Skip to content

Commit e37a1e7

Browse files
author
Mukesh Dua
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into release-microsoft-discovery
2 parents 6cdc766 + c4a70ac commit e37a1e7

8 files changed

Lines changed: 117 additions & 10 deletions

File tree

articles/api-management/api-management-howto-api-inspector.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,8 @@ Detailed steps follow.
8585

8686
> [!NOTE]
8787
>
88-
> - These steps require API Management REST API version 2023-05-01-preview or later. You must be assigned the Contributor or higher role on the API Management instance to call the REST API.
88+
> - These steps require API Management REST API version 2023-05-01-preview or later.
89+
> - You must be assigned the Contributor or higher role on the API Management instance or have equivalent write permissions on the API to obtain a debug token.
8990
> - For information about authenticating to the REST API, see [Azure REST API reference](/rest/api/azure).
9091
9192
1. **Obtain a debug token**. Call the API Management gateway's [List debug credentials](/rest/api/apimanagement/gateway/list-debug-credentials) API. In the URI, enter *managed* for the instance's managed gateway in the cloud, or the gateway ID for a self-hosted gateway. For example, to obtain trace credentials for the instance's managed gateway, use a request similar to the following example:

articles/api-management/configure-service-update-settings.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ description: Learn how to configure settings for applying service updates to you
44
author: dlepow
55
ms.service: azure-api-management
66
ms.topic: how-to
7-
ms.date: 11/25/2025
7+
ms.date: 04/13/2026
88
ms.author: danlep
99
---
1010

1111
# Configure service update settings for your API Management instances
1212

13-
[!INCLUDE [api-management-availability-premium-standard-basic](../../includes/api-management-availability-premium-standard-basic.md)]
13+
[!INCLUDE [api-management-availability-premium-dev-standard-basic](../../includes/api-management-availability-premium-dev-standard-basic.md)]
1414

1515

1616
This article shows you how to configure *service update* settings (preview) in your API Management instance. Azure periodically applies service updates automatically to API Management instances by using a phased rollout approach. These updates include new features, security enhancements, and reliability improvements.
@@ -25,8 +25,8 @@ An update group (also called a *release channel*) is a set of instances that rec
2525
|--------------|-------------|
2626
| **AI Gateway Early** (GenAI release channel) | Gets early access to the latest [AI gateway features and updates](genai-gateway-capabilities.md) before they reach other update groups.<br/><br/>Combines the most stable mainline service updates with the newest AI-specific features. Receives other service updates as part of the **Late** update group, enabling faster deployment of AI-related capabilities. |
2727
| **Early** | Receives updates early in the rollout, for testing and early access to new features. This option isn't recommended for production deployments. |
28-
| **Default** | Receives updates as part of the regular release rollout. This option is recommended for most services, including production deployments. |
29-
| **Late** | Receives updates later than the previous groups, typically weeks after the initial rollout. This option is recommended for mission-critical deployments only. |
28+
| **Default** | Receives updates as part of the regular release rollout. This option is recommended for most services, including production deployments. *Not available in Developer tier*.|
29+
| **Late** | Receives updates later than the previous groups, typically weeks after the initial rollout. This option is recommended for mission-critical deployments only. *Not available in Developer tier*.|
3030

3131

3232
> [!NOTE]

articles/azure-resource-manager/bicep/bicep-functions-resource.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: reference
55
ms.custom:
66
- devx-track-bicep
77
- build-2025
8-
ms.date: 12/22/2025
8+
ms.date: 04/17/2026
99
---
1010

1111
# Resource functions for Bicep
@@ -661,6 +661,48 @@ output storageID string = storageAccount.id
661661

662662
For more information, see the [JSON template resourceId function](../templates/template-functions-resource.md#resourceid).
663663

664+
## roleDefinitions
665+
666+
`roleDefinisions(roleName)`
667+
668+
Returns information about the specified role definition, including `id` and `roleDefinitionId`. It's a name-based helper for Azure RBAC role assignments. Instead of requiring you to hardcode the GUID of a built-in role definition (like Contributor, Reader, and others), it lets you provide the built-in role’s display name, and the function resolves the corresponding role definition information at deployment time.
669+
670+
Namespace: [az](bicep-functions.md#namespaces-for-functions).
671+
672+
### Parameters
673+
674+
| Parameter | Required | Type | Description |
675+
|:--- |:--- |:--- |:--- |
676+
| roleName | Yes | string | The display name of the role definition. |
677+
678+
### Return value
679+
680+
An object representing the role definition, including `id` and `roleDefinitionId`.
681+
682+
### Examples
683+
684+
The following Bicep code creates a deterministic Azure RBAC role assignment that grants a specified principal the **Storage Blob Data Reader** built‑in role at the deployment scope by resolving the role definition by name at deployment time.
685+
686+
```bicep
687+
@description('Specifies the role definition ID used in the role assignment.')
688+
param roleDefinitionName string = 'Storage Blob Data Reader'
689+
690+
@description('Specifies the principal ID assigned to the role.')
691+
param principalId string
692+
693+
var roleAssignmentName= guid(principalId, roleDefinitionName, resourceGroup().id)
694+
resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = {
695+
name: roleAssignmentName
696+
properties: {
697+
roleDefinitionId: roleDefinitions(roleDefinitionName).id
698+
principalId: principalId
699+
}
700+
}
701+
702+
```
703+
704+
For more information, see the [JSON template resourceId function](../templates/template-functions-resource.md#roledefinitions).
705+
664706
## subscriptionResourceId
665707

666708
`subscriptionResourceId([subscriptionId], resourceType, resourceName1, [resourceName2], ...)`

articles/azure-resource-manager/bicep/bicep-functions.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Bicep functions overview
33
description: Learn about the functions that can be used in a Bicep file to retrieve values, work with strings and numerics, and retrieve deployment information.
44
ms.topic: reference
5-
ms.date: 09/11/2025
5+
ms.date: 04/17/2026
66
ms.custom:
77
- devx-track-bicep
88
- build-2025
@@ -158,6 +158,7 @@ The following functions are available for getting resource values. Most of these
158158
* [providers (deprecated)](./bicep-functions-resource.md#providers)
159159
* [reference](./bicep-functions-resource.md#reference)
160160
* [resourceId](./bicep-functions-resource.md#resourceid) - This can be used at any scope, but the valid parameters change depending on the scope.
161+
* [roleDefinitions](./bicep-functions-resource.md#roledefinitions)
161162
* [subscriptionResourceId](./bicep-functions-resource.md#subscriptionresourceid)
162163
* [tenantResourceId](./bicep-functions-resource.md#tenantresourceid)
163164
* [toLogicalZone](./bicep-functions-resource.md#tologicalzone)

articles/azure-resource-manager/bicep/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@ items:
355355
displayName: externalInput,getSecret,readEnvironmentVariable
356356
href: bicep-functions-parameters-file.md
357357
- name: Resource functions
358-
displayName: extensionResourceId,getSecret,listAccountSas,ListKeys,listSecrets,list,managementGroupResourceId,pickZones,providers,reference,resourceId,subscriptionResourceId,tenantResourceId,toLogicalZone,toLogicalZones,toPhysicalZone,toPhysicalZones
358+
displayName: extensionResourceId,getSecret,listAccountSas,ListKeys,listSecrets,list,managementGroupResourceId,pickZones,providers,reference,resourceId,roleDefinitions,subscriptionResourceId,tenantResourceId,toLogicalZone,toLogicalZones,toPhysicalZone,toPhysicalZones
359359
href: bicep-functions-resource.md
360360
- name: Scope functions
361361
displayName: managementGroup,resourceGroup,subscription,tenant

articles/azure-resource-manager/templates/template-functions-resource.md

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1258,6 +1258,66 @@ The output of default values from the preceding example is:
12581258
| differentSubOutput | String | /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/otherResourceGroup/providers/Microsoft.Storage/storageAccounts/examplestorage |
12591259
| nestedResourceOutput | String | /subscriptions/{current-sub-id}/resourceGroups/examplegroup/providers/Microsoft.SQL/servers/serverName/databases/databaseName |
12601260

1261+
## roleDefinitions
1262+
1263+
`roleDefinisions(roleName)`
1264+
1265+
Returns information about the specified role definition, including `id` and `roleDefinitionId`. It's a name-based helper for Azure RBAC role assignments. Instead of requiring you to hardcode the GUID of a built-in role definition (like Contributor, Reader, and others), it lets you provide the built-in role’s display name, and the function resolves the corresponding role definition information at deployment time.
1266+
1267+
In Bicep, use the [roleDefinitions](../bicep/bicep-functions-resource.md#roledefinitions) function.
1268+
1269+
### Parameters
1270+
1271+
| Parameter | Required | Type | Description |
1272+
|:--- |:--- |:--- |:--- |
1273+
| roleName | Yes | string | The display name of the role definition. |
1274+
1275+
### Return value
1276+
1277+
An object representing the role definition, including `id` and `roleDefinitionId`.
1278+
1279+
### Examples
1280+
1281+
The following ARM template creates a deterministic Azure RBAC role assignment that grants a specified principal the **Storage Blob Data Reader** built‑in role at the deployment scope by resolving the role definition by name at deployment time.
1282+
1283+
```json
1284+
{
1285+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
1286+
"contentVersion": "1.0.0.0",
1287+
"parameters": {
1288+
"roleDefinitionName": {
1289+
"type": "string",
1290+
"defaultValue": "Storage Blob Data Reader",
1291+
"metadata": {
1292+
"description": "Specifies the role definition ID used in the role assignment."
1293+
}
1294+
},
1295+
"principalId": {
1296+
"type": "string",
1297+
"metadata": {
1298+
"description": "Specifies the principal ID assigned to the role."
1299+
}
1300+
}
1301+
},
1302+
"variables": {
1303+
"roleAssignmentName": "[guid(parameters('principalId'), parameters('roleDefinitionName'), resourceGroup().id)]"
1304+
},
1305+
"resources": [
1306+
{
1307+
"type": "Microsoft.Authorization/roleAssignments",
1308+
"apiVersion": "2022-04-01",
1309+
"name": "[variables('roleAssignmentName')]",
1310+
"properties": {
1311+
"roleDefinitionId": "[roleDefinitions(parameters('roleDefinitionName')).id]",
1312+
"principalId": "[parameters('principalId')]"
1313+
}
1314+
}
1315+
]
1316+
}
1317+
```
1318+
1319+
For more information, see the [Bicep roleDefinition function](../bicep/bicep-functions-resource.md#roledefinitions).
1320+
12611321
## subscription
12621322

12631323
See the [`subscription` scope](template-functions-scope.md#subscription) function for more information.

articles/azure-resource-manager/templates/template-functions.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Template functions
33
description: Describes the functions to use in an Azure Resource Manager template (ARM template) to retrieve values, work with strings and numerics, and retrieve deployment information.
44
ms.topic: reference
55
ms.custom: devx-track-arm-template
6-
ms.date: 07/10/2025
6+
ms.date: 04/17/2026
77
---
88

99
# ARM template functions
@@ -262,6 +262,7 @@ Resource Manager provides the following functions for getting resource values:
262262
* [reference](template-functions-resource.md#reference)
263263
* [references](template-functions-resource.md#references)
264264
* [resourceId](template-functions-resource.md#resourceid) - can be used at any scope, but the valid parameters change depending on the scope.
265+
* [roleDefinitions](template-functions-resource.md#roledefinitions)
265266
* [subscriptionResourceId](template-functions-resource.md#subscriptionresourceid)
266267
* [tenantResourceId](template-functions-resource.md#tenantresourceid)
267268

articles/private-link/private-endpoint-dns.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-private-link
77
ms.custom:
88
- ignite-2024
99
ms.topic: concept-article
10-
ms.date: 08/04/2025
10+
ms.date: 04/17/2026
1111
# Customer intent: As a network administrator, I want to configure private DNS zone values for Azure services with private endpoints, so that I can ensure proper DNS resolution for secure connections within my network.
1212
---
1313

@@ -167,6 +167,7 @@ For Azure services, use the recommended zone names as described in the following
167167
> | Private link resource type | Subresource | Private DNS zone name | Public DNS zone forwarders |
168168
> |---|---|---|---|
169169
> | Azure Media Services (Microsoft.Media/mediaservices) | keydelivery </br> liveevent </br> streamingendpoint | privatelink.media.azure.net | media.azure.net |
170+
> | Azure AI Video Indexer (Microsoft.VideoIndexer/accounts) | account | privatelink.api.videoindexer.ai | api.videoindexer.ai |
170171
171172
### Management and Governance
172173

@@ -223,6 +224,7 @@ For Azure services, use the recommended zone names as described in the following
223224
> | Azure Web Apps / Azure Function Apps (Microsoft.Web/sites) | sites | privatelink.azurewebsites.net </br> scm.privatelink.azurewebsites.net<sup>3</sup> | azurewebsites.net </br> scm.azurewebsites.net |
224225
> | SignalR (Microsoft.SignalRService/SignalR) | signalr | privatelink.service.signalr.net | service.signalr.net |
225226
> | Azure Static Web Apps (Microsoft.Web/staticSites) | staticSites | privatelink.azurestaticapps.net </br> privatelink.{partitionId}.azurestaticapps.net | azurestaticapps.net </br> {partitionId}.azurestaticapps.net |
227+
> | Azure Maps (Microsoft.Maps/accounts) | account | privatelink.account.maps.azure.com | account.maps.azure.com |
226228
> | Azure Web PubSub service (Microsoft.SignalRService/WebPubSub) | webpubsub | privatelink.webpubsub.azure.com | webpubsub.azure.com |
227229
228230
<sup>1</sup>If you are using Azure Private DNS Zones, do not deploy this as an additional zone. DNS entries will be automatically added to the existing DNS Zone `privatelink.azurecr.io`.

0 commit comments

Comments
 (0)