You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1198,8 +1198,8 @@ The SCIM spec does not define a SCIM-specific scheme for authentication and auth
1198
1198
[!NOTE] It's not recommended to leave the token field blank in the Azure AD provisioning configuration custom app UI. The token generated is primarily available for testing purposes.
1199
1199
1200
1200
**OAuthauthorizationcodegrantflow:**Theprovisioningservicesupportsthe [authorizationcodegrant](https://tools.ietf.org/html/rfc6749#page-24). After submitting your request for publishing your app in the gallery, our team will work with you to collect the following information:
Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-overview.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,18 +96,18 @@ For this scenario, use NSGs on the Application Gateway subnet. Put the following
96
96
97
97
You can create a UDR to send 0.0.0.0/0 traffic directly to the Internet.
98
98
99
-
**Scenario 3**: UDR for Azure Kubernetes Service kubenet
99
+
**Scenario 3**: UDR for Azure Kubernetes Service with kubenet
100
100
101
-
If you're using kubenet with Azure Kubernetes Service (AKS) and Application Gateway Ingress Controller (AGIC), you need to set up a route table to allow traffic sent to the pods to be routed to the correct node. This won't be necessary if you use Azure CNI.
101
+
If you're using kubenet with Azure Kubernetes Service (AKS) and Application Gateway Ingress Controller (AGIC), you'll need a route table to allow traffic sent to the pods from Application Gateway to be routed to the correct node. This won't be necessary if you use Azure CNI.
102
102
103
-
To set up the route table to allow kubenet to work, use the following steps:
103
+
To use the route table to allow kubenet to work, follow the steps below:
104
104
105
-
1. Create a Route Table resource in Azure.
106
-
2. Once it's created, go to the **Routes** page.
107
-
3. Add a new route:
105
+
1. Go to the resource group created by AKS (the name of the resource group should begin with "MC_")
106
+
2. Find the route table created by AKS in that resource group. The route table should be populated with the following information:
108
107
- Address prefix should be the IP range of the pods you want to reach in AKS.
109
-
- Next hop type should be **Virtual Appliance**.
110
-
- Next hop address should be the IP address of the node hosting the pods within the IP range defined in the address prefix field.
108
+
- Next hop type should be Virtual Appliance.
109
+
- Next hop address should be the IP address of the node hosting the pods.
110
+
3. Associate this route table to the Application Gateway subnet.
Copy file name to clipboardExpand all lines: articles/application-gateway/ssl-overview.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,10 @@ Application Gateway supports TLS termination at the gateway, after which traffic
24
24
25
25
To configure TLS termination, a TLS/SSL certificate is required to be added to the listener to enable the application gateway to derive a symmetric key as per TLS/SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. The TLS/SSL certificate needs to be in Personal Information Exchange (PFX) format. This file format allows you to export the private key that is required by the application gateway to perform the encryption and decryption of traffic.
26
26
27
+
> [!IMPORTANT]
28
+
> Please note that the certificate on the listener requires the entire certificate chain to be uploaded.
29
+
30
+
27
31
> [!NOTE]
28
32
>
29
33
> Application gateway does not provide any capability to create a new certificate or send a certificate request to a certification authority.
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/manage-cost-storage.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -308,7 +308,7 @@ Usage
308
308
309
309
### Data volume by computer
310
310
311
-
The `Usage` data type does not include information at the completer level. To see the **size** of ingested data per computer, use the `_BilledSize`[property](log-standard-properties.md#_billedsize), which provides the size in bytes:
311
+
The `Usage` data type does not include information at the computer level. To see the **size** of ingested data per computer, use the `_BilledSize`[property](log-standard-properties.md#_billedsize), which provides the size in bytes:
312
312
313
313
```kusto
314
314
union withsource = tt *
@@ -599,4 +599,4 @@ There are some additional Log Analytics limits, some of which depend on the Log
599
599
- To configure an effective event collection policy, review [Azure Security Center filtering policy](../../security-center/security-center-enable-data-collection.md).
@@ -195,9 +197,17 @@ If you require verbose logging for waagent, follow these steps:
195
197
196
198
### VM-Agent configuration options are not set (for Linux VMs)
197
199
198
-
A configuration file (/etc/waagent.conf) controls the actions of waagent. Configuration File Options **Extensions.Enable** and **Provisioning.Agent** should be set to **y** for Backup to work.
200
+
A configuration file (/etc/waagent.conf) controls the actions of waagent. Configuration File Options **Extensions.Enable**should be set to **y**and **Provisioning.Agent** should be set to **auto** for Backup to work.
199
201
For full list of VM-Agent Configuration File Options, see <https://github.com/Azure/WALinuxAgent#configuration-file-options>
200
202
203
+
### Application control solution is blocking IaaSBcdrExtension.exe
204
+
205
+
If you are running [AppLocker](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker) (or another application control solution), and the rules are publisher or path based, they may block the **IaaSBcdrExtension.exe** executable from running.
206
+
207
+
#### Solution
208
+
209
+
Exclude the `/var/lib` path or the **IaaSBcdrExtension.exe** executable from AppLocker (or other application control software.)
210
+
201
211
### <aname="the-snapshot-status-cannot-be-retrieved-or-a-snapshot-cannot-be-taken"></a>The snapshot status can't be retrieved, or a snapshot can't be taken
202
212
203
213
The VM backup relies on issuing a snapshot command to the underlying storage account. Backup can fail either because it has no access to the storage account, or because the execution of the snapshot task is delayed.
Copy file name to clipboardExpand all lines: articles/load-balancer/concepts.md
+5-25Lines changed: 5 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,35 +61,15 @@ Availability Zones | Standard load balancer supports additional abilities in reg
61
61
62
62
## <aname = "limitations"></a>Limitations
63
63
64
-
- A load balancer rule can't span two virtual networks. Front-ends and their related backend instances must be located in the same virtual network.
65
-
- Web Worker Roles without a virtual network and other Microsoft platform services can be accessible from instances behind only an internal standard load balancer. Don't rely on this accessibility, as the respective service itself or the underlying platform can change without notice. If outbound connectivity is required when using a standard internal load balancer, [outbound connectivity](load-balancer-outbound-connections.md) must be configured.
66
-
- Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
67
-
68
-
Load balancer doesn't close, respond, or otherwise interact with the payload of a UDP or TCP flow. Load balancer doesn't function as a proxy.
69
-
70
-
A successful connection to a front end must take place. This connection must be with the same port used in a load balancing or inbound NAT rule. To see a response from the frontend, one virtual machine in the backend pool must respond.
71
-
72
-
Failure to receive a response from the front end indicates no virtual machines could respond. Interact with a load balancer front end will fail without a virtual machine to respond.
73
-
74
-
This principle also applies to outbound connections where port masquerade SNAT is only supported for TCP and UDP. Any other IP protocols, including ICMP, fail.
75
-
76
-
Assign a public IP address to the resource to resolve this issue. For more information, see [Understanding SNAT and PAT](load-balancer-outbound-connections.md#snat).
64
+
- A load balancer rule can't span two virtual networks. Frontends and their backend instances must be located in the same virtual network.
77
65
78
-
-Internal load balancers don't translate outbound originated connections to the front end of an internal load balancer because both are in private IP address space. Public load balancers provide [outbound connections](load-balancer-outbound-connections.md) from private IP addresses inside the virtual network to public IP addresses. For internal load balancers, this approach avoids potential SNAT port exhaustion inside a unique internal IP address space, where translation isn't required.
66
+
-Web Worker Roles without a virtual network and other Microsoft platform services can be accessible from instances behind only a Standard internal Load balancer. Don't rely on this accessibility, as the respective service itself or the underlying platform can change without notice. If outbound connectivity is required when using a standard internal load balancer, [outbound connectivity](load-balancer-outbound-connections.md) must be configured.
79
67
80
-
Outbound flow from a backend VM to a frontend of an internal load balancer will fail. The failure occurs when the flow is mapped backed to itself. The two legs of the flow don't match and the flow will fail.
81
-
82
-
When the flow maps back to itself, the outbound flow appears to originate from the VM to the front end.
83
-
84
-
The flow succeeds if it didn't map back to the same VM in the back-end that created the flow.
85
-
86
-
The inbound and outbound parts of the flow don't match inside the VM. The TCP stack won't recognize these halves of the same flow as being part of the same flow. The source and destination don't match. The VM can respond when the flow maps to another VM in the backend. The halves for the flow match, and the connection can continue.
87
-
88
-
The symptom for this scenario is intermittent connection timeouts. Common workarounds include insertion of a proxy layer behind the internal load balancer and using Direct Server Return (DSR) style rules. For more information, see [Multiple Front ends for Azure Load Balancer](load-balancer-multivip-overview.md).
68
+
- Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
89
69
90
-
You can combine an internal load balancer with any third-party proxy. Use of internal [Application Gateway](../application-gateway/application-gateway-introduction.md) for proxy scenarios with HTTP/HTTPS is also available. While you could use a public load balancer to mitigate this issue, the resulting scenario is prone to [SNAT exhaustion](load-balancer-outbound-connections.md#snat). Avoid this second approach unless carefully managed.
70
+
- Internal load balancers don't translate outbound originated connections to the frontend of an internal load balancer because both are in private IP address space. Outbound flow from a backend VM to a frontend of an internal load balancer will fail. The failure occurs when the flow is mapped backed to itself. The two legs of the flow don't match and the flow will fail.
91
71
92
-
-In general, forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules. HA ports load-balancing rules can be used to forward existing IP fragments. For more information, see [High availability ports overview](load-balancer-ha-ports-overview.md).
72
+
-Forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules. HA ports load-balancing rules can be used to forward existing IP fragments. For more information, see [High availability ports overview](load-balancer-ha-ports-overview.md).
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-enable-virtual-network.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -554,7 +554,7 @@ For information on using Azure Machine Learning with Azure Firewall, see [Use Az
554
554
555
555
For more information, see the [update()](https://docs.microsoft.com/python/api/azureml-core/azureml.core.workspace.workspace?view=azure-ml-py#update-friendly-name-none--description-none--tags-none--image-build-compute-none--enable-data-actions-none-) method reference.
556
556
557
-
1. If you are using Private Link for your Azure Machine Learning workspace, and put the Azure Container Registry for your workspace in a virtual network, you must also apply the following Azure Resource Manager template. This template enables your workspace to communicate withACR over the Private Link.
557
+
1. You must apply the following Azure Resource Manager template. This template enables your workspace to communicate withACR.
0 commit comments