Skip to content

Commit 46d37a1

Browse files
authored
Merge pull request #289558 from MicrosoftDocs/main
10/31 11:00 AM IST Publish
2 parents 11e1da2 + a8f3f2a commit 46d37a1

File tree

13 files changed

+146
-29
lines changed

13 files changed

+146
-29
lines changed

articles/azure-functions/functions-triggers-bindings.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,10 @@
22
title: Triggers and bindings in Azure Functions
33
description: Learn to use triggers and bindings to connect your Azure Function to online events and cloud-based services.
44
ms.topic: conceptual
5-
ms.date: 09/06/2024
5+
ms.date: 10/28/2024
66
ms.custom: devdivchpfy22, devx-track-extended-java, devx-track-js, devx-track-python, devx-track-ts
77
zone_pivot_groups: programming-languages-set-functions
8+
ai-usage: ai-assisted
89
---
910

1011
# Azure Functions triggers and bindings concepts
@@ -36,9 +37,9 @@ These examples aren't meant to be exhaustive, but are provided to illustrate how
3637
3738
## Trigger and binding definitions
3839

39-
Triggers and bindings are defined differently depending on the development language. Make sure to select your language at the [top](#top) of the article.
40+
A function has a single trigger and one or more bindings. The type of binding is either input or output. Not all services support both input and output bindings. See your specific binding extension for [specific bindings code examples](#bindings-code-examples).
4041

41-
Bindings can be either input or output bindings. Not all services support both input and output bindings. See your specific binding extension for [specific bindings code examples](#bindings-code-examples).
42+
Triggers and bindings are defined differently depending on the development language. Make sure to select your language at the [top](#top) of the article.
4243

4344
This example shows an HTTP triggered function with an output binding that writes a message to an Azure Storage queue.
4445

@@ -194,10 +195,13 @@ In Python for Functions version 1, this example `function.json` file defines an
194195
---
195196

196197
::: zone-end
198+
197199
## Add bindings to a function
198200

199201
You can connect your function to other services by using input or output bindings. Add a binding by adding its specific definitions to your function. To learn how, see [Add bindings to an existing function in Azure Functions](add-bindings-existing-function.md).
200202

203+
Azure Functions supports multiple bindings, which must be configured correctly. For example, a function can read data from a queue (input binding) and write data to a database (output binding) simultaneously.
204+
201205
## Supported bindings
202206

203207
[!INCLUDE [Full bindings table](../../includes/functions-bindings.md)]

articles/dns/dns-faq.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,11 +77,9 @@ sections:
7777
The feature to buy domain names is tracked in the Azure backlog. Use the feedback site to [register your support for this feature](https://feedback.azure.com/d365community/idea/9e9f97ea-8526-ec11-b6e6-000d3a4f0789).
7878
7979
- question: |
80-
Does Azure DNS support DNSSEC?
80+
Does Azure DNS support Domain Name System Security Extensions (DNSSEC)?
8181
answer: |
82-
No. Azure DNS doesn't currently support the Domain Name System Security Extensions (DNSSEC).
83-
84-
The DNSSEC feature is tracked in the Azure DNS backlog. Use the feedback site to [register your support for this feature](https://feedback.azure.com/d365community/idea/d403899e-8526-ec11-b6e6-000d3a4f0789).
82+
Yes. See [DNSSEC overview](dnssec.md).
8583
8684
- question: |
8785
Does Azure DNS support zone transfers (AXFR/IXFR)?

articles/dns/dnssec.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Before you sign a zone with DNSSEC, be sure to understand [how DNSSEC works](#ho
7979

8080
If a DNS server is DNSSEC-aware, it can set the DNSSEC OK (DO) flag in a DNS query to a value of `1`. This value tells the responding DNS server to include DNSSEC-related resource records with the response. These DNSSEC records are Resource Record Signature (RRSIG) records that are used to validate that the DNS response is genuine.
8181

82-
A recursive (non-authoritative) DNS server performs DNSSEC validation on RRSIG records using a trust anchor (DNSKEY). The server uses a DNSKEY to decrypt digital signatures in RRSIG records (and other DNSSEC-related records), and then computes and compares hash values. If hash values are the same, it provides a reply to the DNS client with the DNS data that it requested, such as a host address (A) record. See the following diagram:
82+
A recursive (non-authoritative) DNS server performs DNSSEC validation on RRSIG records using a [trust anchor](#trust-anchors-and-dnssec-validation) (DNSKEY). The server uses a DNSKEY to decrypt digital signatures in RRSIG records (and other DNSSEC-related records), and then computes and compares hash values. If hash values are the same, it provides a reply to the DNS client with the DNS data that it requested, such as a host address (A) record. See the following diagram:
8383

8484
![A diagram showing how DNSSEC validation works.](media/dnssec/dnssec-validation.png)
8585

@@ -92,7 +92,7 @@ Windows 10 and Windows 11 client devices are [nonvalidating security-aware stub
9292
> [!NOTE]
9393
> DNSSEC response validation is not performed by the default Azure-provided resolver. The information in this section is helpful if you are setting up your own recursive DNS servers for DNSSEC validation or troubleshooting validation issues.
9494
95-
Trust anchors operate based on the DNS namespace hierarchy. A recursive DNS server can have any number of trust anchors, or no trust anchors. Trust anchors can be added for a single child DNS zone, or any parent zone. If a recursive DNS server has a root (.) trust anchor, then it can perform DNSSEC validation on any DNS zone.
95+
Trust anchors operate based on the DNS namespace hierarchy. A recursive DNS server can have any number of trust anchors, or no trust anchors. Trust anchors can be added for a single child DNS zone, or any parent zone. If a recursive DNS server has a root (.) trust anchor, then it can perform DNSSEC validation on any DNS zone. For more information, see [Root Zone Operator Information](https://www.iana.org/dnssec).
9696

9797
The DNSSEC validation process works with trust anchors as follows:
9898
- If a recursive DNS server doesn't have a DNSSEC trust anchor for a zone or the zone's parent hierarchical namespace, it will not perform DNSSEC validation on that zone.

articles/dns/public-dns-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ For more information, see [How to protect DNS zones and records](dns-protect-zon
3333

3434
## DNSSEC
3535

36-
Azure Public DNS doesn't currently support DNSSEC. In most cases, you can reduce the need for DNSSEC by consistently using HTTPS/TLS in your applications. If DNSSEC is a critical requirement for your DNS zones, you can host these zones with third-party DNS hosting providers.
36+
Azure Public DNS supports DNSSEC. For more information, see [DNSSEC overview](dnssec.md).
3737

3838
## Ease of use
3939

articles/frontdoor/migrate-cdn-to-front-door.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ We recommend that your plan this migration well in advance and test the function
2020

2121
## Prerequisites
2222

23-
- Review the [feature differences](front-door-cdn-comparison.md) between Azure CDN and Azure Front Door to determine if there are any compability gaps.
23+
- Review the [feature differences](front-door-cdn-comparison.md) between Azure CDN and Azure Front Door to determine if there are any compatibility gaps.
2424
- You need access to a VM connected to the internet that can run Wget on Linux or Invoke-WebRequest on Windows using PowerShell.
2525
- You need access to a monitoring tool such as CatchPoint or ThousandEyes to verify the availability of your URLs before and after the migration. These tools are the most ideal because they can monitor the availability of your URLs from different locations around the world. `webpagetest.org` is another option, but it only provides a limited view of your URLs from a few locations.
2626

@@ -193,4 +193,4 @@ At this stage you have fully migrated all traffic from Azure CDN from Edgio to A
193193

194194
## Next steps
195195

196-
Learn about [best practices](best-practices.md) for Azure Front Door.
196+
Learn about [best practices](best-practices.md) for Azure Front Door.

articles/iot-operations/manage-mqtt-broker/howto-test-connection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: azure-mqtt-broker
77
ms.topic: how-to
88
ms.custom:
99
- ignite-2023
10-
ms.date: 07/08/2024
10+
ms.date: 10/30/2024
1111

1212
#CustomerIntent: As an operator or developer, I want to test MQTT connectivity with tools that I'm already familiar with to know that I set up my MQTT broker correctly.
1313
ms.service: azure-iot-operations
@@ -305,13 +305,13 @@ For Azure Kubernetes Services Edge Essentials, you need to perform a few additio
305305

306306
1. Set up port forwarding to the `broker-loadbalancer` service on the external IP address `192.168.0.4` and port `1883`:
307307

308-
```bash
308+
```cmd
309309
netsh interface portproxy add v4tov4 listenport=1883 connectport=1883 connectaddress=192.168.0.4
310310
```
311311

312312
1. Open the port on the firewall to allow traffic to the broker's service:
313313

314-
```bash
314+
```powershell
315315
New-NetFirewallRule -DisplayName "AIO MQTT Broker" -Direction Inbound -Protocol TCP -LocalPort 1883 -Action Allow
316316
```
317317

articles/network-watcher/diagnose-network-security-rules.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,13 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-network-watcher
88
ms.topic: how-to
9-
ms.date: 10/29/2024
9+
ms.date: 10/30/2024
1010
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1111
---
1212

1313
# Diagnose network security rules
1414

15-
You can use [network security groups](../virtual-network/network-security-groups-overview.md) to filter and control inbound and outbound network traffic to and from your Azure resources. You can also use [Azure Virtual Network Manager](../virtual-network-manager/overview.md) to apply admin security rules to your Azure resources to control network traffic.
16-
17-
In this article, you learn how to use Azure Network Watcher [NSG diagnostics](nsg-diagnostics-overview.md) to check and troubleshoot security rules applied to your Azure traffic. NSG diagnostics checks if the traffic is allowed or denied by applied security rules.
15+
In this article, you learn how to use Azure Network Watcher [NSG diagnostics](nsg-diagnostics-overview.md) to check and troubleshoot security rules applied to your Azure traffic through [network security groups](../virtual-network/network-security-groups-overview.md?toc=/azure/network-watcher/toc.json) and [Azure Virtual Network Manager](../virtual-network-manager/overview.md?toc=/azure/network-watcher/toc.json). NSG diagnostics checks if the traffic is allowed or denied by applied security rules.
1816

1917
The example in this article shows you how a misconfigured network security group can prevent you from using Azure Bastion to connect to a virtual machine.
2018

articles/operator-nexus/troubleshoot-accepted-cluster-hydration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 10/30/2024
1212

1313
# Troubleshoot accepted Cluster resources
1414

15-
Operator Nexus relies on mirroring, or hydrating, resources from the on-premises cluster to Azure. When this process is interrupted, the Cluster resource can move to `Accepted`state.
15+
Operator Nexus relies on mirroring, or hydrating, resources from the on-premises cluster to Azure. When this process is interrupted, the Cluster resource can move to `Accepted` state.
1616

1717
## Diagnosis
1818

@@ -44,7 +44,7 @@ After the tag is applied, the Cluster moves to `Running` state.
4444
az networkcloud cluster show --resource-group <RESOURCE_GROUP> --name <CLUSTER_NAME>
4545
```
4646

47-
If the Cluster resource maintains the state after a period of time, less than 5 minutes, contact Microsoft support.
47+
If the Cluster resource maintains the state after a period of time, more than 5 minutes, contact Microsoft support.
4848

4949
## Further information
5050

articles/storage/file-sync/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,10 @@
6969
href: ../files/files-manage-namespaces.md?toc=/azure/storage/file-sync/toc.json
7070
- name: Enable threat protection with Microsoft Defender for Storage
7171
href: ../common/azure-defender-storage-configure.md?toc=/azure/storage/file-sync/toc.json
72-
- name: Encryption
72+
- name: Security
7373
items:
74+
- name: Configure managed identities
75+
href: file-sync-managed-identities.md
7476
- name: Encryption at rest
7577
href: ../common/storage-service-encryption.md?toc=/azure/storage/file-sync/toc.json
7678
- name: Encryption at rest with customer-managed keys

0 commit comments

Comments
 (0)