Skip to content

Commit 4ff470b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-m3-dataflow
2 parents e0a4389 + addccd5 commit 4ff470b

File tree

779 files changed

+2790
-3704
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

779 files changed

+2790
-3704
lines changed

.openpublishing.redirection.json

Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,105 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/lab-services/class-type-adobe-creative-cloud.md",
5+
"redirect_url": "/previous-versions/azure/lab-services/class-type-adobe-creative-cloud",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/lab-services/class-type-arcgis.md",
10+
"redirect_url": "/previous-versions/azure/lab-services/class-type-arcgis",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/lab-services/class-type-autodesk.md",
15+
"redirect_url": "/previous-versions/azure/lab-services/class-type-autodesk",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/lab-services/class-type-big-data-analytics.md",
20+
"redirect_url": "/previous-versions/azure/lab-services/class-type-big-data-analytics",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/lab-services/class-type-database-management.md",
25+
"redirect_url": "/previous-versions/azure/lab-services/class-type-database-management",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/lab-services/class-type-deep-learning-natural-language-processing.md",
30+
"redirect_url": "/previous-versions/azure/lab-services/class-type-deep-learning-natural-language-processing",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/lab-services/class-type-ethical-hacking.md",
35+
"redirect_url": "/previous-versions/azure/lab-services/class-type-ethical-hacking",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/lab-services/class-type-matlab.md",
40+
"redirect_url": "/previous-versions/azure/lab-services/class-type-matlab",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/lab-services/class-type-jupyter-notebook.md",
45+
"redirect_url": "/previous-versions/azure/lab-services/class-type-jupyter-notebook",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/lab-services/class-type-networking-gns3.md",
50+
"redirect_url": "/previous-versions/azure/lab-services/class-type-networking-gns3",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/lab-services/class-type-pltw.md",
55+
"redirect_url": "/previous-versions/azure/lab-services/class-type-pltw",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/lab-services/class-type-react-linux.md",
60+
"redirect_url": "/previous-versions/azure/lab-services/class-type-react-linux",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/lab-services/class-type-react-windows.md",
65+
"redirect_url": "/previous-versions/azure/lab-services/class-type-react-windows",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/lab-services/class-type-rstudio-linux.md",
70+
"redirect_url": "/previous-versions/azure/lab-services/class-type-rstudio-linux",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "articles/lab-services/class-type-rstudio-windows.md",
75+
"redirect_url": "/previous-versions/azure/lab-services/class-type-rstudio-windows",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "articles/lab-services/class-type-shell-scripting-linux.md",
80+
"redirect_url": "/previous-versions/azure/lab-services/class-type-shell-scripting-linux",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path": "articles/lab-services/class-type-solidworks.md",
85+
"redirect_url": "/previous-versions/azure/lab-services/class-type-solidworks",
86+
"redirect_document_id": false
87+
},
88+
{
89+
"source_path": "articles/lab-services/class-type-sql-server.md",
90+
"redirect_url": "/previous-versions/azure/lab-services/class-type-sql-server",
91+
"redirect_document_id": false
92+
},
93+
{
94+
"source_path": "articles/lab-services/class-types.md",
95+
"redirect_url": "/previous-versions/azure/lab-services/class-types",
96+
"redirect_document_id": false
97+
},
98+
{
99+
"source_path": "articles/lab-services/how-to-create-lab-accounts.md",
100+
"redirect_url": "/previous-versions/azure/lab-services/how-to-create-lab-accounts",
101+
"redirect_document_id": false
102+
},
3103
{
4104
"source_path": "articles/devtest-labs/devtest-lab-integrate-ci-cd.md",
5105
"redirect_url": "/previous-versions/azure/devtest-labs/devtest-lab-integrate-ci-cd",
@@ -3330,6 +3430,11 @@
33303430
"redirect_url": "/azure/vpn-gateway/add-remove-site-to-site-connections",
33313431
"redirect_document_id": false
33323432
},
3433+
{
3434+
"source_path_from_root": "/articles/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md",
3435+
"redirect_url": "/azure/vpn-gateway/point-to-site-certificate-gateway",
3436+
"redirect_document_id": false
3437+
},
33333438
{
33343439
"source_path_from_root": "/articles/vpn-gateway/vpn-gateway-howto-openvpn-clients.md",
33353440
"redirect_url": "/azure/vpn-gateway/point-to-site-vpn-client-cert-windows",

articles/app-service/configure-gateway-required-vnet-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ You can't use gateway-required virtual network integration:
3535

3636
To create a gateway:
3737

38-
1. [Create the VPN gateway and subnet](../vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md#creategw). Select a route-based VPN type.
38+
1. [Create the VPN gateway and subnet](../vpn-gateway/point-to-site-certificate-gateway.md#creategw). Select a route-based VPN type.
3939

40-
1. [Set the point-to-site addresses](../vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md#addresspool). If the gateway isn't in the basic SKU, then IKEV2 must be disabled in the point-to-site configuration and SSTP must be selected. The point-to-site address space must be in the RFC 1918 address blocks 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.
40+
1. [Set the point-to-site addresses](../vpn-gateway/point-to-site-certificate-gateway.md#addresspool). If the gateway isn't in the basic SKU, then IKEV2 must be disabled in the point-to-site configuration and SSTP must be selected. The point-to-site address space must be in the RFC 1918 address blocks 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.
4141

4242
If you create the gateway for use with gateway-required virtual network integration, you don't need to upload a certificate. Creating the gateway can take 30 minutes. You won't be able to integrate your app with your virtual network until the gateway is created.
4343

articles/app-service/configure-vnet-integration-routing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Your app is already integrated using the regional virtual network integration fe
1717

1818
## Configure application routing
1919

20-
Application routing defines what traffic is routed from your app and into the virtual network. We recommend that you use the `vnetRouteAllEnabled` site setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F33228571-70a4-4fa1-8ca1-26d0aba8d6ef). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
20+
Application routing defines what traffic is routed from your app and into the virtual network. We recommend that you use the `vnetRouteAllEnabled` site setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff5c0bfb3-acea-47b1-b477-b0edcdf6edc1). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
2121

2222
### Configure in the Azure portal
2323

@@ -75,4 +75,4 @@ az resource update --resource-group <group-name> --name <app-name> --resource-ty
7575
## Next steps
7676

7777
- [Enable virtual network integration](./configure-vnet-integration-enable.md)
78-
- [General networking overview](./networking-features.md)
78+
- [General networking overview](./networking-features.md)

articles/azure-government/azure-secure-isolation-guidance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -576,7 +576,7 @@ TLS provides strong authentication, message privacy, and integrity. [Perfect For
576576
**In-transit encryption for VMs** – Remote sessions to Windows and Linux VMs deployed in Azure can be conducted over protocols that ensure data encryption in transit. For example, the [Remote Desktop Protocol (RDP)](/windows/win32/termserv/remote-desktop-protocol) initiated from your client computer to Windows and Linux VMs enables TLS protection for data in transit. You can also use [Secure Shell](/azure/virtual-machines/linux/ssh-from-windows) (SSH) to connect to Linux VMs running in Azure. SSH is an encrypted connection protocol available by default for remote management of Linux VMs hosted in Azure.
577577

578578
> [!IMPORTANT]
579-
> You should review best practices for network security, including guidance for **[disabling RDP/SSH access to Virtual Machines](../security/fundamentals/network-best-practices.md#disable-rdpssh-access-to-virtual-machines)** from the Internet to mitigate brute force attacks to gain access to Azure Virtual Machines. Accessing VMs for remote management can then be accomplished via **[point-to-site VPN](../vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md)**, **[site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md)**, or **[Azure ExpressRoute](../expressroute/expressroute-howto-linkvnet-portal-resource-manager.md)**.
579+
> You should review best practices for network security, including guidance for **[disabling RDP/SSH access to Virtual Machines](../security/fundamentals/network-best-practices.md#disable-rdpssh-access-to-virtual-machines)** from the Internet to mitigate brute force attacks to gain access to Azure Virtual Machines. Accessing VMs for remote management can then be accomplished via **[point-to-site VPN](../vpn-gateway/point-to-site-about.md)**, **[site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md)**, or **[Azure ExpressRoute](../expressroute/expressroute-howto-linkvnet-portal-resource-manager.md)**.
580580
581581
**Azure Storage transactions** – When interacting with Azure Storage through the Azure portal, all transactions take place over HTTPS. Moreover, you can configure your storage accounts to accept requests only from secure connections by setting the &#8220;[secure transfer required](../storage/common/storage-require-secure-transfer.md)&#8221; property for the storage account. The &#8220;secure transfer required&#8221; option is enabled by default when creating a Storage account in the Azure portal.
582582

@@ -586,7 +586,7 @@ TLS provides strong authentication, message privacy, and integrity. [Perfect For
586586
**VPN encryption**[Virtual Network](../virtual-network/virtual-networks-overview.md) (VNet) provides a means for Azure Virtual Machines (VMs) to act as part of your internal (on-premises) network. With VNet, you choose the address ranges of non-globally-routable IP addresses to be assigned to the VMs so that they won't collide with addresses you're using elsewhere. You have options to securely connect to a VNet from your on-premises infrastructure or remote locations.
587587

588588
- **Site-to-Site** (IPsec/IKE VPN tunnel) – A cryptographically protected &#8220;tunnel&#8221; is established between Azure and your internal network, allowing an Azure VM to connect to your back-end resources as though it was directly on that network. This type of connection requires a [VPN device](../vpn-gateway/vpn-gateway-vpn-faq.md#s2s) located on-premises that has an externally facing public IP address assigned to it. You can use Azure [VPN Gateway](../vpn-gateway/vpn-gateway-about-vpngateways.md) to send encrypted traffic between your VNet and your on-premises infrastructure across the public Internet, for example, a [site-to-site VPN](../vpn-gateway/tutorial-site-to-site-portal.md) relies on IPsec for transport encryption. VPN Gateway supports many encryption algorithms that are FIPS 140 validated. Moreover, you can configure VPN Gateway to use [custom IPsec/IKE policy](../vpn-gateway/vpn-gateway-about-compliance-crypto.md) with specific cryptographic algorithms and key strengths instead of relying on the default Azure policies. IPsec encrypts data at the IP level (Network Layer 3).
589-
- **Point-to-Site** (VPN over SSTP, OpenVPN, and IPsec) – A secure connection is established from your individual client computer to your VNet using Secure Socket Tunneling Protocol (SSTP), OpenVPN, or IPsec. As part of the [Point-to-Site VPN](../vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md) configuration, you need to install a certificate and a VPN client configuration package, which allow the client computer to connect to any VM within the VNet. [Point-to-Site VPN](../vpn-gateway/point-to-site-about.md) connections don't require a VPN device or a public facing IP address.
589+
- **Point-to-Site** (VPN over SSTP, OpenVPN, and IPsec) – A secure connection is established from your individual client computer to your VNet using Secure Socket Tunneling Protocol (SSTP), OpenVPN, or IPsec. As part of the [Point-to-Site VPN](../vpn-gateway/point-to-site-certificate-gateway.md) configuration, you need to install a certificate and a VPN client configuration package, which allow the client computer to connect to any VM within the VNet. [Point-to-Site VPN](../vpn-gateway/point-to-site-about.md) connections don't require a VPN device or a public facing IP address.
590590

591591
In addition to controlling the type of algorithm that is supported for VPN connections, Azure provides you with the ability to enforce that all traffic leaving a VNet may only be routed through a VNet Gateway (for example, Azure VPN Gateway). This enforcement allows you to ensure that traffic may not leave a VNet without being encrypted. A VPN Gateway can be used for [VNet-to-VNet](../vpn-gateway/vpn-gateway-howto-vnet-vnet-resource-manager-portal.md) connections while also providing a secure tunnel with IPsec/IKE. Azure VPN uses [Pre-Shared Key (PSK) authentication](../vpn-gateway/vpn-gateway-vpn-faq.md#how-is-my-vpn-tunnel-authenticated) whereby Microsoft generates the PSK when the VPN tunnel is created. You can change the autogenerated PSK to your own.
592592

articles/cloud-shell/faq-troubleshooting.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
description: This article answers common questions and explains how to troubleshoot Cloud Shell issues.
3-
ms.date: 08/29/2024
3+
ms.date: 11/04/2024
44
ms.topic: troubleshooting
55
tags: azure-resource-manager
66
ms.custom: has-azure-ad-ps-ref
@@ -125,7 +125,7 @@ command that requires elevated permissions.
125125

126126
- **Details**: Cloud Shell uses Azure Relay for terminal connections. Cloud Shell can fail to
127127
request a terminal due to DNS resolution problems. This failure can be caused when you launch a
128-
Cloud Shell session from a host in a network that has a private DNS Zone for the servicebus
128+
Cloud Shell session from a host in a network that has a private DNS Zone for the `servicebus`
129129
domain. This error can also occur if you're using a private on-premises DNS server.
130130

131131
- **Resolution**: You can add a DNS record for the Azure Relay instance that Cloud Shell uses.
@@ -189,6 +189,27 @@ command that requires elevated permissions.
189189
Alternately, you can deploy your own private Cloud Shell instance. For more information, see
190190
[Deploy Cloud Shell in a virtual network][01].
191191

192+
### Terminal output - Sorry, your Cloud Shell failed to provision: {"code":"TenantDisabled" ...}
193+
194+
195+
- **Details**: In rare cases, Azure might flag out-of-the-ordinary resource consumption based in
196+
from Cloud Shell as fraudulent activity. When this occurs, Azure disables Cloud Shell at the
197+
tenant level and you see the following error message:
198+
199+
> Sorry, your Cloud Shell failed to provision: {"code":"TenantDisabled","message":"Cloud Shell has
200+
> been disabled in directory<>."} Please refresh the page.
201+
202+
There can be legitimate use cases where CPU usage in your Azure Cloud Shell instance exceeds the
203+
thresholds that trigger fraud prevention and block your tenant. Large AZCopy jobs could be the
204+
cause this event. The Microsoft Azure engineering team can help to figure out why the tenant was
205+
disabled and re-enable it.
206+
207+
- **Resolution**: To investigate the cause and re-enable Cloud Shell for your tenant, open a new
208+
Azure support request. Include the following details:
209+
210+
1. Tenant ID
211+
2. The business justification and a description of how you use Cloud Shell.
212+
192213
## Managing Cloud Shell
193214

194215
### Manage personal data

articles/communication-services/how-tos/ui-library-sdk/includes/theming/android.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,6 @@ ms.topic: include
88
ms.service: azure-communication-services
99
---
1010

11-
[!INCLUDE [Public Preview Notice](../../../../includes/public-preview-include.md)]
12-
1311
For more information, see the [open-source Android UI Library](https://github.com/Azure/communication-ui-library-android) and the [sample application code](https://github.com/Azure-Samples/communication-services-android-quickstarts/tree/main/ui-calling).
1412

1513
### Defining a theme

articles/communication-services/how-tos/ui-library-sdk/includes/theming/ios.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,6 @@ ms.topic: include
88
ms.service: azure-communication-services
99
---
1010

11-
[!INCLUDE [Public Preview Notice](../../../../includes/public-preview-include.md)]
12-
1311
For more information, see the [open-source iOS UI Library](https://github.com/Azure/communication-ui-library-ios) and the [sample application code](https://github.com/Azure-Samples/communication-services-ios-quickstarts/tree/main/ui-calling).
1412

1513
### Defining a theme

0 commit comments

Comments
 (0)