Skip to content

Commit 21983e4

Browse files
2 parents 92dceef + 0382e5d commit 21983e4

File tree

7 files changed

+49
-19
lines changed

7 files changed

+49
-19
lines changed

articles/application-gateway/application-gateway-diagnostics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,9 +91,9 @@ The following snippet shows an example of the response:
9191
You can use different types of logs in Azure to manage and troubleshoot application gateways. You can access some of these logs through the portal. All logs can be extracted from Azure Blob storage and viewed in different tools, such as [Azure Monitor logs](../azure-monitor/insights/azure-networking-analytics.md), Excel, and Power BI. You can learn more about the different types of logs from the following list:
9292

9393
* **Activity log**: You can use [Azure activity logs](../monitoring-and-diagnostics/insights-debugging-with-events.md) (formerly known as operational logs and audit logs) to view all operations that are submitted to your Azure subscription, and their status. Activity log entries are collected by default, and you can view them in the Azure portal.
94-
* **Access log**: You can use this log to view Application Gateway access patterns and analyze important information. This includes the caller's IP, requested URL, response latency, return code, and bytes in and out. An access log is collected every 300 seconds. This log contains one record per instance of Application Gateway. The Application Gateway instance is identified by the instanceId property.
94+
* **Access log**: You can use this log to view Application Gateway access patterns and analyze important information. This includes the caller's IP, requested URL, response latency, return code, and bytes in and out. An access log is collected every 60 seconds. This log contains one record per instance of Application Gateway. The Application Gateway instance is identified by the instanceId property.
9595
* **Performance log**: You can use this log to view how Application Gateway instances are performing. This log captures performance information for each instance, including total requests served, throughput in bytes, total requests served, failed request count, and healthy and unhealthy back-end instance count. A performance log is collected every 60 seconds. The Performance log is available only for the v1 SKU. For the v2 SKU, use [Metrics](application-gateway-metrics.md) for performance data.
96-
* **Firewall log**: You can use this log to view the requests that are logged through either detection or prevention mode of an application gateway that is configured with the web application firewall.
96+
* **Firewall log**: You can use this log to view the requests that are logged through either detection or prevention mode of an application gateway that is configured with the web application firewall. Firewall logs are collected every 60 seconds.
9797

9898
> [!NOTE]
9999
> Logs are available only for resources deployed in the Azure Resource Manager deployment model. You cannot use logs for resources in the classic deployment model. For a better understanding of the two models, see the [Understanding Resource Manager deployment and classic deployment](../azure-resource-manager/management/deployment-models.md) article.

articles/application-gateway/application-gateway-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -348,11 +348,11 @@ Currently, one instance of Ingress Controller can only be associated to one Appl
348348

349349
Application Gateway provides three logs:
350350

351-
* **ApplicationGatewayAccessLog**: The access log contains each request submitted to the application gateway frontend. The data includes the caller's IP, URL requested, response latency, return code, and bytes in and out. The access log is collected every 300 seconds. It contains one record per application gateway.
351+
* **ApplicationGatewayAccessLog**: The access log contains each request submitted to the application gateway frontend. The data includes the caller's IP, URL requested, response latency, return code, and bytes in and out. It contains one record per application gateway.
352352
* **ApplicationGatewayPerformanceLog**: The performance log captures performance information for each application gateway. Information includes the throughput in bytes, total requests served, failed request count, and healthy and unhealthy backend instance count.
353353
* **ApplicationGatewayFirewallLog**: For application gateways that you configure with WAF, the firewall log contains requests that are logged through either detection mode or prevention mode.
354354

355-
For more information, see [Backend health, diagnostics logs, and metrics for Application Gateway](application-gateway-diagnostics.md).
355+
All logs are collected every 60 seconds. For more information, see [Backend health, diagnostics logs, and metrics for Application Gateway](application-gateway-diagnostics.md).
356356

357357
### How do I know if my backend pool members are healthy?
358358

articles/machine-learning/how-to-deploy-and-where.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -904,6 +904,24 @@ service_name = 'my-sklearn-service'
904904
service = Model.deploy(ws, service_name, [model])
905905
```
906906

907+
NOTE: Models which support predict_proba will use that method by default. To override this to use predict you can modify the POST body as below:
908+
```python
909+
import json
910+
911+
912+
input_payload = json.dumps({
913+
'data': [
914+
[ 0.03807591, 0.05068012, 0.06169621, 0.02187235, -0.0442235,
915+
-0.03482076, -0.04340085, -0.00259226, 0.01990842, -0.01764613]
916+
],
917+
'method': 'predict' # If you have a classification model, the default behavior is to run 'predict_proba'.
918+
})
919+
920+
output = service.run(input_payload)
921+
922+
print(output)
923+
```
924+
907925
NOTE: These dependencies are included in the prebuilt sklearn inference container:
908926

909927
```yaml

articles/virtual-machines/workloads/mainframe-rehosting/microfocus/demo.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Set up Micro Focus CICS BankDemo for Micro Focus Enterprise Developer 4.0
33
description: Run the Micro Focus BankDemo application on Azure Virtual Machines (VMs) to learn to use Micro Focus Enterprise Server and Enterprise Developer.
44
author: sread
55
ms.author: sread
6-
ms.date: 04/02/2019
6+
ms.date: 03/30/2020
77
ms.topic: article
88
ms.service: multiple
99
---
@@ -15,6 +15,9 @@ When you set up Micro Focus Enterprise Server 4.0 and Enterprise Developer 4.0 o
1515
CICs stands for Customer Information Control System, the transaction platform used by many of the online mainframe applications. The BankDemo application is great for learning how Enterprise Server and Enterprise Developer operate and how to manage and deploy an actual application complete with green screen
1616
terminals.
1717

18+
> [!NOTE]
19+
> Coming soon: Instructions for setting up [Micro Focus Enterprise Server 5.0](https://techcommunity.microsoft.com/t5/azurecat/micro-focus-enterprise-server-5-0-quick-start-template-on-azure/ba-p/1160110) on Azure VMs.
20+
1821
## Prerequisites
1922

2023
- A VM with [Enterprise Developer](set-up-micro-focus-azure.md). Keep in mind that Enterprise Developer has a complete instance of Enterprise Server on it for development and test purposes. This instance is the instance of Enterprise Server used for the demo.

articles/virtual-machines/workloads/mainframe-rehosting/microfocus/get-started.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Micro Focus dev/test environments on Azure | Microsoft Docs
33
description: Rehost your IBM z/OS mainframe workloads using Micro Focus solutions on Azure virtual machines (VMs).
44
author: njray
55
ms.author: sread
6-
ms.date: 04/02/2019
6+
ms.date: 03/30/2020
77
ms.topic: article
88
ms.service: multiple
99
---
@@ -16,6 +16,9 @@ Micro Focus has partnered with Microsoft to offer compelling mainframe migration
1616

1717
Micro Focus offers development rehosting and test rehosting solutions that extend existing COBOL and PL/I business applications to Azure.
1818

19+
> [!NOTE]
20+
> Coming soon: Instructions for setting up [Micro Focus Enterprise Server 5.0](https://techcommunity.microsoft.com/t5/azurecat/micro-focus-enterprise-server-5-0-quick-start-template-on-azure/ba-p/1160110) on Azure VMs.
21+
1922
**Next steps**
2023

2124
- [Install Micro Focus Enterprise Server 4.0 and Enterprise Developer 4.0 on Azure](./set-up-micro-focus-azure.md)

articles/virtual-machines/workloads/mainframe-rehosting/microfocus/set-up-micro-focus-azure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: edprice
88
manager: edprice
99
editor: edprice
1010
ms.topic: conceptual
11-
ms.date: 05/29/2019
11+
ms.date: 03/30/2020
1212
tags:
1313
keywords:
1414
ms.service: multiple
@@ -21,6 +21,9 @@ This article shows how to set up [Micro Focus Enterprise Server 4.0](https://www
2121

2222
A common workload on Azure is a development and test environment. This scenario is common because it's so cost-effective and easy to deploy and tear down. With Enterprise Server, Micro Focus has created one of the largest mainframe rehosting platforms available. You can run z/OS workloads on a less expensive x86 platform on Azure using either Windows or Linux virtual machines (VMs).
2323

24+
> [!NOTE]
25+
> Coming soon: Instructions for setting up [Micro Focus Enterprise Server 5.0](https://techcommunity.microsoft.com/t5/azurecat/micro-focus-enterprise-server-5-0-quick-start-template-on-azure/ba-p/1160110) on Azure VMs.
26+
2427
This setup uses Azure VMs running the Windows Server 2016 image from the Azure Marketplace with Microsoft SQL Server 2017 already installed. This setup also applies to Azure Stack.
2528

2629
The corresponding development environment for Enterprise Server is Enterprise Developer, which runs on either Microsoft Visual Studio 2017 or later, Visual Studio Community (free to download), or Eclipse. This article shows how to deploy it using a Windows Server 2016 virtual machine that comes with Visual Studio 2017 or later installed.

articles/virtual-network/nat-gateway-resource.md

Lines changed: 15 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: overview
1414
ms.tgt_pltfrm: na
1515
ms.workload: infrastructure-services
16-
ms.date: 03/14/2020
16+
ms.date: 03/30/2020
1717
ms.author: allensu
1818
---
1919

@@ -35,7 +35,7 @@ Configuring and using NAT gateway is intentionally made simple:
3535
NAT gateway resource:
3636
- Create regional or zonal (zone-isolated) NAT gateway resource,
3737
- Assign IP addresses,
38-
- Modify TCP idle timeout (optional).
38+
- If necessary, modify TCP idle timeout (optional). Review [timers](#timers) <ins>before</ins> you change the default.
3939

4040
Virtual network:
4141
- Configure virtual network subnet to use a NAT gateway.
@@ -180,21 +180,23 @@ Even without availability zones, NAT is resilient and can survive multiple infra
180180
<img src="media/nat-overview/az-directions.svg" width="425" title="Virtual Network NAT with availability zones">
181181
</p>
182182

183-
*Figure: Virtual Network NAT with availability zones*
183+
*Figure: Virtual Network NAT with zone isolation*
184184

185185
A zone-isolated NAT gateway requires IP addresses to match the zone of the NAT gateway. NAT gateway resources with IP addresses from a different zone or without a zone are unsupported.
186186

187187
Virtual networks and subnets are regional and not zonal aligned. A VM must be in the same zone as NAT gateway for a zonal promise of outbound connections. Zone isolation is created by creating a zonal "stack" per availability zone. A zonal promise won't exist when crossing zones of a zonal NAT gateway or using a regional NAT gateway with zonal VMs.
188188

189-
When you deploy virtual machine scale sets to use with NAT, you deploy a zonal scale set on its own subnet and attach the matching zone NAT gateway to that subnet. If you use zone-spanning scale sets (a scale set in two or more zones), NAT won't provide a zonal promise. NAT doesn't support zone-redundancy. Only regional or zone-isolation is supported.
190189

191190
<p align="center">
192191
<img src="media/nat-overview/az-directions2.svg" width="425" title="zone-spanning Virtual Network NAT">
193192
</p>
194193

195-
*Figure: Zone-spanning Virtual Network NAT*
194+
*Figure: Virtual Network NAT not compatible with zone-spanning subnet*
196195

197-
The zones property isn't mutable. Redeploy NAT gateway resource with the intended regional or zone preference.
196+
Virtual Network NAT is unable to provide a zonal promise with a zone-spanning subnet. NAT doesn't support zone-redundancy and doesn't replicate flow state across zones. Use zone-isolation instead.
197+
198+
>[!NOTE]
199+
>The zones property of a NAT gateway resource isn't mutable. Redeploy NAT gateway resource with the intended regional or zone preference.
198200
199201
>[!NOTE]
200202
>IP addresses by themselves aren't zone-redundant if no zone is specified. The frontend of a [Standard Load Balancer is zone-redundant](../load-balancer/load-balancer-standard-availability-zones.md#frontend) if an IP address isn't created in a specific zone. This doesn't apply to NAT. Only regional or zone-isolation is supported.
@@ -251,11 +253,9 @@ Once a SNAT port releases, it's available for use by any virtual machine on subn
251253

252254
### Scaling
253255

254-
NAT needs sufficient SNAT port inventory for the complete outbound scenario. Scaling NAT is primarily a function of managing the shared, available SNAT port inventory. Sufficient inventory needs to exist to address the peak outbound flow for all subnets attached to a NAT gateway resource.
255-
256-
SNAT maps multiple private addresses to one public address and uses multiple public IPs to scale.
256+
NAT needs sufficient SNAT port inventory for the complete outbound scenario. Scaling NAT is primarily a function of managing the shared, available SNAT port inventory. Sufficient inventory needs to exist to address the peak outbound flow for all subnets attached to a NAT gateway resource. You can use public IP addresses or public IP prefixes or both to create SNAT port inventory for usage by the NAT.
257257

258-
A NAT gateway resource will use 64,000 ports (SNAT ports) of a public IP address. These SNAT ports become the available inventory for the private to public flow mapping. And adding more public IP addresses increases the available inventory SNAT ports. NAT gateway resources can scale up to 16 IP addresses and 1M SNAT ports. TCP and UDP are separate SNAT port inventories and unrelated.
258+
SNAT maps private addresses to one or more public IP addresses. These public IP addresses can be provided as public IP address resources or public IP prefix resources or both. A NAT gateway resource will use 64,000 ports (SNAT ports) per configured IP address for this translation. If a public IP prefix resource is provided, each IP address within the prefix is provided ports to the SNAT port inventory. These SNAT ports become the available inventory for the private to public flow mapping. And adding more IP addresses increases the available inventory SNAT ports. NAT gateway resources can scale up to 16 IP addresses and 1M SNAT ports. TCP and UDP are separate SNAT port inventories and unrelated.
259259

260260
NAT gateway resources opportunistically reuse source ports. For scaling purposes, you should assume each flow requires a new SNAT port and scale the total number of available IP addresses for outbound traffic.
261261

@@ -265,6 +265,9 @@ NAT gateway resources interact with IP and IP transport headers of UDP and TCP f
265265

266266
### Timers
267267

268+
>[!IMPORTANT]
269+
>Long idle timers can unnecessarily increase likelihood of SNAT exhaustion. The longer of a timer you specify, the longer NAT will hold on to SNAT ports until they eventually idle timeout. If your flows are idle timed out, they will fail eventually anyway and unnecessarily consume SNAT port inventory. Flows that fails at 2 hours would have failed at the default 4 minutes as well. Increasing the idle timeout is a last resort option that should be used sparingly. If a flow never does go idle, it will not be impacted by these timers.
270+
268271
TCP idle timeout can be adjusted from 4 minutes (default) to 120 minutes (2 hours) for all flows. Additionally, you can reset the idle timer with traffic on the flow. A recommended pattern for refreshing long idle connections and endpoint liveness detection is TCP keepalives. TCP keepalives appear as duplicate ACKs to the endpoints, are low overhead, and invisible to the application layer.
269272

270273
The following timers are used for SNAT port release:
@@ -290,7 +293,7 @@ A SNAT port is available for reuse to the same destination IP address and destin
290293

291294
## Feedback
292295

293-
We want to know how we can improve the service. Propose and vote on what we should build next at [UserVoice for NAT](https://aka.ms/natuservoice).
296+
We want to know how we can improve the service. Are missing a capability? Make your case for what we should build next at [UserVoice for NAT](https://aka.ms/natuservoice).
294297

295298
## Next steps
296299

@@ -310,9 +313,9 @@ We want to know how we can improve the service. Propose and vote on what we shou
310313
- [REST API](https://docs.microsoft.com/rest/api/virtualnetwork/natgateways)
311314
- [Azure CLI](https://docs.microsoft.com/cli/azure/network/nat/gateway?view=azure-cli-latest)
312315
- [PowerShell](https://docs.microsoft.com/powershell/module/az.network/new-aznatgateway)
313-
314316
* Learn about [availability zones](../availability-zones/az-overview.md).
315317
* Learn about [standard load balancer](../load-balancer/load-balancer-standard-overview.md).
316318
* Learn about [availability zones and standard load balancer](../load-balancer/load-balancer-standard-availability-zones.md).
319+
* [Tell us what to build next for Virtual Network NAT in UserVoice](https://aka.ms/natuservoice).
317320

318321

0 commit comments

Comments
 (0)