Skip to content

Commit 04ae890

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vhdx
2 parents a0ed60b + ea287a3 commit 04ae890

File tree

5 files changed

+106
-109
lines changed

5 files changed

+106
-109
lines changed

articles/azure-resource-manager/management/azure-subscription-service-limits.md

Lines changed: 1 addition & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -443,47 +443,7 @@ The latest values for Microsoft Purview quotas can be found in the [Microsoft Pu
443443

444444
## Microsoft Sentinel limits
445445

446-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-analytics-rules.md)]
447-
448-
### Incident limits
449-
450-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-incidents.md)]
451-
452-
### Machine learning-based limits
453-
454-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-machine-learning.md)]
455-
456-
### Multi workspace limits
457-
458-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-multi-workspace.md)]
459-
460-
### Notebook limits
461-
462-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-notebooks.md)]
463-
464-
### Repositories limits
465-
466-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-repositories.md)]
467-
468-
### Threat intelligence limits
469-
470-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-threat-intelligence.md)]
471-
472-
## TI upload indicators API limits
473-
474-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-ti-upload-api.md)]
475-
476-
### User and Entity Behavior Analytics (UEBA) limits
477-
478-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-ueba.md)]
479-
480-
### Watchlist limits
481-
482-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-watchlists.md)]
483-
484-
### Workbook limits
485-
486-
[!INCLUDE [sentinel-service-limits](../../sentinel/includes/sentinel-limits-workbooks.md)]
446+
For Microsoft Sentinel limits, see [Service limits for Microsoft Sentinel](../../sentinel/sentinel-service-limits.md)
487447

488448
## Service Bus limits
489449

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: "include file"
3+
description: "include file"
4+
services: microsoft-sentinel
5+
author: austinmccollum
6+
tags: azure-service-management
7+
ms.topic: "include"
8+
ms.date: 05/23/2023
9+
ms.author: austinmc
10+
ms.custom: "include file"
11+
---
12+
13+
The following limits apply to workspace manager in Microsoft Sentinel.
14+
15+
|Description | Limit |Dependency|
16+
|--|-------------------------|--------------------|
17+
|Number of published operations in a group<br>*Published operations* = (*member workspaces*) * (*content items*)| 2000 published operations |None|
18+

articles/sentinel/sentinel-service-limits.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,10 @@ This article lists the most common service limits you might encounter as you use
5656

5757
[!INCLUDE [sentinel-service-limits](includes/sentinel-limits-workbooks.md)]
5858

59+
## Workspace manager limits
60+
61+
[!INCLUDE [sentinel-service-limits](includes/sentinel-limits-workspace-manager.md)]
62+
5963
## Next steps
6064

6165
- [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md)

articles/sentinel/workspace-manager.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,10 @@ Workspace manager groups allow you to organize workspaces together based on busi
8181
## Publish the Group definition
8282
At this point, the content items selected haven't been published to the member workspace(s) yet.
8383

84+
> [!NOTE]
85+
> The publish action will fail if the [maximum publish operations](#known-limitations) are exceeded.
86+
> Consider splitting up member workspaces into additional groups if you approach this limit.
87+
8488
1. Select the group > **Publish content**.
8589

8690
:::image type="content" source="media/workspace-manager/publish-group.png" alt-text="Screenshot shows the group publish window.":::
@@ -111,6 +115,7 @@ Common reasons for failure include:
111115
- A member workspace has been deleted.
112116

113117
### Known limitations
118+
- The maximum published operations per group is 2000. *Published operations* = (*member workspaces*) * (*content items*).<br>For example, if you have 10 member workspaces in a group and you publish 20 content items in that group,<br>*published operations* = *10* * *20* = *200*.
114119
- Playbooks attributed or attached to analytics and automation rules aren't currently supported.
115120
- Workbooks stored in bring-your-own-storage aren't currently supported.
116121
- Workspace manager only manages content items published from the central workspace. It doesn't manage content created locally from member workspace(s).

articles/storage/elastic-san/elastic-san-networking.md

Lines changed: 78 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: How to configure networking for Azure Elastic SAN Preview, a servic
44
author: roygara
55
ms.service: azure-elastic-san-storage
66
ms.topic: how-to
7-
ms.date: 08/17/2023
7+
ms.date: 08/25/2023
88
ms.author: rogarana
9-
ms.custom: ignite-2022, devx-track-azurepowershell, references_regions
9+
ms.custom: ignite-2022, devx-track-azurepowershell, references_regions, engagement
1010
---
1111

1212
# Configure networking for an Elastic SAN Preview
@@ -15,91 +15,40 @@ Azure Elastic storage area network (SAN) Preview allows you to secure and contro
1515

1616
This article describes how to configure your Elastic SAN to allow access from your Azure virtual network infrastructure.
1717

18-
You can configure your Elastic SAN volume groups to allow access only from endpoints on specific virtual network subnets. The allowed subnets may belong to virtual networks in the same subscription, or those in a different subscription, including a subscription belonging to a different Azure Active Directory tenant.
19-
2018
To configure network access to your Elastic SAN:
2119

2220
> [!div class="checklist"]
2321
> - [Configure a virtual network endpoint](#configure-a-virtual-network-endpoint).
24-
> - [Configure virtual network rules](#configure-virtual-network-rules) to control the source and type of traffic to your Elastic SAN.
2522
> - [Configure client connections](#configure-client-connections).
2623
2724
## Configure a virtual network endpoint
2825

29-
You can allow access to your Elastic SAN volume groups from two types of Azure virtual network endpoints:
30-
31-
- [Storage service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md)
32-
- [Private endpoints](../../private-link/private-endpoint-overview.md)
33-
34-
To decide which type of endpoint works best for you, see [Compare Private Endpoints and Service Endpoints](../../virtual-network/vnet-integration-for-azure-services.md#compare-private-endpoints-and-service-endpoints).
35-
36-
Each volume group can be configured to allow access from either public storage service endpoints or private endpoints, but not both at the same time. Once network access is configured for a volume group, the configuration is inherited by all volumes belonging to the group.
37-
38-
The process for enabling each type of endpoint follows:
39-
40-
- [Configure an Azure Storage service endpoint](#configure-an-azure-storage-service-endpoint)
41-
- [Configure a private endpoint](#configure-a-private-endpoint)
42-
43-
### Configure an Azure Storage service endpoint
44-
45-
You can configure an Azure Storage service endpoint from the virtual network where access is required. You must have permission to the `Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action` [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) via a custom Azure role to configure a service endpoint.
46-
47-
> [!NOTE]
48-
> Configuration of rules that grant access to subnets in virtual networks that are a part of a different Azure Active Directory tenant are currently only supported through PowerShell, CLI and REST APIs. These rules cannot be configured through the Azure portal, though they may be viewed in the portal.
49-
50-
# [Portal](#tab/azure-portal)
51-
52-
1. Navigate to your virtual network and select **Service Endpoints**.
53-
1. Select **+ Add**.
54-
1. On the **Add service endpoints** screen:
55-
1. For **Service** select **Microsoft.Storage.Global** to add a [cross-region service endpoint](../common/storage-network-security.md#azure-storage-cross-region-service-endpoints).
56-
57-
> [!NOTE]
58-
> You might see **Microsoft.Storage** listed as an available storage service endpoint. That option is for intra-region endpoints which exist for backward compatibility only. Always use cross-region endpoints unless you have a specific reason for using intra-region ones.
59-
60-
1. For **Subnets** select all the subnets where you want to allow access.
61-
1. Select **Add**.
26+
You can configure your Elastic SAN volume groups to allow access only from endpoints on specific virtual network subnets. The allowed subnets may belong to virtual networks in the same subscription, or those in a different subscription, including a subscription belonging to a different Azure Active Directory tenant.
6227

63-
:::image type="content" source="media/elastic-san-create/elastic-san-service-endpoint.png" alt-text="Screenshot of the virtual network service endpoint page, adding the storage service endpoint." lightbox="media/elastic-san-create/elastic-san-service-endpoint.png":::
28+
You can allow access to your Elastic SAN volume group from two types of Azure virtual network endpoints:
6429

65-
# [PowerShell](#tab/azure-powershell)
30+
- [Private endpoints](../../private-link/private-endpoint-overview.md)
31+
- [Storage service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md)
6632

67-
Use this sample code to create a storage service endpoint for your Elastic SAN volume group with PowerShell.
33+
A private endpoint uses one or more private IP addresses from your virtual network subnet to access an Elastic SAN volume group over the Microsoft backbone network. With a private endpoint, traffic between your virtual network and the volume group are secured over a private link.
6834

69-
```powershell
70-
# Define some variables
71-
$RgName = "<ResourceGroupName>"
72-
$VnetName = "<VnetName>"
73-
$SubnetName = "<SubnetName>"
35+
Virtual network service endpoints are public and accessible via the internet. You can [Configure virtual network rules](#configure-virtual-network-rules) to control access to your volume group when using storage service endpoints.
7436

75-
# Get the virtual network and subnet
76-
$Vnet = Get-AzVirtualNetwork -ResourceGroupName $RgName -Name $VnetName
77-
$Subnet = Get-AzVirtualNetworkSubnetConfig -VirtualNetwork $Vnet -Name $SubnetName
37+
Network rules only apply to the public endpoints of a volume group, not private endpoints. The process of approving the creation of a private endpoint grants implicit access to traffic from the subnet that hosts the private endpoint. You can use [Network Policies](../../private-link/disable-private-endpoint-network-policy.md) to control traffic over private endpoints if you want to refine access rules. If you want to use private endpoints exclusively, do not enable service endpoints for the volume group.
7838

79-
# Enable the storage service endpoint
80-
$Vnet | Set-AzVirtualNetworkSubnetConfig -Name $SubnetName -AddressPrefix $Subnet.AddressPrefix -ServiceEndpoint "Microsoft.Storage.Global" | Set-AzVirtualNetwork
81-
```
82-
83-
# [Azure CLI](#tab/azure-cli)
39+
To decide which type of endpoint works best for you, see [Compare Private Endpoints and Service Endpoints](../../virtual-network/vnet-integration-for-azure-services.md#compare-private-endpoints-and-service-endpoints).
8440

85-
Use this sample code to create a storage service endpoint for your Elastic SAN volume group with the Azure CLI.
41+
Once network access is configured for a volume group, the configuration is inherited by all volumes belonging to the group.
8642

87-
```azurecli
88-
# Define some variables
89-
RgName="<ResourceGroupName>"
90-
VnetName="<VnetName>"
91-
SubnetName="<SubnetName>"
92-
93-
# Enable the storage service endpoint
94-
az network vnet subnet update --resource-group $RgName --vnet-name $VnetName --name $SubnetName --service-endpoints "Microsoft.Storage.Global"
95-
```
43+
The process for enabling each type of endpoint follows:
9644

97-
---
45+
- [Configure a private endpoint](#configure-a-private-endpoint)
46+
- [Configure an Azure Storage service endpoint](#configure-an-azure-storage-service-endpoint)
9847

9948
### Configure a private endpoint
10049

10150
> [!IMPORTANT]
102-
> - Private endpoints for Elastic SAN Preview are supported in all regions that Elastic SAN is available in if you deploy with [locally-redundant storage (LRS)](elastic-san-planning.md#redundancy) as their redundancy option. Private endpoints aren't currently supported Elastic SANs deployed using [zone-redundant storage (ZRS)](elastic-san-planning.md#redundancy) as their redundancy option.
51+
> - For Elastic SANs using [locally-redundant storage (LRS)](elastic-san-planning.md#redundancy) as their redundancy option, private endpoints are supported in all regions that Elastic SAN is available. Private endpoints aren't currently supported for elastic SANs using [zone-redundant storage (ZRS)](elastic-san-planning.md#redundancy) as their redundancy option.
10352
>
10453
> - Before you can create a private endpoint connection to a volume group, it must contain at least one volume.
10554
@@ -109,6 +58,8 @@ There are two steps involved in configuring a private endpoint connection:
10958
> - Creating the endpoint and the associated connection.
11059
> - Approving the connection.
11160
61+
You can also use [Network Policies](../../private-link/disable-private-endpoint-network-policy.md) to refine access control over private endpoints.
62+
11263
To create a private endpoint for an Elastic SAN volume group, you must have the [Elastic SAN Volume Group Owner](../../role-based-access-control/built-in-roles.md#elastic-san-volume-group-owner) role. To approve a new private endpoint connection, you must have permission to the [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftelasticsan) `Microsoft.ElasticSan/elasticSans/PrivateEndpointConnectionsApproval/action`. Permission for this operation is included in the [Elastic SAN Network Admin](../../role-based-access-control/built-in-roles.md#elastic-san-owner) role, but it can also be granted via a custom Azure role.
11364

11465
If you create the endpoint from a user account that has all of the necessary roles and permissions required for creation and approval, the process can be completed in one step. If not, it will require two separate steps by two different users.
@@ -284,7 +235,67 @@ az network private-endpoint-connection approve \
284235

285236
---
286237

287-
## Configure virtual network rules
238+
### Configure an Azure Storage service endpoint
239+
240+
To configure an Azure Storage service endpoint from the virtual network where access is required, you must have permission to the `Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action` [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) via a custom Azure role to configure a service endpoint.
241+
242+
Virtual network service endpoints are public and accessible via the internet. You can [Configure virtual network rules](#configure-virtual-network-rules) to control access to your volume group when using storage service endpoints.
243+
244+
> [!NOTE]
245+
> Configuration of rules that grant access to subnets in virtual networks that are a part of a different Azure Active Directory tenant are currently only supported through PowerShell, CLI and REST APIs. These rules cannot be configured through the Azure portal, though they may be viewed in the portal.
246+
247+
# [Portal](#tab/azure-portal)
248+
249+
1. Navigate to your virtual network and select **Service Endpoints**.
250+
1. Select **+ Add**.
251+
1. On the **Add service endpoints** screen:
252+
1. For **Service** select **Microsoft.Storage.Global** to add a [cross-region service endpoint](../common/storage-network-security.md#azure-storage-cross-region-service-endpoints).
253+
254+
> [!NOTE]
255+
> You might see **Microsoft.Storage** listed as an available storage service endpoint. That option is for intra-region endpoints which exist for backward compatibility only. Always use cross-region endpoints unless you have a specific reason for using intra-region ones.
256+
257+
1. For **Subnets** select all the subnets where you want to allow access.
258+
1. Select **Add**.
259+
260+
:::image type="content" source="media/elastic-san-create/elastic-san-service-endpoint.png" alt-text="Screenshot of the virtual network service endpoint page, adding the storage service endpoint." lightbox="media/elastic-san-create/elastic-san-service-endpoint.png":::
261+
262+
# [PowerShell](#tab/azure-powershell)
263+
264+
Use this sample code to create a storage service endpoint for your Elastic SAN volume group with PowerShell.
265+
266+
```powershell
267+
# Define some variables
268+
$RgName = "<ResourceGroupName>"
269+
$VnetName = "<VnetName>"
270+
$SubnetName = "<SubnetName>"
271+
272+
# Get the virtual network and subnet
273+
$Vnet = Get-AzVirtualNetwork -ResourceGroupName $RgName -Name $VnetName
274+
$Subnet = Get-AzVirtualNetworkSubnetConfig -VirtualNetwork $Vnet -Name $SubnetName
275+
276+
# Enable the storage service endpoint
277+
$Vnet | Set-AzVirtualNetworkSubnetConfig -Name $SubnetName -AddressPrefix $Subnet.AddressPrefix -ServiceEndpoint "Microsoft.Storage.Global" | Set-AzVirtualNetwork
278+
```
279+
280+
# [Azure CLI](#tab/azure-cli)
281+
282+
Use this sample code to create a storage service endpoint for your Elastic SAN volume group with the Azure CLI.
283+
284+
```azurecli
285+
# Define some variables
286+
RgName="<ResourceGroupName>"
287+
VnetName="<VnetName>"
288+
SubnetName="<SubnetName>"
289+
290+
# Enable the storage service endpoint
291+
az network vnet subnet update --resource-group $RgName --vnet-name $VnetName --name $SubnetName --service-endpoints "Microsoft.Storage.Global"
292+
```
293+
294+
---
295+
296+
#### Configure virtual network rules
297+
298+
All incoming requests for data over a service endpoint are blocked by default. Only applications that request data from allowed sources that you configure in your network rules will be able to access your data.
288299

289300
You can manage virtual network rules for volume groups through the Azure portal, PowerShell, or CLI.
290301

@@ -376,7 +387,6 @@ You can manage virtual network rules for volume groups through the Azure portal,
376387
```
377388
378389
---
379-
---
380390
381391
## Configure client connections
382392

0 commit comments

Comments
 (0)