You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cloud-services/cloud-services-guestos-msrc-releases.md
+55-1Lines changed: 55 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,13 +11,67 @@ ms.service: cloud-services
11
11
ms.topic: article
12
12
ms.tgt_pltfrm: na
13
13
ms.workload: tbd
14
-
ms.date: 2/11/2022
14
+
ms.date: 2/15/2022
15
15
ms.author: gunnarc
16
16
---
17
17
18
18
# Azure Guest OS
19
19
The following tables show the Microsoft Security Response Center (MSRC) updates applied to the Azure Guest OS. Search this article to determine if a particular update applies to the Guest OS you are using. Updates always carry forward for the particular [family][family-explain] they were introduced in.
20
20
21
+
## February 2022 Guest OS
22
+
23
+
>[!NOTE]
24
+
25
+
>The February Guest OS is currently being rolled out to Cloud Service VMs that are configured for automatic updates. When the rollout is complete, this version will be made available for manual updates through the Azure portal and configuration files. The following patches are included in the February Guest OS. This list is subject to change.
26
+
>
27
+
28
+
| Product Category | Parent KB Article | Vulnerability Description | Guest OS | Date First Introduced |
Copy file name to clipboardExpand all lines: articles/container-apps/vnet-custom.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: container-apps
7
7
ms.topic: how-to
8
-
ms.date: 1/28/2021
8
+
ms.date: 2/3/2022
9
9
ms.author: cshoe
10
10
zone_pivot_groups: azure-cli-or-portal
11
11
---
@@ -21,7 +21,7 @@ As you create an Azure Container Apps [environment](environment.md), a virtual n
21
21
- You can restrict inbound requests to the environment exclusively to the VNET by deploying the environment as internal.
22
22
23
23
> [!IMPORTANT]
24
-
> In order to ensure the environment deployment within your custom VNET is successful, configure your VNET with an "allow-all" configuration by default. The full list of traffic dependencies required to configure the VNET as "deny-all" is not yet available. Refer to the [custom VNET security sample](https://aka.ms/azurecontainerapps/customvnet) for additional details.
24
+
> In order to ensure the environment deployment within your custom VNET is successful, configure your VNET with an "allow-all" configuration by default. The full list of traffic dependencies required to configure the VNET as "deny-all" is not yet available. Refer to [Known issues for public preview](https://github.com/microsoft/azure-container-apps/wiki/Known-Issues-for-public-preview) for additional details.
25
25
26
26
:::image type="content" source="media/networking/azure-container-apps-virtual-network.png" alt-text="Azure Container Apps environments use an existing VNET, or you can provide your own.":::
27
27
@@ -67,6 +67,10 @@ To create an internal only environment, provide the `--internal-only` parameter
67
67
68
68
::: zone-end
69
69
70
+
## Managed resources
71
+
72
+
When you deploy an internal or an external environment into your own network, a new resource group prefixed with `MC_` is created in the Azure subscription where your environment is hosted. This resource group contains infrastructure components managed by the Azure Container Apps platform, and shouldn't be modified. The resource group contains Public IP addresses used specifically for outbound connectivity from your environment as well as a load balancer. As the load balancer is created in your subscription, there are additional costs associated with deploying the service to a custom virtual network.
73
+
70
74
## Example
71
75
72
76
The following example shows you how to create a Container Apps environment in an existing virtual network.
Copy file name to clipboardExpand all lines: articles/cosmos-db/sql/migrate-dotnet-v3.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: esarroyo
6
6
ms.service: cosmos-db
7
7
ms.subservice: cosmosdb-sql
8
8
ms.topic: how-to
9
-
ms.date: 01/13/2022
9
+
ms.date: 02/15/2022
10
10
ms.devlang: csharp
11
11
---
12
12
@@ -89,6 +89,8 @@ The following classes have been replaced on the 3.0 SDK:
89
89
90
90
The Microsoft.Azure.Documents.UriFactory class has been replaced by the fluent design. The fluent design builds URLs internally and allows a single `Container` object to be passed around instead of a `DocumentClient`, `DatabaseName`, and `DocumentCollection`.
91
91
92
+
Because the .NET v3 SDK allows users to configure a custom serialization engine, there is no direct replacement for the `Document` type. When using Newtonsoft.Json (default serialization engine), `JObject` can be used to achieve the same functionality. When using a different serialization engine, you can use its base json document type (for example, `JsonDocument` for System.Text.Json). The recommendation is to use a C# type that reflects the schema of your items instead of relying on generic types.
93
+
92
94
### Changes to item ID generation
93
95
94
96
Item ID is no longer auto populated in the .NET v3 SDK. Therefore, the Item ID must specifically include a generated ID. View the following example:
Copy file name to clipboardExpand all lines: articles/expressroute/expressroute-howto-coexist-resource-manager.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,6 @@ You can configure a Site-to-Site VPN connection as a backup for ExpressRoute. Th
49
49
> [!NOTE]
50
50
> While ExpressRoute circuit is preferred over Site-to-Site VPN when both routes are the same, Azure will use the longest prefix match to choose the route towards the packet's destination.
51
51
>
52
-
>
53
52
54
53

0 commit comments