|
6 | 6 | "_generator": { |
7 | 7 | "name": "bicep", |
8 | 8 | "version": "0.37.4.10188", |
9 | | - "templateHash": "5055336374994058436" |
| 9 | + "templateHash": "14259315155038248870" |
10 | 10 | }, |
11 | 11 | "name": "Content Processing Solution Accelerator", |
12 | 12 | "description": "Bicep template to deploy the Content Processing Solution Accelerator with AVM compliance." |
|
303 | 303 | }, |
304 | 304 | "addressPrefixes": { |
305 | 305 | "value": [ |
306 | | - "10.0.0.0/20" |
| 306 | + "10.0.0.0/8" |
307 | 307 | ] |
308 | 308 | }, |
309 | 309 | "location": { |
|
328 | 328 | "_generator": { |
329 | 329 | "name": "bicep", |
330 | 330 | "version": "0.37.4.10188", |
331 | | - "templateHash": "4658548157594615847" |
| 331 | + "templateHash": "14464809693505395958" |
332 | 332 | } |
333 | 333 | }, |
334 | 334 | "definitions": { |
|
639 | 639 | { |
640 | 640 | "name": "AzureBastionSubnet", |
641 | 641 | "addressPrefixes": [ |
642 | | - "10.0.10.0/26" |
| 642 | + "10.0.1.32/27" |
643 | 643 | ], |
644 | 644 | "networkSecurityGroup": { |
645 | 645 | "name": "nsg-bastion", |
|
703 | 703 | } |
704 | 704 | }, |
705 | 705 | { |
706 | | - "name": "jumpbox", |
| 706 | + "name": "admin", |
707 | 707 | "addressPrefixes": [ |
708 | | - "10.0.12.0/23" |
| 708 | + "10.0.1.0/27" |
709 | 709 | ], |
710 | 710 | "networkSecurityGroup": { |
711 | | - "name": "nsg-jumpbox", |
| 711 | + "name": "nsg-admin", |
712 | 712 | "securityRules": [ |
713 | 713 | { |
714 | | - "name": "AllowRdpFromBastion", |
| 714 | + "name": "Deny-hop-outbound", |
715 | 715 | "properties": { |
716 | | - "access": "Allow", |
717 | | - "direction": "Inbound", |
718 | | - "priority": 100, |
719 | | - "protocol": "Tcp", |
| 716 | + "access": "Deny", |
| 717 | + "direction": "Outbound", |
| 718 | + "priority": 200, |
| 719 | + "protocol": "*", |
720 | 720 | "sourcePortRange": "*", |
721 | | - "destinationPortRange": "3389", |
722 | | - "sourceAddressPrefixes": [ |
723 | | - "10.0.10.0/26" |
| 721 | + "destinationPortRanges": [ |
| 722 | + "3389", |
| 723 | + "22" |
724 | 724 | ], |
725 | | - "destinationAddressPrefixes": [ |
726 | | - "10.0.12.0/23" |
727 | | - ] |
| 725 | + "sourceAddressPrefix": "VirtualNetwork", |
| 726 | + "destinationAddressPrefix": "*" |
728 | 727 | } |
729 | 728 | } |
730 | 729 | ] |
|
3137 | 3136 | "type": "string", |
3138 | 3137 | "value": "[if(contains(map(parameters('subnets'), lambda('subnet', lambdaVariables('subnet').name)), 'AzureBastionSubnet'), reference('virtualNetwork').outputs.subnetResourceIds.value[indexOf(map(parameters('subnets'), lambda('subnet', lambdaVariables('subnet').name)), 'AzureBastionSubnet')], '')]" |
3139 | 3138 | }, |
3140 | | - "jumpboxSubnetResourceId": { |
| 3139 | + "adminSubnetResourceId": { |
3141 | 3140 | "type": "string", |
3142 | | - "value": "[if(contains(map(parameters('subnets'), lambda('subnet', lambdaVariables('subnet').name)), 'jumpbox'), reference('virtualNetwork').outputs.subnetResourceIds.value[indexOf(map(parameters('subnets'), lambda('subnet', lambdaVariables('subnet').name)), 'jumpbox')], '')]" |
| 3141 | + "value": "[if(contains(map(parameters('subnets'), lambda('subnet', lambdaVariables('subnet').name)), 'admin'), reference('virtualNetwork').outputs.subnetResourceIds.value[indexOf(map(parameters('subnets'), lambda('subnet', lambdaVariables('subnet').name)), 'admin')], '')]" |
3143 | 3142 | } |
3144 | 3143 | } |
3145 | 3144 | } |
|
4515 | 4514 | "ipConfigurations": [ |
4516 | 4515 | { |
4517 | 4516 | "name": "ipconfig1", |
4518 | | - "subnetResourceId": "[reference('virtualNetwork').outputs.jumpboxSubnetResourceId.value]" |
| 4517 | + "subnetResourceId": "[reference('virtualNetwork').outputs.adminSubnetResourceId.value]" |
4519 | 4518 | } |
4520 | 4519 | ], |
4521 | 4520 | "diagnosticSettings": "[if(parameters('enableMonitoring'), createArray(createObject('name', 'jumpboxDiagnostics', 'workspaceResourceId', reference('logAnalyticsWorkspace').outputs.resourceId.value, 'logCategoriesAndGroups', createArray(createObject('categoryGroup', 'allLogs', 'enabled', true())), 'metricCategories', createArray(createObject('category', 'AllMetrics', 'enabled', true())))), null())]" |
|
27271 | 27270 | }, |
27272 | 27271 | "allowBlobPublicAccess": "[if(parameters('enablePrivateNetworking'), createObject('value', true()), createObject('value', false()))]", |
27273 | 27272 | "publicNetworkAccess": "[if(parameters('enablePrivateNetworking'), createObject('value', 'Disabled'), createObject('value', 'Enabled'))]", |
27274 | | - "privateEndpoints": "[if(parameters('enablePrivateNetworking'), createObject('value', createArray(createObject('name', format('storage-private-endpoint-blob-{0}', variables('solutionSuffix')), 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'storage-dns-zone-group-blob', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').storageBlob)).outputs.resourceId.value))), 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value, 'service', 'blob'), createObject('name', format('storage-private-endpoint-queue-{0}', variables('solutionSuffix')), 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'storage-dns-zone-group-queue', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').storageQueue)).outputs.resourceId.value))), 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value, 'service', 'queue'))), createObject('value', createArray()))]" |
| 27273 | + "privateEndpoints": "[if(parameters('enablePrivateNetworking'), createObject('value', createArray(createObject('name', format('pep-blob-{0}', variables('solutionSuffix')), 'customNetworkInterfaceName', format('nic-blob-{0}', variables('solutionSuffix')), 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'storage-dns-zone-group-blob', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').storageBlob)).outputs.resourceId.value))), 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value, 'service', 'blob'), createObject('name', format('pep-queue-{0}', variables('solutionSuffix')), 'customNetworkInterfaceName', format('nic-queue-{0}', variables('solutionSuffix')), 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'storage-dns-zone-group-queue', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').storageQueue)).outputs.resourceId.value))), 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value, 'service', 'queue'))), createObject('value', createArray()))]" |
27275 | 27274 | }, |
27276 | 27275 | "template": { |
27277 | 27276 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
|
32968 | 32967 | "avmContainerApp", |
32969 | 32968 | "avmContainerApp_API", |
32970 | 32969 | "avmManagedIdentity", |
32971 | | - "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').storageQueue)]", |
32972 | 32970 | "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').storageBlob)]", |
| 32971 | + "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').storageQueue)]", |
32973 | 32972 | "virtualNetwork" |
32974 | 32973 | ] |
32975 | 32974 | }, |
|
33066 | 33065 | ] |
33067 | 33066 | }, |
33068 | 33067 | "publicNetworkAccess": "[if(parameters('enablePrivateNetworking'), createObject('value', 'Disabled'), createObject('value', 'Enabled'))]", |
33069 | | - "privateEndpoints": "[if(and(parameters('enablePrivateNetworking'), empty(variables('existingProjectResourceId'))), createObject('value', createArray(createObject('name', format('ai-services-private-endpoint-{0}', variables('solutionSuffix')), 'privateEndpointResourceId', reference('virtualNetwork').outputs.resourceId.value, 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'ai-services-dns-zone-cognitiveservices', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cognitiveServices)).outputs.resourceId.value), createObject('name', 'ai-services-dns-zone-openai', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').openAI)).outputs.resourceId.value), createObject('name', 'ai-services-dns-zone-aiservices', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').aiServices)).outputs.resourceId.value), createObject('name', 'ai-services-dns-zone-contentunderstanding', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').contentUnderstanding)).outputs.resourceId.value))), 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value))), createObject('value', createArray()))]" |
| 33068 | + "privateEndpoints": "[if(and(parameters('enablePrivateNetworking'), empty(variables('existingProjectResourceId'))), createObject('value', createArray(createObject('name', format('pep-aiservices-{0}', variables('solutionSuffix')), 'customNetworkInterfaceName', format('nic-aiservices-{0}', variables('solutionSuffix')), 'privateEndpointResourceId', reference('virtualNetwork').outputs.resourceId.value, 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'ai-services-dns-zone-cognitiveservices', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cognitiveServices)).outputs.resourceId.value), createObject('name', 'ai-services-dns-zone-openai', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').openAI)).outputs.resourceId.value), createObject('name', 'ai-services-dns-zone-aiservices', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').aiServices)).outputs.resourceId.value), createObject('name', 'ai-services-dns-zone-contentunderstanding', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').contentUnderstanding)).outputs.resourceId.value))), 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value))), createObject('value', createArray()))]" |
33070 | 33069 | }, |
33071 | 33070 | "template": { |
33072 | 33071 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
@@ -38710,10 +38709,10 @@ |
38710 | 38709 | "dependsOn": [ |
38711 | 38710 | "avmContainerApp", |
38712 | 38711 | "avmManagedIdentity", |
38713 | | - "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').contentUnderstanding)]", |
38714 | 38712 | "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').aiServices)]", |
38715 | 38713 | "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cognitiveServices)]", |
38716 | 38714 | "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').openAI)]", |
| 38715 | + "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').contentUnderstanding)]", |
38717 | 38716 | "logAnalyticsWorkspace", |
38718 | 38717 | "virtualNetwork" |
38719 | 38718 | ] |
|
38779 | 38778 | ] |
38780 | 38779 | }, |
38781 | 38780 | "publicNetworkAccess": "[if(parameters('enablePrivateNetworking'), createObject('value', 'Disabled'), createObject('value', 'Enabled'))]", |
38782 | | - "privateEndpoints": "[if(parameters('enablePrivateNetworking'), createObject('value', createArray(createObject('name', format('aicu-private-endpoint-{0}', variables('solutionSuffix')), 'privateEndpointResourceId', reference('virtualNetwork').outputs.resourceId.value, 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'aicu-dns-zone-cognitiveservices', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cognitiveServices)).outputs.resourceId.value), createObject('name', 'aicu-dns-zone-contentunderstanding', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').contentUnderstanding)).outputs.resourceId.value))), 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value))), createObject('value', createArray()))]" |
| 38781 | + "privateEndpoints": "[if(parameters('enablePrivateNetworking'), createObject('value', createArray(createObject('name', format('pep-aicu-{0}', variables('solutionSuffix')), 'customNetworkInterfaceName', format('nic-aicu-{0}', variables('solutionSuffix')), 'privateEndpointResourceId', reference('virtualNetwork').outputs.resourceId.value, 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'aicu-dns-zone-cognitiveservices', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cognitiveServices)).outputs.resourceId.value), createObject('name', 'aicu-dns-zone-contentunderstanding', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').contentUnderstanding)).outputs.resourceId.value))), 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value))), createObject('value', createArray()))]" |
38783 | 38782 | }, |
38784 | 38783 | "template": { |
38785 | 38784 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
|
41051 | 41050 | "dependsOn": [ |
41052 | 41051 | "avmContainerApp", |
41053 | 41052 | "avmManagedIdentity", |
41054 | | - "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cognitiveServices)]", |
41055 | 41053 | "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').contentUnderstanding)]", |
| 41054 | + "[format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cognitiveServices)]", |
41056 | 41055 | "virtualNetwork" |
41057 | 41056 | ] |
41058 | 41057 | }, |
|
41993 | 41992 | "mode": "Incremental", |
41994 | 41993 | "parameters": { |
41995 | 41994 | "name": { |
41996 | | - "value": "[format('acr-reader-mid{0}', variables('solutionSuffix'))]" |
| 41995 | + "value": "[format('id-acr-{0}', variables('solutionSuffix'))]" |
41997 | 41996 | }, |
41998 | 41997 | "location": { |
41999 | 41998 | "value": "[parameters('resourceGroupLocation')]" |
|
47160 | 47159 | "virtualNetworkRules": [] |
47161 | 47160 | } |
47162 | 47161 | }, |
47163 | | - "privateEndpoints": "[if(parameters('enablePrivateNetworking'), createObject('value', createArray(createObject('name', format('cosmosdb-private-endpoint-{0}', variables('solutionSuffix')), 'privateEndpointResourceId', reference('virtualNetwork').outputs.resourceId.value, 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'cosmosdb-dns-zone-group', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cosmosDB)).outputs.resourceId.value))), 'service', 'MongoDB', 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value))), createObject('value', createArray()))]" |
| 47162 | + "privateEndpoints": "[if(parameters('enablePrivateNetworking'), createObject('value', createArray(createObject('name', format('pep-cosmosdb-{0}', variables('solutionSuffix')), 'customNetworkInterfaceName', format('nic-cosmosdb-{0}', variables('solutionSuffix')), 'privateEndpointResourceId', reference('virtualNetwork').outputs.resourceId.value, 'privateDnsZoneGroup', createObject('privateDnsZoneGroupConfigs', createArray(createObject('name', 'cosmosdb-dns-zone-group', 'privateDnsZoneResourceId', reference(format('avmPrivateDnsZones[{0}]', variables('dnsZoneIndex').cosmosDB)).outputs.resourceId.value))), 'service', 'MongoDB', 'subnetResourceId', reference('virtualNetwork').outputs.backendSubnetResourceId.value))), createObject('value', createArray()))]" |
47164 | 47163 | }, |
47165 | 47164 | "template": { |
47166 | 47165 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
|
53092 | 53091 | "privateEndpoints": { |
53093 | 53092 | "value": [ |
53094 | 53093 | { |
53095 | | - "name": "[format('appconfig-private-endpoint-{0}', variables('solutionSuffix'))]", |
| 53094 | + "name": "[format('pep-appconfig-{0}', variables('solutionSuffix'))]", |
| 53095 | + "customNetworkInterfaceName": "[format('nic-appconfig-{0}', variables('solutionSuffix'))]", |
53096 | 53096 | "privateDnsZoneGroup": { |
53097 | 53097 | "privateDnsZoneGroupConfigs": [ |
53098 | 53098 | { |
|
0 commit comments