Skip to content

Commit 0c2eb71

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram-0929
2 parents 160a8d1 + 811b6be commit 0c2eb71

File tree

75 files changed

+1336
-1303
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

75 files changed

+1336
-1303
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20438,6 +20438,21 @@
2043820438
"redirect_url": "/azure/logic-apps/create-serverless-apps-visual-studio",
2043920439
"redirect_document_id": true
2044020440
},
20441+
{
20442+
"source_path_from_root": "/articles/logic-apps/logic-apps-enterprise-integration-edifact-encode.md",
20443+
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-edifact",
20444+
"redirect_document_id": true
20445+
},
20446+
{
20447+
"source_path_from_root": "/articles/logic-apps/logic-apps-enterprise-integration-edifact-decode.md",
20448+
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-edifact",
20449+
"redirect_document_id": false
20450+
},
20451+
{
20452+
"source_path_from_root": "/articles/logic-apps/logic-apps-enterprise-integration-edifact_inputfile_unh2.5.md",
20453+
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-edifact",
20454+
"redirect_document_id": false
20455+
},
2044120456
{
2044220457
"source_path_from_root": "/articles/machine-learning/service/index.yml",
2044320458
"redirect_url": "/azure/machine-learning/",

articles/active-directory/fundamentals/resilience-in-infrastructure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Build resilience in your IAM infrastructure with Azure Active Directory
3-
description: A guide for architects and IT administrators non building resilience to disruption of their IAM infrastructure.
3+
description: A guide for architects and IT administrators on building resilience to disruption of their IAM infrastructure.
44
services: active-directory
55
author: BarbaraSelden
66
manager: daveba
@@ -65,4 +65,4 @@ Resilience resources for developers
6565

6666
* [Build IAM resilience in your applications](resilience-app-development-overview.md)
6767

68-
* [Build resilience in your CIAM systems](resilience-b2c.md)
68+
* [Build resilience in your CIAM systems](resilience-b2c.md)

articles/app-service/reference-app-settings.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -567,6 +567,9 @@ The following environment variables are related to the [push notifications](/pre
567567
| `WEBSITE_PUSH_TAGS_REQUIRING_AUTH` | Read-only. Contains a list of tags in the notification registration that requires user authentication. |
568568
| `WEBSITE_PUSH_TAGS_DYNAMIC` | Read-only. Contains a list of tags in the notification registration that were added automatically. |
569569

570+
>[!NOTE]
571+
> This article contains references to the term *whitelist*, a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
572+
570573
<!--
571574
## WellKnownAppSettings
572575

articles/application-gateway/migrate-v1-v2.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,7 @@ To run the script:
7979
-resourceId <v1 application gateway Resource ID>
8080
-subnetAddressRange <subnet space you want to use>
8181
-appgwName <string to use to append>
82+
-AppGwResourceGroupName <resource group name you want to use>
8283
-sslCertificates <comma-separated SSLCert objects as above>
8384
-trustedRootCertificates <comma-separated Trusted Root Cert objects as above>
8485
-privateIpAddress <private IP string>
@@ -96,8 +97,9 @@ To run the script:
9697
$appgw.Id
9798
```
9899
99-
* **subnetAddressRange: [String]: Required** - This is the IP address space that you've allocated (or want to allocate) for a new subnet that contains your new v2 gateway. This must be specified in the CIDR notation. For example: 10.0.0.0/24. You don't need to create this subnet in advance. The script creates it for you if it doesn't exist.
100+
* **subnetAddressRange: [String]: Required** - This is the IP address space that you've allocated (or want to allocate) for a new subnet that contains your new v2 gateway. This must be specified in the CIDR notation. For example: 10.0.0.0/24. You don't need to create this subnet in advance but the CIDR needs to be part of the VNET address space. The script creates it for you if it doesn't exist and if it exists, it will use the existing one (make sure the subnet is either empty, contains only v2 Gateway if any, and has enough available IPs).
100101
* **appgwName: [String]: Optional**. This is a string you specify to use as the name for the new Standard_v2 or WAF_v2 gateway. If this parameter isn't supplied, the name of your existing v1 gateway will be used with the suffix *_v2* appended.
102+
* **AppGwResourceGroupName: [String]: Optional**. Name of resource group where you want v2 Application Gateway resources to be created (default value will be <v1-app-gw-rgname>)
101103
* **sslCertificates: [PSApplicationGatewaySslCertificate]: Optional**. A comma-separated list of PSApplicationGatewaySslCertificate objects that you create to represent the TLS/SSL certs from your v1 gateway must be uploaded to the new v2 gateway. For each of your TLS/SSL certs configured for your Standard v1 or WAF v1 gateway, you can create a new PSApplicationGatewaySslCertificate object via the `New-AzApplicationGatewaySslCertificate` command shown here. You need the path to your TLS/SSL Cert file and the password.
102104
103105
This parameter is only optional if you don't have HTTPS listeners configured for your v1 gateway or WAF. If you have at least one HTTPS listener setup, you must specify this parameter.
@@ -135,6 +137,7 @@ To run the script:
135137
-resourceId /subscriptions/8b1d0fea-8d57-4975-adfb-308f1f4d12aa/resourceGroups/MyResourceGroup/providers/Microsoft.Network/applicationGateways/myv1appgateway `
136138
-subnetAddressRange 10.0.0.0/24 `
137139
-appgwname "MynewV2gw" `
140+
-AppGwResourceGroupName "MyResourceGroup" `
138141
-sslCertificates $mySslCert1,$mySslCert2 `
139142
-trustedRootCertificates $trustedCert `
140143
-privateIpAddress "10.0.0.1" `

articles/azure-arc/servers/private-link-security.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Use Azure Private Link to securely connect networks to Azure Arc
33
description: Learn how to use Azure Private Link to securely connect networks to Azure Arc.
44
ms.topic: conceptual
5-
ms.date: 09/30/2021
5+
ms.date: 10/01/2021
66
---
77

88
# Use Azure Private Link to securely connect networks to Azure Arc
@@ -39,7 +39,9 @@ Azure Arc Private Link Scope (preview) connects private endpoints (and the virtu
3939

4040
:::image type="content" source="./media/private-link-security/private-link-topology.png" alt-text="Diagram of basic resource topology" border="true":::
4141

42-
Connectivity to any other Azure resource from an Azure Arc-enabled server requires configuring Private Link for each service. For more information about configuring Private Link for the Azure services listed earlier, see the [Azure Automation](../../automation/how-to/private-link-security.md), [Azure Monitor](../../azure-monitor/logs/private-link-security.md), [Azure Key Vault](../../key-vault/general/private-link-service.md), or [Azure Blob storage](../../private-link/tutorial-private-endpoint-storage-portal.md) articles.
42+
Connectivity to any other Azure resource from an Azure Arc-enabled server requires configuring Private Link for each service, which is optional, but recommended. Azure Private Link requires separate configuration per service.
43+
44+
For more information about configuring Private Link for the Azure services listed earlier, see the [Azure Automation](../../automation/how-to/private-link-security.md), [Azure Monitor](../../azure-monitor/logs/private-link-security.md), [Azure Key Vault](../../key-vault/general/private-link-service.md), or [Azure Blob storage](../../private-link/tutorial-private-endpoint-storage-portal.md) articles.
4345

4446
> [!IMPORTANT]
4547
> Azure Private Link is now generally available. Both Private Endpoint and Private Link service (service behind standard load balancer) are generally available. Different Azure PaaS onboard to Azure Private Link following different schedules. See [Private Link availability](../../private-link/availability.md) for an updated status of Azure PaaS on Private Link. For known limitations, see [Private Endpoint](../../private-link/private-endpoint-overview.md#limitations) and [Private Link Service](../../private-link/private-link-service-overview.md#limitations).

articles/connectors/managed.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -606,8 +606,8 @@ For more information, see these topics:
606606
<!-- Integration account connector docs -->
607607
[as2-doc]: ../logic-apps/logic-apps-enterprise-integration-as2.md "Encode and decode messages that use the AS2 protocol"
608608
[edifact-doc]: ../logic-apps/logic-apps-enterprise-integration-edifact.md "Encode and decode messages that use the EDIFACT protocol"
609-
[edifact-decode-doc]: ../logic-apps/logic-apps-enterprise-integration-EDIFACT-decode.md "Decode messages that use the EDIFACT protocol"
610-
[edifact-encode-doc]: ../logic-apps/logic-apps-enterprise-integration-EDIFACT-encode.md "Encode messages that use the EDIFACT protocol"
609+
[edifact-decode-doc]: ../logic-apps/logic-apps-enterprise-integration-edifact.md "Decode messages that use the EDIFACT protocol"
610+
[edifact-encode-doc]: ../logic-apps/logic-apps-enterprise-integration-edifact.md "Encode messages that use the EDIFACT protocol"
611611
[x12-doc]: ../logic-apps/logic-apps-enterprise-integration-x12.md "Encode and decode messages that use the X12 protocol"
612612
[x12-decode-doc]: ../logic-apps/logic-apps-enterprise-integration-X12-decode.md "Decode messages that use the X12 protocol"
613613
[x12-encode-doc]: ../logic-apps/logic-apps-enterprise-integration-X12-encode.md "Encode messages that use the X12 protocol"

articles/data-factory/TOC.yml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -810,7 +810,15 @@ items:
810810
- name: Schedule Azure-SSIS integration runtime
811811
href: how-to-schedule-azure-ssis-integration-runtime.md
812812
- name: Join Azure-SSIS IR to a virtual network
813-
href: join-azure-ssis-integration-runtime-virtual-network.md
813+
items:
814+
- name: Overview
815+
href: join-azure-ssis-integration-runtime-virtual-network.md
816+
- name: Virtual network configuration
817+
href: azure-ssis-integration-runtime-virtual-network-configuration.md
818+
- name: Using the Azure Data Factory Studio UI
819+
href: join-azure-ssis-integration-runtime-virtual-network-ui.md
820+
- name: Using Azure PowerShell
821+
href: join-azure-ssis-integration-runtime-virtual-network-powershell.md
814822
- name: Configure Self-Hosted IR as a proxy for Azure-SSIS IR
815823
href: self-hosted-integration-runtime-proxy-ssis.md
816824
displayName: self hosted

0 commit comments

Comments
 (0)