Skip to content

Commit 41b3ec6

Browse files
committed
Merge remote-tracking branch 'upstream/main' into jac0bsmith_doc_prs
2 parents 264e133 + e564e90 commit 41b3ec6

File tree

241 files changed

+8922
-1588
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

241 files changed

+8922
-1588
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6471,27 +6471,27 @@
64716471
},
64726472
{
64736473
"source_path": "articles/cloud-services/cloud-services-guestos-family-2-3-4-retirement.md",
6474-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-family-2-3-4-retirement",
6474+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-family-2-3-4-retirement",
64756475
"redirect_document_id": false
64766476
},
64776477
{
64786478
"source_path": "articles/cloud-services/cloud-services-guestos-family1-retirement.md",
6479-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-family1-retirement",
6479+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-family-1-retirement",
64806480
"redirect_document_id": false
64816481
},
64826482
{
64836483
"source_path": "articles/cloud-services/cloud-services-guestos-msrc-releases.md",
6484-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-msrc-releases",
6484+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-microsoft-security-response-center-releases",
64856485
"redirect_document_id": false
64866486
},
64876487
{
64886488
"source_path": "articles/cloud-services/cloud-services-guestos-retirement-policy.md",
6489-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-retirement-policy",
6489+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-retirement-policy",
64906490
"redirect_document_id": false
64916491
},
64926492
{
64936493
"source_path": "articles/cloud-services/cloud-services-guestos-update-matrix.md",
6494-
"redirect_url": "/previous-versions/azure/cloud-services/cloud-services-guestos-update-matrix",
6494+
"redirect_url": "/azure/cloud-services-extended-support/cloud-services-guestos-update-matrix",
64956495
"redirect_document_id": false
64966496
},
64976497
{
@@ -6759,5 +6759,30 @@
67596759
"redirect_url": "/azure/sentinel/work-with-stix-objects-indicators",
67606760
"redirect_document_id": false
67616761
},
6762+
{
6763+
"source_path_from_root": "/articles/azure-functions/migration.md",
6764+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads-overview",
6765+
"redirect_document_id": false
6766+
},
6767+
{
6768+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-assess.md",
6769+
"redirect_url": "/azure/azure-functions/migration/assess-lambda-workloads",
6770+
"redirect_document_id": false
6771+
},
6772+
{
6773+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-discover.md",
6774+
"redirect_url": "/azure/azure-functions/migration/discover-lambda-workloads",
6775+
"redirect_document_id": false
6776+
},
6777+
{
6778+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-migrate.md",
6779+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads",
6780+
"redirect_document_id": false
6781+
},
6782+
{
6783+
"source_path": "articles/azure-functions/migration/lambda-functions-migration-overview.md",
6784+
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads-overview",
6785+
"redirect_document_id": false
6786+
},
67626787
]
67636788
}

articles/api-management/integrate-vnet-outbound.md

Lines changed: 9 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,20 @@ author: dlepow
55
ms.author: danlep
66
ms.service: azure-api-management
77
ms.topic: how-to
8-
ms.date: 03/20/2025
8+
ms.date: 04/03/2025
99
---
1010

1111
# Integrate an Azure API Management instance with a private virtual network for outbound connections
1212

1313
[!INCLUDE [api-management-availability-standardv2-premiumv2](../../includes/api-management-availability-standardv2-premiumv2.md)]
1414

15-
This article guides you through the process of configuring *virtual network integration* for your Standard v2 or Premium v2 (preview) Azure API Management instance. With virtual network integration, your instance can make outbound requests to APIs hosted in a delegated subnet of a single connected virtual network.
15+
This article guides you through the process of configuring *virtual network integration* for your Standard v2 or Premium v2 (preview) Azure API Management instance. With virtual network integration, your instance can make outbound requests to APIs that are isolated in a single connected virtual network.
1616

1717
When an API Management instance is integrated with a virtual network for outbound requests, the gateway and developer portal endpoints remain publicly accessible. The API Management instance can reach both public and network-isolated backend services.
1818

1919
:::image type="content" source="./media/integrate-vnet-outbound/vnet-integration.png" alt-text="Diagram of integrating API Management instance with a virtual network for outbound traffic." :::
2020

21-
If you want to inject a Premium v2 API Management instance into a virtual network to isolate both inbound and outbound traffic, see [Inject a Premium v2 instance into a virtual network](inject-vnet-v2.md).
21+
If you want to inject a Premium v2 (preview) API Management instance into a virtual network to isolate both inbound and outbound traffic, see [Inject a Premium v2 instance into a virtual network](inject-vnet-v2.md).
2222

2323
> [!IMPORTANT]
2424
> * Outbound virtual network integration described in this article is available only for API Management instances in the Standard v2 and Premium v2 tiers. For networking options in the different tiers, see [Use a virtual network with Azure API Management](virtual-network-concepts.md).
@@ -48,7 +48,7 @@ If you want to inject a Premium v2 API Management instance into a virtual networ
4848

4949
### Network security group
5050

51-
A network security group must be associated with the subnet. No specific rules are required. To set up a network security group, see [Create a network security group](../virtual-network/manage-network-security-group.md).
51+
A network security group must be associated with the subnet. Configure any network security group rules that you need for the gateway to access your API backends. To set up a network security group, see [Create a network security group](../virtual-network/manage-network-security-group.md).
5252

5353
### Subnet delegation
5454

@@ -76,21 +76,14 @@ You must have at least the following role-based access control permissions on th
7676

7777
## Configure virtual network integration
7878

79-
This section guides you through the process of configure external virtual network integration for an existing Azure API Management instance.
79+
This section guides you through the process to configure external virtual network integration for an existing Azure API Management instance. You can also configure virtual network integration when you create a new API Management instance.
8080

8181

8282
1. In the [Azure portal](https://portal.azure.com), navigate to your API Management instance.
83-
1. In the left menu, under **Deployment + Infrastructure**, select **Network**.
84-
1. On the **Outbound traffic** card, select **virtual network integration**.
85-
86-
:::image type="content" source="media/integrate-vnet-outbound/integrate-vnet.png" lightbox="media/integrate-vnet-outbound/integrate-vnet.png" alt-text="Screenshot of virtual network integration in the portal.":::
87-
88-
1. In the **Virtual network** blade, enable the **Virtual network** checkbox.
89-
1. Select the location of your API Management instance.
90-
1. In **Virtual network**, select the virtual network and the delegated subnet that you want to integrate.
91-
1. Select **Apply**, and then select **Save**. The virtual network is integrated.
92-
93-
:::image type="content" source="media/integrate-vnet-outbound/vnet-settings.png" lightbox="media/integrate-vnet-outbound/vnet-settings.png" alt-text="Screenshot of virtual network settings in the portal.":::
83+
1. In the left menu, under **Deployment + Infrastructure**, select **Network** > **Edit**.
84+
1. On the **Network configuration** page, under **Outbound features**, select **Enable** virtual network integration.
85+
1. Select the virtual network and the delegated subnet that you want to integrate.
86+
1. Select **Save**. The virtual network is integrated.
9487

9588
## (Optional) Test virtual network integration
9689

Binary file not shown.
Binary file not shown.

0 commit comments

Comments
 (0)