Skip to content

Commit a91428c

Browse files
authored
Merge pull request #314894 from mukesh-dua/release-microsoft-discovery
Release microsoft discovery - resync with main
2 parents 29c697b + f21b730 commit a91428c

38 files changed

Lines changed: 157 additions & 49 deletions

articles/api-management/api-management-howto-api-inspector.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,8 @@ Detailed steps follow.
8585

8686
> [!NOTE]
8787
>
88-
> - These steps require API Management REST API version 2023-05-01-preview or later. You must be assigned the Contributor or higher role on the API Management instance to call the REST API.
88+
> - These steps require API Management REST API version 2023-05-01-preview or later.
89+
> - You must be assigned the Contributor or higher role on the API Management instance or have equivalent write permissions on the API to obtain a debug token.
8990
> - For information about authenticating to the REST API, see [Azure REST API reference](/rest/api/azure).
9091
9192
1. **Obtain a debug token**. Call the API Management gateway's [List debug credentials](/rest/api/apimanagement/gateway/list-debug-credentials) API. In the URI, enter *managed* for the instance's managed gateway in the cloud, or the gateway ID for a self-hosted gateway. For example, to obtain trace credentials for the instance's managed gateway, use a request similar to the following example:

articles/api-management/configure-service-update-settings.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ description: Learn how to configure settings for applying service updates to you
44
author: dlepow
55
ms.service: azure-api-management
66
ms.topic: how-to
7-
ms.date: 11/25/2025
7+
ms.date: 04/13/2026
88
ms.author: danlep
99
---
1010

1111
# Configure service update settings for your API Management instances
1212

13-
[!INCLUDE [api-management-availability-premium-standard-basic](../../includes/api-management-availability-premium-standard-basic.md)]
13+
[!INCLUDE [api-management-availability-premium-dev-standard-basic](../../includes/api-management-availability-premium-dev-standard-basic.md)]
1414

1515

1616
This article shows you how to configure *service update* settings (preview) in your API Management instance. Azure periodically applies service updates automatically to API Management instances by using a phased rollout approach. These updates include new features, security enhancements, and reliability improvements.
@@ -25,8 +25,8 @@ An update group (also called a *release channel*) is a set of instances that rec
2525
|--------------|-------------|
2626
| **AI Gateway Early** (GenAI release channel) | Gets early access to the latest [AI gateway features and updates](genai-gateway-capabilities.md) before they reach other update groups.<br/><br/>Combines the most stable mainline service updates with the newest AI-specific features. Receives other service updates as part of the **Late** update group, enabling faster deployment of AI-related capabilities. |
2727
| **Early** | Receives updates early in the rollout, for testing and early access to new features. This option isn't recommended for production deployments. |
28-
| **Default** | Receives updates as part of the regular release rollout. This option is recommended for most services, including production deployments. |
29-
| **Late** | Receives updates later than the previous groups, typically weeks after the initial rollout. This option is recommended for mission-critical deployments only. |
28+
| **Default** | Receives updates as part of the regular release rollout. This option is recommended for most services, including production deployments. *Not available in Developer tier*.|
29+
| **Late** | Receives updates later than the previous groups, typically weeks after the initial rollout. This option is recommended for mission-critical deployments only. *Not available in Developer tier*.|
3030

3131

3232
> [!NOTE]

articles/azure-resource-manager/bicep/bicep-functions-resource.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: reference
55
ms.custom:
66
- devx-track-bicep
77
- build-2025
8-
ms.date: 12/22/2025
8+
ms.date: 04/17/2026
99
---
1010

1111
# Resource functions for Bicep
@@ -661,6 +661,48 @@ output storageID string = storageAccount.id
661661

662662
For more information, see the [JSON template resourceId function](../templates/template-functions-resource.md#resourceid).
663663

664+
## roleDefinitions
665+
666+
`roleDefinisions(roleName)`
667+
668+
Returns information about the specified role definition, including `id` and `roleDefinitionId`. It's a name-based helper for Azure RBAC role assignments. Instead of requiring you to hardcode the GUID of a built-in role definition (like Contributor, Reader, and others), it lets you provide the built-in role’s display name, and the function resolves the corresponding role definition information at deployment time.
669+
670+
Namespace: [az](bicep-functions.md#namespaces-for-functions).
671+
672+
### Parameters
673+
674+
| Parameter | Required | Type | Description |
675+
|:--- |:--- |:--- |:--- |
676+
| roleName | Yes | string | The display name of the role definition. |
677+
678+
### Return value
679+
680+
An object representing the role definition, including `id` and `roleDefinitionId`.
681+
682+
### Examples
683+
684+
The following Bicep code creates a deterministic Azure RBAC role assignment that grants a specified principal the **Storage Blob Data Reader** built‑in role at the deployment scope by resolving the role definition by name at deployment time.
685+
686+
```bicep
687+
@description('Specifies the role definition ID used in the role assignment.')
688+
param roleDefinitionName string = 'Storage Blob Data Reader'
689+
690+
@description('Specifies the principal ID assigned to the role.')
691+
param principalId string
692+
693+
var roleAssignmentName= guid(principalId, roleDefinitionName, resourceGroup().id)
694+
resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = {
695+
name: roleAssignmentName
696+
properties: {
697+
roleDefinitionId: roleDefinitions(roleDefinitionName).id
698+
principalId: principalId
699+
}
700+
}
701+
702+
```
703+
704+
For more information, see the [JSON template resourceId function](../templates/template-functions-resource.md#roledefinitions).
705+
664706
## subscriptionResourceId
665707

666708
`subscriptionResourceId([subscriptionId], resourceType, resourceName1, [resourceName2], ...)`

articles/azure-resource-manager/bicep/bicep-functions.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Bicep functions overview
33
description: Learn about the functions that can be used in a Bicep file to retrieve values, work with strings and numerics, and retrieve deployment information.
44
ms.topic: reference
5-
ms.date: 09/11/2025
5+
ms.date: 04/17/2026
66
ms.custom:
77
- devx-track-bicep
88
- build-2025
@@ -158,6 +158,7 @@ The following functions are available for getting resource values. Most of these
158158
* [providers (deprecated)](./bicep-functions-resource.md#providers)
159159
* [reference](./bicep-functions-resource.md#reference)
160160
* [resourceId](./bicep-functions-resource.md#resourceid) - This can be used at any scope, but the valid parameters change depending on the scope.
161+
* [roleDefinitions](./bicep-functions-resource.md#roledefinitions)
161162
* [subscriptionResourceId](./bicep-functions-resource.md#subscriptionresourceid)
162163
* [tenantResourceId](./bicep-functions-resource.md#tenantresourceid)
163164
* [toLogicalZone](./bicep-functions-resource.md#tologicalzone)

articles/azure-resource-manager/bicep/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@ items:
355355
displayName: externalInput,getSecret,readEnvironmentVariable
356356
href: bicep-functions-parameters-file.md
357357
- name: Resource functions
358-
displayName: extensionResourceId,getSecret,listAccountSas,ListKeys,listSecrets,list,managementGroupResourceId,pickZones,providers,reference,resourceId,subscriptionResourceId,tenantResourceId,toLogicalZone,toLogicalZones,toPhysicalZone,toPhysicalZones
358+
displayName: extensionResourceId,getSecret,listAccountSas,ListKeys,listSecrets,list,managementGroupResourceId,pickZones,providers,reference,resourceId,roleDefinitions,subscriptionResourceId,tenantResourceId,toLogicalZone,toLogicalZones,toPhysicalZone,toPhysicalZones
359359
href: bicep-functions-resource.md
360360
- name: Scope functions
361361
displayName: managementGroup,resourceGroup,subscription,tenant

articles/azure-resource-manager/templates/template-functions-resource.md

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1258,6 +1258,66 @@ The output of default values from the preceding example is:
12581258
| differentSubOutput | String | /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/otherResourceGroup/providers/Microsoft.Storage/storageAccounts/examplestorage |
12591259
| nestedResourceOutput | String | /subscriptions/{current-sub-id}/resourceGroups/examplegroup/providers/Microsoft.SQL/servers/serverName/databases/databaseName |
12601260

1261+
## roleDefinitions
1262+
1263+
`roleDefinisions(roleName)`
1264+
1265+
Returns information about the specified role definition, including `id` and `roleDefinitionId`. It's a name-based helper for Azure RBAC role assignments. Instead of requiring you to hardcode the GUID of a built-in role definition (like Contributor, Reader, and others), it lets you provide the built-in role’s display name, and the function resolves the corresponding role definition information at deployment time.
1266+
1267+
In Bicep, use the [roleDefinitions](../bicep/bicep-functions-resource.md#roledefinitions) function.
1268+
1269+
### Parameters
1270+
1271+
| Parameter | Required | Type | Description |
1272+
|:--- |:--- |:--- |:--- |
1273+
| roleName | Yes | string | The display name of the role definition. |
1274+
1275+
### Return value
1276+
1277+
An object representing the role definition, including `id` and `roleDefinitionId`.
1278+
1279+
### Examples
1280+
1281+
The following ARM template creates a deterministic Azure RBAC role assignment that grants a specified principal the **Storage Blob Data Reader** built‑in role at the deployment scope by resolving the role definition by name at deployment time.
1282+
1283+
```json
1284+
{
1285+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
1286+
"contentVersion": "1.0.0.0",
1287+
"parameters": {
1288+
"roleDefinitionName": {
1289+
"type": "string",
1290+
"defaultValue": "Storage Blob Data Reader",
1291+
"metadata": {
1292+
"description": "Specifies the role definition ID used in the role assignment."
1293+
}
1294+
},
1295+
"principalId": {
1296+
"type": "string",
1297+
"metadata": {
1298+
"description": "Specifies the principal ID assigned to the role."
1299+
}
1300+
}
1301+
},
1302+
"variables": {
1303+
"roleAssignmentName": "[guid(parameters('principalId'), parameters('roleDefinitionName'), resourceGroup().id)]"
1304+
},
1305+
"resources": [
1306+
{
1307+
"type": "Microsoft.Authorization/roleAssignments",
1308+
"apiVersion": "2022-04-01",
1309+
"name": "[variables('roleAssignmentName')]",
1310+
"properties": {
1311+
"roleDefinitionId": "[roleDefinitions(parameters('roleDefinitionName')).id]",
1312+
"principalId": "[parameters('principalId')]"
1313+
}
1314+
}
1315+
]
1316+
}
1317+
```
1318+
1319+
For more information, see the [Bicep roleDefinition function](../bicep/bicep-functions-resource.md#roledefinitions).
1320+
12611321
## subscription
12621322

12631323
See the [`subscription` scope](template-functions-scope.md#subscription) function for more information.

articles/azure-resource-manager/templates/template-functions.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Template functions
33
description: Describes the functions to use in an Azure Resource Manager template (ARM template) to retrieve values, work with strings and numerics, and retrieve deployment information.
44
ms.topic: reference
55
ms.custom: devx-track-arm-template
6-
ms.date: 07/10/2025
6+
ms.date: 04/17/2026
77
---
88

99
# ARM template functions
@@ -262,6 +262,7 @@ Resource Manager provides the following functions for getting resource values:
262262
* [reference](template-functions-resource.md#reference)
263263
* [references](template-functions-resource.md#references)
264264
* [resourceId](template-functions-resource.md#resourceid) - can be used at any scope, but the valid parameters change depending on the scope.
265+
* [roleDefinitions](template-functions-resource.md#roledefinitions)
265266
* [subscriptionResourceId](template-functions-resource.md#subscriptionresourceid)
266267
* [tenantResourceId](template-functions-resource.md#tenantresourceid)
267268

articles/microsoft-discovery/concept-observability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ Logs are typically available in Log Analytics within a few seconds of the event.
126126
- [Query workspace logs](how-to-query-workspace-logs.md)
127127
- [Query CogLoop logs](how-to-query-cognitive-loop-logs.md)
128128
- [Query supercomputer logs](how-to-query-supercomputer-logs.md)
129-
- [Query bookshelf knowledgebase query logs](how-to-query-bookshelf-query-logs.md)
129+
- [Query bookshelf knowledgebase query logs](how-to-query-bookshelf-logs.md)
130130
- [Query bookshelf indexing logs](how-to-query-bookshelf-indexing-logs.md)
131131
- [View activity logs for Microsoft Discovery resources](how-to-view-activity-logs.md)
132132
- [Enable audit logging for Microsoft Discovery resources](how-to-enable-audit-logging.md)

articles/microsoft-discovery/how-to-access-resource-logs.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@ Each Microsoft Discovery resource—workspace, supercomputer, or bookshelf—has
4747
3. On the bookshelf overview page, locate the **Managed Resource Group** field. It appears under the **Essentials** section.
4848
4. Select the link to open the Managed Resource Group.
4949

50+
---
51+
5052
## Open the Log Analytics workspace
5153

5254
After you navigate to the MRG:
@@ -85,5 +87,5 @@ Now that you can access the Log Analytics workspace, query logs for your specifi
8587
- [Query workspace logs](how-to-query-workspace-logs.md)
8688
- [Query CogLoop logs](how-to-query-cognitive-loop-logs.md)
8789
- [Query supercomputer logs](how-to-query-supercomputer-logs.md)
88-
- [Query bookshelf knowledgebase query logs](how-to-query-bookshelf-query-logs.md)
90+
- [Query bookshelf knowledgebase query logs](how-to-query-bookshelf-logs.md)
8991
- [Query bookshelf indexing logs](how-to-query-bookshelf-indexing-logs.md)
File renamed without changes.

0 commit comments

Comments
 (0)