Skip to content

Commit 4ca29a2

Browse files
committed
Merge branch 'main' into iot-industrial-reviews
2 parents c0e2687 + 6dd64b4 commit 4ca29a2

File tree

180 files changed

+1456
-1348
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

180 files changed

+1456
-1348
lines changed

articles/api-center/synchronize-api-management-apis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ API Management APIs automatically synchronize to the API center whenever existin
2828

2929
> [!NOTE]
3030
> * There are [limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json#api-center-limits) for the number of linked API Management instances (API sources).
31-
> * API updates in API Management can take a few minutes to up to 24 hours to synchronize to your API center.
31+
> * API updates in API Management typically synchronize to your API center within minutes but synchronization can take up to 24 hours.
3232
3333
### Entities synchronized from API Management
3434

articles/api-management/inject-vnet-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ When you [create](get-started-create-service-instance.md) a Premium v2 instance
8888

8989
1. In the **Create API Management service** wizard, select the **Networking** tab.
9090
1. In **Connectivity type**, select **Virtual network**.
91-
1. In **Type**, select **Internal**.
91+
1. In **Type**, select **Virtual Network injection**.
9292
1. In **Configure virtual networks**, select the virtual network and the delegated subnet that you want to inject.
9393
1. Complete the wizard to create the API Management instance.
9494

articles/azure-cache-for-redis/cache-how-to-premium-vnet.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create and manage virtual network support for your Pre
44

55

66
ms.topic: conceptual
7-
ms.date: 08/29/2023
7+
ms.date: 12/12/2024
88

99
---
1010

@@ -124,7 +124,10 @@ There are nine outbound port requirements. Outbound requests in these ranges are
124124
| --- | --- | --- | --- | --- | --- |
125125
| 80, 443 |Outbound |TCP |Redis dependencies on Azure Storage/PKI (internet) | (Redis subnet) |* <sup>4</sup> |
126126
| 443 | Outbound | TCP | Redis dependency on Azure Key Vault and Azure Monitor | (Redis subnet) | AzureKeyVault, AzureMonitor <sup>1</sup> |
127-
| 53 |Outbound |TCP/UDP |Redis dependencies on DNS (internet/virtual network) | (Redis subnet) | 168.63.129.16 and 169.254.169.254 <sup>2</sup> and any custom DNS server for the subnet <sup>3</sup> |
127+
| 12000 | Outbound | TCP | Redis dependency on Azure Monitor | (Redis subnet) | AzureMonitor <sup>1</sup> |
128+
| 53 |Outbound |TCP/UDP | Redis dependencies on DNS (internet/virtual network) | (Redis subnet) | 168.63.129.16 and 169.254.169.254 <sup>2</sup> and any custom DNS server for the subnet <sup>3</sup> |
129+
| 123 | Outbound | UDP | Operating system dependency on NTP | (Redis subnet) | * |
130+
| 1688 | Outbound | TCP | Operating system dependency for activation | (Redis subnet) | * |
128131
| 8443 |Outbound |TCP |Internal communications for Redis | (Redis subnet) | (Redis subnet) |
129132
| 10221-10231 |Outbound |TCP |Internal communications for Redis | (Redis subnet) | (Redis subnet) |
130133
| 20226 |Outbound |TCP |Internal communications for Redis | (Redis subnet) |(Redis subnet) |
@@ -165,11 +168,14 @@ There are eight inbound port range requirements. Inbound requests in these range
165168

166169
There are network connectivity requirements for Azure Cache for Redis that might not be initially met in a virtual network. Azure Cache for Redis requires all the following items to function properly when used within a virtual network:
167170

168-
- Outbound network connectivity to Azure Key Vault endpoints worldwide. Azure Key Vault endpoints resolve under the DNS domain `vault.azure.net`.
169-
- Outbound network connectivity to Azure Storage endpoints worldwide. Endpoints located in the same region as the Azure Cache for Redis instance and storage endpoints located in _other_ Azure regions are included. Azure Storage endpoints resolve under the following DNS domains: `table.core.windows.net`, `blob.core.windows.net`, `queue.core.windows.net`, and `file.core.windows.net`.
171+
- Outbound network connectivity to Azure Key Vault endpoints worldwide. Azure Key Vault endpoints resolve under the DNS domain `*.vault.azure.net`.
172+
- Outbound network connectivity to Azure Storage endpoints worldwide. Endpoints located in the same region as the Azure Cache for Redis instance and storage endpoints located in _other_ Azure regions are included. Azure Storage endpoints resolve under the following DNS domains: `*.table.core.windows.net`, `*.blob.core.windows.net`, `*.queue.core.windows.net`, and `*.file.core.windows.net`.
170173
- Outbound network connectivity to `ocsp.digicert.com`, `crl4.digicert.com`, `ocsp.msocsp.com`, `mscrl.microsoft.com`, `crl3.digicert.com`, `cacerts.digicert.com`, `oneocsp.microsoft.com`, and `crl.microsoft.com`, `cacerts.geotrust.com`, `www.microsoft.com`, `cdp.geotrust.com`, `status.geotrust.com`. This connectivity is needed to support TLS/SSL functionality.
174+
- Outbound network connectivity to the following Azure Monitor endpoints, which resolve under the following DNS domains: `shoebox3.prod.microsoftmetrics.com`, `shoebox3-red.prod.microsoftmetrics.com`, `shoebox3-black.prod.microsoftmetrics.com`, `azredis.prod.microsoftmetrics.com`, `azredis-red.prod.microsoftmetrics.com`, `azredis-black.prod.microsoftmetrics.com`, `global.prod.microsoftmetrics.com`, `gcs.prod.monitoring.core.windows.net`, and `*.prod.warm.ingest.monitor.core.windows.net`.
175+
- Outbound network connectivity to the following endpoints for internal diagnostics, which resolve under the following DNS domains: `azurewatsonanalysis-prod.core.windows.net`, `*.data.microsoft.com`, `shavamanifestazurecdnprod1.azureedge.net`, and `shavamanifestcdnprod1.azureedge.net`.
176+
- Outbound network connectivity to the following endpoints for the operating system update service, which resolve under the following DNS domains: `*.update.microsoft.com`, `*.ctldl.windowsupdate.com`, and `ctldl.windowsupdate.com`, `*.delivery.mp.microsoft.com`, and `download.windowsupdate.com`.
177+
- Outbound network connectivity to the following endpoints for the antivirus, which resolve under the following DNS domains: `go.microsoft.com`, `wdcp.microsoft.com`, `wdcpalt.microsoft.com`, and `definitionupdates.microsoft.com`.
171178
- The DNS configuration for the virtual network must be able to resolve all of the endpoints and domains mentioned in the earlier points. These DNS requirements can be met by ensuring a valid DNS infrastructure is configured and maintained for the virtual network.
172-
- Outbound network connectivity to the following Azure Monitor endpoints, which resolve under the following DNS domains: `shoebox3.prod.microsoftmetrics.com`, `shoebox3-red.prod.microsoftmetrics.com`, `shoebox3-black.prod.microsoftmetrics.com`, `azredis.prod.microsoftmetrics.com`, `azredis-red.prod.microsoftmetrics.com`, and `azredis-black.prod.microsoftmetrics.com`.
173179

174180
### How can I verify that my cache is working in a virtual network?
175181

articles/azure-cache-for-redis/managed-redis/managed-redis-best-practices-connection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: conceptual
99
ms.date: 11/15/2024
1010
---
1111

12-
# Connection resilience with Azure Managed Redis(preview)
12+
# Connection resilience with Azure Managed Redis (preview)
1313

1414
## Retry commands
1515

articles/azure-resource-manager/management/preview-features.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Set up preview features in Azure subscription
33
description: Describes how to list, register, or unregister preview features in your Azure subscription for a resource provider.
44
ms.topic: how-to
5-
ms.date: 09/26/2024
5+
ms.date: 12/12/2024
66
ms.custom: devx-track-azurepowershell, devx-track-azurecli
77
# Customer intent: As an Azure user, I want to use preview features in my subscription so that I can expose a resource provider's preview functionality.
88
---
@@ -25,7 +25,8 @@ You can list all the preview features and their registration states for an Azure
2525

2626
# [Portal](#tab/azure-portal)
2727

28-
The portal only shows a preview feature when the service that owns the feature has explicitly opted in to the preview features management experience.
28+
> [!NOTE]
29+
> The portal only shows a preview feature when the service that owns the feature has explicitly opted in to the preview features management experience. In case the feature you are looking for doesn't appear on the list available, we recommend using [Azure CLI](./preview-features.md?tabs=azure-cli#list-preview-features) and [Azure Powershell](./preview-features.md?tabs=azure-powershell#list-preview-features).
2930
3031
1. Sign in to the [Azure portal](https://portal.azure.com/).
3132
1. In the search box, enter _subscriptions_ and select **Subscriptions**.
@@ -101,7 +102,7 @@ Name RegistrationState
101102
Microsoft.Compute/InGuestPatchVMPreview NotRegistered
102103
```
103104

104-
# [PowerShell](#tab/azure-powershell)
105+
# [Azure PowerShell](#tab/azure-powershell)
105106

106107
To list all the subscription's preview features, use the [Get-AzProviderFeature](/powershell/module/az.resources/get-azproviderfeature) cmdlet.
107108

@@ -210,7 +211,7 @@ Microsoft.Compute/InGuestPatchVMPreview Registered
210211
> [!NOTE]
211212
> When the register command runs, a message is displayed that after the feature is registered, to run `az provider register --namespace <provider-name>` to propagate the changes.
212213
213-
# [PowerShell](#tab/azure-powershell)
214+
# [Azure PowerShell](#tab/azure-powershell)
214215

215216
To register a preview feature, use the [Register-AzProviderFeature](/powershell/module/az.resources/register-azproviderfeature) cmdlet.
216217

@@ -306,7 +307,7 @@ Name RegistrationState
306307
Microsoft.Compute/InGuestPatchVMPreview Unregistered
307308
```
308309

309-
# [PowerShell](#tab/azure-powershell)
310+
# [Azure PowerShell](#tab/azure-powershell)
310311

311312
To unregister a preview feature, use the [Unregister-AzProviderFeature](/powershell/module/az.resources/unregister-azproviderfeature) cmdlet. The `RegistrationState` state changes to **Unregistered**.
312313

articles/azure-vmware/azure-vmware-solution-platform-updates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the platform updates to Azure VMware Solution.
44
ms.topic: reference
55
ms.custom: "references_regions, engagement-fy23"
66
ms.service: azure-vmware
7-
ms.date: 11/22/2024
7+
ms.date: 12/12/2024
88
---
99

1010
# What's new in Azure VMware Solution
@@ -17,7 +17,7 @@ Azure VMware Solution is now ready to update all existing Azure Commercial custo
1717

1818
All new Azure VMware Solution private clouds are being deployed with VMware vSphere 8.0 version in [Microsoft Azure Government](https://azure.microsoft.com/explore/global-infrastructure/government/#why-azure). [Learn more](architecture-private-clouds.md#vmware-software-versions)
1919

20-
Trusted Launch is now available in all Azure VMware Solution regions. This enables Virtual Trusted Platform Module (vTPM) on virtual machines, ensuring compliance with the latest security standards and unlocking the potential to run modern operating systems like Microsoft Windows 11. [Learn more](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.vm_admin.doc/GUID-A43B6914-E5F9-4CB1-9277-448AC9C467FB.html)
20+
Trusted Launch is now available in all Azure VMware Solution regions. This enables Virtual Trusted Platform Module (vTPM) on virtual machines, ensuring compliance with the latest security standards and unlocking the potential to run modern operating systems like Microsoft Windows 11. [Learn more](configure-virtual-trusted-platform-module.md#configure-virtual-trusted-platform-module-vtpm-on-virtual-machines-with-azure-vmware-solution)
2121

2222
## October 2024
2323

articles/azure-vmware/configure-site-to-site-vpn-gateway.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,6 @@ A virtual hub is a virtual network that is created and used by Azure Virtual WAN
8282

8383
2. Select the VPN Site for which you want to set up a custom IPsec policy.
8484

85-
:::image type="content" source="../virtual-wan/media/virtual-wan-custom-ipsec-portal/locate.png" alt-text="Screenshot showing the existing VPN sites to set up customer IPsec policies." lightbox="../virtual-wan/media/virtual-wan-custom-ipsec-portal/locate.png":::
86-
8785
3. Select your VPN site name, select **More** (...) at the far right, and then select **Edit VPN Connection**.
8886

8987
:::image type="content" source="../virtual-wan/media/virtual-wan-custom-ipsec-portal/contextmenu.png" alt-text="Screenshot showing the context menu for an existing VPN site." lightbox="../virtual-wan/media/virtual-wan-custom-ipsec-portal/contextmenu.png":::
375 KB
Loading

articles/azure-vmware/toc.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,13 +33,15 @@ items:
3333
href: tutorial-configure-networking.md
3434
- name: 4 - Access a private cloud
3535
href: tutorial-access-private-cloud.md
36-
- name: 5 - Create an NSX network segment
36+
- name: 5 - Create an NSX Tier-1 Gateway
37+
href: tutorial-nsx-tier-1-gateway.md
38+
- name: 6 - Create an NSX network segment
3739
href: tutorial-nsx-t-network-segment.md
38-
- name: 6 - Peer on-premises to private cloud
40+
- name: 7 - Peer on-premises to private cloud
3941
href: tutorial-expressroute-global-reach-private-cloud.md
40-
- name: 7 - Scale a private cloud
42+
- name: 8 - Scale a private cloud
4143
href: tutorial-scale-private-cloud.md
42-
- name: 8 - Delete a private cloud
44+
- name: 9 - Delete a private cloud
4345
href: tutorial-delete-private-cloud.md
4446
- name: Cost optimization
4547
items:
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: Tutorial - NSX-Tier-1-Gateway
3+
description: Learn how to create a Tier-1 Gateway
4+
ms.topic: tutorial
5+
ms.service: azure-vmware
6+
ms.date: 12/11/2024
7+
ms.custom: engagement-fy25
8+
---
9+
10+
# Tutorial: Create an NSX Tier-1 Gateway
11+
12+
After deploying the Azure VMware Solution, you can create additional Tier-1 Gateways from the NSX Manager. Once configured, the additional Tier-1 Gateway is visible in the NSX Manager. NSX comes pre-provisioned by default with an NSX Tier-0 Gateway in **Active/Active** mode and a default Tier-1 Gateway in **Active/Standby** mode.
13+
14+
In this tutorial, you learn how to:
15+
16+
> [!div class="checklist"]
17+
> * Create an additional NSX Tier-1 Gateway in the NSX Manager
18+
> * Configure the High Availability (HA) mode on a Tier-1 Gateway
19+
20+
## Prerequisites
21+
22+
An Azure VMware Solution private cloud with access to the NSX Manager interface. For more information, see the [Configure networking](tutorial-configure-networking.md) tutorial.
23+
24+
## Use NSX Manager to create a Tier-1 Gateway
25+
26+
A Tier-1 Gateway is typically added to a Tier-0 Gateway in the northbound direction and to segments in the southbound direction.
27+
28+
1. With the CloudAdmin account, sign-in to the NSX Manager.
29+
30+
2. In NSX Manager, select **Networking** > **Tier-1 Gateways**.
31+
32+
3. Select **Add Tier-1 Gateway**.
33+
34+
4. Enter a name for the gateway.
35+
36+
5. Select the **HA Mode** for the Tier-1 Gateway. Choose between **Active/Standby**, **Active/Active**, or **Distributed Only**:
37+
38+
| HA Mode | Description |
39+
| :--------- | :------------- |
40+
| Active Standby | One active instance and one standby instance. The Standby takes over is the active fails. |
41+
| Active Active | Both instances are active and can handle traffic simultaneously. |
42+
| Distributed Only | No centralized instances; routing is distributed across all transport nodes. |
43+
44+
6. Select a Tier-0 Gateway to connect to this Tier-1 Gateway to create a multi-tier topology.
45+
46+
7. Select an NSX Edge cluster if you want this Tier-1 Gateway to host stateful services such as NAT, load balancer, or firewall.
47+
48+
8. After you select an NSX Edge cluster, a toggle gives you the option to select NSX Edge Nodes.
49+
50+
9. If you selected an NSX Edge cluster, select a failover mode or accept the default.
51+
52+
| Option | Description |
53+
| :----- | :---------- |
54+
| Preemptive | If the preferred NSX Edge node fails and recovers, it preempts its peer and becomes the active node. The peer changes its state to standby. |
55+
| Non-preemptive | If the preferred NSX Edge node fails and recovers, it checks if its peer is the active node. If so, the preferred node will not preempt its peer and will be the standby node. This is the default option. |
56+
57+
:::image type="content" source="media/nsxt/nsx-create-tier-1.png" alt-text="Diagram showing the creation of a new Tier-1 Gateway in NSX Manager." border="false" lightbox="media/nsxt/nsx-create-tier-1.png":::
58+
59+
10. Select **Save**.
60+
61+
## Next steps
62+
63+
In this tutorial, you created an additional Tier-1 Gateway to use in your Azure VMware Solution private cloud.
64+

0 commit comments

Comments
 (0)