Skip to content

Commit 425cc83

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into tls-ssl-certificates
2 parents 9dd6564 + 7aab472 commit 425cc83

File tree

150 files changed

+2669
-982
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

150 files changed

+2669
-982
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@
227227
},
228228
{
229229
"source_path": "articles/databox-online/azure-stack-edge-2301-release-notes.md",
230-
"redirect_url": "/previous-versions/azure/databox-online/azure-stack-edge-2301-release-notes",
230+
"redirect_url": "/previous-versions/azure/databox-online/azure-stack-edge-2301-release-notes"
231231
},
232232
{
233233
"source_path": "articles/network-watcher/nsg-flow-logs-rest.md",
@@ -2393,7 +2393,7 @@
23932393
"source_path_from_root": "/articles/app-service/manage-disaster-recovery.md",
23942394
"redirect_url": "/azure/architecture/web-apps/guides/multi-region-app-service/multi-region-app-service",
23952395
"redirect_document_id": false
2396-
},
2396+
},
23972397
{
23982398
"source_path_from_root": "/articles/public-multi-access-edge-compute-mec/tutorial-create-vm-using-python-sdk.md",
23992399
"redirect_url": "/previous-versions/azure/public-multi-access-edge-compute-mec/tutorial-create-vm-using-python-sdk",
@@ -6875,49 +6875,49 @@
68756875
"redirect_document_id": false
68766876
},
68776877
{
6878-
"source_path": "articles/storage/files/storage-files-enable-soft-delete.md",
6878+
"source_path": "articles/storage/files/storage-files-enable-soft-delete.md",
68796879
"redirect_url": "/azure/storage/files/storage-files-prevent-file-share-deletion",
68806880
"redirect_document_id": false
6881-
},
6882-
{
6881+
},
6882+
{
68836883
"source_path": "articles/defender-for-iot/organizations/release-notes-archive.md",
68846884
"redirect_url": "/azure/defender-for-iot/organizations/release-notes-ot-monitoring-sensor-archive",
6885-
"redirect_document_id": false
6886-
},
6887-
{
6885+
"redirect_document_id": false
6886+
},
6887+
{
68886888
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-portal.md",
68896889
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6890-
"redirect_document_id": false
6891-
},
6892-
{
6890+
"redirect_document_id": false
6891+
},
6892+
{
68936893
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-powershell.md",
68946894
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6895-
"redirect_document_id": false
6896-
},
6897-
{
6895+
"redirect_document_id": false
6896+
},
6897+
{
68986898
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-cli.md",
68996899
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6900-
"redirect_document_id": false
6901-
},
6902-
{
6900+
"redirect_document_id": false
6901+
},
6902+
{
69036903
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-template.md",
69046904
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6905-
"redirect_document_id": false
6906-
},
6907-
{
6905+
"redirect_document_id": false
6906+
},
6907+
{
69086908
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-terraform.md",
69096909
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6910-
"redirect_document_id": false
6911-
},
6912-
{
6910+
"redirect_document_id": false
6911+
},
6912+
{
69136913
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-bicep.md",
69146914
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6915-
"redirect_document_id": false
6916-
},
6917-
{
6915+
"redirect_document_id": false
6916+
},
6917+
{
69186918
"source_path": "articles/defender-for-iot/organizations/eiot-sensor.md",
69196919
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise",
69206920
"redirect_document_id": false
69216921
}
69226922
]
6923-
}
6923+
}

articles/application-gateway/configuration-http-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ The Backend Settings enable you to manage the configurations for backend connect
1616
## Types of Backend Settings in Application Gateway
1717
While Portal users will only see the "Backend Settings" option, API users will have access to two types of settings. You must utilize the correct configuration, according to the protocol.
1818

19-
* Backend HTTP settings - It is for Layer 7 proxy configurations that support HTTP, HTTPS, and WebSockets protocols.
19+
* Backend HTTP settings - It is for Layer 7 proxy configurations that support HTTP and HTTPS protocols.
2020
* Backend settings - It is for Layer 4 proxy (Preview) configurations that support TLS and TCP protocols.
2121

2222
---

articles/application-gateway/monitor-application-gateway-reference.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Monitoring data reference for Azure Application Gateway
33
description: This article contains important reference material you need when you monitor Azure Application Gateway.
4-
ms.date: 03/28/2025
4+
ms.date: 05/12/2025
55
ms.custom: horz-monitor
66
ms.topic: reference
77
author: greg-lindsay
@@ -109,7 +109,9 @@ https://management.azure.com/subscriptions/subid/providers/Microsoft.Network/loc
109109

110110
### TLS/TCP proxy metrics
111111

112-
Application Gateway supports TLS/TCP proxy monitoring. With layer 4 proxy feature now available with Application Gateway, there are some Common metrics that apply to both layer 7 and layer 4. There are some layer 4 specific metrics. The following list summarizes the metrics are the applicable for layer 4 usage.
112+
The following metrics are available for monitoring Application Gateway's TLS/TCP proxy. In addition to Layer 4-specific metrics, there are several common metrics with Layer 7 (HTTP/S). For details of each, visit the complete [metrics listing](#supported-metrics-for-microsoftnetworkapplicationgateways).
113+
114+
**Metrics that also apply to L4 proxy**
113115

114116
- Current Connections
115117
- New Connections per second
@@ -118,14 +120,16 @@ Application Gateway supports TLS/TCP proxy monitoring. With layer 4 proxy featur
118120
- Unhealthy host count
119121
- Client RTT
120122
- Backend Connect Time
121-
- Backend First Byte Response Time. `BackendHttpSetting` dimension includes both layer 7 and layer 4 backend settings.
122-
123-
For more information, see previous descriptions and the [metrics table](#supported-metrics-for-microsoftnetworkapplicationgateways).
123+
- Backend First Byte Response Time (`BackendHttpSetting` dimension applies to both Layer 7 and 4 backend settings).
124+
- Bytes Sent
125+
- Bytes Received
126+
- Compute Units
127+
- Capacity Units
124128

125-
These metrics apply to layer 4 only.
129+
**L4 proxy-specific metrics**
126130

127-
- **Backend Session Duration**. The total time of a backend connection. The average time duration from the start of a new connection to its termination. `BackendHttpSetting` dimension includes both layer 7 and layer 4 backend settings.
128-
- **Connection Lifetime**. The total time of a client connection to application gateway. The average time duration from the start of a new connection to its termination in milliseconds.
131+
- Backend Session Duration - The total time of a backend connection. The average time duration from the start of a new connection to its termination. `BackendHttpSetting` dimension includes both layer 7 and layer 4 backend settings.
132+
- Connection Lifetime - The total time of a client connection to application gateway. The average time duration from the start of a new connection to its termination in milliseconds.
129133

130134
### TLS/TCP proxy backend health
131135

articles/automation/extension-based-hybrid-runbook-worker-install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides information about deploying the extension-bas
44
services: automation
55
ms.subservice: process-automation
66
ms.custom: devx-track-azurepowershell, devx-track-azurecli, devx-track-bicep, linux-related-content
7-
ms.date: 05/08/2025
7+
ms.date: 05/12/2025
88
ms.topic: how-to
99
#Customer intent: As a developer, I want to learn about extension so that I can efficiently deploy Hybrid Runbook Workers.
1010
ms.service: azure-automation
@@ -123,7 +123,7 @@ If you use a proxy server for communication between Azure Automation and machine
123123

124124
The API call will provide the value with the key: `AutomationHybridServiceUrl`. Use the URL in the next step to enable extension on the VM.
125125

126-
1. Install the Hybrid Worker Extension on the VM by running the following PowerShell cmdlet (Required module: Az.Compute). Use the `properties.automationHybridServiceUrl` provided by the above API call
126+
1. Install the Hybrid Worker Extension on the VM by running the following PowerShell cmdlet (Required module: Az.Compute). Use the `properties.automationHybridServiceUrl` provided by the above API call. Ensure ProxyServer URL does not contain any blank spaces.
127127

128128
# [Windows](#tab/windows)
129129

articles/azure-compute-fleet/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@
66
href: quickstart-create-portal.md
77
- name: Create with ARM template
88
href: quickstart-create-rest-api.md
9+
- name: Create using Azure CLI
10+
href: quickstart-create-azure-cli.md
911
expand: true
1012
- name: Allocation strategies
1113
href: allocation-strategies.md
Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
---
2+
title: Create an Azure Compute Fleet using Azure CLI
3+
description: Learn how to create an Azure Compute Fleet using Azure CLI.
4+
author: ykh015
5+
ms.author: yakhande
6+
ms.topic: how-to
7+
ms.service: azure-compute-fleet
8+
ms.date: 05/09/2025
9+
ms.reviewer: jushiman
10+
ms.custom: devx-track-azurecli
11+
---
12+
13+
# Create an Azure Compute Fleet using Azure CLI
14+
15+
This article steps through using the Azure CLI to create and deploy a Compute Fleet resource
16+
17+
Make sure that you've installed the latest [Azure CLI](/cli/azure/install-az-cli2) and are logged in to an Azure account with [az login](/cli/azure/reference-index).
18+
19+
## Launch Azure Cloud Shell
20+
21+
The Azure Cloud Shell is a free interactive shell that you can use to run the steps in this article. It has common Azure tools preinstalled and configured to use with your account.
22+
23+
To open the Cloud Shell, select **Open Cloud Shell** from the upper right corner of a code block. You can also launch Cloud Shell in a separate browser tab by going to [https://shell.azure.com/cli](https://shell.azure.com/cli). Select **Copy** to copy the blocks of code, paste it into the Cloud Shell, and press enter to run it.
24+
25+
## Prerequisites
26+
27+
- If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
28+
- Before using Compute Fleet, complete the feature registration and configure role-based access controls (RBAC).
29+
30+
## Feature registration
31+
32+
Register the Azure Compute Fleet resource provider with your subscription using Azure CLI. Registration can take up to 30 minutes to successfully show as registered.
33+
34+
```azurecli-interactive
35+
az provider register --namespace 'Microsoft.AzureFleet'
36+
```
37+
38+
## Define environment variables
39+
40+
Define environment variables as follows.
41+
42+
```bash
43+
export RANDOM_ID="$(openssl rand -hex 3)"
44+
export MY_RESOURCE_GROUP_NAME="myFleetResourceGroup$RANDOM_ID"
45+
export REGION=EastUS
46+
export MY_FLEET_NAME="myFleet$RANDOM_ID"
47+
export MY_USERNAME=azureuser
48+
export MY_VNET_NAME="myVNet$RANDOM_ID"
49+
export NETWORK_PREFIX="$(($RANDOM % 254 + 1))"
50+
export MY_VNET_PREFIX="10.$NETWORK_PREFIX.0.0/16"
51+
export MY_VM_SN_NAME="myVMSN$RANDOM_ID"
52+
export MY_VM_SN_PREFIX="10.$NETWORK_PREFIX.0.0/24"
53+
```
54+
55+
## Create a resource group
56+
57+
A resource group is a logical container into which Azure resources are deployed and managed. All resources must be placed in a resource group. The following command creates a resource group with the previously defined `$MY_RESOURCE_GROUP_NAME` and `$REGION` parameters.
58+
59+
```azurecli-interactive
60+
az group create --name $MY_RESOURCE_GROUP_NAME --location $REGION
61+
```
62+
63+
## Create virtual network and subnet
64+
65+
Now you'll create a virtual network using the previously defined `$MY_VNET_PREFIX`, `$MY_VM_SN_NAME`, and `$MY_VM_SN_PREFIX` parameters.
66+
67+
```azurecli-interactive
68+
az network vnet create --name $MY_VNET_NAME --resource-group $MY_RESOURCE_GROUP_NAME --location $REGION --address-prefix $MY_VNET_PREFIX --subnet-name $MY_VM_SN_NAME --subnet-prefix $MY_VM_SN_PREFIX
69+
```
70+
71+
The following command gets the subnet ARM ID.
72+
73+
```azurecli-interactive
74+
export MY_SUBNET_ID="$(az network vnet subnet show \
75+
--resource-group $MY_RESOURCE_GROUP_NAME \
76+
--vnet-name $MY_VNET_NAME \
77+
--name $MY_VM_SN_NAME \
78+
--query id --output tsv)"
79+
```
80+
81+
## Set up the admin password
82+
83+
Set up a password that meets the [password requirements for Azure VMs](https://learn.microsoft.com/azure/virtual-machines/windows/faq#what-are-the-password-requirements-when-creating-a-vm-).
84+
85+
```bash
86+
export ADMIN_PASSWORD="Azure compliant password"
87+
```
88+
89+
## Create a Compute Fleet
90+
91+
Set up the compute profile which is applied to the underlying VMs.
92+
93+
```bash
94+
export COMPUTE_PROFILE="{ 'baseVirtualMachineProfile': { 'storageProfile': { 'imageReference': { 'publisher':'canonical', 'offer':'0001-com-ubuntu-server-focal', 'sku': '20_04-lts-gen2', 'version': 'latest' } }, 'osProfile': { 'computerNamePrefix': 'vm', 'adminUsername': '$MY_USERNAME', 'adminPassword': '$ADMIN_PASSWORD'}, 'networkProfile': { 'networkInterfaceConfigurations': [{ 'name': 'nic', 'primary': 'true', 'enableIPForwarding': 'true', 'ipConfigurations': [{ 'name': 'ipc', 'subnet': { 'id': '$MY_SUBNET_ID' } }] }], 'networkApiVersion': '2020-11-01'} } }"
95+
```
96+
97+
```azurecli-interactive
98+
az compute-fleet create --name $MY_FLEET_NAME --resource-group $MY_RESOURCE_GROUP_NAME --location $REGION \
99+
--spot-priority-profile "{ 'capacity': 5 }" \
100+
--regular-priority-profile "{ 'capacity': 5 }" \
101+
--compute-profile "$COMPUTE_PROFILE" \
102+
--vm-sizes-profile "[{ 'name': 'Standard_F1s' }]"
103+
```
104+
105+
## Clean up resources (optional)
106+
107+
To avoid Azure charges, you should clean up unneeded resources. When you no longer need your Compute Fleet and other resources, delete the resource group and all its resources with [az group delete](/cli/azure/group). The `--no-wait` parameter returns control to the prompt without waiting for the operation to complete. The `--yes` parameter confirms that you wish to delete the resources without another prompt to do so.
108+
109+
## Next steps
110+
> [!div class="nextstepaction"]
111+
> [Learn how to modify a Compute Fleet.](modify-fleet.md)

articles/azure-functions/durable/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@
116116
href: ./durable-task-scheduler/durable-task-scheduler.md
117117
- name: Choosing an orchestration framework
118118
href: ./durable-task-scheduler/choose-orchestration-framework.md
119-
- name: Create Durable Task Scheduler resources
119+
- name: Develop with Durable Task Scheduler
120120
href: ./durable-task-scheduler/develop-with-durable-task-scheduler.md
121121
- name: Identity
122122
href: ./durable-task-scheduler/durable-task-scheduler-identity.md

articles/azure-functions/durable/durable-functions-mssql-container-apps-hosting.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: how-to
55
ms.date: 05/06/2025
66
---
77

8-
# Host a Durable Functions app in Azure Container Apps
8+
# Host a Durable Functions app in Azure Container Apps (.NET isolated)
99

1010
Azure Functions provides integrated support for developing, deploying, and managing containerized Function Apps on Azure Container Apps. Use Azure Container Apps for your Functions apps when you need to run in the same environment as other microservices, APIs, websites, workflows, or any container hosted programs. Learn more about [running Azure Functions in Container Apps](../../container-apps/functions-overview.md).
1111

@@ -163,7 +163,6 @@ A [workload profile](../functions-container-apps-hosting.md#hosting-and-workload
163163
--resource-group $resourceGroup \
164164
--name $containerAppEnv \
165165
--location $location \
166-
--infrastructure-subnet-resource-id $subnetId
167166
```
168167
169168
1. Create a container app based on the Durable Functions image.
@@ -178,7 +177,7 @@ A [workload profile](../functions-container-apps-hosting.md#hosting-and-workload
178177
--query properties.outputs.fqdn
179178
```
180179
181-
1. Make note of the app URL, which should look similar to `https://<APP_NAME>.victoriouswave-3866c33e.<REGION>.azurecontainerapps.io`.
180+
1. Make note of the app URL, which should look similar to `https://<APP_NAME>.<ENVIRONMENT_IDENTIFIER>.<REGION>.azurecontainerapps.io`.
182181
183182
### Create databases
184183
@@ -235,22 +234,22 @@ In this section, you set up **user-assigned managed identity** for Azure Storage
235234
clientId=$(az identity show --name $identity --resource-group $resourceGroup --query 'clientId' --output tsv)
236235
```
237236
238-
1. Assign the role `Storage Blob Data Owner` role for access to the storage account.
237+
1. Assign the role **Storage Blob Data Owner** role for access to the storage account.
239238
240239
```azurecli
241240
echo "Assign Storage Blob Data Owner role to identity"
242241
az role assignment create --assignee "$clientId" --role "Storage Blob Data Owner" --scope "$scope"
243242
```
244243
245244
### Set up app settings
246-
247-
Authenticating to the MSSQL database using managed identity isn't supported when hosting a Durable Functions app in Azure Container Apps. For now, this guide authenticates using connection strings.
245+
> [!NOTE]
246+
> Authenticating to the MSSQL database using managed identity isn't supported when hosting a Durable Functions app in Azure Container Apps. For now, this guide authenticates using connection strings.
248247
249248
1. From the SQL database resource in the Azure portal, navigate to **Settings** > **Connection strings** to find the connection string.
250249
251250
:::image type="content" source="./media/quickstart-mssql/mssql-azure-db-connection-string.png" alt-text="Screenshot showing database connection string.":::
252251
253-
The connection string should be a format similar to:
252+
The connection string should have a format similar to:
254253
255254
```bash
256255
dbserver=<SQL_SERVER_NAME>

0 commit comments

Comments
 (0)