Skip to content

Commit 50e0968

Browse files
committed
2 parents ea3a914 + df59d0a commit 50e0968

File tree

11 files changed

+53
-9
lines changed

11 files changed

+53
-9
lines changed

articles/app-service/web-sites-monitor.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: seodec18
1414
[Azure App Service](https://go.microsoft.com/fwlink/?LinkId=529714) provides
1515
built-in monitoring functionality for web apps, mobile, and API apps in the [Azure portal](https://portal.azure.com).
1616

17-
In the Azure portal, you can review *quotas* and *metrics* for an app and App Service plan, and set up *alerts* and *autoscaling* that are based metrics.
17+
In the Azure portal, you can review *quotas* and *metrics* for an app and App Service plan, and set up *alerts* and *autoscaling* rules based metrics.
1818

1919
## Understand quotas
2020

@@ -60,13 +60,17 @@ You can increase or remove quotas from your app by upgrading your App Service pl
6060
> **File System Usage** is a new metric being rolled out globally, no data is expected unless you have been whitelisted for private preview.
6161
>
6262
63+
> [!IMPORTANT]
64+
> **Average Response Time** will be deprecated to avoid confusion with metric aggregations. Use **Response Time** as a replacement.
65+
6366
Metrics provide information about the app or the App Service plan's behavior.
6467

6568
For an app, the available metrics are:
6669

6770
| Metric | Description |
6871
| --- | --- |
69-
| **Average Response Time** | The average time taken for the app to serve requests, in seconds. |
72+
| **Response Time** | The time taken for the app to serve requests, in seconds. |
73+
| **Average Response Time (deprecated)** | The average time taken for the app to serve requests, in seconds. |
7074
| **Average memory working set** | The average amount of memory used by the app, in megabytes (MiB). |
7175
| **Connections** | The number of bound sockets existing in the sandbox (w3wp.exe and its child processes). A bound socket is created by calling bind()/connect() APIs and remains until said socket is closed with CloseHandle()/closesocket(). |
7276
| **CPU Time** | The amount of CPU consumed by the app, in seconds. For more information about this metric, see [CPU time vs CPU percentage](#cpu-time-vs-cpu-percentage). |

articles/azure-monitor/platform/metrics-supported.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2168,6 +2168,12 @@ Azure Monitor provides several ways to interact with metrics, including charting
21682168

21692169
## Microsoft.Web/sites (excluding functions)
21702170

2171+
> [!NOTE]
2172+
> **File System Usage** is a new metric being rolled out globally, no data is expected unless you have been whitelisted for private preview.
2173+
2174+
> [!IMPORTANT]
2175+
> **Average Response Time** will be deprecated to avoid confusion with metric aggregations. Use **Response Time** as a replacement.
2176+
21712177
|Metric|Metric Display Name|Unit|Aggregation Type|Description|Dimensions|
21722178
|---|---|---|---|---|---|
21732179
|CpuTime|CPU Time|Seconds|Total|CPU Time|Instance|
@@ -2185,7 +2191,8 @@ Azure Monitor provides several ways to interact with metrics, including charting
21852191
|Http5xx|Http Server Errors|Count|Total|Http Server Errors|Instance|
21862192
|MemoryWorkingSet|Memory working set|Bytes|Average|Memory working set|Instance|
21872193
|AverageMemoryWorkingSet|Average memory working set|Bytes|Average|Average memory working set|Instance|
2188-
|AverageResponseTime|Average Response Time|Seconds|Average|Average Response Time|Instance|
2194+
|ResponseTime|Response Time|Seconds|Total|Response Time|Instance|
2195+
|AverageResponseTime|Average Response Time (deprecated)|Seconds|Average|Average Response Time|Instance|
21892196
|AppConnections|Connections|Count|Average|Connections|Instance|
21902197
|Handles|Handle Count|Count|Average|Handle Count|Instance|
21912198
|Threads|Thread Count|Count|Average|Thread Count|Instance|

articles/bastion/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,14 @@
4040
href: session-monitoring.md
4141
- name: Troubleshoot
4242
href: troubleshoot.md
43+
- name: Reference
44+
items:
45+
- name: Azure PowerShell
46+
href: /powershell/module/az.network
47+
- name: REST
48+
href: /rest/api/virtualnetwork/bastionhosts
49+
- name: Azure CLI
50+
href: /cli/azure/network/bastion
4351
- name: Resources
4452
items:
4553
- name: Bastion FAQ

articles/lighthouse/concepts/managed-services-offers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Managed services offers in Azure Marketplace
33
description: Managed services offers allow service providers to sell resource management offers to customers in Azure Marketplace.
4-
ms.date: 12/16/2019
4+
ms.date: 03/17/2020
55
ms.topic: conceptual
66
---
77

@@ -26,7 +26,7 @@ Public plans let you promote your services to new customers. These are usually m
2626
If appropriate, you can include both public and private plans in the same offer.
2727

2828
> [!IMPORTANT]
29-
> Once a plan has been published as public, you can't change it to private. To control which customers can accept your offer and delegate resources, use a private plan. With a public plan, you can't restrict availability to certain customers or even to a certain number of customers (although you can stop selling the plan completely if you choose to do so). There is currently no mechanism to reject or remove delegations once a customer accepts an offer, although you can always reach out to a customer and ask them to [remove your access](../how-to/view-manage-service-providers.md#add-or-remove-service-provider-offers).
29+
> Once a plan has been published as public, you can't change it to private. To control which customers can accept your offer and delegate resources, use a private plan. With a public plan, you can't restrict availability to certain customers or even to a certain number of customers (although you can stop selling the plan completely if you choose to do so). You can [remove access to a delegation](../how-to/onboard-customer.md#remove-access-to-a-delegation) after a customer accepts an offer only if you included an **Authorization** with the **Role Definition** set to [Managed Services Registration Assignment Delete Role](../../role-based-access-control/built-in-roles.md#managed-services-registration-assignment-delete-role) when you published the offer. You can also reach out to the customer and ask them to [remove your access](../how-to/view-manage-service-providers.md#add-or-remove-service-provider-offers).
3030
3131
## Publish managed service offers
3232

articles/sql-database/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,8 @@
155155
href: sql-database-managed-instance-public-endpoint-securely.md
156156
- name: Managed instance auditing
157157
href: sql-database-managed-instance-auditing.md
158+
- name: Security baseline
159+
href: security-baseline.md
158160

159161
- name: Connect and query
160162
href: sql-database-connect-query.md
@@ -557,6 +559,8 @@
557559
href: sql-database-resource-limits-database-server.md
558560
- name: Connectivity architecture
559561
href: sql-database-connectivity-architecture.md
562+
- name: Connectivity settings
563+
href: sql-database-connectivity-settings.md
560564

561565
- name: Data sync
562566
items:

articles/storage/files/storage-files-planning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ In general, Azure Files features and interoperability with other services are th
8383
- Standard file shares are available for locally redundant, zone redundant, geo-redundant (GRS), and geo-zone redundant (GZRS) storage.
8484
- **Maximum size of file share**
8585
- Premium file shares can be provisioned for up to 100 TiB without any additional work.
86-
- By default, standard file shares can span only up to 5 TiB, although the share limit can be increased to 100 TiB by opting into the *large file share* storage account feature flag. Standard file shares may only span up to 100 TiB for locally redundant or zone redundant storage accounts. For more information on increasing
86+
- By default, standard file shares can span only up to 5 TiB, although the share limit can be increased to 100 TiB by opting into the *large file share* storage account feature flag. Standard file shares may only span up to 100 TiB for locally redundant or zone redundant storage accounts. For more information on increasing file share sizes, see [Enable and create large file shares](https://docs.microsoft.com/azure/storage/files/storage-files-how-to-create-large-file-share).
8787
- **Regional availability**
8888
- Premium file shares are not available in every region, and zone redundant support is available in a smaller subset of regions. To find out if premium file shares are currently available in your region, see the [products available by region](https://azure.microsoft.com/global-infrastructure/services/?products=storage) page for Azure. To find out what regions support ZRS, see [Azure Availability Zone support by region](../../availability-zones/az-overview.md#services-support-by-region). To help us prioritize new regions and premium tier features, please fill out this [survey](https://aka.ms/pfsfeedback).
8989
- Standard file shares are available in every Azure region.
12.6 KB
Loading

articles/virtual-desktop/overview.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Heidilohr
66

77
ms.service: virtual-desktop
88
ms.topic: overview
9-
ms.date: 01/27/2020
9+
ms.date: 03/12/2020
1010
ms.author: helohr
1111
manager: lizross
1212
---
@@ -124,6 +124,20 @@ The following Remote Desktop clients support Windows Virtual Desktop:
124124
* [iOS](connect-ios.md)
125125
* [Android (Preview)](connect-android.md)
126126

127+
The Remote Desktop clients must have access to the following URLs:
128+
129+
|Address|Outbound port|Purpose|Client(s)|
130+
|---|---|---|---|
131+
|*.wvd.microsoft.com|TCP port 443|Service traffic|All|
132+
|go.microsoft.com|TCP port 443|Microsoft FWLinks|All|
133+
|aka.ms|TCP port 443|Microsoft URL shortener|All|
134+
|docs.microsoft.com|TCP port 443|Documentation|All|
135+
|privacy.microsoft.com|TCP port 443|Privacy statement|All|
136+
|query.prod.cms.rt.microsoft.com|TCP port 443|Client updates|Windows Desktop|
137+
138+
>[!IMPORTANT]
139+
>Opening these URLs is essential for a reliable client experience. Blocking access to these URLs is unsupported and will affect service functionality. These URLs only correspond to the client sites and resources, and don't include URLs for other services like Azure Active Directory.
140+
127141
## Supported virtual machine OS images
128142

129143
Windows Virtual Desktop supports the following x64 operating system images:

articles/virtual-machines/workloads/sap/hana-network-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ In the Azure regions where Global Reach is offered, you can request enabling the
167167
> In case of using Global Reach for enabling direct access between your HANA Large Instance units and on-premises assets, the network data and control flow is **not routed through Azure virtual networks**, but directly between the Microsoft enterprise exchange routers. As a result any NSG or ASG rules, or any type of firewall, NVA, or proxy you deployed in an Azure virtual network, are not getting touched. **If you use ExpressRoute Global Reach to enable direct access from on-premises to HANA Large instance units restrictions and permissions to access HANA large Instance units need to be defined in firewalls on the on-premises side**
168168
169169
##### Connecting HANA Large Instances in different Azure regions
170-
In the same way, as ExpressRoute Global Reach can be used for connecting on-premises to HANA Large Instance units, it can be used to connect tow HANA Large Instance tenants that are deployed for you in two different regions. The isolation is the ExpressRoute circuits that your HANA Large Instance tenants are using to connect to Azure in both regions. There are no additional charges for connecting two HANA Large Instance tenants that are deployed in two different regions.
170+
In the same way, as ExpressRoute Global Reach can be used for connecting on-premises to HANA Large Instance units, it can be used to connect two HANA Large Instance tenants that are deployed for you in two different regions. The isolation is the ExpressRoute circuits that your HANA Large Instance tenants are using to connect to Azure in both regions. There are no additional charges for connecting two HANA Large Instance tenants that are deployed in two different regions.
171171

172172
> [!IMPORTANT]
173173
> The data flow and control flow of the network traffic between the different HANA Large instance tenants will not be routed through azure networks. As a result you can't use Azure functionality or NVAs to enforce communication restrictions between your two HANA Large Instances tenants.

includes/active-directory-cloud-provisioning-sso.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: billmath
99
---
1010

1111
## Steps to enable Single Sign-on
12-
Cloud provisioning works with Single Sign-on. Currently their is not an option to enable SSO when the agent is installed, however you can use the steps below to enable SSO and use it.
12+
Cloud provisioning works with Single Sign-on. Currently there is not an option to enable SSO when the agent is installed, however you can use the steps below to enable SSO and use it.
1313

1414
### Step 1: Download and extract Azure AD Connect files
1515
1. First, download the latest version of [Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594)

0 commit comments

Comments
 (0)