Skip to content

Commit 48b74a5

Browse files
authored
Merge pull request #300922 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 2e1c540 + 83b277b commit 48b74a5

File tree

2 files changed

+30
-7
lines changed

2 files changed

+30
-7
lines changed

articles/container-apps/gpu-serverless-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Access to this feature is only available after you have serverless GPU quota. Yo
7676
7777
## Supported regions
7878

79-
Serverless GPUs are available in preview in the *West US 3*, *Australia East*, and *Sweden Central* regions.
79+
Serverless GPUs are available in the *West US 3*, *Australia East*, and *Sweden Central* regions.
8080

8181
## Use serverless GPUs
8282

articles/oracle/oracle-db/oracle-database-network-plan.md

Lines changed: 29 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -80,20 +80,43 @@ The following table describes required configurations of supported network featu
8080
|Connectivity from an Oracle database cluster to a [private endpoint](../../private-link/private-endpoint-overview.md) in a different spoke virtual network connected to a virtual WAN|Yes| Yes|
8181
|NSG support on the Private link | No| Yes|
8282
| Connectivity to serverless Apps like Azure functions via private endpoints | No| Yes|
83+
| Azure SLB and ILB support for Oracle database cluster traffic | No | No |
8384
|Dual stack (IPv4 and IPv6) virtual network|Only IPv4 is supported| Only IPv4 is supported|
8485
| Service tags support| No | Yes |
8586

8687
> [!NOTE]
8788
> When using NSGs (Network Security Groups) on the Azure side, ensure that any security rules configured on the Oracle (OCI) side are reviewed to avoid conflicts. While applying security policies on both Azure and OCI can enhance the overall security posture, it also introduces additional complexity in terms of management and requires careful manual synchronization between the two environments. Misalignment between these policies could lead to unintended access issues or operational disruptions.
8889
89-
> [!IMPORTANT]
90-
> For traffic destined to Oracle Database@Azure, when routing traffic through a Network Virtual Appliance (NVA) or firewall to Oracle Database@Azure, the UDR prefix must be at least as specific as the delegated subnet of the instance.
91-
> If the delegated subnet for your instance is x.x.x.x/27, configure the UDR on the Gateway Subnet as:
92-
> x.x.x.x/27 (same as the subnet) ✅
93-
> x.x.x.x/32 (more specific) ✅
94-
> x.x.x.x/24 (too broad) ❌
9590

91+
### UDR requirements for routing traffic to Oracle Database@Azure
92+
When routing traffic to Oracle Database@Azure through a Network Virtual Appliance (NVA)/firewall, the User-Defined Route (UDR) prefix **must be at least as specific as the subnet delegated to the Oracle Database@Azure instance**. Broader prefixes may cause traffic to be dropped.
93+
94+
If the delegated subnet for your instance is x.x.x.x/27, configure the UDR on the Gateway Subnet as:
95+
| Route Prefix | Routing Outcome |
96+
|--------------|-----------------|
97+
|x.x.x.x/27 | (same as the subnet) ✅ |
98+
|x.x.x.x/32 |(more specific) ✅|
99+
|x.x.x.x/24 | (too broad) ❌ |
96100

101+
#### Topology-specific guidance
102+
**Hub-and-spoke topology**
103+
- Define the UDR on the gateway subnet.
104+
- Use a route prefix of `x.x.x.x/27` or more specific.
105+
- Set the next hop to your NVA/Firewall.
106+
107+
**Virtual WAN (VWAN)**
108+
- **With Routing Intent**:
109+
- Add the delegated subnet prefix (`x.x.x.x/27`) to the Routing Intent’s list of prefixes.
110+
111+
- **Without Routing Intent**:
112+
- Add a route to the VWAN's route table for `x.x.x.x/27` and point the next hop to the NVA/firewall.
113+
114+
> [!Note]
115+
> When **advanced network features are not enabled**, and for **traffic originating from the Oracle Database@Azure delegated subnet that needs to traverse a gateway** (for example, to reach on-premises networks, AVS, other clouds, etc.), you must configure specific UDRs on the delegated subnet.
116+
>These UDRs should define the specific destination IP prefixes and set the next hop to the appropriate NVA/firewall in the hub.
117+
> Without these routes, outbound traffic may bypass required inspection paths or fail to reach the intended destination.
118+
119+
97120

98121
## FAQ
99122
### What are advanced network features?

0 commit comments

Comments
 (0)