Skip to content

Commit 0d88aac

Browse files
authored
Merge pull request #214570 from v-ksreedevan/14Oct-NWchanges
Network watcher updates
2 parents d45fd07 + 86382f1 commit 0d88aac

5 files changed

+6
-6
lines changed

articles/network-watcher/connection-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Complete the steps in [Create the first VM](#create-the-first-vm) again, with th
7575

7676
|Step|Setting|Value|
7777
|---|---|---|
78-
| 1 | Select a version of the **Ubuntu Server** | |
78+
| 1 | Select a version of **Ubuntu Server** | |
7979
| 3 | Name | myVm2 |
8080
| 3 | Authentication type | Paste your SSH public key or select **Password** and enter a password. |
8181
| 3 | Resource group | Select **Use existing** and select **myResourceGroup**. |
@@ -128,7 +128,7 @@ Create a connection monitor to monitor communication over TCP port 22 from *myVm
128128

129129
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. A generated alert can automatically run one or more actions, such as to notify someone or start another process. When setting an alert rule, the resource that you target determines the list of available metrics that you can use to generate alerts.
130130

131-
1. In the Azure portal, select the **Monitor** service, and then select **Alerts** > **New alert rule**.
131+
1. In Azure portal, select the **Monitor** service, and then select **Alerts** > **New alert rule**.
132132
2. Click **Select target**, and then select the resources that you want to target. Select the **Subscription**, and set the **Resource type** to filter down to the Connection Monitor that you want to use.
133133

134134
![alert screen with target selected](./media/connection-monitor/set-alert-rule.png)

articles/network-watcher/diagnose-vm-network-routing-problem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Azure automatically creates routes to default destinations. You may create custo
102102

103103
When you ran the test using 13.107.21.200 in [Use next hop](#use-next-hop), the route with the address prefix 0.0.0.0/0 was used to route traffic to the address since no other route includes the address. By default, all addresses not specified within the address prefix of another route are routed to the internet.
104104

105-
When you ran the test using 172.31.0.100, however, the result informed you that there was no next hop type. As you can see in the previous picture, though there is a default route to the 172.16.0.0/12 prefix, which includes the 172.31.0.100 address, the **NEXT HOP TYPE** is **None**. Azure creates a default route to 172.16.0.0/12 but doesn't specify a next hop type until there is a reason to. If, for example, you added the 172.16.0.0/12 address range to the address space of the virtual network, Azure changes the **NEXT HOP TYPE** to **Virtual network** for the route. A check would then show the **Virtual network** as the **NEXT HOP TYPE**.
105+
However, when you ran the test using 172.31.0.100, the result informed you that there was no next hop type. As you can see in the previous picture, though there is a default route to the 172.16.0.0/12 prefix, which includes the 172.31.0.100 address, the **NEXT HOP TYPE** is **None**. Azure creates a default route to 172.16.0.0/12 but doesn't specify a next hop type until there is a reason to. If, for example, you added the 172.16.0.0/12 address range to the address space of the virtual network, Azure changes the **NEXT HOP TYPE** to **Virtual network** for the route. A check would then show **Virtual network** as the **NEXT HOP TYPE**.
106106

107107
## Clean up resources
108108

articles/network-watcher/quickstart-configure-network-security-group-flow-logs-from-arm-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ If there were issues with the deployment, see [Troubleshoot common Azure deploym
7070

7171
## Clean up resources
7272

73-
You can delete Azure resources by using complete deployment mode. To delete a flow logs resource, specify a deployment in the complete mode without including the resource you want to delete. Read more about [complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode).
73+
You can delete Azure resources by using complete deployment mode. To delete a flow logs resource, specify a deployment in complete mode without including the resource you want to delete. Read more about [complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode).
7474

7575
You also can disable an NSG flow log in the Azure portal:
7676

articles/network-watcher/quickstart-configure-network-security-group-flow-logs-from-bicep.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ If there were issues with the deployment, see [Troubleshoot common Azure deploym
7979
8080
## Clean up resources
8181
82-
You can delete Azure resources by using complete deployment mode. To delete a flow logs resource, specify a deployment in the complete mode without including the resource you want to delete. Read more about [complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode).
82+
You can delete Azure resources by using complete deployment mode. To delete a flow logs resource, specify a deployment in complete mode without including the resource you want to delete. Read more about [complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode).
8383
8484
You also can disable an NSG flow log in the Azure portal:
8585

includes/resource-manager-quickstart-bicep-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ ms.date: 09/27/2021
66
ms.author: jgao
77
---
88

9-
[Bicep](../articles/azure-resource-manager/bicep/overview.md) is a domain-specific language (DSL) that uses a declarative syntax to deploy Azure resources. It provides concise syntax, reliable type safety, and support for code reuse. Bicep offers the best authoring experience for your infrastructure-as-code solutions in Azure.
9+
[Bicep](../articles/azure-resource-manager/bicep/overview.md) is a domain-specific language (DSL) that uses declarative syntax to deploy Azure resources. It provides concise syntax, reliable type safety, and support for code reuse. Bicep offers the best authoring experience for your infrastructure-as-code solutions in Azure.

0 commit comments

Comments
 (0)