Skip to content

Commit 2183644

Browse files
authored
Merge branch 'MicrosoftDocs:release-aio-2507' into release-aio-2507
2 parents fea6fc4 + 1e8f117 commit 2183644

File tree

268 files changed

+2616
-1126
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

268 files changed

+2616
-1126
lines changed

articles/api-management/api-management-features.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Each API Management [pricing tier](api-management-key-concepts.md#api-management
2828
| -------------------------------------------------------------------------------------------- | ----------- | --------- | --------- | --------- | ----- | -------- | ------- | ------- |
2929
| Microsoft Entra integration<sup>1</sup> | No | Yes | No | Yes | Yes | Yes | Yes | Yes |
3030
| Virtual network injection support | No | Yes | No | No | No | No | Yes | Yes |
31-
| Private endpoint support for inbound connections | No | Yes | Yes | No | Yes | Yes (preview) | Yes | No |
31+
| Private endpoint support for inbound connections | No | Yes | Yes | No | Yes | Yes | Yes | No |
3232
| Outbound virtual network integration support | No | No | No | No | No | Yes | No | Yes |
3333
| Multi-region deployment | No | No | No | No | No | No | Yes | No |
3434
| Availability zones | No | No | No | No | No | No | Yes | No |
@@ -64,4 +64,4 @@ Each API Management [pricing tier](api-management-key-concepts.md#api-management
6464
* [Overview of Azure API Management](api-management-key-concepts.md)
6565
* [API Management limits](/azure/azure-resource-manager/management/azure-subscription-service-limits?toc=/azure/api-management/toc.json&bc=/azure/api-management/breadcrumb/toc.json#api-management-limits)
6666
* [V2 tiers overview](v2-service-tiers-overview.md)
67-
* [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/)
67+
* [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/)

articles/app-service/tutorial-ai-openai-chatbot-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection: ce-skilling-ai-copilot
1515

1616
# Tutorial: Build a chatbot with Azure App Service and Azure OpenAI (Flask)
1717

18-
In this tutorial, you'll build an intelligent AI application by integrating Azure OpenAI with a Python web application and deploying it to Azure App Service. You'll create a Flask app that sends chat completion requests to a model in Azure OpneAI.
18+
In this tutorial, you'll build an intelligent AI application by integrating Azure OpenAI with a Python web application and deploying it to Azure App Service. You'll create a Flask app that sends chat completion requests to a model in Azure OpenAI.
1919

2020
:::image type="content" source="media/tutorial-ai-openai-chatbot-python/chat-in-browser.png" alt-text="Screenshot showing chatbot running in Azure App Service.":::
2121

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,10 @@ The resource tag is cosmetic, and serves to confirm that the gateway has been pr
187187

188188
Application Gateway Subnet is the subnet within the Virtual Network where the Application Gateway Resources will be deployed. In the Frontend Private Ip configuration, is important that this subnet can reach privately the resources that want to connect to your exposed app or site.
189189

190+
> [!NOTE]
191+
> As of May 5, 2025, new and existing deployments of Private Application Gateway require Subnet Delegation to `Microsoft.Network/applicationGateways`.
192+
> Please follow [these steps](/azure/virtual-network/manage-subnet-delegation?tabs=manage-subnet-delegation-portal) for configuring Subnet Delegation.
193+
190194
## Outbound Internet connectivity
191195

192196
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration associated to a request routing rule) aren't able to egress traffic destined to the Internet. This configuration affects communication to backend targets that are publicly accessible via the Internet.

articles/application-gateway/application-gateway-tls-version-retirement.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: jaesoni
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
8-
ms.date: 07/18/2025
8+
ms.date: 07/29/2025
99
ms.author: mbender
1010
ms.custom:
1111
- build-2025
@@ -101,6 +101,9 @@ To determine whether clients connecting to your Application Gateway resource are
101101
### Logs
102102
You can also check the [Application Gateway Access logs](monitor-application-gateway-reference.md#access-log-category) to view this information in log format.
103103

104+
> [!NOTE]
105+
> The metrics or logs for the V1 SKUs do not provide client TLS protocol information.
106+
104107
### Error information
105108
Once support for TLS versions 1.0 and 1.1 is discontinued, clients may encounter errors such as `curl: (35) error:0A000410:SSL routines::sslv3 alert handshake failure`. Depending on the browser being used, various messages indicating TLS handshake failures may be displayed.
106109

articles/application-gateway/for-containers/understanding-pricing.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -182,14 +182,15 @@ Pricing calculation:
182182

183183
### Example 6 - Web Application Firewall
184184

185-
This example assumes Application Gateway for Containers has load raising the number of capacity units and has a Web Application Firewall (WAF) policy reference to an Application Gateway for Containers' security policy. The WAF policy is configured with both DRS 2.1 and bot manager rulesets.
185+
This example assumes Application Gateway for Containers has load raising the number of capacity units and has a Web Application Firewall (WAF) policy reference to an Application Gateway for Containers' security policy. The WAF policy is configured with both DRS 2.1 and bot manager rulesets. This WAF policy also has four custom rules enabled which do not incur any additional charges
186186

187187
* 1 Application Gateway for Containers resource
188188
* 1 frontend resource
189189
* 1 association resource
190190
* 1 security policy resources (non-billable)
191191
* 8 capacity units
192192
* 1 WAF policy running a default ruleset and a bot manager ruleset
193+
* 4 WAF custom rules
193194
* 10 million requests processed by WAF
194195

195196
Pricing calculation:
@@ -204,14 +205,14 @@ Pricing calculation:
204205

205206
### Example 7 - Web Application Firewall - Multiple Policies
206207

207-
This example assumes Application Gateway for Containers has load raising the number of capacity units and has three Web Application Firewall (WAF) policy reference to three corresponding Application Gateway for Containers' security policies. One policy is configured with both DRS 2.1 and bot manager rulesets, the other two policies only have DRS 2.1 ruleset.
208+
This example assumes Application Gateway for Containers has load raising the number of capacity units and has three Web Application Firewall (WAF) policy reference to three corresponding Application Gateway for Containers' security policies. One policy is configured with both DRS 2.1, bot manager rulesets and 3 custom rules, the other two policies only have DRS 2.1 ruleset and no custom rules.
208209

209210
* 1 Application Gateway for Containers resource
210211
* 1 frontend resource
211212
* 1 association resource
212213
* 3 security policy resources (non-billable)
213214
* 8 Capacity Units
214-
* 1 WAF policy running a default ruleset and a bot manager ruleset
215+
* 1 WAF policy running a default ruleset, a bot manager ruleset and three custom rules
215216
* 10 million requests processed by WAF
216217

217218
Pricing calculation:

articles/application-gateway/overview-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The v2 SKU includes the following enhancements:
2424

2525
- **TCP/TLS proxy (Preview)**: Azure Application Gateway now also supports Layer 4 (TCP protocol) and TLS (Transport Layer Security) proxying. This feature is currently in public preview. For more information, see [Application Gateway TCP/TLS proxy overview](tcp-tls-proxy-overview.md).
2626
- **Autoscaling**: Application Gateway or WAF deployments under the autoscaling SKU can scale out or in based on changing traffic load patterns. Autoscaling also removes the requirement to choose a deployment size or instance count during provisioning. This SKU offers true elasticity. In the Standard_v2 and WAF_v2 SKU, Application Gateway can operate both in fixed capacity (autoscaling disabled) and in autoscaling enabled mode. Fixed capacity mode is useful for scenarios with consistent and predictable workloads. Autoscaling mode is beneficial in applications that see variance in application traffic.
27-
- **Zone redundancy**: An Application Gateway or WAF deployment can span multiple Availability Zones, removing the need to provision separate Application Gateway instances in each zone with a Traffic Manager. You can choose a single zone or multiple zones where Application Gateway instances are deployed, which makes it more resilient to zone failure. The backend pool for applications can be similarly distributed across availability zones.
27+
- **Zone redundancy**: Application Gateway or WAF deployments span multiple Availability Zones by default, removing the need to provision separate Application Gateway instances in each zone with a Traffic Manager. Application Gateway instances are deployed (by default) in a minimum of two availability zones, which makes it more resilient to zone failure. The backend pool for applications can be similarly distributed across availability zones.
2828

2929
Zone redundancy is available only where Azure availability zones are available. In other regions, all other features are supported. For more information, see [Azure regions with availability zone support](../reliability/availability-zones-region-support.md).
3030
- **Static VIP**: Application Gateway v2 SKU supports the static VIP type exclusively. Static VIP ensures that the VIP associated with the application gateway doesn't change for the lifecycle of the deployment, even after a restart. You must use the application gateway URL for domain name routing to App Services via the application gateway, as v1 doesn't have a static VIP.

articles/application-gateway/understanding-pricing.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,19 +41,22 @@ Application Gateway V2 and WAF V2 SKUs support autoscaling and guarantee high av
4141
Capacity Unit is the measure of capacity utilization for an Application Gateway across multiple parameters.
4242

4343
A single Capacity Unit consists of the following parameters:
44-
* 2500 Persistent connections
44+
* 2,500 Persistent connections
4545
* 2.22-Mbps throughput
4646
* 1 Compute Unit
4747

4848
The parameter with the highest utilization among these three parameters is used to calculate capacity units for billing purposes.
4949

50-
#### Capacity Unit related to Instance Count
50+
#### Capacity Units related to Instance Count
5151
<h4 id="instance-count"></h4>
5252

5353
You can also pre-provision resources by specifying the **Instance Count**. Each instance guarantees a minimum of 10 capacity units in terms of processing capability. The same instance could potentially support more than 10 capacity units for different traffic patterns depending upon the capacity unit parameters.
5454

5555
Manually defined scale and limits set for autoscaling (minimum or maximum) are set in terms of instance count. The manually set scale for instance count and the minimum instance count in autoscale config reserves 10 capacity units/instance. These reserved capacity units are billed as long as the application gateway is active regardless of the actual resource consumption. If actual consumption crosses the 10 capacity units/instance threshold, additional capacity units are billed under the variable component.
5656

57+
> [!NOTE]
58+
> An **Instance** is a physical deployment unit of Application Gateway. Users aren't billed directly for the number of instances, but rather for the capacity units reserved or consumed by the instances.
59+
5760
#### Total capacity units
5861

5962
Total capacity units are calculated based on the higher of the capacity units by utilization or by instance count.
@@ -69,6 +72,18 @@ Compute unit guidance:
6972

7073
The following table shows example prices using Application Gateway Standard v2 SKU. These prices are based on a snapshot of East US pricing and are for illustration purposes only.
7174

75+
> [!NOTE]
76+
> Compute units are an entirely different concept from capacity units. Compute units are a measure of compute capacity consumed, while capacity units are a measure of capacity utilization across multiple parameters. Compute units are one of three parameters used to calculate capacity units.
77+
78+
### How much traffic can an instance handle?
79+
80+
Each instance of Application Gateway Standard_v2 can handle the following traffic:
81+
* 25,000 persistent connections
82+
* 500-Mbps throughput
83+
* 10 compute units
84+
85+
Therefore, in cases where the dominant factor is either compute units or persistent connections, each instance can handle 10 capacity units. In cases where the dominant factor is throughput, each instance can handle approximately 225 capacity units. This data depends on the type of payload.
86+
7287
#### Fixed Costs (East US region pricing)
7388

7489
| V2 SKU | Costs ($/hr) |
@@ -116,7 +131,7 @@ Let’s assume you’ve provisioned a Standard_V2 Application Gateway with manua
116131

117132
Your Application Gateway costs using the pricing described previously are calculated as follows:
118133

119-
1 CU can handle 2.22 Mbps throughput.
134+
1 CU can handle 2.22-Mbps throughput.
120135

121136
CUs required to handle 88.8 Mbps = 88.8 / 2.22 = 40
122137

@@ -134,7 +149,7 @@ Variable Costs = $0.008 * ( 3 (Instance Units) * 10 (capacity units) + 10 (addit
134149
Total Costs = $179.58 + $233.6 = $413.18
135150

136151
However, if processing capacity equivalent to only say 7 additional CUs was available for use within the 3 reserved instances.
137-
In this scenario the Application Gateway resource is under scaled and could potentially lead to increase in latency or requests getting dropped.
152+
In this scenario, the Application Gateway resource is under scaled and could potentially lead to increase in latency or requests getting dropped.
138153

139154
Fixed Price = $0.246 * 730 (Hours) = $179.58
140155

@@ -401,7 +416,7 @@ You can view the amount of consumption for different parameters (compute unit, t
401416

402417
* Fixed Billable Capacity Units
403418

404-
The minimum number of capacity units kept provisioned as per the minimum instance count setting (one instance translates to 10 capacity units) in the Application Gateway configuration.
419+
The minimum number of capacity units kept provisioned as per the minimum instance count setting (one instance translates to a minimum of 10 capacity units) in the Application Gateway configuration.
405420

406421
* Estimated Billed Capacity units
407422

articles/automation/automation-hrw-run-runbooks.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Run Azure Automation Runbooks on a Hybrid Runbook Worker
33
description: This article describes how to run runbooks on machines in your local datacenter or other cloud provider with the Hybrid Runbook Worker.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 07/22/2025
6+
ms.date: 07/29/2025
77
ms.topic: how-to
88
ms.custom: devx-track-azurepowershell, linux-related-content
99
ms.service: azure-automation
@@ -14,7 +14,7 @@ author: jasminemehndir
1414
# Run Automation runbooks on a Hybrid Runbook Worker
1515

1616

17-
> [!Important]
17+
> [!IMPORTANT]
1818
> - Starting 1st April 2025, all jobs running on agent-based Hybrid Worker will be stopped.
1919
> - Azure Automation Agent-based User Hybrid Runbook Worker (Windows and Linux) has retired on **31 August 2024** and is no longer supported. Follow the guidelines on how to [migrate from an existing Agent-based User Hybrid Runbook Workers to Extension-based Hybrid Workers](migrate-existing-agent-based-hybrid-worker-to-extension-based-workers.md).
2020
@@ -41,8 +41,9 @@ Azure Automation handles jobs on Hybrid Runbook Workers differently from jobs ru
4141
Jobs for Hybrid Runbook Workers run under the local **System** account.
4242

4343
> [!NOTE]
44-
>- PowerShell 5.1, PowerShell 7.1(preview), Python 2.7, and Python 3.8 runbooks are supported on both extension-based and agent-based Windows Hybrid Runbook Workers. For agent based workers, ensure the Windows Hybrid worker version is 7.3.12960 or above.
45-
>- PowerShell 7.2 and Python 3.10 (preview) runbooks are supported on extension-based Windows Hybrid Workers only. Ensure the Windows Hybrid worker extension version is 1.1.11 or above.
44+
>- PowerShell 7.4 and Python 3.10 runbooks are supported on extension-based Windows Hybrid Workers only. Ensure the Windows Hybrid worker extension version is 1.3.63 or above.
45+
>- PowerShell 5.1, PowerShell 7.1 (preview), Python 2.7, and Python 3.8 runbooks are supported on both extension-based and agent-based Windows Hybrid Runbook Workers. For agent based workers, ensure the Windows Hybrid worker version is 7.3.12960 or above.
46+
>- PowerShell 7.2 runbook is supported on extension-based Windows Hybrid Workers only. Ensure the Windows Hybrid worker extension version is 1.1.11 or above.
4647
4748
#### Extension-based Hybrid Workers
4849

@@ -94,8 +95,9 @@ If the *Python* executable file is at the default location *C:\Python27\python.e
9495
### Linux Hybrid Worker
9596

9697
> [!NOTE]
97-
>- PowerShell 5.1, PowerShell 7.1(preview), Python 2.7, Python 3.8 runbooks are supported on both extension-based and agent-based Linux Hybrid Runbook Workers. For agent-based workers, ensure the Linux Hybrid Runbook worker version is 1.7.5.0 or above.
98-
>- PowerShell 7.2 and Python 3.10 (preview) runbooks are supported on extension-based Linux Hybrid Workers only. Ensure the Linux Hybrid worker extension version is 1.1.11 or above.
98+
>- PowerShell 7.4 and Python 3.10 runbooks are supported on extension-based Linux Hybrid Workers only. Ensure the Linux Hybrid worker extension version is 1.1.23 or above.
99+
>- PowerShell 5.1, PowerShell 7.1 (preview), Python 2.7, Python 3.8 runbooks are supported on both extension-based and agent-based Linux Hybrid Runbook Workers. For agent-based workers, ensure the Linux Hybrid Runbook worker version is 1.7.5.0 or above.
100+
>- PowerShell 7.2 runbook is supported on extension-based Linux Hybrid Workers only. Ensure the Linux Hybrid worker extension version is 1.1.11 or above.
99101
100102
#### Extension-based Hybrid Workers
101103

@@ -286,7 +288,7 @@ By default, the Hybrid jobs run under the context of System account. However, to
286288
1. Select **Hybrid Worker Groups**, and then select the specific group.
287289
1. Select **Settings**.
288290
1. Change the value of **Hybrid Worker credentials** from **Default** to **Custom**.
289-
1. Select the credential and click **Save**.
291+
1. Select the credential and select **Save**.
290292
1. If the following permissions are not assigned for Custom users, jobs might get suspended.
291293
292294
| **Resource type** | **Folder permissions** |

articles/azure-app-configuration/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -200,6 +200,8 @@
200200
href: howto-feature-filters-javascript.md
201201
- name: Python
202202
href: howto-feature-filters-python.md
203+
- name: Go Gin
204+
href: howto-feature-filters-go.md
203205
- name: Enable features on a schedule
204206
items:
205207
- name: Overview
@@ -208,6 +210,8 @@
208210
href: howto-timewindow-filter-aspnet-core.md
209211
- name: JavaScript
210212
href: howto-timewindow-filter-javascript.md
213+
- name: Go Gin
214+
href: howto-timewindow-filter-go.md
211215
- name: Python
212216
href: howto-time-window-filter-python.md
213217
- name: Roll out features to targeted audience

articles/azure-app-configuration/concept-feature-management.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,12 @@ To start using feature flags with Azure App Configuration, continue to the follo
9696
> [!div class="nextstepaction"]
9797
> [JavaScript](./quickstart-feature-flag-javascript.md)
9898
99+
> [!div class="nextstepaction"]
100+
> [Go](./quickstart-feature-flag-go-console.md)
101+
102+
> [!div class="nextstepaction"]
103+
> [Go Gin](./quickstart-feature-flag-go-gin.md)
104+
99105
> [!div class="nextstepaction"]
100106
> [Azure Kubernetes Service](./quickstart-feature-flag-azure-kubernetes-service.md)
101107

0 commit comments

Comments
 (0)