Skip to content

Commit 04b5d14

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into healthprobe
2 parents 9fd34ea + 028b29d commit 04b5d14

File tree

43 files changed

+235
-632
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+235
-632
lines changed

articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ curl -X POST -H "Content-Type: application/x-www-form-urlencoded" -d 'client_id=
167167
| --------------- | --------- | ----------- |
168168
| `tenant` | Required | The directory tenant the application plans to operate against, in GUID or domain-name format. |
169169
| `client_id` | Required | The application ID that's assigned to your app. You can find this information in the portal where you registered your app. |
170-
| `scope` | Required | The value passed for the `scope` parameter in this request should be the resource identifier (application ID URI) of the resource you want, affixed with the `.default` suffix. For the Microsoft Graph example, the value is `https://graph.microsoft.com/.default`. <br/>This value tells the Microsoft identity platform that of all the direct application permissions you have configured for your app, the endpoint should issue a token for the ones associated with the resource you want to use. To learn more about the `/.default` scope, see the [consent documentation](v2-permissions-and-consent.md#the-default-scope). |
170+
| `scope` | Required | The value passed for the `scope` parameter in this request should be the resource identifier (application ID URI) of the resource you want, affixed with the `.default` suffix. All scopes included must be for a single resource. Including scopes for multiple resources will result in an error. <br/>For the Microsoft Graph example, the value is `https://graph.microsoft.com/.default`. This value tells the Microsoft identity platform that of all the direct application permissions you have configured for your app, the endpoint should issue a token for the ones associated with the resource you want to use. To learn more about the `/.default` scope, see the [consent documentation](v2-permissions-and-consent.md#the-default-scope). |
171171
| `client_secret` | Required | The client secret that you generated for your app in the app registration portal. The client secret must be URL-encoded before being sent. The Basic auth pattern of instead providing credentials in the Authorization header, per [RFC 6749](https://datatracker.ietf.org/doc/html/rfc6749#section-2.3.1) is also supported. |
172172
| `grant_type` | Required | Must be set to `client_credentials`. |
173173

@@ -189,7 +189,7 @@ scope=https%3A%2F%2Fgraph.microsoft.com%2F.default
189189
| ----------------------- | --------- | ----------- |
190190
| `tenant` | Required | The directory tenant the application plans to operate against, in GUID or domain-name format. |
191191
| `client_id` | Required | The application (client) ID that's assigned to your app. |
192-
| `scope` | Required | The value passed for the `scope` parameter in this request should be the resource identifier (application ID URI) of the resource you want, affixed with the `.default` suffix. For the Microsoft Graph example, the value is `https://graph.microsoft.com/.default`. <br/>This value informs the Microsoft identity platform that of all the direct application permissions you have configured for your app, it should issue a token for the ones associated with the resource you want to use. To learn more about the `/.default` scope, see the [consent documentation](v2-permissions-and-consent.md#the-default-scope). |
192+
| `scope` | Required | The value passed for the `scope` parameter in this request should be the resource identifier (application ID URI) of the resource you want, affixed with the `.default` suffix. All scopes included must be for a single resource. Including scopes for multiple resources will result in an error. <br/>For the Microsoft Graph example, the value is `https://graph.microsoft.com/.default`. This value tells the Microsoft identity platform that of all the direct application permissions you have configured for your app, the endpoint should issue a token for the ones associated with the resource you want to use. To learn more about the `/.default` scope, see the [consent documentation](v2-permissions-and-consent.md#the-default-scope). |
193193
| `client_assertion_type` | Required | The value must be set to `urn:ietf:params:oauth:client-assertion-type:jwt-bearer`. |
194194
| `client_assertion` | Required | An assertion (a JSON web token) that you need to create and sign with the certificate you registered as credentials for your application. Read about [certificate credentials](active-directory-certificate-credentials.md) to learn how to register your certificate and the format of the assertion.|
195195
| `grant_type` | Required | Must be set to `client_credentials`. |

articles/aks/deploy-extensions-az-cli.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Deploy and manage cluster extensions by using the Azure CLI
33
description: Learn how to use Azure CLI to deploy and manage extensions for Azure Kubernetes Service clusters.
4-
ms.date: 05/12/2023
4+
ms.date: 05/15/2023
55
ms.topic: article
66
author: JnHs
77
ms.author: jenhayes
@@ -101,7 +101,7 @@ To list all extensions installed on a cluster, use `k8s-extension list`, passing
101101
az k8s-extension list --cluster-name <clusterName> --resource-group <resourceGroupName> --cluster-type managedClusters
102102
```
103103

104-
### Update extension instance
104+
## Update extension instance
105105

106106
> [!NOTE]
107107
> Refer to documentation for the specific extension type to understand the specific settings in `--configuration-settings` and `--configuration-protected-settings` that are able to be updated. For `--configuration-protected-settings`, all settings are expected to be provided, even if only one setting is being updated. If any of these settings are omitted, those settings will be considered obsolete and deleted.
@@ -122,6 +122,14 @@ az k8s-extension update --name azureml --extension-type Microsoft.AzureML.Kubern
122122
| `--resource-group` | The resource group containing the AKS cluster |
123123
| `--cluster-type` | The cluster type on which the extension instance has to be created. Specify `managedClusters` as it maps to AKS clusters|
124124

125+
If updating a Kubernetes application procured through Marketplace, the following parameters are also required:
126+
127+
| Parameter name | Description |
128+
|----------------|------------|
129+
|`--plan-name` | **Plan ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. |
130+
|`--plan-product` | **Product ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. An example of this is the name of the ISV offering used. |
131+
|`--plan-publisher` | **Publisher ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. |
132+
125133
### Optional parameters for update
126134

127135
| Parameter name | Description |
@@ -134,9 +142,7 @@ az k8s-extension update --name azureml --extension-type Microsoft.AzureML.Kubern
134142
| `--configuration-protected-settings-file` | Path to the JSON file having key value pairs to be used for passing in sensitive settings to the extension. If this parameter is used in the command, then `--configuration-protected-settings` can't be used in the same command. |
135143
| `--scope` | Scope of installation for the extension - `cluster` or `namespace` |
136144
| `--release-train` | Extension authors can publish versions in different release trains such as `Stable`, `Preview`, etc. If this parameter isn't set explicitly, `Stable` is used as default. This parameter can't be used when `autoUpgradeMinorVersion` parameter is set to `false`. |
137-
|`--plan-name` | **Plan ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. |
138-
|`--plan-product` | **Product ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. An example of this is the name of the ISV offering used. |
139-
|`--plan-publisher` | **Publisher ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. |
145+
140146

141147
## Delete extension instance
142148

articles/application-gateway/create-ssl-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Thumbprint Subject
5353
E1E81C23B3AD33F9B4D1717B20AB65DBB91AC630 CN=www.contoso.com
5454
```
5555

56-
Use [Export-PfxCertificate](/powershell/module/pki/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate. Make sure your password is 4 - 12 characters long:
56+
Use [Export-PfxCertificate](/powershell/module/pki/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate. The supported pfc algorithms are listed at [PFXImportCertStore function](/windows/win32/api/wincrypt/nf-wincrypt-pfximportcertstore#remarks). Make sure your password is 4 - 12 characters long:
5757

5858

5959
```powershell

articles/azure-netapp-files/azacsnap-introduction.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,16 +42,20 @@ Azure Application Consistent Snapshot tool (AzAcSnap) is a command-line tool tha
4242

4343
AzAcSnap leverages the volume snapshot and replication functionalities in Azure NetApp Files and Azure Large Instance. It provides the following benefits:
4444

45+
- **Rapid backup snapshots independent of database size**
46+
- AzAcSnap takes snapshot backups regardless of the size of the volumes or database by leveraging the snapshot technology of storage.
47+
- It takes snapshots in parallel across all the volumes thereby allowing multiple volumes to be part of the database storage.
48+
- Tests have shown a 100+TiB database stored across 16 volumes was able to be snapshot backup in less than 2 minutes.
4549
- **Application-consistent data protection**
46-
AzAcSnap is a centralized solution for backing up critical database files. It ensures database consistency before performing a storage volume snapshot. As a result, it ensures that the storage volume snapshot can be used for database recovery.
50+
- AzAcSnap can be deployed as a centralized or distributed solution for backing up critical database files. It ensures database consistency before performing a storage volume snapshot. As a result, it ensures that the storage volume snapshot can be used for database recovery.
4751
- **Database catalog management**
48-
When you use AzAcSnap with SAP HANA, the records within the backup catalog are kept current with storage snapshots. This capability allows a database administrator to see the backup activity.
52+
- When you use AzAcSnap with SAP HANA, the records within the backup catalog are kept current with storage snapshots. This capability allows a database administrator to see the backup activity.
4953
- **Ad hoc volume protection**
50-
This capability is helpful for non-database volumes that don't need application quiescing before taking a storage snapshot. Examples include SAP HANA log-backup volumes or SAPTRANS volumes.
54+
- This capability is helpful for non-database volumes that don't need application quiescing before taking a storage snapshot. Examples include SAP HANA log-backup volumes or SAPTRANS volumes.
5155
- **Cloning of storage volumes**
52-
This capability provides space-efficient storage volume clones for development and test purposes.
56+
- This capability provides space-efficient storage volume clones for development and test purposes.
5357
- **Support for disaster recovery**
54-
AzAcSnap leverages storage volume replication to provide options for recovering replicated application-consistent snapshots at a remote site.
58+
- AzAcSnap leverages storage volume replication to provide options for recovering replicated application-consistent snapshots at a remote site.
5559

5660
AzAcSnap is a single binary. It does not need additional agents or plug-ins to interact with the database or the storage (Azure NetApp Files via Azure Resource Manager, and Azure Large Instance via SSH). AzAcSnap must be installed on a system that has connectivity to the database and the storage. However, the flexibility of installation and configuration allows for either a single centralized installation (Azure NetApp Files only) or a fully distributed installation (Azure NetApp Files and Azure Large Instance) with copies installed on each database installation.
5761

articles/communication-services/concepts/advisor-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ The following SDKs are supported for this feature, along with all their supporte
3333
* Phone Numbers
3434
* Management
3535
* Network Traversal
36+
* Call Automation
3637

3738
## Next steps
3839

articles/connectors/connectors-native-webhook.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,24 +11,29 @@ tags: connectors
1111

1212
# Create and run automated event-based workflows by using HTTP webhooks in Azure Logic Apps
1313

14-
With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in HTTP Webhook connector, you can create automated tasks and workflows that subscribe to a service endpoint, wait for specific events, and run based on those events, rather than regularly checking or *polling* that endpoint.
14+
With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the HTTP Webhook built-in connector, you can create an automated workflow that subscribes to a service endpoint, waits for specific events, and runs specific actions, rather than regularly check or *poll* the service endpoint.
1515

1616
Here are some example webhook-based workflows:
1717

18-
* Wait for an item to arrive from an [Azure Event Hub](https://github.com/logicappsio/EventHubAPI) before triggering a logic app run.
18+
* Wait for an event to arrive from [Azure Event Hubs](https://github.com/logicappsio/EventHubAPI) before triggering a workflow run.
1919
* Wait for an approval before continuing a workflow.
2020

21-
This article shows how to use the Webhook trigger and Webhook action so that your logic app can receive and respond to events at a service endpoint.
21+
This how-to guide shows how to use the HTTP Webhook trigger and Webhook action so that your logic app workflow can receive and respond to events at a service endpoint.
2222

2323
## How do webhooks work?
2424

25-
A webhook trigger is event-based, which doesn't depend on checking or polling regularly for new items. When you save a logic app that starts with a webhook trigger, or when you change your logic app from disabled to enabled, the webhook trigger *subscribes* to the specified service endpoint by registering a *callback URL* with that endpoint. The trigger then waits for that service endpoint to call the URL, which starts running the logic app. Similar to the [Request trigger](connectors-native-reqres.md), the logic app fires immediately when the specified event happens. The webhook trigger *unsubscribes* from the service endpoint if you remove the trigger and save your logic app, or when you change your logic app from enabled to disabled.
25+
A webhook trigger is event-based, which doesn't depend on checking or polling regularly for new data or events. After you add a webhook trigger to an empty workflow and then save the workflow, or after you re-enable a disabled logic app resource, the webhook trigger *subscribes* to the specified service endpoint by registering a *callback URL* with that endpoint. The trigger then waits for that service endpoint to call the URL, which fires the trigger and starts the workflow. Similar to the [Request trigger](connectors-native-reqres.md), a webhook trigger fires immediately. The webhook trigger also remains subscribed to the service endpoint unless you manually take the following actions:
2626

27-
A webhook action is also event-based and *subscribes* to the specified service endpoint by registering a *callback URL* with that endpoint. The webhook action pauses the logic app's workflow and waits until the service endpoint calls the URL before the logic app resumes running. The webhook action *unsubscribes* from the service endpoint in these cases:
27+
* Change the trigger's parameter values.
28+
* Delete the trigger and then save your workflow.
29+
* Disable your logic app resource.
2830

29-
* When the webhook action successfully finishes
30-
* If the logic app run is canceled while waiting for a response
31-
* Before the logic app times out
31+
Similar to the webhook trigger, a webhook action works is also event-based. After you add a webhook action to an existing workflow and then save the workflow, or after you re-enable a disabled logic app resource, the webhook action *subscribes* to the specified service endpoint by registering a *callback URL* with that endpoint. When the workflow runs, the webhook action pauses the workflow and waits until the service endpoint calls the URL before the workflow resumes running. A webhook action *unsubscribes* from the service endpoint when the following conditions occur:
32+
33+
* The webhook action successfully finishes.
34+
* The workflow run is canceled while waiting for a response.
35+
* Before a workflow run times out.
36+
* You change any webhook action parameter values that are used as inputs by a webhook trigger.
3237

3338
For example, the Office 365 Outlook connector's [**Send approval email**](connectors-create-api-office365-outlook.md) action is an example of webhook action that follows this pattern. You can extend this pattern into any service by using the webhook action.
3439

@@ -51,7 +56,7 @@ For information about encryption, security, and authorization for inbound calls
5156

5257
This built-in trigger calls the subscribe endpoint on the target service and registers a callback URL with the target service. Your logic app then waits for the target service to send an `HTTP POST` request to the callback URL. When this event happens, the trigger fires and passes any data in the request along to the workflow.
5358

54-
1. Sign in to the [Azure portal](https://portal.azure.com). Open your blank logic app in Logic App Designer.
59+
1. In the [Azure portal](https://portal.azure.com), pen your blank logic app workflow in the designer.
5560

5661
1. In the designer's search box, enter `http webhook` as your filter. From the **Triggers** list, select the **HTTP Webhook** trigger.
5762

articles/firewall-manager/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,8 @@ Azure Firewall Manager has the following known issues:
8383
|---------|---------|---------|
8484
|Traffic splitting|Microsoft 365 and Azure Public PaaS traffic splitting isn't currently supported. As such, selecting a third-party provider for V2I or B2I also sends all Azure Public PaaS and Microsoft 365 traffic via the partner service.|Investigating traffic splitting at the hub.
8585
|Base policies must be in same region as local policy|Create all your local policies in the same region as the base policy. You can still apply a policy that was created in one region on a secured hub from another region.|Investigating|
86-
|Filtering inter-hub traffic in secure virtual hub deployments|Secured Virtual Hub to Secured Virtual Hub communication filtering isn't yet supported. However, hub to hub communication still works if private traffic filtering via Azure Firewall isn't enabled.|Investigating|
87-
|Branch to branch traffic with private traffic filtering enabled|Branch to branch traffic isn't supported when private traffic filtering is enabled. |Investigating.<br><br>Don't secure private traffic if branch to branch connectivity is critical.|
86+
|Filtering inter-hub traffic in secure virtual hub deployments|Secured Virtual Hub to Secured Virtual Hub communication filtering is supported with the Routing Intent feature.|Enable Routing Intent on your Virtual WAN Hub by setting Inter-hub to **Enabled** in Azure Firewall Manager. See [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md) for more information about this feature.|
87+
|Branch to branch traffic with private traffic filtering enabled|Branch to branch traffic can be inspected by Azure Firewall in secured hub scenarios if Routing Intent is enabled. |Enable Routing Intent on your Virtual WAN Hub by setting Inter-hub to **Enabled** in Azure Firewall Manager. See [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md) for more information about this feature.|
8888
|All Secured Virtual Hubs sharing the same virtual WAN must be in the same resource group.|This behavior is aligned with Virtual WAN Hubs today.|Create multiple Virtual WANs to allow Secured Virtual Hubs to be created in different resource groups.|
8989
|Bulk IP address addition fails|The secure hub firewall goes into a failed state if you add multiple public IP addresses.|Add smaller public IP address increments. For example, add 10 at a time.|
9090
|DDoS Protection not supported with secured virtual hubs|DDoS Protection is not integrated with vWANs.|Investigating|

0 commit comments

Comments
 (0)