@@ -273,7 +273,7 @@ param postgreSqlFabricUserSecretName string = 'postgres-fabric-user-password'
273273param postgreSqlMirrorConnectionMode string = 'fabricUser'
274274
275275@description ('Authentication configuration for PostgreSQL Flexible Server. Defaults to both Microsoft Entra and password authentication enabled so Fabric mirroring can be configured immediately after deployment.' )
276- param postgreSqlAuthConfig resourceInput <'Microsoft.DBforPostgreSQL/flexibleServers@2025-06 -01-preview ' >.properties .authConfig = {
276+ param postgreSqlAuthConfig resourceInput <'Microsoft.DBforPostgreSQL/flexibleServers@2025-08 -01' >.properties .authConfig = {
277277 activeDirectoryAuth : 'Enabled'
278278 passwordAuth : 'Enabled'
279279}
@@ -369,17 +369,17 @@ var effectivePostgreSqlAdminPassword = postgreSqlAdminPassword == '$(secretOrRan
369369 ? '${uniqueString (subscription ().id , resourceGroup ().id , postgreSqlServerName )}!${replace (generatedPostgreSqlAdminPassword , '-' , '' )}'
370370 : postgreSqlAdminPassword
371371
372- resource keyVault 'Microsoft.KeyVault/vaults@2023-07 -01' existing = {
372+ resource keyVault 'Microsoft.KeyVault/vaults@2026-02 -01' existing = {
373373 name : last (split (effectiveKeyVaultResourceId , '/' ))
374374}
375375
376- resource postgreSqlPrivateDnsZone 'Microsoft.Network/privateDnsZones@2020 -06-01' = if (deployPostgreSql && postgreSqlNetworkIsolation ) {
376+ resource postgreSqlPrivateDnsZone 'Microsoft.Network/privateDnsZones@2024 -06-01' = if (deployPostgreSql && postgreSqlNetworkIsolation ) {
377377 name : postgreSqlPrivateDnsZoneName
378378 location : 'global'
379379 tags : deploymentTags
380380}
381381
382- resource postgreSqlPrivateDnsZoneVnetLink 'Microsoft.Network/privateDnsZones/virtualNetworkLinks@2020 -06-01' = if (deployPostgreSql && postgreSqlNetworkIsolation && deployPostgreSqlPrivateDnsLink ) {
382+ resource postgreSqlPrivateDnsZoneVnetLink 'Microsoft.Network/privateDnsZones/virtualNetworkLinks@2024 -06-01' = if (deployPostgreSql && postgreSqlNetworkIsolation && deployPostgreSqlPrivateDnsLink ) {
383383 name : effectivePostgreSqlPrivateDnsLinkName
384384 parent : postgreSqlPrivateDnsZone
385385 location : 'global'
@@ -428,11 +428,11 @@ module postgreSqlFlexibleServer 'br/public:avm/res/db-for-postgre-sql/flexible-s
428428 }
429429}
430430
431- resource postgreSqlFlexibleServerResource 'Microsoft.DBforPostgreSQL/flexibleServers@2025-06 -01-preview ' existing = if (deployPostgreSql ) {
431+ resource postgreSqlFlexibleServerResource 'Microsoft.DBforPostgreSQL/flexibleServers@2025-08 -01' existing = if (deployPostgreSql ) {
432432 name : postgreSqlServerName
433433}
434434
435- resource postgreSqlAllowAzureServicesFirewallRule 'Microsoft.DBforPostgreSQL/flexibleServers/firewallRules@2025-01 -01-preview ' = if (deployPostgreSql && !postgreSqlNetworkIsolation && postgreSqlAllowAzureServices ) {
435+ resource postgreSqlAllowAzureServicesFirewallRule 'Microsoft.DBforPostgreSQL/flexibleServers/firewallRules@2025-08 -01' = if (deployPostgreSql && !postgreSqlNetworkIsolation && postgreSqlAllowAzureServices ) {
436436 parent : postgreSqlFlexibleServerResource
437437 name : 'AllowAzureServices'
438438 properties : {
@@ -444,7 +444,7 @@ resource postgreSqlAllowAzureServicesFirewallRule 'Microsoft.DBforPostgreSQL/fle
444444 ]
445445}
446446
447- resource postgreSqlAdminSecret 'Microsoft.KeyVault/vaults/secrets@2023-07 -01' = if (deployPostgreSql && enablePostgreSqlKeyVaultSecret ) {
447+ resource postgreSqlAdminSecret 'Microsoft.KeyVault/vaults/secrets@2026-02 -01' = if (deployPostgreSql && enablePostgreSqlKeyVaultSecret ) {
448448 name : postgreSqlAdminSecretName
449449 parent : keyVault
450450 properties : {
0 commit comments