Skip to content

Commit 4ee361d

Browse files
authored
Merge pull request #288608 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents dd184ba + 4385140 commit 4ee361d

File tree

8 files changed

+28
-26
lines changed

8 files changed

+28
-26
lines changed

articles/app-service/app-service-key-vault-references.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,13 +102,13 @@ A key vault reference is of the form `@Microsoft.KeyVault({referenceString})`, w
102102
> [!div class="mx-tdBreakAll"]
103103
> | Reference string | Description |
104104
> |-----------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
105-
> | SecretUri=_secretUri_ | The **SecretUri** should be the full data-plane URI of a secret in the vault, optionally including a version, e.g., `https://myvault.vault.azure.net/secrets/mysecret/` or `https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931` |
105+
> | SecretUri=_secretUri_ | The **SecretUri** should be the full data-plane URI of a secret in the vault, for example `https://myvault.vault.azure.net/secrets/mysecret`. Optionally, include a version, such as `https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931`. |
106106
> | VaultName=_vaultName_;SecretName=_secretName_;SecretVersion=_secretVersion_ | The **VaultName** is required and is the vault name. The **SecretName** is required and is the secret name. The **SecretVersion** is optional but if present indicates the version of the secret to use. |
107107
108-
For example, a complete reference would look like the following string:
108+
For example, a complete reference without a specific version would look like the following string:
109109
110110
```
111-
@Microsoft.KeyVault(SecretUri=https://myvault.vault.azure.net/secrets/mysecret/)
111+
@Microsoft.KeyVault(SecretUri=https://myvault.vault.azure.net/secrets/mysecret)
112112
```
113113
114114
Alternatively:

articles/app-service/configure-common.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@ Here, you can configure some common settings for the app. Some settings require
443443
> [!NOTE]
444444
> Most modern browsers support HTTP/2 protocol over TLS only, while non-encrypted traffic continues to use HTTP/1.1. To ensure that client browsers connect to your app with HTTP/2, secure your custom DNS name. For more information, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
445445
- **Web sockets**: For [ASP.NET SignalR] or [socket.io](https://socket.io/), for example.
446-
- **Always On**: Keeps the app loaded even when there's no traffic. When **Always On** isn't turned on (default), the app is unloaded after 20 minutes without any incoming requests. The unloaded app can cause high latency for new requests because of its warm-up time. When **Always On** is turned on, the front-end load balancer sends a GET request to the application root every five minutes. The continuous ping prevents the app from being unloaded.
446+
- **Always On**: Keeps the app loaded even when there's no traffic. When **Always On** isn't turned on (default), the app is unloaded after 20 minutes without any incoming requests. The unloaded app can cause high latency for new requests because of its warm-up time. When **Always On** is turned on, the front-end load balancer sends a GET request to the application root every five minutes. It's important to ensure this request receives a 200 OK response to ensure any re-imaging operations are performed correctly. The continuous ping prevents the app from being unloaded.
447447

448448
Always On is required for continuous WebJobs or for WebJobs that are triggered using a CRON expression.
449449
- **Session affinity**: In a multi-instance deployment, ensure that the client is routed to the same instance for the life of the session. You can set this option to **Off** for stateless applications.

articles/app-service/deploy-github-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ To use [user-level credentials](#1-generate-deployment-credentials), paste the e
196196
When you configure the GitHub workflow file later, you use the secret for the input `creds` of the [Azure/login](https://github.com/marketplace/actions/azure-login). For example:
197197

198198
```yaml
199-
- uses: azure/login@v1
199+
- uses: azure/login@v2
200200
with:
201201
creds: ${{ secrets.AZURE_CREDENTIALS }}
202202
```
@@ -301,4 +301,4 @@ Check out references on Azure GitHub Actions and workflows:
301301
- [Azure/k8s-deploy action](https://github.com/Azure/k8s-deploy)
302302
- [Actions workflows to deploy to Azure](https://github.com/Azure/actions-workflow-samples)
303303
- [Starter Workflows](https://github.com/actions/starter-workflows)
304-
- [Events that trigger workflows](https://docs.github.com/en/actions/reference/events-that-trigger-workflows)
304+
- [Events that trigger workflows](https://docs.github.com/en/actions/reference/events-that-trigger-workflows)

articles/app-service/deploy-staging-slots.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ When you swap two slots (usually from a staging slot *as the source* into the pr
124124

125125
1. Now that the source slot has the pre-swap app previously in the target slot, perform the same operation by applying all settings and restarting the instances.
126126

127-
At any point of the swap operation, all work of initializing the swapped apps happens on the source slot. The target slot remains online while the source slot is being prepared and warmed up, regardless of where the swap succeeds or fails. To swap a staging slot with the production slot, make sure that the production slot is always the target slot. This way, the swap operation doesn't affect your production app.
127+
At any point of the swap operation, all work of initializing the swapped apps happens on the source slot. The target slot remains online while the source slot is being prepared and warmed up, regardless of whether the swap succeeds or fails. To swap a staging slot with the production slot, make sure that the production slot is always the target slot. This way, the swap operation doesn't affect your production app.
128128

129129
> [!NOTE]
130130
> The instances in your former production instances (those that will be swapped into staging after this swap operation) will be recycled quickly in the last step of the swap process. In case you have any long running operations in your application, they will be abandoned, when the workers recycle. This also applies to function apps. Therefore your application code should be written in a fault tolerant way.

articles/batch/batch-linux-nodes.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ When you create a virtual machine image reference, you must specify the followin
2424

2525
| **Image reference property** | **Example** |
2626
| --- | --- |
27-
| Publisher |Canonical |
28-
| Offer |UbuntuServer |
29-
| SKU |20.04-LTS |
27+
| Publisher |canonical |
28+
| Offer |0001-com-ubuntu-server-focal |
29+
| SKU |20_04-lts |
3030
| Version |latest |
3131

3232
> [!TIP]
@@ -89,9 +89,9 @@ new_pool.start_task = start_task
8989
# Create an ImageReference which specifies the Marketplace
9090
# virtual machine image to install on the nodes
9191
ir = batchmodels.ImageReference(
92-
publisher="Canonical",
93-
offer="UbuntuServer",
94-
sku="20.04-LTS",
92+
publisher="canonical",
93+
offer="0001-com-ubuntu-server-focal",
94+
sku="20_04-lts",
9595
version="latest")
9696

9797
# Create the VirtualMachineConfiguration, specifying
@@ -118,8 +118,8 @@ images = client.account.list_supported_images()
118118
image = None
119119
for img in images:
120120
if (img.image_reference.publisher.lower() == "canonical" and
121-
img.image_reference.offer.lower() == "ubuntuserver" and
122-
img.image_reference.sku.lower() == "20.04-lts"):
121+
img.image_reference.offer.lower() == "0001-com-ubuntu-server-focal" and
122+
img.image_reference.sku.lower() == "20_04-lts"):
123123
image = img
124124
break
125125

@@ -157,9 +157,9 @@ List<ImageInformation> images =
157157
ImageInformation image = null;
158158
foreach (var img in images)
159159
{
160-
if (img.ImageReference.Publisher == "Canonical" &&
161-
img.ImageReference.Offer == "UbuntuServer" &&
162-
img.ImageReference.Sku == "20.04-LTS")
160+
if (img.ImageReference.Publisher == "canonical" &&
161+
img.ImageReference.Offer == "0001-com-ubuntu-server-focal" &&
162+
img.ImageReference.Sku == "20_04-lts")
163163
{
164164
image = img;
165165
break;
@@ -187,9 +187,9 @@ Although the previous snippet uses the [PoolOperations.istSupportedImages](/dotn
187187

188188
```csharp
189189
ImageReference imageReference = new ImageReference(
190-
publisher: "Canonical",
191-
offer: "UbuntuServer",
192-
sku: "20.04-LTS",
190+
publisher: "canonical",
191+
offer: "0001-com-ubuntu-server-focal",
192+
sku: "20_04-lts",
193193
version: "latest");
194194
```
195195
::: zone-end

articles/firewall/firewall-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ sections:
180180

181181
- question: Does Azure Firewall outbound SNAT between private networks?
182182
answer: |
183-
Azure Firewall doesn't SNAT when the destination IP address is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918). If your organization uses a public IP address range for private networks, Azure Firewall SNATs the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. You can configure Azure Firewall to **not** SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
183+
Azure Firewall doesn't SNAT when the destination IP address is a private IP range per [IANA RFC 1918](https://tools.ietf.org/html/rfc1918) or [IANA RFC 6598](https://datatracker.ietf.org/doc/html/rfc6598) for private networks. If your organization uses a public IP address range for private networks, Azure Firewall SNATs the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. You can configure Azure Firewall to **not** SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
184184
185185
In addition, traffic processed by application rules are always SNAT-ed. If you want to see the original source IP address in your logs for FQDN traffic, you can use network rules with the destination FQDN.
186186
- question: Is forced tunneling/chaining to a Network Virtual Appliance supported?

articles/firewall/monitor-firewall-reference.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,8 @@ There are a few ways to verify the update was successful, but you can navigate t
119119

120120
To create a diagnostic setting and enable Resource Specific Table, see [Create diagnostic settings in Azure Monitor](/azure/azure-monitor/essentials/create-diagnostic-settings).
121121

122+
## Flow trace
123+
122124
The firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *SYN* packet. However, such an entry doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing occurred. The Azure Firewall Flow Trace Log addresses this concern.
123125

124126
> [!TIP]

articles/firewall/rule-processing.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Here's an example policy:
4545
Assuming BaseRCG1 is a rule collection group priority (200) that contains the rule collections: DNATRC1, DNATRC3,NetworkRC1.\
4646
BaseRCG2 is a rule collection group priority (300) that contains the rule collections: AppRC2, NetworkRC2.\
4747
ChildRCG1 is a rule collection group priority (300) that contains the rule collections: ChNetRC1, ChAppRC1.\
48-
ChildRCG2 is a rule collection group that contains the rule collections: ChNetRC2, ChAppRC2,ChDNATRC3.
48+
ChildRCG2 is a rule collection group priority (650) that contains the rule collections: ChNetRC2, ChAppRC2,ChDNATRC3.
4949

5050
As per following table:
5151

@@ -66,14 +66,14 @@ As per following table:
6666
|ChAppRC2 | Application rule collection |2000 |7 |-|
6767
|ChDNATRC3 | DNAT rule collection | 3000 | 2 |-|
6868

69-
Initial Processing:
69+
Initial Iteration for DNAT Rules:
7070

7171
The process begins by examining the rule collection group (RCG) with the lowest number, which is BaseRCG1 with a priority of 200. Within this group, it searches for DNAT rule collections and evaluates them according to their priorities. In this case, DNATRC1 (priority 600) and DNATRC3 (priority 610) are found and processed accordingly.\
72-
Next, it moves to the next RCG, BaseRCG2 (priority 200), but finds no DNAT rule collection.\
72+
Next, it moves to the next RCG, BaseRCG2 (priority 300), but finds no DNAT rule collection.\
7373
Following that, it proceeds to ChildRCG1 (priority 300), also without a DNAT rule collection.\
7474
Finally, it checks ChildRCG2 (priority 650) and finds the ChDNATRC3 rule collection (priority 3000).
7575

76-
Iteration Within Rule Collection Groups:
76+
Iteration for NETWORK Rules:
7777

7878
Returning to BaseRCG1, the iteration continues, this time for NETWORK rules. Only NetworkRC1 (priority 800) is found.\
7979
Then, it moves to BaseRCG2, where NetworkRC2 (priority 1300) is located.\

0 commit comments

Comments
 (0)