Skip to content

Commit cce4aa4

Browse files
committed
refresh articles
1 parent 500bb77 commit cce4aa4

File tree

6 files changed

+69
-65
lines changed

6 files changed

+69
-65
lines changed

articles/azure-resource-manager/templates/child-resource-name-type.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Child resources in templates
33
description: Describes how to set the name and type for child resources in an Azure Resource Manager template (ARM template).
44
ms.topic: conceptual
55
ms.custom: devx-track-arm-template
6-
ms.date: 06/20/2024
6+
ms.date: 07/23/2025
77
---
88

99
# Set name and type for child resources
@@ -47,7 +47,7 @@ The following example shows a virtual network and with a subnet. Notice that the
4747
"resources": [
4848
{
4949
"type": "Microsoft.Network/virtualNetworks",
50-
"apiVersion": "2022-11-01",
50+
"apiVersion": "2024-07-01",
5151
"name": "VNet1",
5252
"location": "[parameters('location')]",
5353
"properties": {
@@ -60,7 +60,7 @@ The following example shows a virtual network and with a subnet. Notice that the
6060
"resources": [
6161
{
6262
"type": "subnets",
63-
"apiVersion": "2022-11-01",
63+
"apiVersion": "2024-07-01",
6464
"name": "Subnet1",
6565
"dependsOn": [
6666
"VNet1"
@@ -106,7 +106,7 @@ The following example shows a virtual network and subnet that are both defined a
106106
"resources": [
107107
{
108108
"type": "Microsoft.Network/virtualNetworks",
109-
"apiVersion": "2022-11-01",
109+
"apiVersion": "2024-07-01",
110110
"name": "VNet1",
111111
"location": "[parameters('location')]",
112112
"properties": {
@@ -119,7 +119,7 @@ The following example shows a virtual network and subnet that are both defined a
119119
},
120120
{
121121
"type": "Microsoft.Network/virtualNetworks/subnets",
122-
"apiVersion": "2022-11-01",
122+
"apiVersion": "2024-07-01",
123123
"name": "VNet1/Subnet1",
124124
"dependsOn": [
125125
"VNet1"

articles/azure-resource-manager/templates/conditional-resource-deployment.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Conditional deployment with templates
33
description: Describes how to conditionally deploy a resource in an Azure Resource Manager template (ARM template).
44
ms.topic: conceptual
55
ms.custom: devx-track-arm-template
6-
ms.date: 06/20/2024
6+
ms.date: 07/23/2025
77
---
88

99
# Conditional deployment in ARM templates
@@ -26,17 +26,21 @@ You can pass in a parameter value that indicates whether a resource is deployed.
2626
"contentVersion": "1.0.0.0",
2727
"parameters": {
2828
"deployZone": {
29-
"type": "bool"
29+
"type": "bool",
30+
"defaultValue": true
3031
}
3132
},
3233
"functions": [],
3334
"resources": [
3435
{
3536
"condition": "[parameters('deployZone')]",
3637
"type": "Microsoft.Network/dnsZones",
37-
"apiVersion": "2018-05-01",
38+
"apiVersion": "2024-07-01-preview",
3839
"name": "myZone",
39-
"location": "global"
40+
"location": "global",
41+
"properties": {
42+
"zoneType": "Public"
43+
}
4044
}
4145
]
4246
}
@@ -73,7 +77,7 @@ You can use conditional deployment to create a new resource or use an existing o
7377
{
7478
"condition": "[equals(parameters('newOrExisting'), 'new')]",
7579
"type": "Microsoft.Storage/storageAccounts",
76-
"apiVersion": "2022-09-01",
80+
"apiVersion": "2025-01-01",
7781
"name": "[parameters('storageAccountName')]",
7882
"location": "[parameters('location')]",
7983
"sku": {
@@ -84,7 +88,7 @@ You can use conditional deployment to create a new resource or use an existing o
8488
{
8589
"condition": "[equals(parameters('newOrExisting'), 'existing')]",
8690
"type": "Microsoft.Storage/storageAccounts",
87-
"apiVersion": "2022-09-01",
91+
"apiVersion": "2025-01-01",
8892
"name": "[parameters('storageAccountName')]"
8993
}
9094
],

articles/azure-resource-manager/templates/copy-outputs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Define multiple instances of an output value
33
description: Use copy operation in an Azure Resource Manager template (ARM template) to iterate multiple times when returning a value from a deployment.
44
ms.topic: how-to
55
ms.custom: devx-track-arm-template
6-
ms.date: 06/20/2024
6+
ms.date: 07/23/2025
77
---
88

99
# Output iteration in ARM templates
@@ -71,7 +71,7 @@ The following example creates a variable number of storage accounts and returns
7171
"count": "[parameters('storageCount')]"
7272
},
7373
"type": "Microsoft.Storage/storageAccounts",
74-
"apiVersion": "2022-09-01",
74+
"apiVersion": "2025-01-01",
7575
"name": "[format('{0}{1}', copyIndex(), variables('baseName'))]",
7676
"location": "[parameters('location')]",
7777
"sku": {
@@ -128,7 +128,7 @@ The next example returns three properties from the new storage accounts.
128128
"count": "[length(range(0, parameters('storageCount')))]"
129129
},
130130
"type": "Microsoft.Storage/storageAccounts",
131-
"apiVersion": "2022-09-01",
131+
"apiVersion": "2025-01-01",
132132
"name": "[format('{0}{1}', range(0, parameters('storageCount'))[copyIndex()], variables('baseName'))]",
133133
"location": "[parameters('location')]",
134134
"sku": {

articles/azure-resource-manager/templates/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.author: jgao
1111
ms.subservice: templates
1212
ms.topic: landing-page
13-
ms.date: 06/20/2024
13+
ms.date: 07/23/2025
1414

1515
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
1616

articles/azure-resource-manager/templates/key-vault-parameter.md

Lines changed: 49 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Key Vault secret with template
33
description: Shows how to pass a secret from a key vault as a parameter during deployment.
44
ms.topic: how-to
5-
ms.date: 06/20/2024
5+
ms.date: 07/23/2025
66
ms.custom: devx-track-azurepowershell, devx-track-azurecli
77
---
88

@@ -108,51 +108,51 @@ For other users, grant the `Microsoft.KeyVault/vaults/deploy/action` permission.
108108

109109
1. Create a custom role definition JSON file:
110110

111-
```json
112-
{
113-
"Name": "Key Vault resource manager template deployment operator",
114-
"IsCustom": true,
115-
"Description": "Lets you deploy a resource manager template with the access to the secrets in the Key Vault.",
116-
"Actions": [
117-
"Microsoft.KeyVault/vaults/deploy/action"
118-
],
119-
"NotActions": [],
120-
"DataActions": [],
121-
"NotDataActions": [],
122-
"AssignableScopes": [
123-
"/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e"
124-
]
125-
}
126-
```
127-
128-
Replace "00000000-0000-0000-0000-000000000000" with the subscription ID.
129-
130-
2. Create the new role using the JSON file:
131-
132-
# [Azure CLI](#tab/azure-cli)
133-
134-
```azurecli-interactive
135-
az role definition create --role-definition "<path-to-role-file>"
136-
az role assignment create \
137-
--role "Key Vault resource manager template deployment operator" \
138-
--scope /subscriptions/<Subscription-id>/resourceGroups/<resource-group-name> \
139-
--assignee <user-principal-name> \
140-
--resource-group ExampleGroup
141-
```
142-
143-
# [PowerShell](#tab/azure-powershell)
144-
145-
```azurepowershell-interactive
146-
New-AzRoleDefinition -InputFile "<path-to-role-file>"
147-
New-AzRoleAssignment `
148-
-ResourceGroupName ExampleGroup `
149-
-RoleDefinitionName "Key Vault resource manager template deployment operator" `
150-
-SignInName <user-principal-name>
151-
```
152-
153-
---
154-
155-
The samples assign the custom role to the user on the resource group level.
111+
```json
112+
{
113+
"Name": "Key Vault resource manager template deployment operator",
114+
"IsCustom": true,
115+
"Description": "Lets you deploy a resource manager template with the access to the secrets in the Key Vault.",
116+
"Actions": [
117+
"Microsoft.KeyVault/vaults/deploy/action"
118+
],
119+
"NotActions": [],
120+
"DataActions": [],
121+
"NotDataActions": [],
122+
"AssignableScopes": [
123+
"/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e"
124+
]
125+
}
126+
```
127+
128+
Replace "00000000-0000-0000-0000-000000000000" with the subscription ID.
129+
130+
1. Create the new role using the JSON file:
131+
132+
# [Azure CLI](#tab/azure-cli)
133+
134+
```azurecli-interactive
135+
az role definition create --role-definition "<path-to-role-file>"
136+
az role assignment create \
137+
--role "Key Vault resource manager template deployment operator" \
138+
--scope /subscriptions/<Subscription-id>/resourceGroups/<resource-group-name> \
139+
--assignee <user-principal-name> \
140+
--resource-group ExampleGroup
141+
```
142+
143+
# [PowerShell](#tab/azure-powershell)
144+
145+
```azurepowershell-interactive
146+
New-AzRoleDefinition -InputFile "<path-to-role-file>"
147+
New-AzRoleAssignment `
148+
-ResourceGroupName ExampleGroup `
149+
-RoleDefinitionName "Key Vault resource manager template deployment operator" `
150+
-SignInName <user-principal-name>
151+
```
152+
153+
---
154+
155+
The samples assign the custom role to the user on the resource group level.
156156

157157
When using a key vault with the template for a [Managed Application](../managed-applications/overview.md), you must grant access to the **Appliance Resource Provider** service principal. For more information, see [Access Key Vault secret when deploying Azure Managed Applications](../managed-applications/key-vault-access.md).
158158

@@ -188,7 +188,7 @@ The following template deploys a SQL server that includes an administrator passw
188188
"resources": [
189189
{
190190
"type": "Microsoft.Sql/servers",
191-
"apiVersion": "2021-11-01",
191+
"apiVersion": "2024-05-01-preview",
192192
"name": "[parameters('sqlServerName')]",
193193
"location": "[parameters('location')]",
194194
"properties": {
@@ -312,7 +312,7 @@ The following template dynamically creates the key vault ID and passes it as a p
312312
"resources": [
313313
{
314314
"type": "Microsoft.Resources/deployments",
315-
"apiVersion": "2020-10-01",
315+
"apiVersion": "2025-04-01",
316316
"name": "dynamicSecret",
317317
"properties": {
318318
"mode": "Incremental",
@@ -339,7 +339,7 @@ The following template dynamically creates the key vault ID and passes it as a p
339339
"resources": [
340340
{
341341
"type": "Microsoft.Sql/servers",
342-
"apiVersion": "2021-11-01",
342+
"apiVersion": "2024-05-01-preview",
343343
"name": "[variables('sqlServerName')]",
344344
"location": "[parameters('location')]",
345345
"properties": {

articles/azure-resource-manager/templates/template-spec-convert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Convert portal template to template spec
33
description: Describes how to convert an existing template in the Azure portal gallery to a template specs.
44
ms.topic: how-to
5-
ms.date: 06/20/2024
5+
ms.date: 07/23/2025
66
---
77

88
# Convert template gallery in portal to template specs

0 commit comments

Comments
 (0)