2020
@@ -37,7 +39,7 @@ The template defines one resource:
37
39
## Deploy the template
38
40
39
41
1. Select the following image to sign in to Azure and open the template. This template creates a dedicated SQL pool (formerly SQL DW).
40
-
42
+
41
43
[](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.sql%2Fsql-data-warehouse-transparent-encryption-create%2Fazuredeploy.json)
42
44
43
45
1. Enter or update the following values:
@@ -49,7 +51,7 @@ The template defines one resource:
49
51
***SQL Administrator login**: Enter the administrator username for the SQL Server.
50
52
***SQL Administrator password**: Enter the administrator password for the SQL Server.
51
53
***Data Warehouse Name**: Enter a dedicated SQL pool name.
52
-
***Transparent Data Encryption**: Accept the default, enabled.
54
+
***Transparent Data Encryption**: Accept the default, enabled.
53
55
***Service Level Objective**: Accept the default, DW400c.
54
56
***Location**: Accept the default location of the resource group.
55
57
***Review and Create**: Select.
@@ -64,7 +66,7 @@ You can either use the Azure portal to check the deployed resources, or use Azur
64
66
```azurecli-interactive
65
67
echo "Enter the resource group where your dedicated SQL pool (formerly SQL DW) exists:" &&
66
68
read resourcegroupName &&
67
-
az resource list --resource-group $resourcegroupName
69
+
az resource list --resource-group $resourcegroupName
0 commit comments