You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-network-topologies.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: ram-kakani
6
6
ms.service: azure-netapp-files
7
7
ms.topic: conceptual
8
-
ms.date: 05/10/2024
8
+
ms.date: 12/05/2024
9
9
ms.author: ramakk
10
10
ms.custom: references_regions
11
11
---
@@ -111,7 +111,8 @@ Configuring UDRs on the source VM subnets with the address prefix of delegated s
111
111
> To access an Azure NetApp Files volume from an on-premises network via a VNet gateway (ExpressRoute or VPN) and firewall, configure the route table assigned to the VNet gateway to include the `/32` IPv4 address of the Azure NetApp Files volume listed and point to the firewall as the next hop. Using an aggregate address space that includes the Azure NetApp Files volume IP address will not forward the Azure NetApp Files traffic to the firewall.
112
112
113
113
>[!NOTE]
114
-
>If you want to configure a UDR route in the VM VNet, to control the routing of packets destined for a regionally VNet-peered Azure NetApp Files standard volume, the UDR prefix must be more specific or equal to the delegated subnet size of the Azure NetApp Files volume. If the UDR prefix is of size greater than the delegated subnet size, it will not be effective.
114
+
> If you want to configure a route table (UDR route) to control the routing of packets through a network virtual alliance or firewall destined to an Azure NetApp Files standard volume from a source in the same VNet or a peered VNet, the UDR prefix must be more specific or equal to the delegated subnet size of the Azure NetApp Files volume. If the UDR prefix is less specific than the delegated subnet size, it isn't be effective.
115
+
> For example, if your delegated subnet is `x.x.x.x/24`, you must configured your UDR to `x.x.x.x/24` (equal) or `x.x.x.x/32` (more specific). If you configure the UDR route to be `x.x.x.x/16`, undefined behaviors such as asymmetric routing can cause a network drop at the firewall.
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/bicep/bicep-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -185,7 +185,7 @@ The following message shows an example for Bicep version.
185
185
```
186
186
187
187
For the available methods & request/response bodies, see [`ICliJsonRpcProtocol.cs`](https://github.com/Azure/bicep/blob/main/src/Bicep.Cli/Rpc/ICliJsonRpcProtocol.cs).
188
-
For an example establishing a JSONRPC connection and interacting with Bicep files programmatically using Node, see [`jsonrpc.test.ts`](https://github.com/Azure/bicep/blob/main/src/Bicep.Cli.E2eTests/src/jsonrpc.test.ts).
188
+
For an example establishing a JSONRPC connection and interacting with Bicep files programmatically using Node, see [`jsonrpc.test.ts`](https://github.com/Azure/bicep/blob/main/src/Bicep.Cli.E2eTests/src/local/jsonrpc.test.ts).
Copy file name to clipboardExpand all lines: articles/azure-vmware/includes/create-private-cloud-azure-portal-steps.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Steps to create an Azure VMware Solution private cloud using the Az
4
4
ms.topic: include
5
5
ms.service: azure-vmware
6
6
ms.custom: devx-track-azurecli, engagement-fy23
7
-
ms.date: 1/03/2024
7
+
ms.date: 12/5/2024
8
8
author: suzizuber
9
9
ms.author: v-szuber
10
10
---
@@ -51,7 +51,7 @@ You can create an Azure VMware Solution private cloud using the Azure portal or
51
51
1. Verify the information entered, and if correct, select **Create**.
52
52
53
53
> [!NOTE]
54
-
> This step takes roughly 3-4 hours. Adding a single host in an existing or the same cluster takes between 30 - 45 minutes.
54
+
> This step takes an estimated 4+ hours. Adding a single host in an existing cluster takes an estimated 1 hour. If you are adding a new cluster with maximum nodes (16), it can take an estimated 4+ hours.
55
55
56
56
1. Verify that the deployment was successful. Navigate to the resource group you created and select your private cloud. You see the status of **Succeeded** when the deployment is finished.
Copy file name to clipboardExpand all lines: articles/communication-services/concepts/analytics/logs/voice-and-video-logs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ For each endpoint within a call, a distinct call diagnostic log is created for o
107
107
|`identifier`| The unique ID for the user. The identity can be an Azure Communication Services user, a Microsoft Entra user ID, a Teams object ID, or a Teams bot ID. You can use this ID to correlate user events across logs. |
108
108
|`endpointId`| The unique ID that represents each endpoint connected to the call, where `endpointType` defines the endpoint type. When the value is `null`, the connected entity is the Communication Services server. `EndpointId` can persist for the same user across multiple calls (`correlationId`) for native clients but is unique for every call when the client is a web browser. |
109
109
|`endpointType`| The value that describes the properties of each `endpointId` instance. It can contain `"Server"`, `"VOIP"`, `"PSTN"`, `"BOT"`, `"Voicemail"`, `"Anonymous"`, or `"Unknown"`. |
110
-
|`mediaType`| The string value that describes the type of media that's being transmitted between endpoints within each stream. Possible values include `"Audio"`, `"Video"`, `"VBSS"` (video-based screen sharing), and `"AppSharing"`. |
110
+
|`mediaType`| The string value that describes the type of media that's being transmitted between endpoints within each stream. Possible values include `"Audio"`, `"Video"`, `"VBSS"` (screen sharing), and `"AppSharing"` (data channel).|
111
111
|`streamId`| A nonunique integer that, together with `mediaType`, you can use to uniquely identify streams of the same `participantId` value. |
112
112
|`transportType`| The string value that describes the network transport protocol for each `participantId` value. It can contain `"UDP"`, `"TCP"`, or `"Unrecognized"`. `"Unrecognized"` indicates that the system couldn't determine if the transport type was TCP or UDP. |
113
113
|`roundTripTimeAvg`| The average time that it takes to get an IP packet from one endpoint to another within a `participantDuration` period. This network propagation delay is related to the physical distance between the two points, the speed of light, and any overhead that the various routers take in between. <br><br>The latency is measured as one-way time or round-trip time (RTT). Its value expressed in milliseconds. An RTT greater than 500 ms is negatively affecting the call quality. |
Copy file name to clipboardExpand all lines: articles/firewall/management-nic.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,13 +12,13 @@ ms.author: victorh
12
12
# Azure Firewall Management NIC
13
13
14
14
> [!NOTE]
15
-
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
15
+
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, certain upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
16
16
17
-
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall. This is a mandatory requirement to avoid service disruption.
17
+
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Certain upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall to avoid service disruption.
18
18
19
19
## What happens when you enable the Management NIC
20
20
21
-
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
21
+
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
22
22
23
23
By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
24
24
@@ -91,33 +91,33 @@ Now when you view the firewall in the Azure portal, you see the assigned Managem
91
91
If you prefer to deploy a new Azure Firewall instead of the Stop/Start method, make sure to include a Management Subnet and Management NIC as part of your configuration.
92
92
93
93
**Important Note**
94
-
***Single Firewall per Virtual Network (VNET)**: Since two firewalls cannot exist within the same virtual network, it is recommended to delete the old firewall before starting the new deployment if you plan to reuse the same VNET.
95
-
***Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing VNET.
94
+
***Single Firewall per Virtual Network (VNET)**: Since two firewalls can't exist within the same virtual network, it's recommended to delete the old firewall before starting the new deployment if you plan to reuse the same virtual network.
95
+
***Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing virtual network.
96
96
97
97
**Prerequisites**
98
98
* Create the **AzureFirewallManagementSubnet**:
99
99
* Minimum subnet size: /26
100
100
* Example: 10.0.1.0/26
101
101
102
102
**Deployment Steps**
103
-
1. Go to **Create a Resource** in the Azure Portal.
103
+
1. Go to **Create a Resource** in the Azure portal.
104
104
1. Search for **Firewall** and select **Create**.
105
-
1. On the Create a Firewall page, configure the following:
105
+
1. On the Create a Firewall page, configure the following settings:
106
106
* **Subscription**: Select your subscription.
107
107
* **Resource Group**: Select or create a new resource group.
108
108
* **Name**: Enter a name for the firewall.
109
109
* **Region**: Choose your region.
110
110
* **Firewall SKU**: Select Basic, Standard, or Premium.
111
111
* **Virtual Network**: Create a new virtual network or use an existing one.
112
-
* Address space: e.g., 10.0.0.0/16
113
-
* Subnet for AzureFirewallSubnet: e.g., 10.0.0.0/26
112
+
* Address space: for example, 10.0.0.0/16
113
+
* Subnet for AzureFirewallSubnet: for example, 10.0.0.0/26
114
114
* **Public IP Address**: Add new Public IP
115
-
* Name: e.g., FW-PIP
115
+
* Name: for example, FW-PIP
116
116
1. Firewall Management NIC
117
117
* Select **Enable Firewall Management NIC**
118
-
* Subnet for AzureFirewallManagementSubnet: e.g., 10.0.1.0/24
119
-
* Create Management public IP address: e.g., Mgmt-PIP
120
-
1. Select **Review + Create** to validate and deploy the firewall. This will take a few minutes to deploy.
118
+
* Subnet for AzureFirewallManagementSubnet: for example, 10.0.1.0/24
119
+
* Create Management public IP address: for example, Mgmt-PIP
120
+
1. Select **Review + Create** to validate and deploy the firewall. This takes a few minutes to deploy.
Copy file name to clipboardExpand all lines: articles/iot-hub-device-update/support.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,9 +42,6 @@ The systems listed in the following tables are supported by Microsoft, either ge
42
42
| Ubuntu Server 22.04 ||||
43
43
44
44
45
-
> [!NOTE]
46
-
> [Standard support for Ubuntu 18.04 LTS ends on May 31st, 2023](https://ubuntu.com/blog/18-04-end-of-standard-support). Beginning June 2023, Ubuntu 18.04 LTS won't be a supported platform. Ubuntu 18.04 LTS Device Update packages are available until Nov 30th, 2023. If you take no action, Ubuntu 18.04 LTS based Device Update devices continue to work but ongoing security patches and bug fixes in the host packages for Ubuntu 18.04 won't be available after Nov 30th, 2023. To continue to receive support and security updates, we recommend that you update your host OS to a supported platform.
47
-
48
45
## Releases and Support
49
46
50
47
Device Update for IoT Hub release assets and release notes are available on the [Device Update Release](https://github.com/Azure/iot-hub-device-update/releases) page. Support for the APIs, PnP Models, and device update reference agents is covered in the table.
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-overview.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,6 +98,10 @@ To learn how other companies improved their agility and increased focus on their
98
98
99
99
All these services help you connect and bring together disparate systems. Each service has their advantages and benefits, so combining their capabilities is the best way to quickly build a scalable, full-featured integration system. For more information, see [Choose between Azure Logic Apps, Azure Functions, Azure WebJobs, and Microsoft Power Automate](../azure-functions/functions-compare-logic-apps-ms-flow-webjobs.md).
100
100
101
+
## How does Azure Logic Apps differ from Azure Automation Runbooks?
102
+
103
+
[Azure Automation Runbooks](/azure/automation/automation-runbook-types) provide a lightweight and cost-effective solution for straightforward remediations, such as restarting virtual machines. In contrast, Azure Logic Apps are ideal for workflows and orchestrations between multiple services, systems, apps, and data. including workloads that run custom code or require complex logic that uses control structures such as loops, branching, conditions, and more.
104
+
101
105
## How quickly can I ramp up my solutions with Azure Logic Apps?
102
106
103
107
You can start small with your current systems and services, and then grow incrementally at your own pace. When you're ready, Azure Logic Apps helps you implement and scale up to more mature integration scenarios by providing the following capabilities and benefits.
0 commit comments