Skip to content

Commit 4b928d6

Browse files
authored
Merge pull request #291508 from MicrosoftDocs/main
12/5/2024 AM Publish
2 parents 620cecf + c556c7a commit 4b928d6

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+128
-263
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4009,6 +4009,16 @@
40094009
"source_path_from_root": "/articles/defender-for-iot/device-builders/overview-firmware-analysis.md",
40104010
"redirect_url": "/azure/firmware-analysis/overview-firmware-analysis",
40114011
"redirect_document_id": false
4012+
},
4013+
{
4014+
"source_path_from_root": "/articles/managed-grafana/how-to-upgrade-grafana-10.md",
4015+
"redirect_url": "/azure/managed-grafana/overview",
4016+
"redirect_document_id": false
4017+
},
4018+
{
4019+
"source_path_from_root": "/articles/managed-grafana/how-to-transition-domain.md",
4020+
"redirect_url": "/azure/managed-grafana/overview",
4021+
"redirect_document_id": false
40124022
}
40134023
]
40144024
}

articles/azure-netapp-files/azure-netapp-files-network-topologies.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: ram-kakani
66
ms.service: azure-netapp-files
77
ms.topic: conceptual
8-
ms.date: 05/10/2024
8+
ms.date: 12/05/2024
99
ms.author: ramakk
1010
ms.custom: references_regions
1111
---
@@ -111,7 +111,8 @@ Configuring UDRs on the source VM subnets with the address prefix of delegated s
111111
> To access an Azure NetApp Files volume from an on-premises network via a VNet gateway (ExpressRoute or VPN) and firewall, configure the route table assigned to the VNet gateway to include the `/32` IPv4 address of the Azure NetApp Files volume listed and point to the firewall as the next hop. Using an aggregate address space that includes the Azure NetApp Files volume IP address will not forward the Azure NetApp Files traffic to the firewall.
112112
113113
>[!NOTE]
114-
>If you want to configure a UDR route in the VM VNet, to control the routing of packets destined for a regionally VNet-peered Azure NetApp Files standard volume, the UDR prefix must be more specific or equal to the delegated subnet size of the Azure NetApp Files volume. If the UDR prefix is of size greater than the delegated subnet size, it will not be effective.
114+
> If you want to configure a route table (UDR route) to control the routing of packets through a network virtual alliance or firewall destined to an Azure NetApp Files standard volume from a source in the same VNet or a peered VNet, the UDR prefix must be more specific or equal to the delegated subnet size of the Azure NetApp Files volume. If the UDR prefix is less specific than the delegated subnet size, it isn't be effective.
115+
> For example, if your delegated subnet is `x.x.x.x/24`, you must configured your UDR to `x.x.x.x/24` (equal) or `x.x.x.x/32` (more specific). If you configure the UDR route to be `x.x.x.x/16`, undefined behaviors such as asymmetric routing can cause a network drop at the firewall.
115116
116117
## Azure native environments
117118

articles/azure-resource-manager/bicep/bicep-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ The following message shows an example for Bicep version.
185185
```
186186

187187
For the available methods & request/response bodies, see [`ICliJsonRpcProtocol.cs`](https://github.com/Azure/bicep/blob/main/src/Bicep.Cli/Rpc/ICliJsonRpcProtocol.cs).
188-
For an example establishing a JSONRPC connection and interacting with Bicep files programmatically using Node, see [`jsonrpc.test.ts`](https://github.com/Azure/bicep/blob/main/src/Bicep.Cli.E2eTests/src/jsonrpc.test.ts).
188+
For an example establishing a JSONRPC connection and interacting with Bicep files programmatically using Node, see [`jsonrpc.test.ts`](https://github.com/Azure/bicep/blob/main/src/Bicep.Cli.E2eTests/src/local/jsonrpc.test.ts).
189189

190190
### Usage for named pipe
191191

articles/azure-resource-manager/management/move-support-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -999,7 +999,7 @@ Moves between Resource groups and subscriptions are supported for APIs that use
999999
> | Resource type | Resource group | Subscription | Region move |
10001000
> | ------------- | ----------- | ---------- | ----------- |
10011001
> | accounts | **Yes** | **Yes** | No. [Learn more](/azure/azure-monitor/app/create-workspace-resource#how-do-i-move-an-application-insights-resource-to-a-new-region). |
1002-
> | actiongroups | No | No | No |
1002+
> | actiongroups | **Yes** | **Yes** | No |
10031003
> | activitylogalerts | No | No | No |
10041004
> | alertrules | **Yes** | **Yes** | No |
10051005
> | autoscalesettings | **Yes** | **Yes** | No |

articles/azure-vmware/includes/create-private-cloud-azure-portal-steps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Steps to create an Azure VMware Solution private cloud using the Az
44
ms.topic: include
55
ms.service: azure-vmware
66
ms.custom: devx-track-azurecli, engagement-fy23
7-
ms.date: 1/03/2024
7+
ms.date: 12/5/2024
88
author: suzizuber
99
ms.author: v-szuber
1010
---
@@ -51,7 +51,7 @@ You can create an Azure VMware Solution private cloud using the Azure portal or
5151
1. Verify the information entered, and if correct, select **Create**.
5252

5353
> [!NOTE]
54-
> This step takes roughly 3-4 hours. Adding a single host in an existing or the same cluster takes between 30 - 45 minutes.
54+
> This step takes an estimated 4+ hours. Adding a single host in an existing cluster takes an estimated 1 hour. If you are adding a new cluster with maximum nodes (16), it can take an estimated 4+ hours.
5555
5656
1. Verify that the deployment was successful. Navigate to the resource group you created and select your private cloud. You see the status of **Succeeded** when the deployment is finished.
5757

articles/communication-services/concepts/analytics/logs/voice-and-video-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ For each endpoint within a call, a distinct call diagnostic log is created for o
107107
| `identifier` | The unique ID for the user. The identity can be an Azure Communication Services user, a Microsoft Entra user ID, a Teams object ID, or a Teams bot ID. You can use this ID to correlate user events across logs. |
108108
| `endpointId` | The unique ID that represents each endpoint connected to the call, where `endpointType` defines the endpoint type. When the value is `null`, the connected entity is the Communication Services server. `EndpointId` can persist for the same user across multiple calls (`correlationId`) for native clients but is unique for every call when the client is a web browser. |
109109
| `endpointType` | The value that describes the properties of each `endpointId` instance. It can contain `"Server"`, `"VOIP"`, `"PSTN"`, `"BOT"`, `"Voicemail"`, `"Anonymous"`, or `"Unknown"`. |
110-
| `mediaType` | The string value that describes the type of media that's being transmitted between endpoints within each stream. Possible values include `"Audio"`, `"Video"`, `"VBSS"` (video-based screen sharing), and `"AppSharing"`. |
110+
| `mediaType` | The string value that describes the type of media that's being transmitted between endpoints within each stream. Possible values include `"Audio"`, `"Video"`, `"VBSS"` (screen sharing), and `"AppSharing"` (data channel).|
111111
| `streamId` | A nonunique integer that, together with `mediaType`, you can use to uniquely identify streams of the same `participantId` value. |
112112
| `transportType` | The string value that describes the network transport protocol for each `participantId` value. It can contain `"UDP"`, `"TCP"`, or `"Unrecognized"`. `"Unrecognized"` indicates that the system couldn't determine if the transport type was TCP or UDP. |
113113
| `roundTripTimeAvg` | The average time that it takes to get an IP packet from one endpoint to another within a `participantDuration` period. This network propagation delay is related to the physical distance between the two points, the speed of light, and any overhead that the various routers take in between. <br><br>The latency is measured as one-way time or round-trip time (RTT). Its value expressed in milliseconds. An RTT greater than 500 ms is negatively affecting the call quality. |

articles/firewall/management-nic.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ ms.author: victorh
1212
# Azure Firewall Management NIC
1313

1414
> [!NOTE]
15-
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
15+
> This feature was previously called Forced Tunneling. Originally, a Management NIC was required only for Forced Tunneling. However, certain upcoming Firewall features will also require a Management NIC, so it has been decoupled from Forced Tunneling. All relevant documentation has been updated to reflect this.
1616
17-
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall. This is a mandatory requirement to avoid service disruption.
17+
An Azure Firewall Management NIC separates firewall management traffic from customer traffic. Certain upcoming Firewall features will also require a Management NIC. To support any of these capabilities, you must create an Azure Firewall with the Firewall Management NIC enabled or enable it on an existing Azure Firewall to avoid service disruption.
1818

1919
## What happens when you enable the Management NIC
2020

21-
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. It's used exclusively by the Azure platform and can't be used for any other purpose. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
21+
If you enable a Management NIC, the firewall routes its management traffic via the AzureFirewallManagementSubnet (minimum subnet size /26) with its associated public IP address. You assign this public IP address for the firewall to manage traffic. All traffic required for firewall operational purposes is incorporated into the AzureFirewallManagementSubnet.
2222

2323
By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway routes* must be disabled. Avoid associating customer route tables to the Management subnet, as this can cause service disruptions if configured incorrectly. If you do associate a route table, then ensure it has a default route to the Internet to avoid service disruptions.
2424

@@ -91,33 +91,33 @@ Now when you view the firewall in the Azure portal, you see the assigned Managem
9191
If you prefer to deploy a new Azure Firewall instead of the Stop/Start method, make sure to include a Management Subnet and Management NIC as part of your configuration.
9292

9393
**Important Note**
94-
* **Single Firewall per Virtual Network (VNET)**: Since two firewalls cannot exist within the same virtual network, it is recommended to delete the old firewall before starting the new deployment if you plan to reuse the same VNET.
95-
* **Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing VNET.
94+
* **Single Firewall per Virtual Network (VNET)**: Since two firewalls can't exist within the same virtual network, it's recommended to delete the old firewall before starting the new deployment if you plan to reuse the same virtual network.
95+
* **Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing virtual network.
9696

9797
**Prerequisites**
9898
* Create the **AzureFirewallManagementSubnet**:
9999
* Minimum subnet size: /26
100100
* Example: 10.0.1.0/26
101101

102102
**Deployment Steps**
103-
1. Go to **Create a Resource** in the Azure Portal.
103+
1. Go to **Create a Resource** in the Azure portal.
104104
1. Search for **Firewall** and select **Create**.
105-
1. On the Create a Firewall page, configure the following:
105+
1. On the Create a Firewall page, configure the following settings:
106106
* **Subscription**: Select your subscription.
107107
* **Resource Group**: Select or create a new resource group.
108108
* **Name**: Enter a name for the firewall.
109109
* **Region**: Choose your region.
110110
* **Firewall SKU**: Select Basic, Standard, or Premium.
111111
* **Virtual Network**: Create a new virtual network or use an existing one.
112-
* Address space: e.g., 10.0.0.0/16
113-
* Subnet for AzureFirewallSubnet: e.g., 10.0.0.0/26
112+
* Address space: for example, 10.0.0.0/16
113+
* Subnet for AzureFirewallSubnet: for example, 10.0.0.0/26
114114
* **Public IP Address**: Add new Public IP
115-
* Name: e.g., FW-PIP
115+
* Name: for example, FW-PIP
116116
1. Firewall Management NIC
117117
* Select **Enable Firewall Management NIC**
118-
* Subnet for AzureFirewallManagementSubnet: e.g., 10.0.1.0/24
119-
* Create Management public IP address: e.g., Mgmt-PIP
120-
1. Select **Review + Create** to validate and deploy the firewall. This will take a few minutes to deploy.
118+
* Subnet for AzureFirewallManagementSubnet: for example, 10.0.1.0/24
119+
* Create Management public IP address: for example, Mgmt-PIP
120+
1. Select **Review + Create** to validate and deploy the firewall. This takes a few minutes to deploy.
121121

122122

123123
## Related content

articles/governance/machine-configuration/how-to/develop-custom-package/1-set-up-authoring-environment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Support for applying configurations through machine configuration is introduced
2424

2525
Operating systems where the module can be installed:
2626

27-
- Ubuntu 18
27+
- Ubuntu 18 or higher
2828
- Windows
2929

3030
The module can be installed on a machine running PowerShell 7.x. Install the versions of PowerShell

articles/iot-hub-device-update/support.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,6 @@ The systems listed in the following tables are supported by Microsoft, either ge
4242
| Ubuntu Server 22.04 | ![Ubuntu Server 22.04 + AMD64](./media/support/green-check.png) | | ![Ubuntu Server 22.04 + ARM64](./media/support/green-check.png) |
4343

4444

45-
> [!NOTE]
46-
> [Standard support for Ubuntu 18.04 LTS ends on May 31st, 2023](https://ubuntu.com/blog/18-04-end-of-standard-support). Beginning June 2023, Ubuntu 18.04 LTS won't be a supported platform. Ubuntu 18.04 LTS Device Update packages are available until Nov 30th, 2023. If you take no action, Ubuntu 18.04 LTS based Device Update devices continue to work but ongoing security patches and bug fixes in the host packages for Ubuntu 18.04 won't be available after Nov 30th, 2023. To continue to receive support and security updates, we recommend that you update your host OS to a supported platform.
47-
4845
## Releases and Support
4946

5047
Device Update for IoT Hub release assets and release notes are available on the [Device Update Release](https://github.com/Azure/iot-hub-device-update/releases) page. Support for the APIs, PnP Models, and device update reference agents is covered in the table.

articles/logic-apps/logic-apps-overview.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,10 @@ To learn how other companies improved their agility and increased focus on their
9898

9999
All these services help you connect and bring together disparate systems. Each service has their advantages and benefits, so combining their capabilities is the best way to quickly build a scalable, full-featured integration system. For more information, see [Choose between Azure Logic Apps, Azure Functions, Azure WebJobs, and Microsoft Power Automate](../azure-functions/functions-compare-logic-apps-ms-flow-webjobs.md).
100100

101+
## How does Azure Logic Apps differ from Azure Automation Runbooks?
102+
103+
[Azure Automation Runbooks](/azure/automation/automation-runbook-types) provide a lightweight and cost-effective solution for straightforward remediations, such as restarting virtual machines. In contrast, Azure Logic Apps are ideal for workflows and orchestrations between multiple services, systems, apps, and data. including workloads that run custom code or require complex logic that uses control structures such as loops, branching, conditions, and more.
104+
101105
## How quickly can I ramp up my solutions with Azure Logic Apps?
102106

103107
You can start small with your current systems and services, and then grow incrementally at your own pace. When you're ready, Azure Logic Apps helps you implement and scale up to more mature integration scenarios by providing the following capabilities and benefits.

0 commit comments

Comments
 (0)