You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/nat-gateway/troubleshoot-nat-connectivity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ You observe a drop in the datapath availability of NAT gateway, which coincides
56
56
* If your investigation is inconclusive, open a support case to [further troubleshoot](#more-troubleshooting-guidance).
57
57
58
58
>[!NOTE]
59
-
>It is important to understand why SNAT port exhaustion occurs. Make sure you use the right patterns for scalable and reliable scenarios. Adding more SNAT ports to a scenario without understanding the cause of the demand should be a last resort. If you do not understand why your scenario is applying pressure on SNAT port inventory, adding more SNAT ports by adding more IP addresses will only delay the same exhaustion failure as your application scales. You may be masking other inefficiencies and anti-patterns. For more informations, see [best practices for efficient use of outbound connections](#outbound-connectivity-best-practices).
59
+
>It is important to understand why SNAT port exhaustion occurs. Make sure you use the right patterns for scalable and reliable scenarios. Adding more SNAT ports to a scenario without understanding the cause of the demand should be a last resort. If you do not understand why your scenario is applying pressure on SNAT port inventory, adding more SNAT ports by adding more IP addresses will only delay the same exhaustion failure as your application scales. You may be masking other inefficiencies and anti-patterns. For more information, see [best practices for efficient use of outbound connections](#outbound-connectivity-best-practices).
60
60
61
61
### Possible solutions for TCP connection timeouts
Copy file name to clipboardExpand all lines: articles/network-watcher/network-watcher-visualize-nsg-flow-logs-open-source-tools.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ By connecting NSG flow logs with the Elastic Stack, we can create a Kibana dashb
37
37
38
38
The following instructions are used to install Elasticsearch in Ubuntu Azure VMs. For instructions on how to install elastic search in Red Hat Enterprise Linux, see [Install Elasticsearch with RPM](https://www.elastic.co/guide/en/elasticsearch/reference/8.6/rpm.html).
39
39
40
-
1. The Elastic Stack from version 5.0 and above requires Java 8. Run the command `java -version` to check your version. If you don't have Java installed, see the documentation on the [Azure-suppored JDKs](/azure/developer/java/fundamentals/java-support-on-azure).
40
+
1. The Elastic Stack from version 5.0 and above requires Java 8. Run the command `java -version` to check your version. If you don't have Java installed, see the documentation on the [Azure-supported JDKs](/azure/developer/java/fundamentals/java-support-on-azure).
41
41
2. Download the correct binary package for your system:
Copy file name to clipboardExpand all lines: articles/network-watcher/nsg-flow-logs-policy-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,7 +92,7 @@ To assign the *deployIfNotExists* policy:
92
92
| Setting | Value |
93
93
| --- | --- |
94
94
|**NSG Region**| Select the region of your network security group that you're targeting with the policy. |
95
-
|**Storage id**| Enter the full resource ID of the storage account. The storage account must be in the same region as the network security group. The format of storage resource ID is `/subscriptions/<SubscriptionID>/resourceGroups/<ResouceGroupName>/providers/Microsoft.Storage/storageAccounts/<StorageAccountName>`. |
95
+
|**Storage id**| Enter the full resource ID of the storage account. The storage account must be in the same region as the network security group. The format of storage resource ID is `/subscriptions/<SubscriptionID>/resourceGroups/<ResourceGroupName>/providers/Microsoft.Storage/storageAccounts/<StorageAccountName>`. |
96
96
|**Network Watchers RG**| Select the resource group of your Azure Network Watcher instance. |
97
97
|**Network Watcher name**| Enter the name of your Network Watcher instance. |
@@ -147,7 +147,7 @@ The following table lists the fields in the schema and what they signify for net
147
147
> |**LoadBalancer2_s**|\<SubscriptionID\>/\<ResourceGroupName\>/\<LoadBalancerName\>| Load balancer associated with the Destination IP in the flow. |
148
148
> |**LocalNetworkGateway1_s**|\<SubscriptionID\>/\<ResourceGroupName\>/\<LocalNetworkGatewayName\>| Local network gateway associated with the Source IP in the flow. |
149
149
> |**LocalNetworkGateway2_s**|\<SubscriptionID\>/\<ResourceGroupName\>/\<LocalNetworkGatewayName\>| Local network gateway associated with the Destination IP in the flow. |
> |**ConnectionName_s**|\<SubscriptionID\>/\<ResourceGroupName\>/\<ConnectionName\>| The connection Name. For flow type P2S, it is formatted as \<gateway name\>_\<VPN Client IP\>. |
152
152
> |**ConnectingVNets_s**| Space separated list of virtual network names | In case of hub and spoke topology, hub virtual networks are populated here. |
153
153
> |**Country_s**| Two letter country code (ISO 3166-1 alpha-2) | Populated for flow type ExternalPublic. All IP addresses in PublicIPs_s field share the same country code. |
Copy file name to clipboardExpand all lines: articles/networking/create-zero-trust-network-web-apps.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -395,7 +395,7 @@ You'll deploy Azure Firewall to perform packet inspection between the applicatio
395
395
| Firewall tier | Select **Premium**. |
396
396
| Firewall policy | Select **Add new**.|
397
397
|**Create a new Firewall Policy**||
398
-
| Policy name | Enter **myFirewalPolicy**. |
398
+
| Policy name | Enter **myFirewallPolicy**. |
399
399
| Policy tier | Select **Premium** and select **OK**. |
400
400
| Choose a virtual network | Select **Use existing**. |
401
401
| Virtual network | Select **hub-vnet**. |
@@ -408,7 +408,7 @@ You'll deploy Azure Firewall to perform packet inspection between the applicatio
408
408
In this task, you'll configure the firewall policy used for packet inspection.
409
409
410
410
1. Navigate to the Azure Firewall that you previously created.
411
-
1. In the **Overview** page, locate and select the link to the **myFirewalPolicy** firewall policy.
411
+
1. In the **Overview** page, locate and select the link to the **myFirewallPolicy** firewall policy.
412
412
1. In the **Firewall Policy** page, select the **IDPS** under **Settings**.
413
413
1. On the **IDPS** page, select **Alert and deny** and then select **Apply**. Wait for the firewall policy to complete updating before proceeding to the next step.
Copy file name to clipboardExpand all lines: articles/operational-excellence/relocation-automation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ In the diagram below, the red flow lines illustrate redeployment of the target i
61
61
62
62
1. Deploy the template using [ARM](/azure/automation/quickstart-create-automation-account-template), [Portal](/azure/automation/automation-create-standalone-account?tabs=azureportal) or [PowerShell](/powershell/module/az.automation/import-azautomationrunbook?view=azps-11.2.0&preserve-view=true).
63
63
64
-
1. Use PowerShell to export all associated runbooks from the source Azure Automation instance and import them to the target instance. Reconfigure the properties as per target. For more information, see [Export-AzAuotomationRunbook](/powershell/module/az.automation/export-azautomationrunbook?view=azps-11.2.0&viewFallbackFrom=azps-9.4.0&preserve-view=true).
64
+
1. Use PowerShell to export all associated runbooks from the source Azure Automation instance and import them to the target instance. Reconfigure the properties as per target. For more information, see [Export-AzAutomationRunbook](/powershell/module/az.automation/export-azautomationrunbook?view=azps-11.2.0&viewFallbackFrom=azps-9.4.0&preserve-view=true).
65
65
66
66
1. Associate the relocated Azure Automation instance to the target Log Analytics workspace.
Copy file name to clipboardExpand all lines: articles/operational-excellence/relocation-firewall.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,7 +142,7 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
142
142
1. Review and update the configuration for the topics below to reflect the changes required for the target region.
143
143
-**IP Groups.** To include IP addresses from the target region, if different from the source, *IP Groups* should be reviewed. The IP addresses included in the groups must be modified.
144
144
-**Zones.** Configure the [availability Zones (AZ)](../reliability/availability-zones-overview.md) in the target region.
145
-
-**Forced Tunneling.**[Ensure that you've relcoated the virtual network](./relocation-virtual-network.md) and that the firewall *Management Subnet* is present before the Azure Firewall is relocated. Update the IP Address in the target region of the Network Virtual Appliance (NVA) to which the Azure Firewall should redirect the traffic, in the User Defined Route (UDR).
145
+
-**Forced Tunneling.**[Ensure that you've relocated the virtual network](./relocation-virtual-network.md) and that the firewall *Management Subnet* is present before the Azure Firewall is relocated. Update the IP Address in the target region of the Network Virtual Appliance (NVA) to which the Azure Firewall should redirect the traffic, in the User Defined Route (UDR).
146
146
-**DNS.** Review IP Addresses for your custom custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall’s private IP address as a *Custom DNS server*.
147
147
-**Private IP ranges (SNAT).** - If custom ranges are defined for SNAT, it's recommended that you review and eventually adjust to include the target region address space.
148
148
-**Tags.** - Verify and eventually update any tag that may reflect or refer to the new firewall location.
@@ -185,7 +185,7 @@ To find the location code for your target region, see [Data residency in Azure](
185
185
1. Review and update the configuration for the topics below to reflect the changes required for the target region.
186
186
-**IP Groups.** To include IP addresses from the target region, if different from the source, *IP Groups* should be reviewed. The IP addresses included in the groups must be modified.
187
187
-**Zones.** Configure the [availability Zones (AZ)](../reliability/availability-zones-overview.md) in the target region.
188
-
-**Forced Tunneling.**[Ensure that you've relcoated the virtual network](./relocation-virtual-network.md) and that the firewall *Management Subnet* is present before the Azure Firewall is relocated. Update the IP Address in the target region of the Network Virtual Appliance (NVA) to which the Azure Firewall should redirect the traffic, in the User Defined Route (UDR).
188
+
-**Forced Tunneling.**[Ensure that you've relocated the virtual network](./relocation-virtual-network.md) and that the firewall *Management Subnet* is present before the Azure Firewall is relocated. Update the IP Address in the target region of the Network Virtual Appliance (NVA) to which the Azure Firewall should redirect the traffic, in the User Defined Route (UDR).
189
189
-**DNS.** Review IP Addresses for your custom custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall’s private IP address as a *Custom DNS server*.
190
190
-**Private IP ranges (SNAT).** - If custom ranges are defined for SNAT, it's recommended that you review and eventually adjust to include the target region address space.
191
191
-**Tags.** - Verify and eventually update any tag that may reflect or refer to the new firewall location.
Copy file name to clipboardExpand all lines: articles/vpn-gateway/azure-vpn-client-prerequisites-check.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ The **Run Prerequisites Test** feature is available in the Azure VPN Client for
28
28
1. Select **Run Prerequisites Test** to run the check.
29
29
1. After the prerequisites check has completed, the **Status** shows **Complete**. Review the results. If any test items don't pass, the status indicates that and prescriptive measures are provided to help you mitigate the issue.
30
30
31
-
:::image type="content" source="./media/azure-vpn-client-prerequisites-check/error.png" alt-text="Screenshot of prerequistes test status results." lightbox="./media/azure-vpn-client-prerequisites-check/error.png":::
31
+
:::image type="content" source="./media/azure-vpn-client-prerequisites-check/error.png" alt-text="Screenshot of prerequisites test status results." lightbox="./media/azure-vpn-client-prerequisites-check/error.png":::
0 commit comments