Skip to content

Commit c7f68d0

Browse files
authored
Merge pull request #115924 from DCtheGeek/dmc-gov-apiversionupdates
Updating REST URIs to use latest api-versions
2 parents 8c8d5b0 + ba5fd01 commit c7f68d0

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

articles/governance/blueprints/create-blueprint-rest-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ $authHeader = @{
5050
}
5151
5252
# Invoke the REST API
53-
$restUri = 'https://management.azure.com/subscriptions/{subscriptionId}?api-version=2016-06-01'
53+
$restUri = 'https://management.azure.com/subscriptions/{subscriptionId}?api-version=2020-01-01'
5454
$response = Invoke-RestMethod -Uri $restUri -Method Get -Headers $authHeader
5555
```
5656

articles/governance/management-groups/manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -383,7 +383,7 @@ New-AzRoleAssignment -Scope "/providers/Microsoft.Management/managementGroups/Co
383383
The same scope path is used when retrieving a policy definition at a management group.
384384

385385
```http
386-
GET https://management.azure.com/providers/Microsoft.Management/managementgroups/MyManagementGroup/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming?api-version=2018-05-01
386+
GET https://management.azure.com/providers/Microsoft.Management/managementgroups/MyManagementGroup/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming?api-version=2019-09-01
387387
```
388388

389389
## Next steps

articles/governance/policy/assign-policy-azurecli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Next, run the following command to get the resource IDs of the non-compliant res
8383
output into a JSON file:
8484

8585
```console
86-
armclient post "/subscriptions/<subscriptionID>/resourceGroups/<rgName>/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2019-09-01&$filter=IsCompliant eq false and PolicyAssignmentId eq '<policyAssignmentID>'&$apply=groupby((ResourceId))" > <json file to direct the output with the resource IDs into>
86+
armclient post "/subscriptions/<subscriptionID>/resourceGroups/<rgName>/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2019-10-01&$filter=IsCompliant eq false and PolicyAssignmentId eq '<policyAssignmentID>'&$apply=groupby((ResourceId))" > <json file to direct the output with the resource IDs into>
8787
```
8888

8989
Your results resemble the following example:

articles/governance/policy/concepts/definition-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -814,7 +814,7 @@ Policy, use one of the following methods:
814814
- REST API / ARMClient
815815

816816
```http
817-
GET https://management.azure.com/providers/?api-version=2017-08-01&$expand=resourceTypes/aliases
817+
GET https://management.azure.com/providers/?api-version=2019-10-01&$expand=resourceTypes/aliases
818818
```
819819

820820
### Understanding the [*] alias

articles/governance/policy/how-to/get-compliance-data.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ an example of summarization at the subscription level using Azure Policy Insight
271271
Subscription](/rest/api/policy-insights/policystates/summarizeforsubscription):
272272

273273
```http
274-
POST https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/summarize?api-version=2018-04-04
274+
POST https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/summarize?api-version=2019-10-01
275275
```
276276

277277
The output summarizes the subscription. In the example output below, the summarized compliance are
@@ -288,15 +288,15 @@ and the definition information for each assignment. Each policy object in the hi
288288
"@odata.id": null,
289289
"@odata.context": "https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/$metadata#summary/$entity",
290290
"results": {
291-
"queryResultsUri": "https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2018-04-04&$from=2018-05-18 04:28:22Z&$to=2018-05-19 04:28:22Z&$filter=IsCompliant eq false",
291+
"queryResultsUri": "https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2019-10-01&$from=2018-05-18 04:28:22Z&$to=2018-05-19 04:28:22Z&$filter=IsCompliant eq false",
292292
"nonCompliantResources": 15,
293293
"nonCompliantPolicies": 1
294294
},
295295
"policyAssignments": [{
296296
"policyAssignmentId": "/subscriptions/{subscriptionId}/resourcegroups/rg-tags/providers/microsoft.authorization/policyassignments/37ce239ae4304622914f0c77",
297297
"policySetDefinitionId": "",
298298
"results": {
299-
"queryResultsUri": "https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2018-04-04&$from=2018-05-18 04:28:22Z&$to=2018-05-19 04:28:22Z&$filter=IsCompliant eq false and PolicyAssignmentId eq '/subscriptions/{subscriptionId}/resourcegroups/rg-tags/providers/microsoft.authorization/policyassignments/37ce239ae4304622914f0c77'",
299+
"queryResultsUri": "https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2019-10-01&$from=2018-05-18 04:28:22Z&$to=2018-05-19 04:28:22Z&$filter=IsCompliant eq false and PolicyAssignmentId eq '/subscriptions/{subscriptionId}/resourcegroups/rg-tags/providers/microsoft.authorization/policyassignments/37ce239ae4304622914f0c77'",
300300
"nonCompliantResources": 15,
301301
"nonCompliantPolicies": 1
302302
},
@@ -305,7 +305,7 @@ and the definition information for each assignment. Each policy object in the hi
305305
"policyDefinitionId": "/providers/microsoft.authorization/policydefinitions/1e30110a-5ceb-460c-a204-c1c3969c6d62",
306306
"effect": "deny",
307307
"results": {
308-
"queryResultsUri": "https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2018-04-04&$from=2018-05-18 04:28:22Z&$to=2018-05-19 04:28:22Z&$filter=IsCompliant eq false and PolicyAssignmentId eq '/subscriptions/{subscriptionId}/resourcegroups/rg-tags/providers/microsoft.authorization/policyassignments/37ce239ae4304622914f0c77' and PolicyDefinitionId eq '/providers/microsoft.authorization/policydefinitions/1e30110a-5ceb-460c-a204-c1c3969c6d62'",
308+
"queryResultsUri": "https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2019-10-01&$from=2018-05-18 04:28:22Z&$to=2018-05-19 04:28:22Z&$filter=IsCompliant eq false and PolicyAssignmentId eq '/subscriptions/{subscriptionId}/resourcegroups/rg-tags/providers/microsoft.authorization/policyassignments/37ce239ae4304622914f0c77' and PolicyDefinitionId eq '/providers/microsoft.authorization/policydefinitions/1e30110a-5ceb-460c-a204-c1c3969c6d62'",
309309
"nonCompliantResources": 15
310310
}
311311
}]
@@ -327,7 +327,7 @@ PolicyStates we used **latest**, which automatically sets a **from** and **to**
327327
last 24-hours.
328328

329329
```http
330-
https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2018-04-04&$from=2018-05-18 04:28:22Z&$to=2018-05-19 04:28:22Z&$filter=IsCompliant eq false and PolicyAssignmentId eq '/subscriptions/{subscriptionId}/resourcegroups/rg-tags/providers/microsoft.authorization/policyassignments/37ce239ae4304622914f0c77' and PolicyDefinitionId eq '/providers/microsoft.authorization/policydefinitions/1e30110a-5ceb-460c-a204-c1c3969c6d62'
330+
https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2019-10-01&$from=2018-05-18 04:28:22Z&$to=2018-05-19 04:28:22Z&$filter=IsCompliant eq false and PolicyAssignmentId eq '/subscriptions/{subscriptionId}/resourcegroups/rg-tags/providers/microsoft.authorization/policyassignments/37ce239ae4304622914f0c77' and PolicyDefinitionId eq '/providers/microsoft.authorization/policydefinitions/1e30110a-5ceb-460c-a204-c1c3969c6d62'
331331
```
332332

333333
The example response below has been trimmed to a single non-compliant resource for brevity. The
@@ -378,7 +378,7 @@ _policy events_. Use the following Uri to view recent policy events associated w
378378
subscription.
379379

380380
```http
381-
https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyEvents/default/queryResults?api-version=2018-04-04
381+
https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyEvents/default/queryResults?api-version=2019-10-01
382382
```
383383

384384
Your results resemble the following example:

0 commit comments

Comments
 (0)