Skip to content

Commit 22e47ea

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-eflow-nics
2 parents d427d9d + 973ec28 commit 22e47ea

15 files changed

+5662
-5444
lines changed

.openpublishing.redirection.json

Lines changed: 5113 additions & 5103 deletions
Large diffs are not rendered by default.

articles/azure-web-pubsub/howto-troubleshoot-resource-logs.md

Lines changed: 167 additions & 142 deletions
Large diffs are not rendered by default.

articles/cost-management-billing/understand/mca-understand-your-usage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@ ms.reviewer: amberb
66
ms.service: cost-management-billing
77
ms.subservice: billing
88
ms.topic: conceptual
9-
ms.date: 03/21/2024
9+
ms.date: 01/21/2025
1010
ms.author: banders
1111
---
1212

1313
# Terms in the Azure usage and charges file for a Microsoft Customer Agreement
1414

1515
This article applies to a billing account for a Microsoft Customer Agreement. [Check if you have access to a Microsoft Customer Agreement](#check-access-to-a-microsoft-customer-agreement).
1616

17-
The Azure usage and charges CSV file contains daily and meter-level usage charges for the current billing period.
17+
The Azure usage and charges CSV file contain daily and meter-level usage charges for the current billing period.
1818

1919
To get your Azure usage and charges file, see [View and download Azure usage and charges for your Microsoft Customer Agreement](download-azure-daily-usage.md). It's available in a comma-separated values (.csv) file format that you can open in a spreadsheet application.
2020

@@ -45,7 +45,7 @@ If you're an EA customer, notice that the terms in the Azure billing profile usa
4545
| MeterRegion | meterRegion | Detail required for a service. Useful to find the region context of the resource. |
4646
| MeterName | meterName | Name of the meter. Represents the Azure service deployable resource. |
4747
| ConsumedQuantity | quantity | Measured quantity purchased or consumed. The amount of the meter used during the billing period. |
48-
| ResourceRate | effectivePrice | The price represents the actual rate that you end up paying per unit, after discounts are taken into account. It's the price that should be used with the `Quantity` to do `Price` \* `Quantity` calculations to reconcile charges. The price takes into account the following scenarios and the scaled unit price that's also present in the files. As a result, it might differ from the scaled unit price. |
48+
| ResourceRate | effectivePrice | The price represents the actual rate that you end up paying per unit, after discounts are taken into account. It's the price that should be used with the `Quantity` to do `Price` \* `Quantity` calculations to reconcile charges. The price takes into account the following scenarios and the scaled unit price that's also present in the files. As a result, it might differ from the scaled unit price. <br> [Reservation](../reservations/understand-reserved-instance-usage-ea.md) and [savings plan](../savings-plan/utilization-cost-reports.md) charges might be zero in actual cost reports but are shown in amortized cost reports. |
4949
| ExtendedCost | cost | Cost of the charge in the billing currency before credits or taxes. |
5050
| ResourceLocation | resourceLocation | Location of the used resource's data center. |
5151
| ConsumedService | consumedService | Name of the service. |

articles/ddos-protection/types-of-attacks.md

Lines changed: 32 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,45 @@ services: ddos-protection
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: concept-article
8-
ms.date: 07/17/2024
8+
ms.date: 01/21/2025
99
ms.author: abell
1010
---
11-
# Types of attacks Azure DDoS Protection mitigates
11+
# Types of attacks Azure DDoS Protection mitigate
1212

1313
Azure DDoS Protection can mitigate the following types of attacks:
1414

15-
- **Volumetric attacks**: These attacks flood the network layer with a substantial amount of seemingly legitimate traffic. They include UDP floods, amplification floods, and other spoofed-packet floods. DDoS Protection mitigates these potential multi-gigabyte attacks by absorbing and scrubbing them, with Azure's global network scale, automatically.
16-
- **Protocol attacks**: These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stack. They include SYN flood attacks, reflection attacks, and other protocol attacks. DDoS Protection mitigates these attacks, differentiating between malicious and legitimate traffic, by interacting with the client, and blocking malicious traffic.
17-
- **Resource (application) layer attacks**: These attacks target web application packets, to disrupt the transmission of data between hosts. They include HTTP protocol violations, SQL injection, cross-site scripting, and other layer 7 attacks. Use a Web Application Firewall, such as the Azure [Application Gateway web application firewall](../web-application-firewall/ag/ag-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json), as well as DDoS Protection to provide defense against these attacks. There are also third-party web application firewall offerings available in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps?page=1&search=web%20application%20firewall).
15+
- **Volumetric attacks**: These attacks flood the network layer with a substantial amount of seemingly legitimate traffic. They include UDP floods, amplification floods, and other spoofed-packet floods. DDoS Protection mitigates these potential multi-gigabyte attacks by absorbing and scrubbing them, with Azure's global network scale, automatically. Common attack types are listed in the following table.
1816

19-
## Azure DDoS Protection
17+
| **Attack Type** | **Description** |
18+
|--------------------------------|---------------------------------------------------------------------------------|
19+
| **ICMP Flood** | Overwhelms the target with ICMP Echo Request (ping) packets, causing disruption. |
20+
| **IP/ICMP Fragmentation** | Exploits IP packet fragmentation to overwhelm the target with fragmented packets.|
21+
| **IPsec Flood** | Floods the target with IPsec packets, overwhelming the processing capability. |
22+
| **UDP Flood** | Sends a large number of UDP packets to random ports, causing resource exhaustion.|
23+
| **Reflection Amplification Attack** | Uses a third-party server to amplify the attack traffic towards the target. |
24+
25+
- **Protocol attacks**: These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stack. They include SYN flood attacks, reflection attacks, and other protocol attacks. DDoS Protection mitigates these attacks, differentiating between malicious and legitimate traffic, by interacting with the client, and blocking malicious traffic. Common attack types are listed in the following table.
26+
27+
| **Attack Type** | **Description** |
28+
|--------------------------------|---------------------------------------------------------------------------------|
29+
| **SYN Flood** | Exploits the TCP handshake process to overwhelm the target with connection requests. |
30+
| **Fragmented Packet Attack** | Sends fragmented packets to the target, causing resource exhaustion during reassembly. |
31+
| **Ping of Death** | Sends malformed or oversized packets to crash or destabilize the target system. |
32+
| **Smurf Attack** | Uses ICMP echo requests to flood the target with traffic by exploiting network devices. |
33+
34+
- **Resource (application) layer attacks**: These attacks target web application packets, to disrupt the transmission of data between hosts. They include HTTP protocol violations, SQL injection, cross-site scripting, and other layer 7 attacks. Use a Web Application Firewall, such as the Azure [Application Gateway web application firewall](../web-application-firewall/ag/ag-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json), and DDoS Protection to provide defense against these attacks. There are also third-party web application firewall offerings available in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps?page=1&search=web%20application%20firewall). Common attacks types are listed in the following table.
35+
36+
37+
| **Attack Type** | **Description** |
38+
|--------------------------------|---------------------------------------------------------------------------------|
39+
| **BGP Hijacking** | Involves taking control of a group of IP addresses by corrupting Internet routing tables. |
40+
| **Slowloris** | Keeps many connections to the target web server open and holds them open as long as possible. |
41+
| **Slow Post** | Sends HTTP POST headers that are incomplete, causing the server to wait for the rest of the data. |
42+
| **Slow Read** | Reads responses from the server slowly, causing the server to keep the connection open. |
43+
| **HTTP(/s) Flooding** | Floods the target with HTTP requests, overwhelming the server's ability to respond. |
44+
| **Low and Slow attack** | Uses a few connections to slowly send or request data, evading detection. |
45+
| **Large Payload POST** | Sends large payloads in HTTP POST requests to exhaust server resources. |
2046

21-
Azure DDoS Protection protects resources in a virtual network including public IP addresses associated with virtual machines, load balancers, and application gateways. When coupled with the Application Gateway web application firewall, or a third-party web application firewall deployed in a virtual network with a public IP, Azure DDoS Protection can provide full layer 3 to layer 7 mitigation capability.
2247

2348
## Next steps
2449

articles/reliability/TOC.yml

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@
44
href: overview.md
55
- name: Reliability fundamentals
66
items:
7+
- name: Business continuity, high availability, and disaster recovery
8+
href: concept-business-continuity-high-availability-disaster-recovery.md
79
- name: Shared responsibility for resiliency
810
href: concept-shared-responsibility.md
911
- name: Azure service incident response
@@ -88,12 +90,6 @@
8890
href: migrate-vm.md
8991
- name: Workload - Azure Kubernetes and MySQL
9092
href: migrate-workload-aks-mysql.md
91-
- name: Disaster recovery
92-
items:
93-
- name: What is disaster recovery?
94-
href: disaster-recovery-overview.md
95-
- name: Business continuity management program
96-
href: business-continuity-management-program.md
9793
- name: Reliability guides by service
9894
items:
9995
- name: Overview

articles/reliability/availability-service-by-category.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: anaharris-ms
55
ms.service: azure
66
ms.subservice: azure-availability-zones
77
ms.topic: conceptual
8-
ms.date: 06/13/2024
8+
ms.date: 01/22/2025
99
ms.author: anaharris
1010
ms.custom: references_regions, subject-reliability
1111
---
@@ -106,6 +106,7 @@ As mentioned previously, Azure classifies services into three categories: founda
106106
> | Azure VMware Solution |
107107
> | Microsoft Azure Attestation |
108108
> | Microsoft Purview |
109+
> | SQL Server on Azure Virtual Machines |
109110
> | SQL Server Stretch Database |
110111
> | Virtual Machines: Bsv2-series |
111112
> | Virtual Machines: Dasv5 and Dadsv5-series |

0 commit comments

Comments
 (0)