You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/expressroute/design-architecture-for-resiliency.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Users of ExpressRoute rely on the availability and performance of edge sites, WA
25
25
There are three ExpressRoute resiliency architectures that can be utilized to ensure high availability and resiliency in your network connections between on-premises and Azure. These architecture designs include:
26
26
27
27
*[Maximum resiliency](#maximum-resiliency)
28
-
*[High resiliency](#high-resiliency---in-preview)
28
+
*[High resiliency](#high-resiliency)
29
29
*[Standard resiliency](#standard-resiliency)
30
30
31
31
### Maximum resiliency
@@ -34,7 +34,7 @@ The Maximum resiliency architecture in ExpressRoute is structured to eliminate a
34
34
35
35
:::image type="content" source="./media/design-architecture-for-resiliency/maximum-resiliency.png" alt-text="Diagram illustrating a pair of ExpressRoute circuits, configured at two distinct peering locations, between an on-premises network and Microsoft.":::
36
36
37
-
### High resiliency - In Preview
37
+
### High resiliency
38
38
39
39
High resiliency, also referred to as ExpressRoute Metro, enables the use of multiple sites within the same metropolitan (Metro) area to connect your on-premises network through ExpressRoute to Azure. High resiliency offers site diversity by splitting a single circuit across two sites. The first connection is established at one site and the second connection at a different site. The objective of ExpressRoute Metro is to mitigate the effect of edge-sites isolation and failures by introducing capabilities to enable site diversity. Site diversity is achieved by using a single circuit across paired sites within a metropolitan city, which offers resiliency to failures between edge and region. ExpressRoute Metro provides a higher level of site resiliency than Standard resiliency, but not as much as Maximum resiliency. ExpressRoute Metro architecture can be used for business and mission-critical workloads within a region. For more information, see [ExpressRoute Metro](metro.md)
Copy file name to clipboardExpand all lines: articles/extended-zones/request-access.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
2
title: Request access to Azure Extended Zones
3
-
description: Learn how to request and gain access to Azure Extended Zone using PowerShell or Azure CLI.
3
+
description: Learn how to request and gain access to an Azure Extended Zone by using Azure PowerShell or Azure CLI.
4
4
author: halkazwini
5
5
ms.author: halkazwini
6
6
ms.service: azure-extended-zones
7
7
ms.topic: how-to
8
-
ms.date: 08/02/2024
8
+
ms.date: 10/18/2024
9
9
---
10
10
11
11
# Request access to an Azure Extended Zone
@@ -22,7 +22,7 @@ In this article, you learn how to request and gain access to an Azure Extended Z
22
22
23
23
# [**PowerShell**](#tab/powershell)
24
24
25
-
-An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
25
+
-A billable Azure account.
26
26
27
27
- Azure Cloud Shell or Azure PowerShell.
28
28
@@ -32,7 +32,7 @@ In this article, you learn how to request and gain access to an Azure Extended Z
32
32
33
33
# [**Azure CLI**](#tab/cli)
34
34
35
-
-An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35
+
-A billable Azure account.
36
36
37
37
- Azure Cloud Shell or Azure CLI.
38
38
@@ -96,6 +96,9 @@ In this section, you register resource provider **Microsoft.EdgeZones** to your
96
96
97
97
To register for an Azure Extended Zone, you must select the subscription that you wish to register Azure Extended Zones for and specify the Extended Zone name.
98
98
99
+
> [!NOTE]
100
+
> The Azure account that you're using to register for Azure Extended Zones must be a billable account. To share your feedback or ask questions about Azure Extended Zones, contact [Azure Extended Zones support](mailto:[email protected]).
101
+
99
102
# [**PowerShell**](#tab/powershell)
100
103
101
104
1. Use [Get-AzEdgeZonesExtendedZone](/powershell/module/az.edgezones/get-azedgezonesextendedzone) cmdlet to list all Azure Extended Zones available to your subscription.
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-configure-authentication.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,10 +30,10 @@ To link a BrokerListener to a *BrokerAuthentication* resource, specify the `auth
30
30
31
31
## Default BrokerAuthentication resource
32
32
33
-
Azure IoT Operations Preview deploys a default *BrokerAuthentication* resource named `default` linked with the *default* listener in the `azure-iot-operations` namespace. It's configured to only use Kubernetes Service Account Tokens (SATs) for authentication. To inspect it, run:
33
+
Azure IoT Operations Preview deploys a default *BrokerAuthentication* resource named `authn` linked with the *default* listener named `listener` in the `azure-iot-operations` namespace. It's configured to only use Kubernetes Service Account Tokens (SATs) for authentication. To inspect it, run:
34
34
35
35
```bash
36
-
kubectl get brokerauthentication default -n azure-iot-operations -o yaml
36
+
kubectl get brokerauthentication authn -n azure-iot-operations -o yaml
37
37
```
38
38
39
39
The output shows the default *BrokerAuthentication* resource, with metadata removed for brevity:
@@ -42,7 +42,7 @@ The output shows the default *BrokerAuthentication* resource, with metadata remo
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Each listener port can have its own authentication and authorization rules that
26
26
27
27
Listeners have the following characteristics:
28
28
29
-
- You can have up to three listeners. One listener per service type of `loadBalancer`, `clusterIp`, or `nodePort`. The default *BrokerListener* named *default* is service type `clusterIp`.
29
+
- You can have up to three listeners. One listener per service type of `loadBalancer`, `clusterIp`, or `nodePort`. The default *BrokerListener* named *listener* is service type `clusterIp`.
30
30
- Each listener supports multiple ports
31
31
- BrokerAuthentication and BrokerAuthorization references are per port
32
32
- TLS configuration is per port
@@ -59,7 +59,7 @@ To view or edit the listener:
59
59
To view the default *BrokerListener* resource, use the following command:
60
60
61
61
```bash
62
-
kubectl get brokerlistener default -n azure-iot-operations -o yaml
62
+
kubectl get brokerlistener listener -n azure-iot-operations -o yaml
63
63
```
64
64
65
65
The output should look similar to this, with most metadata removed for brevity:
@@ -68,14 +68,14 @@ The output should look similar to this, with most metadata removed for brevity:
@@ -94,7 +94,7 @@ To learn more about the default BrokerAuthentication resource linked to this lis
94
94
The default *BrokerListener* uses the service type *ClusterIp*. You can have only one listener per service type. If you want to add more ports to service type *ClusterIp*, you can update the default listener to add more ports. For example, you could add a new port 1883 with no TLS and authentication off with the following kubectl patch command:
Copy file name to clipboardExpand all lines: articles/network-watcher/vnet-flow-logs-overview.md
+14-12Lines changed: 14 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: halkazwini
6
6
ms.author: halkazwini
7
7
ms.service: azure-network-watcher
8
8
ms.topic: concept-article
9
-
ms.date: 08/29/2024
9
+
ms.date: 10/20/2024
10
10
11
11
#CustomerIntent: As an Azure administrator, I want to learn about virtual network flow logs so that I can log my network traffic to analyze and optimize network performance.
12
12
---
@@ -59,7 +59,9 @@ Virtual network flow logs also avoid the need to enable multiple-level flow logg
59
59
In addition to existing support to identify traffic that [network security group rules](../virtual-network/network-security-groups-overview.md) allow or deny, Virtual network flow logs support identification of traffic that [Azure Virtual Network Manager security admin rules](../virtual-network-manager/concept-security-admins.md) allow or deny. Virtual network flow logs also support evaluating the encryption status of your network traffic in scenarios where you're using [virtual network encryption](../virtual-network/virtual-network-encryption-overview.md?toc=/azure/network-watcher/toc.json).
60
60
61
61
> [!IMPORTANT]
62
-
> We recommend disabling network security group flow logs before enabling virtual network flow logs on the same underlying workloads to avoid duplicate traffic recording and additional costs. If you enable network security group flow logs on the network security group of a subnet, then you enable virtual network flow logs on the same subnet or parent virtual network, you might get duplicate logging (both network security group flow logs and virtual network flow logs generated for all supported workloads in that particular subnet).
62
+
> We recommend disabling network security group flow logs before enabling virtual network flow logs on the same underlying workloads to avoid duplicate traffic recording and additional costs.
63
+
>
64
+
> If you enable network security group flow logs on the network security group of a subnet, then you enable virtual network flow logs on the same subnet or parent virtual network, you might get duplicate logging or only virtual network flow logs.
63
65
64
66
## How logging works
65
67
@@ -133,15 +135,15 @@ In the following example of virtual network flow logs, multiple records follow t
@@ -161,7 +163,7 @@ In the following example of virtual network flow logs, multiple records follow t
161
163
]
162
164
},
163
165
{
164
-
"aclID": "01020304-abcd-ef00-1234-102030405060",
166
+
"aclID": "00aa00aa-bb11-cc22-dd33-44ee44ee44ee",
165
167
"flowGroups": [
166
168
{
167
169
"rule": "BlockHighRiskTCPPortsFromInternet",
@@ -196,15 +198,15 @@ In the following example of virtual network flow logs, multiple records follow t
196
198
197
199
:::image type="content" source="media/vnet-flow-logs-overview/vnet-flow-log-format.png" alt-text="Table that shows the format of a virtual network flow log."lightbox="media/vnet-flow-logs-overview/vnet-flow-log-format.png"
198
200
199
-
Here's an example bandwidth calculation for flow tuples from a TCP conversation between `203.0.113.105:35370` and `10.2.0.4:23`:
201
+
Here's an example bandwidth calculation for flow tuples from a TCP conversation between `203.0.113.105:35370` and `10.0.0.5:23`:
For continuation (`C`) and end (`E`) flow states, byte and packet counts are aggregate counts from the time of the previous flow's tuple record. In the example conversation, the total number of packets transferred is 1,021 + 52 + 8,005 + 47 = 9,125. The total number of bytes transferred is 588,096 + 29,952 + 4,610,880 + 27,072 = 5,256,000.
206
208
207
-
## Storage account considerations for virtual network flow logs
209
+
## Storage account considerations for virtual network flow logs
208
210
209
211
-**Location**: The storage account must be in the same region as the virtual network.
210
212
-**Subscription**: The storage account must be in the same subscription of the virtual network or in a subscription associated with the same Microsoft Entra tenant of the virtual network's subscription.
0 commit comments