Skip to content

Commit 5ab9fb2

Browse files
committed
changes on GA date
2 parents 26600e6 + 09c3c3f commit 5ab9fb2

24 files changed

+276
-59
lines changed

articles/application-gateway/application-gateway-configure-listener-specific-ssl-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Before you proceed, here are some important points related to listener-specific
3030

3131
- We recommend using TLS 1.2 as this version will be mandated in the future.
3232
- You don't have to configure client authentication on an SSL profile to associate it to a listener. You can have only client authentication or listener-specific SSL policy configured, or both configured in your SSL profile.
33-
- Using a new Predefined or Customv2 policy enhances SSL security and performance for the entire gateway (SSL Policy and SSL Profile). Therefore, you cannot have different listeners on both old as well as new SSL (predefined or custom) policies.
33+
- Using a [2022 Predefined](./application-gateway-ssl-policy-overview.md#predefined-tls-policy) or Customv2 policy enhances SSL security and performance for the entire gateway (SSL Policy and SSL Profile). Therefore, you cannot have different listeners on both old as well as new SSL (predefined or custom) policies.
3434

3535
Consider this example, you're currently using SSL Policy and SSL Profile with "older" policies/ciphers. To use a "new" Predefined or Customv2 policy for any one of them will also require you to upgrade the other configuration. You may use the new predefined policies, or customv2 policy, or combination of these across the gateway.
3636

articles/application-gateway/application-gateway-ssl-policy-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ The TLS policy includes control of the TLS protocol version as well as the ciphe
2020
- SSL 2.0 and 3.0 are disabled for all application gateways and are not configurable.
2121
- A custom TLS policy allows you to select any TLS protocol as the minimum protocol version for your gateway: TLSv1_0, TLSv1_1, TLSv1_2, or TLSv1_3.
2222
- If no TLS policy is defined, the minimum protocol version is set to TLSv1_0, and protocol versions v1.0, v1.1, and v1.2 are supported.
23-
- The new **Predefined and Customv2 policies** that support **TLS v1.3** are currently in **Preview** and only available with Application Gateway V2 SKUs (Standard_v2 or WAF_v2).
24-
- Using a new Predefined or Customv2 policy enhances SSL security and performance posture of the entire gateway (for SSL Policy and [SSL Profile](application-gateway-configure-listener-specific-ssl-policy.md#set-up-a-listener-specific-ssl-policy)). Hence, both old and new policies cannot co-exist on a gateway. You must use any of the older predefined or custom policies across the gateway if clients require older TLS versions or ciphers (for example, TLS v1.0).
23+
- The [**2022 Predefined**](#predefined-tls-policy) and [**Customv2 policies**](#custom-tls-policy) that support **TLS v1.3** are available only with Application Gateway V2 SKUs (Standard_v2 or WAF_v2).
24+
- Using a 2022 Predefined or Customv2 policy enhances SSL security and performance posture of the entire gateway (for SSL Policy and [SSL Profile](application-gateway-configure-listener-specific-ssl-policy.md#set-up-a-listener-specific-ssl-policy)). Hence, both old and new policies cannot co-exist on a gateway. You must use any of the older predefined or custom policies across the gateway if clients require older TLS versions or ciphers (for example, TLS v1.0).
2525
- TLS cipher suites used for the connection are also based on the type of the certificate being used. The cipher suites used in "client to application gateway connections" are based on the type of listener certificates on the application gateway. Whereas the cipher suites used in establishing "application gateway to backend pool connections" are based on the type of server certificates presented by the backend servers.
2626

2727
## Predefined TLS policy
@@ -30,7 +30,7 @@ Application Gateway offers several predefined security policies. You can configu
3030

3131
The following table shows the list of cipher suites and minimum protocol version support for each predefined policy. The ordering of the cipher suites determines the priority order during TLS negotiation. To know the exact ordering of the cipher suites for these predefined policies, you can refer to the PowerShell, CLI, REST API or the Listeners blade in portal.
3232

33-
| Predefined policy names (AppGwSslPolicy&lt;YYYYMMDD&gt;) | 20150501 | 20170401 | 20170401S | 20220101 <br/> (Preview) | 20220101S <br/> (Preview) |
33+
| Predefined policy names (AppGwSslPolicy&lt;YYYYMMDD&gt;) | 20150501 | 20170401 | 20170401S | 20220101 | 20220101S |
3434
| ---------- | ---------- | ---------- | ---------- | ---------- | ---------- |
3535
| **Minimum Protocol Version** | 1.0 | 1.1 | 1.2 | 1.2 | 1.2 |
3636
| **Enabled protocol versions** | 1.0<br/>1.1<br/>1.2 | 1.1<br/>1.2 | 1.2 | 1.2<br/>1.3 | 1.2<br/>1.3 |
@@ -71,7 +71,7 @@ The following table shows the list of cipher suites and minimum protocol version
7171
If a TLS policy needs to be configured for your requirements, you can use a Custom TLS policy. With a custom TLS policy, you have complete control over the minimum TLS protocol version to support, as well as the supported cipher suites and their priority order.
7272

7373
> [!NOTE]
74-
> The newer, stronger ciphers and TLSv1.3 support are only available with the **CustomV2 policy (Preview)**. It provides enhanced security and performance benefits.
74+
> The newer, stronger ciphers and TLSv1.3 support are only available with the **CustomV2 policy**. It provides enhanced security and performance benefits.
7575
7676
> [!IMPORTANT]
7777
> - If you're using a custom SSL policy in Application Gateway v1 SKU (Standard or WAF), make sure that you add the mandatory cipher "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" to the list. This cipher is required to enable metrics and logging in the Application Gateway v1 SKU.

articles/azure-monitor/change/change-analysis-visualizations.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,21 @@ ms.reviewer: cawa
1515

1616
Change Analysis provides data for various management and troubleshooting scenarios to help you understand what changes to your application might have caused the issues. You can view the Change Analysis data through several channels:
1717

18-
## The Change Analysis standalone UI
18+
## Change Analysis overview portal
1919

20-
You can access Change Analysis in a standalone pane under Azure Monitor, where you can view all changes and application dependency/resource insights. You can access Change Analysis through a couple of entry points:
20+
You can access the Change Analysis overview portal under Azure Monitor, where you can view all changes and application dependency/resource insights. You can access Change Analysis through a couple of entry points:
21+
22+
### Monitor home page
23+
24+
From the Azure portal home page, select **Monitor** from the menu.
25+
26+
:::image type="content" source="./media/change-analysis/monitor-menu-2.png" alt-text="Screenshot of finding the Monitor home page from the main portal menu.":::
27+
28+
In the Monitor overview page, select the **Change Analysis** card.
29+
30+
:::image type="content" source="./media/change-analysis/change-analysis-monitor-overview.png" alt-text="Screenshot of selecting the Change Analysis card on the Monitor overview page.":::
31+
32+
### Search
2133

2234
In the Azure portal, search for Change Analysis to launch the experience.
2335

79.9 KB
Loading

articles/azure-monitor/data-platform.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Read more about distributed tracing at [What is distributed tracing?](app/distri
6464

6565
Once [Change Analysis is enabled](./change/change-analysis-enable.md), the `Microsoft.ChangeAnalysis` resource provider is registered with an Azure Resource Manager subscription to make the resource properties and configuration change data available. Change Analysis provides data for various management and troubleshooting scenarios to help users understand what changes might have caused the issues:
6666
- Troubleshoot your application via the [Diagnose & solve problems tool](./change/change-analysis-enable.md).
67-
- Perform general management and monitoring via the [Change Analysis standalone UI](./change/change-analysis-visualizations.md#the-change-analysis-standalone-ui) and [the activity log](./change/change-analysis-visualizations.md#activity-log-change-history).
67+
- Perform general management and monitoring via the [Change Analysis overview portal](./change/change-analysis-visualizations.md#change-analysis-overview-portal) and [the activity log](./change/change-analysis-visualizations.md#activity-log-change-history).
6868
- [Learn more about how to view data results for other scenarios](./change/change-analysis-visualizations.md).
6969

7070
Read more about Change Analysis, including data sources in [Use Change Analysis in Azure Monitor](./change/change-analysis.md).

articles/communication-services/concepts/voice-video-calling/pre-call-diagnostics.md

Lines changed: 31 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,22 +14,36 @@ ms.service: azure-communication-services
1414

1515
# Pre-Call diagnostic
1616

17-
[!INCLUDE [Private Preview Disclaimer](../../includes/private-preview-include-section.md)]
17+
[!INCLUDE [Public Preview Disclaimer](../../includes/public-preview-include.md)]
1818

1919
The Pre-Call API enables developers to programmatically validate a client’s readiness to join an Azure Communication Services Call. The Pre-Call APIs can be accessed through the Calling SDK. They provide multiple diagnostics including device, connection, and call quality. Pre-Call APIs are available only for Web (JavaScript). We will be enabling these capabilities across platforms in the future, please provide us feedback on what platforms you would like to see Pre-Call APIs on.
2020

21+
## Prerequisites
22+
23+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
24+
- [Node.js](https://nodejs.org/) active Long Term Support(LTS) versions are recommended.
25+
- An active Communication Services resource. [Create a Communication Services resource](../../quickstarts/create-communication-resource.md).
26+
- A User Access Token to instantiate the call client. Learn how to [create and manage user access tokens](../../quickstarts/access-tokens.md). You can also use the Azure CLI and run the command below with your connection string to create a user and an access token. (Need to grab connection string from the resource through Azure portal.)
27+
28+
```azurecli-interactive
29+
az communication identity token issue --scope voip --connection-string "yourConnectionString"
30+
```
31+
32+
For details, see [Use Azure CLI to Create and Manage Access Tokens](../../quickstarts/access-tokens.md?pivots=platform-azcli).
33+
2134
## Accessing Pre-Call APIs
2235

2336
>[!IMPORTANT]
24-
>Pre-Call diagnostics are available starting on the version [1.5.2-alpha.20220415.1](https://www.npmjs.com/package/@azure/communication-calling/v/1.5.2-alpha.20220415.1) of the Calling SDK. Make sure to use that version when trying the instructions below.
37+
>Pre-Call diagnostics are available starting on the version [1.9.1-beta.1](https://www.npmjs.com/package/@azure/communication-calling/v/1.9.1-beta.1) of the Calling SDK. Make sure to use that version when trying the instructions below.
2538
2639
To Access the Pre-Call API, you will need to initialize a `callClient` and provision an Azure Communication Services access token. There you can access the `PreCallDiagnostics` feature and the `startTest` method.
2740

2841
```javascript
2942
import { CallClient, Features} from "@azure/communication-calling";
3043
import { AzureCommunicationTokenCredential } from '@azure/communication-common';
3144

32-
const tokenCredential = new AzureCommunicationTokenCredential();
45+
const callClient = new CallClient();
46+
const tokenCredential = new AzureCommunicationTokenCredential("INSERT ACCESS TOKEN");
3347
const preCallDiagnosticsResult = await callClient.feature(Features.PreCallDiagnostics).startTest(tokenCredential);
3448

3549
```
@@ -109,6 +123,7 @@ Performs a quick call to check in-call metrics for audio and video and provides
109123

110124
InCall diagnostics leverages [media quality stats](./media-quality-sdk.md) to calculate quality scores and diagnose issues. During the pre-call diagnostic, the full set of media quality stats are available for consumption. These will include raw values across video and audio metrics that can be used programatically. The InCall diagnostic provides a convenience layer on top of media quality stats to consume the results without the need to process all the raw data. See section on media stats for instructions to access.
111125

126+
112127
```javascript
113128

114129
const inCallDiagnostics = await preCallDiagnosticsResult.inCallDiagnostics;
@@ -121,17 +136,28 @@ InCall diagnostics leverages [media quality stats](./media-quality-sdk.md) to ca
121136

122137
```
123138

124-
At this step, there are multiple failure points to watch out for:
139+
At this step, there are multiple failure points to watch out for. The values provided by the API are based on the threshold values required by the service. Those raw thresholds can be found in our [media quality stats documentation](./media-quality-sdk.md#best-practices).
125140

126141
- If connection fails, the user should be prompted to recheck their network connectivity. Connection failures can also be attributed to network conditions like DNS, Proxies or Firewalls. For more information on recommended network setting check out our [documentation](network-requirements.md).
127142
- If bandwidth is `Bad`, the user should be prompted to try out a different network or verify the bandwidth availability on their current one. Ensure no other high bandwidth activities might be taking place.
128143

129144
### Media stats
130145
For granular stats on quality metrics like jitter, packet loss, rtt, etc. `callMediaStatistics` are provided as part of the `preCallDiagnosticsResult` feature. See the [full list and description of the available metrics](./media-quality-sdk.md) in the linked article. You can subscribe to the call media stats to get full collection of them. This is the raw metrics that are used to calculate InCall diagnostic results and which can be consumed granularly for further analysis.
131146

147+
```javascript
148+
149+
const mediaStatsCollector = callMediaStatistics.startCollector();
150+
151+
mediaStatsCollector.on('mediaStatsEmitted', (mediaStats: SDK.MediaStats) => {
152+
// process the stats for the call.
153+
console.log(mediaStats);
154+
});
155+
156+
```
157+
132158
## Pricing
133159

134-
When the Pre-Call diagnostic test runs, behind the scenes it uses calling minutes to run the diagnostic. The test lasts for roughly 1 minute, using up 1 minute of calling which is charged at the standard rate of $0.004 per participant per minute. For the case of Pre-Call diagnostic, the charge will be for 1 participant x 1 minutes = $0.004.
160+
When the Pre-Call diagnostic test runs, behind the scenes it uses calling minutes to run the diagnostic. The test lasts for roughly 30 seconds, using up 30 seconds of calling which is charged at the standard rate of $0.004 per participant per minute. For the case of Pre-Call diagnostic, the charge will be for 1 participant x 30 seconds = $0.002.
135161

136162
## Next steps
137163

Binary file not shown.

articles/event-grid/receive-events.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Receive events from Azure Event Grid to an HTTP endpoint
33
description: Describes how to validate an HTTP endpoint, then receive and deserialize Events from Azure Event Grid
44
ms.topic: conceptual
5-
ms.date: 07/16/2021
5+
ms.date: 11/14/2022
66
ms.devlang: csharp, javascript
77
ms.custom: devx-track-js, devx-track-csharp
88
---
@@ -28,7 +28,7 @@ SDKs for other languages are available via the [Publish SDKs](./sdk-overview.md#
2828

2929
The first thing you want to do is handle `Microsoft.EventGrid.SubscriptionValidationEvent` events. Every time someone subscribes to an event, Event Grid sends a validation event to the endpoint with a `validationCode` in the data payload. The endpoint is required to echo this back in the response body to [prove the endpoint is valid and owned by you](webhook-event-delivery.md). If you're using an [Event Grid Trigger](../azure-functions/functions-bindings-event-grid.md) rather than a WebHook triggered Function, endpoint validation is handled for you. If you use a third-party API service (like [Zapier](https://zapier.com/home) or [IFTTT](https://ifttt.com/)), you might not be able to programmatically echo the validation code. For those services, you can manually validate the subscription by using a validation URL that is sent in the subscription validation event. Copy that URL in the `validationUrl` property and send a GET request either through a REST client or your web browser.
3030

31-
In C#, the `ParseMany()` method is used to deserialize a `BinaryData` instance containing 1 or more events into an array of `EventGridEvent`. If you knew ahead of time that your are deserializing only a single event, you could use the `Parse` method instead.
31+
In C#, the `ParseMany()` method is used to deserialize a `BinaryData` instance containing 1 or more events into an array of `EventGridEvent`. If you knew ahead of time that you are deserializing only a single event, you could use the `Parse` method instead.
3232

3333
To programmatically echo the validation code, use the following code.
3434

@@ -123,7 +123,7 @@ Test the validation response function by pasting the sample event into the test
123123
}]
124124
```
125125

126-
When you click Run, the Output should be 200 OK and `{"validationResponse":"512d38b6-c7b8-40c8-89fe-f46f9e9622b6"}` in the body:
126+
When you select Run, the Output should be 200 OK and `{"validationResponse":"512d38b6-c7b8-40c8-89fe-f46f9e9622b6"}` in the body:
127127

128128
:::image type="content" source="./media/receive-events/validation-request.png" alt-text="Validation request":::
129129

@@ -249,9 +249,15 @@ Test the new functionality of the function by putting a [Blob storage event](./e
249249

250250
You should see the blob URL output in the function log:
251251

252-
![Output log](./media/receive-events/blob-event-response.png)
252+
```
253+
2022-11-14T22:40:45.978 [Information] Executing 'Function1' (Reason='This function was programmatically called via the host APIs.', Id=8429137d-9245-438c-8206-f9e85ef5dd61)
254+
2022-11-14T22:40:46.012 [Information] C# HTTP trigger function processed a request.
255+
2022-11-14T22:40:46.017 [Information] Received events: [{"topic": "/subscriptions/{subscription-id}/resourceGroups/Storage/providers/Microsoft.Storage/storageAccounts/xstoretestaccount","subject": "/blobServices/default/containers/testcontainer/blobs/testfile.txt","eventType": "Microsoft.Storage.BlobCreated","eventTime": "2017-06-26T18:41:00.9584103Z","id": "831e1650-001e-001b-66ab-eeb76e069631","data": {"api": "PutBlockList","clientRequestId": "6d79dbfb-0e37-4fc4-981f-442c9ca65760","requestId": "831e1650-001e-001b-66ab-eeb76e000000","eTag": "0x8D4BCC2E4835CD0","contentType": "text/plain","contentLength": 524288,"blobType": "BlockBlob","url": "https://example.blob.core.windows.net/testcontainer/testfile.txt","sequencer": "00000000000004420000000000028963","storageDiagnostics": {"batchId": "b68529f3-68cd-4744-baa4-3c0498ec19f0"}},"dataVersion": "","metadataVersion": "1"}]
256+
2022-11-14T22:40:46.335 [Information] Got BlobCreated event data, blob URI https://example.blob.core.windows.net/testcontainer/testfile.txt
257+
2022-11-14T22:40:46.346 [Information] Executed 'Function1' (Succeeded, Id=8429137d-9245-438c-8206-f9e85ef5dd61, Duration=387ms)
258+
```
253259

254-
You can also test by creating a Blob storage account or General Purpose V2 (GPv2) Storage account, [adding and event subscription](../storage/blobs/storage-blob-event-quickstart.md), and setting the endpoint to the function URL:
260+
You can also test by creating a Blob storage account or General Purpose V2 (GPv2) Storage account, [adding an event subscription](../storage/blobs/storage-blob-event-quickstart.md), and setting the endpoint to the function URL:
255261

256262
![Function URL](./media/receive-events/function-url.png)
257263

articles/iot-edge/iot-edge-for-linux-on-windows-support.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ Azure IoT Edge for Linux on Windows supports the following architectures:
4949
| ---------------- | ----- | ----- |
5050
| EFLOW 1.1 LTS | ![AMD64](./media/support/green-check.png) | |
5151
| EFLOW Continuous Release (CR) ([Public preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)) | ![AMD64](./media/support/green-check.png) | ![ARM64](./media/support/green-check.png) |
52+
| EFLOW 1.4 LTS | ![AMD64](./media/support/green-check.png) | ![ARM64](./media/support/green-check.png) |
5253

5354
For more information about Windows ARM64 supported processors, see [Windows Processor Requirements](/windows-hardware/design/minimum/windows-processor-requirements).
5455

@@ -74,8 +75,9 @@ The following table lists the components included in each release. Each release
7475

7576
| Release | IoT Edge | CBL-Mariner | Defender for IoT |
7677
| ------- | -------- | ----------- | ---------------- |
77-
| **1.1 LTS** | 1.1 | 1.0 | - |
78-
| **Continuous Release** | 1.2 | 1.0 | 3.12.3 |
78+
| **1.1 LTS** | 1.1 | 2.0 | - |
79+
| **Continuous Release** | 1.3 | 2.0 | 3.12.3 |
80+
| **1.4 LTS** | 1.4 | 2.0 | - |
7981

8082

8183
## Minimum system requirements

0 commit comments

Comments
 (0)