You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/api-server-vnet-integration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ API Server VNet Integration is available in all global Azure regions.
68
68
69
69
## Create an AKS cluster with API Server VNet Integration using managed VNet
70
70
71
-
You can configure your AKS clusters with API Server VNet Integration in managed VNet or bring-your-own VNet mode. You can create the as public clusters (with API server access available via a public IP) or private clusters (where the API server is only accessible via private VNet connectivity). You can also toggle between a public and private state without redeploying your cluster.
71
+
You can configure your AKS clusters with API Server VNet Integration in managed VNet or bring-your-own VNet mode. You can create them as public clusters (with API server access available via a public IP) or private clusters (where the API server is only accessible via private VNet connectivity). You can also toggle between a public and private state without redeploying your cluster.
Copy file name to clipboardExpand all lines: articles/aks/auto-upgrade-node-os-image.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,31 +131,31 @@ For more information on Planned Maintenance, see [Use Planned Maintenance to sch
131
131
132
132
## Node OS auto-upgrades FAQ
133
133
134
-
* How can I check the current nodeOsUpgradeChannel value on a cluster?
134
+
### How can I check the current nodeOsUpgradeChannel value on a cluster?
135
135
136
136
Run the `az aks show` command and check the "autoUpgradeProfile" to determine what value the `nodeOsUpgradeChannel` is set to:
137
137
138
138
```azurecli-interactive
139
139
az aks show --resource-group myResourceGroup --name myAKSCluster --query "autoUpgradeProfile"
140
140
```
141
141
142
-
* How can I monitor the status of node OS auto-upgrades?
142
+
###How can I monitor the status of node OS auto-upgrades?
143
143
144
144
To view the status of your node OS auto upgrades, look up [activity logs][monitor-aks] on your cluster. You can also look up specific upgrade-related events as mentioned in [Upgrade an AKS cluster][aks-upgrade]. AKS also emits upgrade-related Event Grid events. To learn more, see [AKS as an Event Grid source][aks-eventgrid].
145
145
146
-
* Can I change the node OS auto-upgrade channel value if my cluster auto-upgrade channel is set to `node-image` ?
146
+
###Can I change the node OS auto-upgrade channel value if my cluster auto-upgrade channel is set to `node-image` ?
147
147
148
148
No. Currently, when you set the [cluster auto-upgrade channel][Autoupgrade] to `node-image`, it also automatically sets the node OS auto-upgrade channel to `NodeImage`. You can't change the node OS auto-upgrade channel value if your cluster auto-upgrade channel is `node-image`. In order to be able to change the node OS auto-upgrade channel values, make sure the [cluster auto-upgrade channel][Autoupgrade] isn't `node-image`.
149
149
150
-
* Why is `SecurityPatch` recommended over `Unmanaged` channel?
150
+
###Why is `SecurityPatch` recommended over `Unmanaged` channel?
151
151
152
152
On the `Unmanaged` channel, AKS has no control over how and when the security updates are delivered. With `SecurityPatch`, the security updates are fully tested and follow safe deployment practices. `SecurityPatch` also honors maintenance windows. For more details, see [Increased security and resiliency of Canonical workloads on Azure][Blog].
153
153
154
-
* Does `SecurityPatch` always lead to a reimage of my nodes?
154
+
###Does `SecurityPatch` always lead to a reimage of my nodes?
155
155
156
156
AKS limits reimages to only when absolutely necessary, such as certain kernel packages that may require a reimage to get fully applied. `SecurityPatch` is designed to minimize disruptions as much as possible. If AKS decides reimaging nodes isn't necessary, it will patch nodes live without draining pods and no VHD update is performed in such cases.
157
157
158
-
* How do I know if a `SecurityPatch` or `NodeImage` upgrade is applied on my node?
158
+
###How do I know if a `SecurityPatch` or `NodeImage` upgrade is applied on my node?
Copy file name to clipboardExpand all lines: articles/network-watcher/traffic-analytics-schema.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -190,8 +190,8 @@ The following table lists the fields in the schema and what they signify for vir
190
190
> |**FlowStartTime**| Date and time in UTC | First occurrence of the flow (which gets aggregated) in the flow log processing interval between `FlowIntervalStartTime` and `FlowIntervalEndTime`. This flow gets aggregated based on aggregation logic. |
191
191
> |**FlowEndTime**| Date and time in UTC | Last occurrence of the flow (which gets aggregated) in the flow log processing interval between `FlowIntervalStartTime` and `FlowIntervalEndTime`. |
> |**SrcIP**| Source IP address | Blank in AzurePublic and ExternalPublic flows. |
194
-
> |**DestIP**| Destination IP address | Blank in AzurePublic and ExternalPublic flows. |
193
+
> |**SrcIp**| Source IP address | Blank in AzurePublic and ExternalPublic flows. |
194
+
> |**DestIp**| Destination IP address | Blank in AzurePublic and ExternalPublic flows. |
195
195
> |**TargetResourceId**| ResourceGroupName/ResourceName | The ID of the resource at which flow logging and traffic analytics is enabled. |
196
196
> |**TargetResourceType**| VirtualNetwork/Subnet/NetworkInterface | Type of resource at which flow logging and traffic analytics is enabled (virtual network, subnet, NIC or network security group).|
197
197
> |**FlowLogResourceId**| ResourceGroupName/NetworkWatcherName/FlowLogName | The resource ID of the flow log. |
@@ -201,17 +201,17 @@ The following table lists the fields in the schema and what they signify for vir
201
201
> |**FlowDirection**| - **I** = Inbound <br> - **O** = Outbound | Direction of the flow: in or out of the target resource per flow log. |
202
202
> |**FlowStatus**| - **A** = Allowed <br> - **D** = Denied | Status of flow: allowed or denied by target resource per flow log. |
203
203
> |**NSGList**|\<SUBSCRIPTIONID\>/\<RESOURCEGROUP_NAME\>/\<NSG_NAME\>| Network security group associated with the flow. |
204
-
> |**NSGRule**| NSG_RULENAME | Network security group rule that allowed or denied the flow. |
205
-
> |**NSGRuleType**| - User Defined <br> - Default | The type of network security group rule used by the flow. |
204
+
> |**NsgRule**| NSG_RULENAME | Network security group rule that allowed or denied the flow. |
205
+
> |**NsgRuleType**| - User Defined <br> - Default | The type of network security group rule used by the flow. |
206
206
> |**MACAddress**| MAC Address | MAC address of the NIC at which the flow was captured. |
207
207
> |**SrcSubscription**| Subscription ID | Subscription ID of virtual network / network interface / virtual machine that the source IP in the flow belongs to. |
208
208
> |**DestSubscription**| Subscription ID | Subscription ID of virtual network / network interface / virtual machine that the destination IP in the flow belongs to. |
209
209
> |**SrcRegion**| Azure Region | Azure region of virtual network / network interface / virtual machine to which the source IP in the flow belongs to. |
210
210
> |**DestRegion**| Azure Region | Azure region of virtual network to which the destination IP in the flow belongs to. |
211
-
> |**SrcNIC**|\<resourcegroup_Name\>/\<NetworkInterfaceName\>| NIC associated with the source IP in the flow. |
212
-
> |**DestNIC**|\<resourcegroup_Name\>/\<NetworkInterfaceName\>| NIC associated with the destination IP in the flow. |
213
-
> |**SrcVM**|\<resourcegroup_Name\>/\<VirtualMachineName\>| Virtual machine associated with the source IP in the flow. |
214
-
> |**DestVM**|\<resourcegroup_Name\>/\<VirtualMachineName\>| Virtual machine associated with the destination IP in the flow. |
211
+
> |**SrcNic**|\<resourcegroup_Name\>/\<NetworkInterfaceName\>| NIC associated with the source IP in the flow. |
212
+
> |**DestNic**|\<resourcegroup_Name\>/\<NetworkInterfaceName\>| NIC associated with the destination IP in the flow. |
213
+
> |**SrcVm**|\<resourcegroup_Name\>/\<VirtualMachineName\>| Virtual machine associated with the source IP in the flow. |
214
+
> |**DestVm**|\<resourcegroup_Name\>/\<VirtualMachineName\>| Virtual machine associated with the destination IP in the flow. |
215
215
> |**SrcSubnet**|\<ResourceGroup_Name\>/\<VirtualNetwork_Name\>/\<SubnetName\>| Subnet associated with the source IP in the flow. |
216
216
> |**DestSubnet**|\<ResourceGroup_Name\>/\<VirtualNetwork_Name\>/\<SubnetName\>| Subnet associated with the destination IP in the flow. |
217
217
> |**SrcApplicationGateway**|\<SubscriptionID\>/\<ResourceGroupName\>/\<ApplicationGatewayName\>| Application gateway associated with the source IP in the flow. |
Billing and payment for the service is done through Azure. Payment for Oracle Database@Azure counts toward your Microsoft Azure Consumption Commitment (MACC). Existing Oracle Database software customers can use the Bring Your Own License (BYOL) option or Unlimited License Agreements (ULAs). On your regular Microsoft Azure invoices, you can see charges for Oracle Database@Azure alongside charges for your other Azure Marketplace services.
35
35
36
+
## Compliance
37
+
38
+
Oracle Database@Azure is an Oracle Cloud database service that runs Oracle Database workloads in a customer's Azure environment. Oracle Database@Azure offers various Oracle Database Services through customer’s Microsoft Azure environment. This service allows customers to monitor database metrics, audit logs, events, logging data, and telemetry natively in Azure. It runs on infrastructure managed by Oracle's Cloud Infrastructure operations team who performs software patching, infrastructure updates, and other operations through a connection to Oracle Cloud.
39
+
All infrastructure for Oracle Database@Azure is co-located in Azure's physical data centers and uses Azure Virtual Network for networking, managed within the Azure environment. Federated identity and access management for Oracle Database@Azure is provided by Microsoft Entra ID.
40
+
41
+
For detailed information on the compliance certifications please visit [Microsoft Services Trust Portal](https://servicetrust.microsoft.com/) and [Oracle compliance website](https://docs.oracle.com/en-us/iaas/Content/multicloud/compliance.htm). If you have further questions about OracleDB@Azure compliance please reach out to your account team and/or get information through [Oracle and Microsoft support for Oracle Database@Azure](https://docs.oracle.com/en-us/iaas/Content/multicloud/oaahelp.htm).
42
+
36
43
## Available regions
37
44
38
45
Oracle Database@Azure is available in the following locations. Oracle Database@Azure infrastructure resources must be provisioned in the Azure regions listed.
0 commit comments