Skip to content

Commit 5c7f00d

Browse files
authored
Merge pull request #290303 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 44a3cc4 + d3120d9 commit 5c7f00d

File tree

6 files changed

+19
-9
lines changed

6 files changed

+19
-9
lines changed

articles/firewall/protect-azure-kubernetes-service.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,6 +146,11 @@ When the previous command has succeeded, save the firewall frontend IP address f
146146
147147
FWPUBLIC_IP=$(az network public-ip show -g $RG -n $FWPUBLICIP_NAME --query "ipAddress" -o tsv)
148148
FWPRIVATE_IP=$(az network firewall show -g $RG -n $FWNAME --query "ipConfigurations[0].privateIPAddress" -o tsv)
149+
150+
151+
# set fw as vnet dns server so dns queries are visible in fw logs
152+
153+
az network vnet update -g $RG --name $VNET_NAME --dns-servers $FWPRIVATE_IP
149154
```
150155

151156
> [!NOTE]
@@ -191,6 +196,11 @@ az network firewall network-rule create -g $RG -f $FWNAME --collection-name 'aks
191196

192197
```azurecli
193198
az network firewall application-rule create -g $RG -f $FWNAME --collection-name 'aksfwar' -n 'fqdn' --source-addresses '*' --protocols 'http=80' 'https=443' --fqdn-tags "AzureKubernetesService" --action allow --priority 100
199+
200+
# set fw application rule to allow kubernettes to reach storage and image resources
201+
202+
az network firewall application-rule create -g $RG -f $FWNAME --collection-name 'aksfwarweb' -n 'storage' --source-addresses '10.42.1.0/24' --protocols 'https=443' --target-fqdns '*.blob.storage.azure.net' '*.blob.core.windows.net' --action allow --priority 101
203+
az network firewall application-rule create -g $RG -f $FWNAME --collection-name 'aksfwarweb' -n 'website' --source-addresses '10.42.1.0/24' --protocols 'https=443' --target-fqdns 'ghcr.io' '*.docker.io' '*.docker.com' '*.githubusercontent.com'
194204
```
195205

196206
See [Azure Firewall documentation](overview.md) to learn more about the Azure Firewall service.

articles/migrate/migrate-servers-to-azure-using-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ With discovery completed, you can begin replication of Hyper-V VMs to Azure.
235235
> You can update replication settings any time before replication starts, **Manage** > **Replicating machines**. Settings can't be changed after replication starts.
236236
237237
Next, follow the instructions to [perform migrations](tutorial-migrate-hyper-v.md#migrate-vms).
238-
]
238+
239239
### Grant access permissions to the Recovery Services vault
240240

241241
You must grant the permissions to the Recovery Services vault for authenticated access to the cache/replication storage account.

articles/migrate/vmware/prepare-for-agentless-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: vmware-scenario-422, engagement-fy23, linux-related-content
1616
1717
This article provides an overview of the changes performed when you [migrate VMware VMs to Azure via the agentless migration](./tutorial-migrate-vmware.md) method using the Migration and modernization tool.
1818

19-
Before you migrate your on-premises VM to Azure, you may require a few changes to make the VM ready for Azure. These changes are important to ensure that the migrated VM can boot successfully in Azure and connectivity to the Azure VM can be established-.
19+
Before you migrate your on-premises VM to Azure, you may require a few changes to make the VM ready for Azure. These changes are important to ensure that the migrated VM can boot successfully in Azure and connectivity to the Azure VM can be established.
2020
Azure Migrate automatically handles these configuration changes for the following operating system versions for both Linux and Windows. This process is called *Hydration*.
2121

2222
**Operating system versions supported for hydration**

articles/site-recovery/tutorial-prepare-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ On-premises machines are replicated to Azure managed disks. When failover occurs
8787
1. After deleting the pre-existing address range, select **Add an IP address space**.
8888

8989
:::image type="Protection state" source="media/tutorial-prepare-azure/add-ip-address-space.png" alt-text="Screenshot of the adding IP.":::
90-
1. In **Starting address** enter **10.0.0.**
90+
1. In **Starting address** enter **10.0.0.0**
9191
1. Under **Address space size**, select **/24 (256 addresses)**.
9292
1. Select **Add**.
9393

articles/storage/elastic-san/elastic-san-scale-targets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following regions are regions with higher base storage capacity available, a
5757
##### Lower available base storage capacity
5858

5959

60-
The following regions are regions with higher base storage capacity available, and the table following the regions outlines their scale targets: East Asia, Korea Central, South Africa North, France Central, Southeast Asia, West US 3, Sweden Central, Switzerland North.
60+
The following regions are regions with lower base storage capacity available, and the table following the regions outlines their scale targets: East Asia, Korea Central, South Africa North, France Central, Southeast Asia, West US 3, Sweden Central, Switzerland North.
6161

6262

6363
|Resource |Values |

articles/virtual-network/virtual-network-test-latency.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Many other common network latency test tools, such as Ping, don't measure TCP or
2121

2222
Latte and SockPerf measure only TCP or UDP payload delivery times. These tools use the following approach to measure network latency between two physical or virtual computers:
2323

24-
1. Create a two-way communications channel between the computers by designating one as sender and one as receiver.
24+
1. Create a two-way communication channel between the computers by designating one as sender and one as receiver.
2525
1. Send and receive packets in both directions and measure the round-trip time (RTT).
2626

2727
## Tips and best practices to optimize network latency
@@ -39,7 +39,7 @@ Use the following best practices to test and analyze network latency:
3939

4040
1. Test the effects on network latency of changing any of the following components:
4141
- Operating system (OS) or network stack software, including configuration changes.
42-
- VM deployment method, such as deploying to an availability zone or proximity placement group (PPG).
42+
- VM deployment methods, such as deploying to an availability zone or proximity placement group (PPG).
4343
- VM properties, such as Accelerated Networking or size changes.
4444
- Virtual network configuration, such as routing or filtering changes.
4545

@@ -49,13 +49,13 @@ Use the following best practices to test and analyze network latency:
4949

5050
## Test VMs with Latte or SockPerf
5151

52-
Use the following procedures to install and test network latency with [Latte](https://github.com/mellanox/sockperf) for Windows or [SockPerf](https://github.com/mellanox/sockperf) for Linux.
52+
Use the following procedures to install and test network latency with [Latte](https://github.com/microsoft/latte) for Windows or [SockPerf](https://github.com/mellanox/sockperf) for Linux.
5353

5454
# [Windows](#tab/windows)
5555

5656
### Install Latte and configure VMs
5757

58-
1. [Download the latest version of latte.exe](https://github.com/microsoft/latte/releases/download/v0/latte.exe) to both VMs, into a separate folder such as *c:\\tools*.
58+
1. [Download the latest version of latte.exe](https://github.com/microsoft/latte/releases/latest/download/latte.exe) to both VMs and put it in a separate folder such as *c:/tools*.
5959

6060
1. On the *receiver* VM, create a Windows Defender Firewall `allow` rule to allow the Latte traffic to arrive. It's easier to allow the *latte.exe* program by name than to allow specific inbound TCP ports. In the command, replace the `<path>` placeholder with the path you downloaded *latte.exe* to, such as *c:\\tools\\*.
6161

@@ -78,7 +78,7 @@ Run *latte.exe* from the Windows command line, not from PowerShell.
7878

7979
The following example shows the command for a VM with an IP address of `10.0.0.4`:<br><br>`latte -a 10.0.0.4:5005 -i 65100`
8080

81-
1. On the *sender* VM, run the same command as on the receiver, except with `-c` added to indicate the *client* or sender VM. Again replace the `<receiver IP address>`, `<port>`, and `<iterations>` placeholders with your own values.
81+
1. On the *sender* VM, run the same command as on the receiver, except with `-c` added to indicate the *client* or sender VM. Again, replace the `<receiver IP address>`, `<port>`, and `<iterations>` placeholders with your own values.
8282

8383
```cmd
8484
latte -c -a <receiver IP address>:<port> -i <iterations>

0 commit comments

Comments
 (0)