pulumi-azure 6.29.0a1760595961__py3-none-any.whl → 6.29.0a1762410795__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-azure might be problematic. Click here for more details.

Files changed (66) hide show
  1. pulumi_azure/apimanagement/api_tag_description.py +18 -0
  2. pulumi_azure/apimanagement/redis_cache.py +18 -0
  3. pulumi_azure/appplatform/spring_cloud_app_redis_association.py +4 -0
  4. pulumi_azure/appplatform/spring_cloud_connection.py +18 -0
  5. pulumi_azure/appservice/app_connection.py +18 -0
  6. pulumi_azure/appservice/connection.py +18 -0
  7. pulumi_azure/appservice/function_app.py +8 -0
  8. pulumi_azure/appservice/web_app_active_slot.py +18 -0
  9. pulumi_azure/containerapp/custom_domain.py +4 -0
  10. pulumi_azure/containerservice/get_registry_cache_rule.py +18 -0
  11. pulumi_azure/containerservice/token_password.py +18 -0
  12. pulumi_azure/cosmosdb/sql_function.py +4 -0
  13. pulumi_azure/cosmosdb/sql_stored_procedure.py +4 -0
  14. pulumi_azure/cosmosdb/sql_trigger.py +4 -0
  15. pulumi_azure/dataprotection/backup_policy_kubernetes_cluster.py +18 -0
  16. pulumi_azure/dynatrace/monitor.py +18 -0
  17. pulumi_azure/dynatrace/tag_rules.py +18 -0
  18. pulumi_azure/eventhub/queue_authorization_rule.py +18 -0
  19. pulumi_azure/eventhub/subscription_rule.py +22 -0
  20. pulumi_azure/iot/endpoint_cosmosdb_account.py +4 -0
  21. pulumi_azure/iot/endpoint_servicebus_queue.py +4 -0
  22. pulumi_azure/keyvault/managed_hardware_security_module_key.py +18 -0
  23. pulumi_azure/keyvault/managed_hardware_security_module_role_definition.py +4 -0
  24. pulumi_azure/keyvault/secret.py +69 -1
  25. pulumi_azure/kusto/cosmosdb_data_connection.py +18 -0
  26. pulumi_azure/lb/get_lb_rule.py +18 -0
  27. pulumi_azure/managedlustre/file_system.py +18 -0
  28. pulumi_azure/mobile/get_network_sim.py +18 -0
  29. pulumi_azure/mobile/network_attached_data_network.py +18 -0
  30. pulumi_azure/mobile/network_packet_core_data_plane.py +18 -0
  31. pulumi_azure/mssql/get_managed_database.py +18 -0
  32. pulumi_azure/mssql/managed_instance_security_alert_policy.py +18 -0
  33. pulumi_azure/mssql/managed_instance_start_stop_schedule.py +18 -0
  34. pulumi_azure/mssql/server_extended_auditing_policy.py +4 -0
  35. pulumi_azure/mssql/server_microsoft_support_auditing_policy.py +18 -0
  36. pulumi_azure/network/virtual_network_dns_servers.py +14 -0
  37. pulumi_azure/oracle/autonomous_database.py +68 -0
  38. pulumi_azure/oracle/autonomous_database_backup.py +18 -0
  39. pulumi_azure/privatedns/link_service.py +18 -0
  40. pulumi_azure/privatelink/application_security_group_association.py +18 -0
  41. pulumi_azure/privatelink/endpoint.py +188 -0
  42. pulumi_azure/pulumi-plugin.json +1 -1
  43. pulumi_azure/qumulo/file_system.py +18 -0
  44. pulumi_azure/redis/cache_access_policy.py +18 -0
  45. pulumi_azure/redis/cache_access_policy_assignment.py +18 -0
  46. pulumi_azure/redis/firewall_rule.py +18 -0
  47. pulumi_azure/redis/get_enterprise_database.py +18 -0
  48. pulumi_azure/redis/linked_server.py +18 -0
  49. pulumi_azure/servicebus/queue_authorization_rule.py +18 -0
  50. pulumi_azure/servicebus/subscription_rule.py +22 -0
  51. pulumi_azure/signalr/service_network_acl.py +18 -0
  52. pulumi_azure/stack/hci_logical_network.py +18 -0
  53. pulumi_azure/stack/hci_network_interface.py +18 -0
  54. pulumi_azure/streamanalytics/output_cosmosdb.py +18 -0
  55. pulumi_azure/streamanalytics/output_service_bus_queue.py +18 -0
  56. pulumi_azure/streamanalytics/output_servicebus_topic.py +18 -0
  57. pulumi_azure/synapse/sql_pool_security_alert_policy.py +4 -0
  58. pulumi_azure/synapse/sql_pool_vulnerability_assessment.py +4 -0
  59. pulumi_azure/synapse/workspace_security_alert_policy.py +4 -0
  60. pulumi_azure/synapse/workspace_vulnerability_assessment.py +4 -0
  61. pulumi_azure/webpubsub/custom_domain.py +18 -0
  62. pulumi_azure/webpubsub/network_acl.py +18 -0
  63. {pulumi_azure-6.29.0a1760595961.dist-info → pulumi_azure-6.29.0a1762410795.dist-info}/METADATA +1 -1
  64. {pulumi_azure-6.29.0a1760595961.dist-info → pulumi_azure-6.29.0a1762410795.dist-info}/RECORD +66 -66
  65. {pulumi_azure-6.29.0a1760595961.dist-info → pulumi_azure-6.29.0a1762410795.dist-info}/WHEEL +0 -0
  66. {pulumi_azure-6.29.0a1760595961.dist-info → pulumi_azure-6.29.0a1762410795.dist-info}/top_level.txt +0 -0
@@ -431,6 +431,15 @@ class LinkService(pulumi.CustomResource):
431
431
 
432
432
  > **Note:** Private Link is now in [GA](https://docs.microsoft.com/en-gb/azure/private-link/).
433
433
 
434
+ ## Example Usage
435
+
436
+ ## API Providers
437
+
438
+ <!-- This section is generated, changes will be overwritten -->
439
+ This resource uses the following Azure API Providers:
440
+
441
+ * `Microsoft.Network` - 2024-05-01
442
+
434
443
  ## Import
435
444
 
436
445
  Private Link Services can be imported using the `resource id`, e.g.
@@ -466,6 +475,15 @@ class LinkService(pulumi.CustomResource):
466
475
 
467
476
  > **Note:** Private Link is now in [GA](https://docs.microsoft.com/en-gb/azure/private-link/).
468
477
 
478
+ ## Example Usage
479
+
480
+ ## API Providers
481
+
482
+ <!-- This section is generated, changes will be overwritten -->
483
+ This resource uses the following Azure API Providers:
484
+
485
+ * `Microsoft.Network` - 2024-05-01
486
+
469
487
  ## Import
470
488
 
471
489
  Private Link Services can be imported using the `resource id`, e.g.
@@ -106,6 +106,15 @@ class ApplicationSecurityGroupAssociation(pulumi.CustomResource):
106
106
  """
107
107
  Manages an association between Private Endpoint and Application Security Group.
108
108
 
109
+ ## Example Usage
110
+
111
+ ## API Providers
112
+
113
+ <!-- This section is generated, changes will be overwritten -->
114
+ This resource uses the following Azure API Providers:
115
+
116
+ * `Microsoft.Network` - 2024-05-01
117
+
109
118
  ## Import
110
119
 
111
120
  Associations between Private Endpoint and Application Security Group can be imported using the `resource id`, e.g.
@@ -128,6 +137,15 @@ class ApplicationSecurityGroupAssociation(pulumi.CustomResource):
128
137
  """
129
138
  Manages an association between Private Endpoint and Application Security Group.
130
139
 
140
+ ## Example Usage
141
+
142
+ ## API Providers
143
+
144
+ <!-- This section is generated, changes will be overwritten -->
145
+ This resource uses the following Azure API Providers:
146
+
147
+ * `Microsoft.Network` - 2024-05-01
148
+
131
149
  ## Import
132
150
 
133
151
  Associations between Private Endpoint and Application Security Group can be imported using the `resource id`, e.g.
@@ -388,6 +388,100 @@ class Endpoint(pulumi.CustomResource):
388
388
 
389
389
  Azure Private Endpoint is a network interface that connects you privately and securely to a service powered by Azure Private Link. Private Endpoint uses a private IP address from your VNet, effectively bringing the service into your VNet. The service could be an Azure service such as Azure Storage, SQL, etc. or your own Private Link Service.
390
390
 
391
+ ## Example Usage
392
+
393
+ Using a Private Link Service Alias with existing resources:
394
+
395
+ ```python
396
+ import pulumi
397
+ import pulumi_azure as azure
398
+
399
+ example = azure.core.get_resource_group(name="example-resources")
400
+ vnet = azure.network.get_virtual_network(name="example-network",
401
+ resource_group_name=example.name)
402
+ subnet = azure.network.get_subnet(name="default",
403
+ virtual_network_name=vnet.name,
404
+ resource_group_name=example.name)
405
+ example_endpoint = azure.privatelink.Endpoint("example",
406
+ name="example-endpoint",
407
+ location=example.location,
408
+ resource_group_name=example.name,
409
+ subnet_id=subnet.id,
410
+ private_service_connection={
411
+ "name": "example-privateserviceconnection",
412
+ "private_connection_resource_alias": "example-privatelinkservice.d20286c8-4ea5-11eb-9584-8f53157226c6.centralus.azure.privatelinkservice",
413
+ "is_manual_connection": True,
414
+ "request_message": "PL",
415
+ })
416
+ ```
417
+
418
+ Using a Private Endpoint pointing to an *owned* Azure service, with proper DNS configuration:
419
+
420
+ ```python
421
+ import pulumi
422
+ import pulumi_azure as azure
423
+
424
+ example = azure.core.ResourceGroup("example",
425
+ name="example-rg",
426
+ location="West Europe")
427
+ example_account = azure.storage.Account("example",
428
+ name="exampleaccount",
429
+ resource_group_name=example.name,
430
+ location=example.location,
431
+ account_tier="Standard",
432
+ account_replication_type="LRS")
433
+ example_virtual_network = azure.network.VirtualNetwork("example",
434
+ name="virtnetname",
435
+ address_spaces=["10.0.0.0/16"],
436
+ location=example.location,
437
+ resource_group_name=example.name)
438
+ example_subnet = azure.network.Subnet("example",
439
+ name="subnetname",
440
+ resource_group_name=example.name,
441
+ virtual_network_name=example_virtual_network.name,
442
+ address_prefixes=["10.0.2.0/24"])
443
+ example_zone = azure.privatedns.Zone("example",
444
+ name="privatelink.blob.core.windows.net",
445
+ resource_group_name=example.name)
446
+ example_endpoint = azure.privatelink.Endpoint("example",
447
+ name="example-endpoint",
448
+ location=example.location,
449
+ resource_group_name=example.name,
450
+ subnet_id=example_subnet.id,
451
+ private_service_connection={
452
+ "name": "example-privateserviceconnection",
453
+ "private_connection_resource_id": example_account.id,
454
+ "subresource_names": ["blob"],
455
+ "is_manual_connection": False,
456
+ },
457
+ private_dns_zone_group={
458
+ "name": "example-dns-zone-group",
459
+ "private_dns_zone_ids": [example_zone.id],
460
+ })
461
+ example_zone_virtual_network_link = azure.privatedns.ZoneVirtualNetworkLink("example",
462
+ name="example-link",
463
+ resource_group_name=example.name,
464
+ private_dns_zone_name=example_zone.name,
465
+ virtual_network_id=example_virtual_network.id)
466
+ ```
467
+
468
+ ## Example HCL Configurations
469
+
470
+ * How to conneca `Private Endpoint` to a Application Gateway
471
+ * How to connect a `Private Endpoint` to a Cosmos MongoDB
472
+ * How to connect a `Private Endpoint` to a Cosmos PostgreSQL
473
+ * How to connect a `Private Endpoint` to a PostgreSQL Server
474
+ * How to connect a `Private Endpoint` to a Private Link Service
475
+ * How to connect a `Private Endpoint` to a Private DNS Group
476
+ * How to connect a `Private Endpoint` to a Databricks Workspace
477
+
478
+ ## API Providers
479
+
480
+ <!-- This section is generated, changes will be overwritten -->
481
+ This resource uses the following Azure API Providers:
482
+
483
+ * `Microsoft.Network` - 2024-05-01
484
+
391
485
  ## Import
392
486
 
393
487
  Private Endpoints can be imported using the `resource id`, e.g.
@@ -419,6 +513,100 @@ class Endpoint(pulumi.CustomResource):
419
513
 
420
514
  Azure Private Endpoint is a network interface that connects you privately and securely to a service powered by Azure Private Link. Private Endpoint uses a private IP address from your VNet, effectively bringing the service into your VNet. The service could be an Azure service such as Azure Storage, SQL, etc. or your own Private Link Service.
421
515
 
516
+ ## Example Usage
517
+
518
+ Using a Private Link Service Alias with existing resources:
519
+
520
+ ```python
521
+ import pulumi
522
+ import pulumi_azure as azure
523
+
524
+ example = azure.core.get_resource_group(name="example-resources")
525
+ vnet = azure.network.get_virtual_network(name="example-network",
526
+ resource_group_name=example.name)
527
+ subnet = azure.network.get_subnet(name="default",
528
+ virtual_network_name=vnet.name,
529
+ resource_group_name=example.name)
530
+ example_endpoint = azure.privatelink.Endpoint("example",
531
+ name="example-endpoint",
532
+ location=example.location,
533
+ resource_group_name=example.name,
534
+ subnet_id=subnet.id,
535
+ private_service_connection={
536
+ "name": "example-privateserviceconnection",
537
+ "private_connection_resource_alias": "example-privatelinkservice.d20286c8-4ea5-11eb-9584-8f53157226c6.centralus.azure.privatelinkservice",
538
+ "is_manual_connection": True,
539
+ "request_message": "PL",
540
+ })
541
+ ```
542
+
543
+ Using a Private Endpoint pointing to an *owned* Azure service, with proper DNS configuration:
544
+
545
+ ```python
546
+ import pulumi
547
+ import pulumi_azure as azure
548
+
549
+ example = azure.core.ResourceGroup("example",
550
+ name="example-rg",
551
+ location="West Europe")
552
+ example_account = azure.storage.Account("example",
553
+ name="exampleaccount",
554
+ resource_group_name=example.name,
555
+ location=example.location,
556
+ account_tier="Standard",
557
+ account_replication_type="LRS")
558
+ example_virtual_network = azure.network.VirtualNetwork("example",
559
+ name="virtnetname",
560
+ address_spaces=["10.0.0.0/16"],
561
+ location=example.location,
562
+ resource_group_name=example.name)
563
+ example_subnet = azure.network.Subnet("example",
564
+ name="subnetname",
565
+ resource_group_name=example.name,
566
+ virtual_network_name=example_virtual_network.name,
567
+ address_prefixes=["10.0.2.0/24"])
568
+ example_zone = azure.privatedns.Zone("example",
569
+ name="privatelink.blob.core.windows.net",
570
+ resource_group_name=example.name)
571
+ example_endpoint = azure.privatelink.Endpoint("example",
572
+ name="example-endpoint",
573
+ location=example.location,
574
+ resource_group_name=example.name,
575
+ subnet_id=example_subnet.id,
576
+ private_service_connection={
577
+ "name": "example-privateserviceconnection",
578
+ "private_connection_resource_id": example_account.id,
579
+ "subresource_names": ["blob"],
580
+ "is_manual_connection": False,
581
+ },
582
+ private_dns_zone_group={
583
+ "name": "example-dns-zone-group",
584
+ "private_dns_zone_ids": [example_zone.id],
585
+ })
586
+ example_zone_virtual_network_link = azure.privatedns.ZoneVirtualNetworkLink("example",
587
+ name="example-link",
588
+ resource_group_name=example.name,
589
+ private_dns_zone_name=example_zone.name,
590
+ virtual_network_id=example_virtual_network.id)
591
+ ```
592
+
593
+ ## Example HCL Configurations
594
+
595
+ * How to conneca `Private Endpoint` to a Application Gateway
596
+ * How to connect a `Private Endpoint` to a Cosmos MongoDB
597
+ * How to connect a `Private Endpoint` to a Cosmos PostgreSQL
598
+ * How to connect a `Private Endpoint` to a PostgreSQL Server
599
+ * How to connect a `Private Endpoint` to a Private Link Service
600
+ * How to connect a `Private Endpoint` to a Private DNS Group
601
+ * How to connect a `Private Endpoint` to a Databricks Workspace
602
+
603
+ ## API Providers
604
+
605
+ <!-- This section is generated, changes will be overwritten -->
606
+ This resource uses the following Azure API Providers:
607
+
608
+ * `Microsoft.Network` - 2024-05-01
609
+
422
610
  ## Import
423
611
 
424
612
  Private Endpoints can be imported using the `resource id`, e.g.
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "azure",
4
- "version": "6.29.0-alpha.1760595961"
4
+ "version": "6.29.0-alpha.1762410795"
5
5
  }
@@ -432,6 +432,15 @@ class FileSystem(pulumi.CustomResource):
432
432
  """
433
433
  Manages an Azure Native Qumulo Scalable File System.
434
434
 
435
+ ## Example Usage
436
+
437
+ ## API Providers
438
+
439
+ <!-- This section is generated, changes will be overwritten -->
440
+ This resource uses the following Azure API Providers:
441
+
442
+ * `Qumulo.Storage` - 2024-06-19
443
+
435
444
  ## Import
436
445
 
437
446
  An existing File System can be imported into Pulumi using the `resource id`, e.g.
@@ -464,6 +473,15 @@ class FileSystem(pulumi.CustomResource):
464
473
  """
465
474
  Manages an Azure Native Qumulo Scalable File System.
466
475
 
476
+ ## Example Usage
477
+
478
+ ## API Providers
479
+
480
+ <!-- This section is generated, changes will be overwritten -->
481
+ This resource uses the following Azure API Providers:
482
+
483
+ * `Qumulo.Storage` - 2024-06-19
484
+
467
485
  ## Import
468
486
 
469
487
  An existing File System can be imported into Pulumi using the `resource id`, e.g.
@@ -139,6 +139,15 @@ class CacheAccessPolicy(pulumi.CustomResource):
139
139
  """
140
140
  Manages a Redis Cache Access Policy
141
141
 
142
+ ## Example Usage
143
+
144
+ ## API Providers
145
+
146
+ <!-- This section is generated, changes will be overwritten -->
147
+ This resource uses the following Azure API Providers:
148
+
149
+ * `Microsoft.Cache` - 2024-11-01
150
+
142
151
  ## Import
143
152
 
144
153
  Redis Cache Access Policy can be imported using the `resource id`, e.g.
@@ -162,6 +171,15 @@ class CacheAccessPolicy(pulumi.CustomResource):
162
171
  """
163
172
  Manages a Redis Cache Access Policy
164
173
 
174
+ ## Example Usage
175
+
176
+ ## API Providers
177
+
178
+ <!-- This section is generated, changes will be overwritten -->
179
+ This resource uses the following Azure API Providers:
180
+
181
+ * `Microsoft.Cache` - 2024-11-01
182
+
165
183
  ## Import
166
184
 
167
185
  Redis Cache Access Policy can be imported using the `resource id`, e.g.
@@ -203,6 +203,15 @@ class CacheAccessPolicyAssignment(pulumi.CustomResource):
203
203
  """
204
204
  Manages a Redis Cache Access Policy Assignment
205
205
 
206
+ ## Example Usage
207
+
208
+ ## API Providers
209
+
210
+ <!-- This section is generated, changes will be overwritten -->
211
+ This resource uses the following Azure API Providers:
212
+
213
+ * `Microsoft.Cache` - 2024-11-01
214
+
206
215
  ## Import
207
216
 
208
217
  Redis Cache Policy Assignment can be imported using the `resource id`, e.g.
@@ -228,6 +237,15 @@ class CacheAccessPolicyAssignment(pulumi.CustomResource):
228
237
  """
229
238
  Manages a Redis Cache Access Policy Assignment
230
239
 
240
+ ## Example Usage
241
+
242
+ ## API Providers
243
+
244
+ <!-- This section is generated, changes will be overwritten -->
245
+ This resource uses the following Azure API Providers:
246
+
247
+ * `Microsoft.Cache` - 2024-11-01
248
+
231
249
  ## Import
232
250
 
233
251
  Redis Cache Policy Assignment can be imported using the `resource id`, e.g.
@@ -203,6 +203,15 @@ class FirewallRule(pulumi.CustomResource):
203
203
  """
204
204
  Manages a Firewall Rule associated with a Redis Cache.
205
205
 
206
+ ## Example Usage
207
+
208
+ ## API Providers
209
+
210
+ <!-- This section is generated, changes will be overwritten -->
211
+ This resource uses the following Azure API Providers:
212
+
213
+ * `Microsoft.Cache` - 2024-11-01
214
+
206
215
  ## Import
207
216
 
208
217
  Redis Firewall Rules can be imported using the `resource id`, e.g.
@@ -228,6 +237,15 @@ class FirewallRule(pulumi.CustomResource):
228
237
  """
229
238
  Manages a Firewall Rule associated with a Redis Cache.
230
239
 
240
+ ## Example Usage
241
+
242
+ ## API Providers
243
+
244
+ <!-- This section is generated, changes will be overwritten -->
245
+ This resource uses the following Azure API Providers:
246
+
247
+ * `Microsoft.Cache` - 2024-11-01
248
+
231
249
  ## Import
232
250
 
233
251
  Redis Firewall Rules can be imported using the `resource id`, e.g.
@@ -127,6 +127,15 @@ def get_enterprise_database(cluster_id: Optional[_builtins.str] = None,
127
127
  """
128
128
  Use this data source to access information about an existing Redis Enterprise Database
129
129
 
130
+ ## Example Usage
131
+
132
+ ## API Providers
133
+
134
+ <!-- This section is generated, changes will be overwritten -->
135
+ This data source uses the following Azure API Providers:
136
+
137
+ * `Microsoft.Cache` - 2024-10-01
138
+
130
139
 
131
140
  :param _builtins.str cluster_id: The resource ID of Redis Enterprise Cluster which hosts the Redis Enterprise Database instance.
132
141
  :param _builtins.str name: The name of the Redis Enterprise Database.
@@ -151,6 +160,15 @@ def get_enterprise_database_output(cluster_id: Optional[pulumi.Input[_builtins.s
151
160
  """
152
161
  Use this data source to access information about an existing Redis Enterprise Database
153
162
 
163
+ ## Example Usage
164
+
165
+ ## API Providers
166
+
167
+ <!-- This section is generated, changes will be overwritten -->
168
+ This data source uses the following Azure API Providers:
169
+
170
+ * `Microsoft.Cache` - 2024-10-01
171
+
154
172
 
155
173
  :param _builtins.str cluster_id: The resource ID of Redis Enterprise Cluster which hosts the Redis Enterprise Database instance.
156
174
  :param _builtins.str name: The name of the Redis Enterprise Database.
@@ -234,6 +234,15 @@ class LinkedServer(pulumi.CustomResource):
234
234
  """
235
235
  Manages a Redis Linked Server (ie Geo Location)
236
236
 
237
+ ## Example Usage
238
+
239
+ ## API Providers
240
+
241
+ <!-- This section is generated, changes will be overwritten -->
242
+ This resource uses the following Azure API Providers:
243
+
244
+ * `Microsoft.Cache` - 2024-11-01
245
+
237
246
  ## Import
238
247
 
239
248
  Redis can be imported using the `resource id`, e.g.
@@ -259,6 +268,15 @@ class LinkedServer(pulumi.CustomResource):
259
268
  """
260
269
  Manages a Redis Linked Server (ie Geo Location)
261
270
 
271
+ ## Example Usage
272
+
273
+ ## API Providers
274
+
275
+ <!-- This section is generated, changes will be overwritten -->
276
+ This resource uses the following Azure API Providers:
277
+
278
+ * `Microsoft.Cache` - 2024-11-01
279
+
262
280
  ## Import
263
281
 
264
282
  Redis can be imported using the `resource id`, e.g.
@@ -310,6 +310,15 @@ class QueueAuthorizationRule(pulumi.CustomResource):
310
310
  """
311
311
  Manages an Authorization Rule for a ServiceBus Queue.
312
312
 
313
+ ## Example Usage
314
+
315
+ ## API Providers
316
+
317
+ <!-- This section is generated, changes will be overwritten -->
318
+ This resource uses the following Azure API Providers:
319
+
320
+ * `Microsoft.ServiceBus` - 2024-01-01
321
+
313
322
  ## Import
314
323
 
315
324
  ServiceBus Queue Authorization Rules can be imported using the `resource id`, e.g.
@@ -337,6 +346,15 @@ class QueueAuthorizationRule(pulumi.CustomResource):
337
346
  """
338
347
  Manages an Authorization Rule for a ServiceBus Queue.
339
348
 
349
+ ## Example Usage
350
+
351
+ ## API Providers
352
+
353
+ <!-- This section is generated, changes will be overwritten -->
354
+ This resource uses the following Azure API Providers:
355
+
356
+ * `Microsoft.ServiceBus` - 2024-01-01
357
+
340
358
  ## Import
341
359
 
342
360
  ServiceBus Queue Authorization Rules can be imported using the `resource id`, e.g.
@@ -254,6 +254,17 @@ class SubscriptionRule(pulumi.CustomResource):
254
254
 
255
255
  ## Example Usage
256
256
 
257
+ ### SQL Filter)
258
+
259
+ ### Correlation Filter)
260
+
261
+ ## API Providers
262
+
263
+ <!-- This section is generated, changes will be overwritten -->
264
+ This resource uses the following Azure API Providers:
265
+
266
+ * `Microsoft.ServiceBus` - 2024-01-01
267
+
257
268
  ## Import
258
269
 
259
270
  Service Bus Subscription Rule can be imported using the `resource id`, e.g.
@@ -282,6 +293,17 @@ class SubscriptionRule(pulumi.CustomResource):
282
293
 
283
294
  ## Example Usage
284
295
 
296
+ ### SQL Filter)
297
+
298
+ ### Correlation Filter)
299
+
300
+ ## API Providers
301
+
302
+ <!-- This section is generated, changes will be overwritten -->
303
+ This resource uses the following Azure API Providers:
304
+
305
+ * `Microsoft.ServiceBus` - 2024-01-01
306
+
285
307
  ## Import
286
308
 
287
309
  Service Bus Subscription Rule can be imported using the `resource id`, e.g.
@@ -173,6 +173,15 @@ class ServiceNetworkAcl(pulumi.CustomResource):
173
173
  """
174
174
  Manages the Network ACL for a SignalR service.
175
175
 
176
+ ## Example Usage
177
+
178
+ ## API Providers
179
+
180
+ <!-- This section is generated, changes will be overwritten -->
181
+ This resource uses the following Azure API Providers:
182
+
183
+ * `Microsoft.SignalRService` - 2024-03-01
184
+
176
185
  ## Import
177
186
 
178
187
  Network ACLs for a SignalR service can be imported using the `resource id`, e.g.
@@ -197,6 +206,15 @@ class ServiceNetworkAcl(pulumi.CustomResource):
197
206
  """
198
207
  Manages the Network ACL for a SignalR service.
199
208
 
209
+ ## Example Usage
210
+
211
+ ## API Providers
212
+
213
+ <!-- This section is generated, changes will be overwritten -->
214
+ This resource uses the following Azure API Providers:
215
+
216
+ * `Microsoft.SignalRService` - 2024-03-01
217
+
200
218
  ## Import
201
219
 
202
220
  Network ACLs for a SignalR service can be imported using the `resource id`, e.g.
@@ -304,6 +304,15 @@ class HciLogicalNetwork(pulumi.CustomResource):
304
304
  """
305
305
  Manages an Azure Stack HCI Logical Network.
306
306
 
307
+ ## Example Usage
308
+
309
+ ## API Providers
310
+
311
+ <!-- This section is generated, changes will be overwritten -->
312
+ This resource uses the following Azure API Providers:
313
+
314
+ * `Microsoft.AzureStackHCI` - 2024-01-01
315
+
307
316
  ## Import
308
317
 
309
318
  Azure Stack HCI Logical Networks can be imported using the `resource id`, e.g.
@@ -332,6 +341,15 @@ class HciLogicalNetwork(pulumi.CustomResource):
332
341
  """
333
342
  Manages an Azure Stack HCI Logical Network.
334
343
 
344
+ ## Example Usage
345
+
346
+ ## API Providers
347
+
348
+ <!-- This section is generated, changes will be overwritten -->
349
+ This resource uses the following Azure API Providers:
350
+
351
+ * `Microsoft.AzureStackHCI` - 2024-01-01
352
+
335
353
  ## Import
336
354
 
337
355
  Azure Stack HCI Logical Networks can be imported using the `resource id`, e.g.
@@ -313,6 +313,15 @@ class HciNetworkInterface(pulumi.CustomResource):
313
313
  """
314
314
  Manages an Azure Stack HCI Network Interface.
315
315
 
316
+ ## Example Usage
317
+
318
+ ## API Providers
319
+
320
+ <!-- This section is generated, changes will be overwritten -->
321
+ This resource uses the following Azure API Providers:
322
+
323
+ * `Microsoft.AzureStackHCI` - 2024-01-01
324
+
316
325
  ## Import
317
326
 
318
327
  Azure Stack HCI Network Interfaces can be imported using the `resource id`, e.g.
@@ -343,6 +352,15 @@ class HciNetworkInterface(pulumi.CustomResource):
343
352
  """
344
353
  Manages an Azure Stack HCI Network Interface.
345
354
 
355
+ ## Example Usage
356
+
357
+ ## API Providers
358
+
359
+ <!-- This section is generated, changes will be overwritten -->
360
+ This resource uses the following Azure API Providers:
361
+
362
+ * `Microsoft.AzureStackHCI` - 2024-01-01
363
+
346
364
  ## Import
347
365
 
348
366
  Azure Stack HCI Network Interfaces can be imported using the `resource id`, e.g.
@@ -302,6 +302,15 @@ class OutputCosmosdb(pulumi.CustomResource):
302
302
  """
303
303
  Manages a Stream Analytics Output to CosmosDB.
304
304
 
305
+ ## Example Usage
306
+
307
+ ## API Providers
308
+
309
+ <!-- This section is generated, changes will be overwritten -->
310
+ This resource uses the following Azure API Providers:
311
+
312
+ * `Microsoft.StreamAnalytics` - 2021-10-01-preview
313
+
305
314
  ## Import
306
315
 
307
316
  Stream Analytics Outputs for CosmosDB can be imported using the `resource id`, e.g.
@@ -330,6 +339,15 @@ class OutputCosmosdb(pulumi.CustomResource):
330
339
  """
331
340
  Manages a Stream Analytics Output to CosmosDB.
332
341
 
342
+ ## Example Usage
343
+
344
+ ## API Providers
345
+
346
+ <!-- This section is generated, changes will be overwritten -->
347
+ This resource uses the following Azure API Providers:
348
+
349
+ * `Microsoft.StreamAnalytics` - 2021-10-01-preview
350
+
333
351
  ## Import
334
352
 
335
353
  Stream Analytics Outputs for CosmosDB can be imported using the `resource id`, e.g.