Skip to content

Commit 30bdc98

Browse files
authored
Merge pull request #293552 from MicrosoftDocs/main
1/24/2025 AM Publish
2 parents f95ad6e + 8108064 commit 30bdc98

24 files changed

+602
-225
lines changed

articles/app-service/provision-resource-terraform.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,9 @@ resource "azurerm_linux_web_app" "webapp" {
7878
https_only = true
7979
site_config {
8080
minimum_tls_version = "1.2"
81+
application_stack {
82+
node_version = "16-lts"
83+
}
8184
}
8285
}
8386

articles/bastion/native-client.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ description: Learn how to configure Bastion for native client connections.
55
author: cherylmc
66
ms.service: azure-bastion
77
ms.topic: how-to
8-
ms.date: 12/09/2024
8+
ms.date: 01/24/2025
99
ms.author: cherylmc
1010
---
1111

1212
# Configure Bastion for native client connections
1313

14-
This article helps you configure your Bastion deployment to accept connections from the native client (SSH or RDP) on your local computer to VMs located in the VNet. The native client feature lets you connect to your target VMs via Bastion using Azure CLI, and expands your sign-in options to include local SSH key pair and Microsoft Entra ID. Additionally, you can also upload or download files, depending on the connection type and client.
14+
This article helps you configure your Bastion deployment to accept connections from the native client (SSH or RDP) on your local computer to VMs located in the virtual network. The native client feature lets you connect to your target VMs via Bastion using Azure CLI, and expands your sign-in options to include local SSH key pair and Microsoft Entra ID. Additionally, you can also upload or download files, depending on the connection type and client.
1515

1616
:::image type="content" source="./media/native-client/native-client-architecture.png" alt-text="Diagram shows a connection via native client." lightbox="./media/native-client/native-client-architecture.png":::
1717

@@ -22,7 +22,7 @@ You can configure this feature by modifying an existing Bastion deployment, or y
2222
2323
## Deploy Bastion with the native client feature
2424

25-
If you haven't already deployed Bastion to your VNet, you can deploy with the native client feature specified by deploying Bastion using manual settings. For steps, see [Tutorial - Deploy Bastion with manual settings](tutorial-create-host-portal.md#createhost). When you deploy Bastion, specify the following settings:
25+
If you haven't already deployed Bastion to your virtual network, you can deploy with the native client feature specified by deploying Bastion using manual settings. For steps, see [Tutorial - Deploy Bastion with manual settings](tutorial-create-host-portal.md#createhost). When you deploy Bastion, specify the following settings:
2626

2727
1. On the **Basics** tab, for **Instance Details -> Tier** select **Standard**. Native client support requires the Standard SKU.
2828

@@ -34,7 +34,7 @@ If you haven't already deployed Bastion to your VNet, you can deploy with the na
3434

3535
## Modify an existing Bastion deployment
3636

37-
If you've already deployed Bastion to your VNet, modify the following configuration settings:
37+
If you've already deployed Bastion to your virtual network, modify the following configuration settings:
3838

3939
1. Navigate to the **Configuration** page for your Bastion resource. Verify that the SKU Tier is **Standard**. If it isn't, select **Standard**.
4040
1. Select the box for **Native Client Support**, then apply your changes.
@@ -53,12 +53,12 @@ Use the following table to understand how to connect from native clients. Notice
5353

5454
| Client | Target VM | Method | Microsoft Entra authentication | File transfer | Concurrent VM sessions | Custom port |
5555
|---|---|---|---| --- |---|---|
56-
| Windows native client | Windows VM | [RDP](connect-vm-native-client-windows.md) | Yes | [Upload/Download](vm-upload-download-native.md#rdp) | Yes | Yes |
56+
| Windows native client | Windows VM | [RDP](connect-vm-native-client-windows.md) | Yes | [Yes](vm-upload-download-native.md#rdp) | Yes | Yes |
5757
| | Linux VM | [SSH](connect-vm-native-client-windows.md) | Yes |No | Yes | Yes |
58-
| | Any VM|[az network bastion tunnel](connect-vm-native-client-windows.md#connect-to-a-vm---tunnel-command) |No |[Upload](vm-upload-download-native.md#tunnel-command)| No | No |
58+
| | Any VM|[az network bastion tunnel](connect-vm-native-client-windows.md#connect-to-a-vm---tunnel-command) |No |[Yes](vm-upload-download-native.md#tunnel-command)| No | No |
5959
| Linux native client | Linux VM |[SSH](connect-vm-native-client-linux.md#ssh)| Yes | No | Yes | Yes |
60-
| | Windows or any VM| [az network bastion tunnel](connect-vm-native-client-linux.md) | No | [Upload](vm-upload-download-native.md#tunnel-command) | No | No |
61-
| Other native client (putty) | Any VM | [az network bastion tunnel](connect-vm-native-client-linux.md) | No | [Upload](vm-upload-download-native.md#tunnel-command) | No | No |
60+
| | Windows or any VM| [az network bastion tunnel](connect-vm-native-client-linux.md) | No | [Yes](vm-upload-download-native.md#tunnel-command) | No | No |
61+
| Other native client (putty) | Any VM | [az network bastion tunnel](connect-vm-native-client-linux.md) | No | [Yes](vm-upload-download-native.md#tunnel-command) | No | No |
6262

6363
**Limitations:**
6464

articles/bastion/vm-upload-download-native.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to upload or download files using Azure Bastion and a nat
55
author: cherylmc
66
ms.service: azure-bastion
77
ms.topic: how-to
8-
ms.date: 03/11/2024
8+
ms.date: 01/24/2025
99
ms.author: cherylmc
1010
# Customer intent: I want to upload or download files using Bastion.
1111

@@ -30,7 +30,7 @@ Azure Bastion offers support for file transfer between your target VM and local
3030
The steps in this section apply when connecting to a target VM from a Windows local computer using the native Windows client and RDP. The **az network bastion rdp** command uses the native client MSTSC. Once connected to the target VM, you can upload and download files using **right-click**, then **Copy** and **Paste**. To learn more about this command and how to connect, see [Connect from a Windows native client](connect-vm-native-client-windows.md).
3131

3232
> [!NOTE]
33-
> File transfer over SSH is not supported using this method. Instead, use the [az network bastion tunnel command](#tunnel-command) to upload files over SSH.
33+
> File transfer over SSH isn't supported using this method. Instead, use the [az network bastion tunnel command](#tunnel-command) to upload files over SSH.
3434
>
3535
3636
1. Sign in to your Azure account. If you have more than one subscription, select the subscription containing your Bastion resource.

articles/cloud-shell/release-notes.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Cloud Shell release notes
33
description: This article lists the new features and changes released in Azure Cloud Shell.
4-
ms.date: 12/09/2024
4+
ms.date: 01/24/2025
55
ms.topic: release-notes
66
---
77

@@ -11,6 +11,14 @@ The following document outlines the changes to Azure Cloud Shell. The Cloud Shel
1111
updated on a monthly basis. Changes can include new or updated features and tools, security updates,
1212
and bug fixes.
1313

14+
## January 2025
15+
16+
Tool changes
17+
18+
- Updated Azure CLI to [v2.68.0](/cli/azure/release-notes-azure-cli)
19+
- Updated Azure PowerShell to [v13.1.0](/powershell/azure/release-notes-azureps?view=azps-13.1.0&preserve-view=true)
20+
- Removed guava-android Java library
21+
1422
## December 2024
1523

1624
Tool changes

articles/firewall/tutorial-firewall-deploy-portal.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: azure-firewall
77
ms.topic: how-to
8-
ms.date: 11/14/2023
8+
ms.date: 01/24/2025
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -88,14 +88,14 @@ This virtual network has two subnets.
8888
1. For **Name**, type **fw-pip** and select **OK**.
8989
1. Select **Next**.
9090
1. For **Address space**, accept the default **10.0.0.0/16**.
91-
1. Under **Subnet**, select **default** and change the **Name** to **Workload-SN**.
91+
1. Under **Subnets**, select **default** and change the **Name** to **Workload-SN**.
9292
1. For **Starting address**, change it to **10.0.2.0/24**.
9393
1. Select **Save**.
9494
1. Select **Review + create**.
9595
1. Select **Create**.
9696

9797
> [!NOTE]
98-
> Azure Firewall uses public IPs as needed based on available ports. After randomly selecting a public IP to connect outbound from, it will only use the next available public IP after no more connections can be made from the current public IP. In scenarios with high traffic volume and throughput, it is recommended to use a NAT Gateway to provide outbound connectivity. SNAT ports are dynamically allocated across all public IPs associated with NAT Gateway. To learn more see [integrate NAT Gateway with Azure Firewall](/azure/firewall/integrate-with-nat-gateway).
98+
> Azure Firewall uses public IPs as needed based on available ports. After randomly selecting a public IP to connect outbound from, it will only use the next available public IP after no more connections can be made from the current public IP. In scenarios with high traffic volume and throughput, it's recommended to use a NAT Gateway to provide outbound connectivity. SNAT ports are dynamically allocated across all public IPs associated with NAT Gateway. To learn more, see [Scale SNAT ports with Azure NAT Gateway](/azure/firewall/integrate-with-nat-gateway).
9999
100100
### Create a virtual machine
101101

@@ -130,8 +130,8 @@ Now create the workload virtual machine, and place it in the **Workload-SN** sub
130130

131131
## Examine the firewall
132132

133-
7. Go to the resource group and select the firewall.
134-
8. Note the firewall private and public IP addresses. You use these addresses later.
133+
1. Go to the resource group and select the firewall.
134+
1. Note the firewall private and public IP addresses. You use these addresses later.
135135

136136
## Create a default route
137137

@@ -141,7 +141,7 @@ As a result, there's no need create another user defined route to include the Az
141141

142142
For the **Workload-SN** subnet, configure the outbound default route to go through the firewall.
143143

144-
1. On the Azure portal search for **Route tables**.
144+
1. On the Azure portal, search for **Route tables**.
145145
1. Select **Route tables** in the results pane.
146146
1. Select **Create**.
147147
1. For **Subscription**, select your subscription.
@@ -204,7 +204,7 @@ This is the network rule that allows outbound access to two IP addresses at port
204204
2. For **Destination type** select **IP address**.
205205
3. For **Destination address**, type **209.244.0.3,209.244.0.4**
206206

207-
These are public DNS servers operated by Level3.
207+
These addresses are public DNS servers operated by Level3.
208208
1. For **Destination Ports**, type **53**.
209209
2. Select **Add**.
210210

articles/hdinsight/hdinsight-release-notes.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,14 +51,17 @@ For workload specific versions, see [HDInsight 5.x component versions](./hdinsig
5151

5252
* MSI Based authentication for SQL Databases.
5353

54-
HDInsight now offers Managed Identity for secure authentication with SQL databases in its clusters offerings. This enhancement provides a more secure mechanism for authentication.
55-
54+
HDInsight now offers Managed Identity for secure authentication with SQL databases in its clusters offerings. This enhancement provides a more secure mechanism for authentication. For more information see, [Use Managed Identity for SQL Database authentication in Azure HDInsight](./use-managed-identity-for-sql-database-authentication-in-azure-hdinsight.md).
55+
5656
To use Managed Identity with SQL databases, follow these steps:
5757

5858
* This feature isn't enabled by default. To enable it, submit a [support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview) with your subscription and region details.
5959

6060
* After the capability has been enabled, proceed to recreate the cluster.
6161

62+
> [!NOTE]
63+
> Managed Identity is currently available only in public regions. It will be rolled out to other regions (Federal and China regions) in future releases.
64+
6265
## New Regions
6366

6467
* New Zealand North.

articles/hdinsight/use-managed-identity-for-sql-database-authentication-in-azure-hdinsight.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,12 @@ The Managed Identity (MI) option is available for the following Databases:
2323
|Ranger (ESP)|||
2424

2525
> [!NOTE]
26-
> * Managed Identity (MI) is currently available only in public regions.
26+
> * Managed Identity (MI) is currently available only in public regions. It will be rolled out to other regions (Federal and China regions) in future releases.
2727
> * MI option isn't enabled by default. To get it enabled, submit a [support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview) with your subscription and region details.
2828
2929
> [!IMPORTANT]
3030
> * It's recommended not to update the Managed Identity after cluster recreation as it can disrupt cluster operation.
31-
> * When you recreate an MSI with the same name, users must recreate the contained user and reassign roles, as the new MSI will have different object and client IDs even if the name remains unchanged.
31+
> * When you recreate an MSI with the same name, you must recreate the contained user and reassign roles, as the new MSI will have different object and client IDs even if the name remains unchanged.
3232
3333

3434
## Steps to Use Managed Identity during cluster creation in Azure portal

articles/iot/tutorial-iot-industrial-solution-architecture.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -94,11 +94,11 @@ The station OPC UA server uses the following OPC UA node IDs for telemetry to th
9494
- i=418 - actual cycle time
9595
- i=434 - pressure
9696

97-
### Digital feedback loop with UA Cloud Commander and UA Cloud Action
97+
## Digital feedback loop with UA Cloud Commander and UA Cloud Action
9898

9999
The solution uses a digital feedback loop to manage the pressure in a simulated station. To implement the feedback loop, the solution triggers a command from the cloud on one of the OPC UA servers in the simulation. The trigger activates when simulated time-series pressure data reaches a certain threshold. You can see the pressure of the assembly machine in the Azure Data Explorer dashboard. The pressure is released at regular intervals for the Seattle production line.
100100

101-
### Install the production line simulation and cloud services
101+
## Install the production line simulation and cloud services
102102

103103
Select the **Deploy** button to deploy all required resources to your Azure subscription:
104104

@@ -123,7 +123,7 @@ curl -sfL https://get.k3s.io | sh
123123

124124
Your VM is now ready to run the production line simulation.
125125

126-
### Run the production line simulation
126+
## Run the production line simulation
127127

128128
In the VM, open a Windows command prompt, enter *wsl*, and press **Enter**. Navigate to the `/mnt/c/ManufacturingOntologies-main/Tools/FactorySimulation` directory and run the **StartSimulation** shell script:
129129

articles/operator-nexus/TOC.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,8 +206,14 @@
206206
href: howto-set-up-break-glass-access.md
207207
- name: How to use-break-glass-access
208208
href: howto-use-break-glass-access.md
209-
- name: How to enable-Micro-BFD on CE and PE devices.md
209+
- name: How to enable-Micro-BFD on CE and PE devices
210210
href: howto-enable-micro-bfd.md
211+
- name: How to replace a terminal server
212+
href: howto-replace-a-terminal-server.md
213+
- name: How to upgrade os of terminal server
214+
href: howto-upgrade-os-of-terminal-server.md
215+
- name: How to restrict serial port access and set timeout on terminal-server
216+
href: howto-restrict-serial-port-access-and-set-timeout-on-terminal-server.md
211217
- name: Cluster
212218
expanded: false
213219
items:
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
---
2+
title: How to replace a terminal server within Azure Operator Nexus Network Fabric
3+
description: Process of replacing a terminal server within Azure Operator Nexus Network Fabric
4+
author: sushantjrao
5+
ms.author: sushrao
6+
ms.service: azure-operator-nexus
7+
ms.topic: how-to
8+
ms.date: 01/24/2025
9+
ms.custom: template-how-to, devx-track-azurecli
10+
---
11+
12+
# Replacing a terminal server
13+
14+
This guide provides a step-by-step process for replacing a Terminal Server (TS) within Azure Operator Nexus Network Fabric. The procedure includes cleaning up the existing TS, removing the TS, installing a new TS, and configuring the Terminal Server.
15+
16+
## Pre-replacement cleanup (Customer action)
17+
18+
Before initiating the Return Merchandise Authorization (RMA) for the existing Terminal Server, ensure a thorough cleanup of the device. This step is crucial if the TS is still accessible.
19+
20+
### Manual cleanup tasks
21+
22+
1. Verify TS password in KeyVault
23+
24+
Confirm that the current Terminal Server password is stored in the customer NFC KeyVault secrets.
25+
26+
2. Stop active services
27+
28+
On the Terminal Server, navigate to the directory under /mnt/nvram/ that begins with the name `opengear` (ensure you select the directory for the latest version, if multiple directories are present).
29+
30+
3. Run the following command to stop the relevant services:
31+
32+
```bash
33+
sudo bash stop.sh
34+
```
35+
36+
4. Remove configuration and certificate files
37+
38+
Access the /mnt/nvram/ directory to ensure all configuration files, certificates, and the Open Gear file are deleted, leaving no traces of previous configurations.
39+
40+
### Device removal (Customer action)
41+
42+
Once the cleanup is complete, proceed with physically removing the existing Terminal Server from the rack.
43+
44+
### Installation of new device (Customer action)
45+
46+
After the old TS is removed, install the new Terminal Server in the rack. Follow the guidelines provided in the public documentation for [Terminal Server setup](howto-platform-prerequisites.md)
47+
48+
Validate the connectivity of both Net1 and Net2 interfaces to ensure proper network functionality.
49+
50+
Set up the terminal server device with the same password and username as before. This password can be obtained from the customer Network Fabric Controller (NFC) KeyVault secrets. The username can be obtained by doing an ARM GET on the network fabric resource.
51+
52+
### Microsoft engineering support
53+
54+
After the new Terminal Server is installed and configured, open a support ticket with Microsoft to complete the setup. Microsoft engineers will trigger a lockbox action for *Reprovisioning Terminal Server Device*.
55+
56+
>[!Note]
57+
>The user is expected to setup the terminal server with the same username and password as stored in customer NFC key vault.
58+
59+
Wait for the operation to complete.
60+
61+
>[!Note]
62+
> The lockbox operation will execute the following tasks:
63+
> - Configure's essential services, including httpd and dhcpd.<br>
64+
> - Set's up the Net3 interface.<br>
65+
> - Copies necessary OS, dhcpd configuration, device configurations, and certificate files to the appropriate directories.<br>
66+
> - Transfers the configuration files and certificates to the /mnt/nvram/conf directory.<br>
67+
> - Restarts the DHCPD service.<br>
68+
> - Ensures that configuration files are accessible via the HTTP service for further validation.<br>
69+

0 commit comments

Comments
 (0)