Skip to content

Commit 5edc4aa

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 856388f + dde42f7 commit 5edc4aa

File tree

9 files changed

+358
-237
lines changed

9 files changed

+358
-237
lines changed

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 234 additions & 194 deletions
Large diffs are not rendered by default.

articles/frontdoor/front-door-url-redirect.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ author: duongau
77
ms.service: frontdoor
88
ms.topic: conceptual
99
ms.workload: infrastructure-services
10-
ms.date: 03/09/2022
10+
ms.date: 04/04/2023
1111
ms.author: duau
1212
zone_pivot_groups: front-door-tiers
1313
---
1414

1515
# URL redirect
1616

17-
Azure Front Door can redirect traffic at each of the following levels: protocol, hostname, path, query string. These functionalities can be configured for individual microservices since the redirection is path-based. This can simplify application configuration by optimizing resource usage, and supports new redirection scenarios including global and path-based redirection.
17+
Azure Front Door can redirect traffic at each of the following levels: protocol, hostname, path, query string. These functionalities can be configured for individual microservices since the redirection is path-based. This setup can simplify application configuration by optimizing resource usage, and supports new redirection scenarios including global and path-based redirection.
1818

1919
::: zone pivot="front-door-standard-premium"
2020

@@ -31,18 +31,19 @@ In Azure Front Door Standard/Premium tier, you can configure URL redirect using
3131
::: zone-end
3232

3333
## Redirection types
34+
3435
A redirect type sets the response status code for the clients to understand the purpose of the redirect. The following types of redirection are supported:
3536

36-
- **301 (Moved permanently)**: Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource will use one of the enclosed URIs. Use 301 status code for HTTP to HTTPS redirection.
37+
- **301 (Moved permanently)**: Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource use one of the enclosed URIs. Use 301 status code for HTTP to HTTPS redirection.
3738
- **302 (Found)**: Indicates that the target resource is temporarily under a different URI. Since the redirection can change on occasion, the client should continue to use the effective request URI for future requests.
3839
- **307 (Temporary redirect)**: Indicates that the target resource is temporarily under a different URI. The user agent MUST NOT change the request method if it does an automatic redirection to that URI. Since the redirection can change over time, the client ought to continue using the original effective request URI for future requests.
3940
- **308 (Permanent redirect)**: Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource should use one of the enclosed URIs.
4041

4142
## Redirection protocol
42-
You can set the protocol that will be used for redirection. The most common use cases of the redirect feature, is to set HTTP to HTTPS redirection.
43+
You can set the protocol that is used for redirection. The most common use cases of the redirect feature are to set HTTP to HTTPS redirection.
4344

4445
- **HTTPS only**: Set the protocol to HTTPS only, if you're looking to redirect the traffic from HTTP to HTTPS. Azure Front Door recommends that you should always set the redirection to HTTPS only.
45-
- **HTTP only**: Redirects the incoming request to HTTP. Use this value only if you want to keep your traffic HTTP that is, non-encrypted.
46+
- **HTTP only**: Redirects the incoming request to HTTP. Use this value only if you want to keep your traffic HTTP that is, nonencrypted.
4647
- **Match request**: This option keeps the protocol used by the incoming request. So, an HTTP request remains HTTP and an HTTPS request remains HTTPS post redirection.
4748

4849
## Destination host

articles/iot-edge/how-to-update-iot-edge.md

Lines changed: 94 additions & 21 deletions
Large diffs are not rendered by default.

articles/machine-learning/how-to-deploy-online-endpoints.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Before following the steps in this article, make sure you have the following pre
7272

7373
### Virtual machine quota allocation for deployment
7474

75-
For managed online endpoints, Azure Machine Learning reserves 20% of your compute resources for performing upgrades. Therefore, if you request a given number of instances in a deployment, you must have a quota for `ceil(1.2*number of instances requested for deployment)* number of cores for the VM SKU` available to avoid getting an error. For example, if you request 10 instances of a [Standard_DS2_v2](/azure/virtual-machines/dv2-dsv2-series) VM (that comes with 2 cores) in a deployment, you should have a quota for 24 cores (`12 instances*2 cores`) available. To view your usage and request quota increases, see [View your usage and quotas in the Azure portal](how-to-manage-quotas.md#view-your-usage-and-quotas-in-the-azure-portal).
75+
For managed online endpoints, Azure Machine Learning reserves 20% of your compute resources for performing upgrades. Therefore, if you request a given number of instances in a deployment, you must have a quota for `ceil(1.2 * number of instances requested for deployment) * number of cores for the VM SKU` available to avoid getting an error. For example, if you request 10 instances of a [Standard_DS3_v2](/azure/virtual-machines/dv2-dsv2-series) VM (that comes with 4 cores) in a deployment, you should have a quota for 48 cores (`12 instances * 4 cores`) available. To view your usage and request quota increases, see [View your usage and quotas in the Azure portal](how-to-manage-quotas.md#view-your-usage-and-quotas-in-the-azure-portal).
7676

7777
<!-- In this tutorial, you'll request one instance of a Standard_DS2_v2 VM SKU (that comes with 2 cores) in your deployment; therefore, you should have a minimum quota for 4 cores (`2 instances*2 cores`) available. -->
7878
---
@@ -461,7 +461,7 @@ For information on creating an environment in the studio, see [Create an environ
461461

462462
# [Azure CLI](#tab/azure-cli)
463463

464-
The preceding definition in the _blue-deployment.yml_ file uses a general-purpose type `Standard_DS2_v2` instance and a non-GPU Docker image `mcr.microsoft.com/azureml/openmpi4.1.0-ubuntu20.04:latest`. For GPU compute, choose a GPU compute type SKU and a GPU Docker image.
464+
The preceding definition in the _blue-deployment.yml_ file uses a general-purpose type `Standard_DS3_v2` instance and a non-GPU Docker image `mcr.microsoft.com/azureml/openmpi4.1.0-ubuntu20.04:latest`. For GPU compute, choose a GPU compute type SKU and a GPU Docker image.
465465

466466
For supported general-purpose and GPU instance types, see [Managed online endpoints supported VM SKUs](reference-managed-online-endpoints-vm-sku-list.md). For a list of Azure Machine Learning CPU and GPU base images, see [Azure Machine Learning base images](https://github.com/Azure/AzureML-Containers).
467467

@@ -470,7 +470,7 @@ For supported general-purpose and GPU instance types, see [Managed online endpoi
470470
471471
# [Python](#tab/python)
472472

473-
The preceding definition of the `blue_deployment` uses a general-purpose type `Standard_DS2_v2` instance and a non-GPU Docker image `mcr.microsoft.com/azureml/openmpi4.1.0-ubuntu20.04:latest`. For GPU compute, choose a GPU compute type SKU and a GPU Docker image.
473+
The preceding definition of the `blue_deployment` uses a general-purpose type `Standard_DS3_v2` instance and a non-GPU Docker image `mcr.microsoft.com/azureml/openmpi4.1.0-ubuntu20.04:latest`. For GPU compute, choose a GPU compute type SKU and a GPU Docker image.
474474

475475
For supported general-purpose and GPU instance types, see [Managed online endpoints supported VM SKUs](reference-managed-online-endpoints-vm-sku-list.md). For a list of Azure Machine Learning CPU and GPU base images, see [Azure Machine Learning base images](https://github.com/Azure/AzureML-Containers).
476476

@@ -1178,4 +1178,4 @@ If you aren't going use the deployment, you should delete it by running the foll
11781178
- [Enable network isolation with managed online endpoints](how-to-secure-online-endpoint.md)
11791179
- [View costs for an Azure Machine Learning managed online endpoint](how-to-view-online-endpoints-costs.md)
11801180
- [Manage and increase quotas for resources with Azure Machine Learning](how-to-manage-quotas.md#azure-machine-learning-managed-online-endpoints)
1181-
- [Use batch endpoints for batch scoring](batch-inference/how-to-use-batch-endpoint.md)
1181+
- [Use batch endpoints for batch scoring](batch-inference/how-to-use-batch-endpoint.md)

articles/postgresql/flexible-server/concepts-networking.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,14 @@ The custom DNS server should be inside the virtual network or reachable via the
103103
Private DNS zone settings and virtual network peering are independent of each other. If you want to connect to the flexible server from a client that's provisioned in another virtual network from the same region or a different region, you have to link the private DNS zone with the virtual network. For more information, see [Link the virtual network](../../dns/private-dns-getstarted-portal.md#link-the-virtual-network).
104104

105105
> [!NOTE]
106-
> Only private DNS zone names that end with `postgres.database.azure.com` can be linked. Your DNS zone name cannot be the same as your flexible server(s) otherwise name resolution will fail.
106+
> Only private DNS zone names that end with **'postgres.database.azure.com'** can be linked. Your DNS zone name cannot be the same as your flexible server(s) otherwise name resolution will fail.
107+
108+
To map a Server name to the DNS record you can run *nslookup* command in [Azure Cloud Shell](../../cloud-shell/overview.md) using Azure PowerShell or Bash, substituting name of your server for <server_name> parameter in example below:
109+
110+
```bash
111+
nslookup -debug <server_name>.postgres.database.azure.com | grep 'canonical name'
112+
113+
```
107114

108115

109116
### Using Hub and Spoke private networking design

articles/purview/how-to-policies-devops-azure-sql-db.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ ms.custom:
1111
---
1212
# Provision access to system metadata in Azure SQL Database
1313

14-
[!INCLUDE [feature-in-preview](includes/feature-in-preview.md)]
15-
1614
[DevOps policies](concept-policies-devops.md) are a type of Microsoft Purview access policies. They allow you to manage access to system metadata on data sources that have been registered for *Data use management* in Microsoft Purview. These policies are configured directly from the Microsoft Purview governance portal, and after they are saved, they get automatically published and then enforced by the data source. Microsoft Purview policies only manage access for Azure AD principals.
1715

1816
This how-to guide covers how to configure Azure SQL Database to enforce policies created in Microsoft Purview. It covers the configuration steps for Azure SQL Database and the ones in Microsoft Purview to provision access to Azure SQL Database system metadata (DMVs and DMFs) using the DevOps policies actions *SQL Performance Monitoring* or *SQL Security Auditing*.

articles/spring-apps/how-to-migrate-standard-tier-to-enterprise-tier.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -300,7 +300,7 @@ To build locally, use the following steps:
300300
customers-service eastus <resource group> default Succeeded 1 2Gi 1/1 1/1 - True True
301301
```
302302

303-
## Use Application Insight
303+
## Use Application Insights
304304

305305
Azure Spring Apps Enterprise tier uses buildpack bindings to integrate [Application Insights](../azure-monitor/app/app-insights-overview.md) with the type `ApplicationInsights` instead of In-Process Agent. For more information, see [How to configure APM integration and CA certificates](how-to-enterprise-configure-apm-intergration-and-ca-certificates.md).
306306

articles/spring-apps/quickstart-access-standard-consumption-within-virtual-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,4 +95,4 @@ echo "Press [ENTER] to continue ..."
9595
## Next steps
9696

9797
> [!div class="nextstepaction"]
98-
> [Deploy an event-driven application to Azure Spring Apps with the Standard consumption plan](./quickstart-deploy-event-driven-app-standard-consumption.md)
98+
> [Quickstart: Set up autoscale for applications in Azure Spring Apps Standard consumption plan](./quickstart-apps-autoscale-standard-consumption.md)

articles/storage/file-sync/file-sync-firewall-and-proxy.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Understand Azure File Sync on-premises proxy and firewall settings.
44
author: khdownie
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 03/17/2023
7+
ms.date: 04/04/2023
88
ms.author: kendownie
99
ms.subservice: files
1010
---
@@ -37,7 +37,7 @@ Azure File Sync moves file data and metadata exclusively over HTTPS and requires
3737

3838
The Azure File Sync agent has no requirements regarding special channels like [ExpressRoute](../../expressroute/expressroute-introduction.md), etc. to Azure.
3939

40-
Azure File Sync will work through any means available that allow reach into Azure, automatically adapting to various network characteristics like bandwidth, latency as well as offering admin control for fine-tuning.
40+
Azure File Sync will work through any means available that allow reach into Azure, automatically adapting to network characteristics like bandwidth and latency, as well as offering admin control for fine-tuning.
4141

4242
## Proxy
4343

@@ -139,7 +139,7 @@ The following table describes the required domains for communication:
139139
140140
If &ast;.afs.azure.net or &ast;.one.microsoft.com is too broad, you can limit the server's communication by allowing communication to only explicit regional instances of the Azure File Sync service. Which instance(s) to choose depends on the region of the storage sync service you have deployed and registered the server to. That region is called "Primary endpoint URL" in the table below.
141141
142-
For business continuity and disaster recovery (BCDR) reasons you may have created your Azure file shares in a storage account that is configured for geo-redundant storage (GRS). If that is the case, your Azure file shares will fail over to the paired region in the event of a lasting regional outage. Azure File Sync uses the same regional pairings as storage. So if you use GRS storage accounts, you need to enable additional URLs to allow your server to talk to the paired region for Azure File Sync. The table below calls this "Paired region". Additionally, there is a traffic manager profile URL that needs to be enabled as well. This will ensure network traffic can be seamlessly re-routed to the paired region in the event of a fail-over and is called "Discovery URL" in the table below.
142+
For business continuity and disaster recovery (BCDR) reasons you may have created your Azure file shares in a storage account that is configured for geo-redundant storage (GRS). If that is the case, your Azure file shares will fail over to the paired region in the event of a lasting regional outage. Azure File Sync uses the same regional pairings as storage. So if you use GRS storage accounts, you need to enable additional URLs to allow your server to talk to the paired region for Azure File Sync. The table below calls this "Paired region". Additionally, there is a traffic manager profile URL that needs to be enabled as well. This will ensure network traffic can be seamlessly re-routed to the paired region in the event of a failover and is called "Discovery URL" in the table below.
143143
144144
| Cloud | Region | Primary endpoint URL | Paired region | Discovery URL |
145145
|--------|--------|----------------------|---------------|---------------|
@@ -168,6 +168,8 @@ For business continuity and disaster recovery (BCDR) reasons you may have create
168168
| Public | Southeast Asia | https:\//southeastasia01.afs.azure.net<br>https:\//kailani10.one.microsoft.com | East Asia | https:\//tm-southeastasia01.afs.azure.net<br>https:\//tm-kailani10.one.microsoft.com |
169169
| Public | Switzerland North | https:\//switzerlandnorth01.afs.azure.net<br>https:\//tm-switzerlandnorth01.afs.azure.net | Switzerland West | https:\//switzerlandwest01.afs.azure.net<br>https:\//tm-switzerlandwest01.afs.azure.net |
170170
| Public | Switzerland West | https:\//switzerlandwest01.afs.azure.net<br>https:\//tm-switzerlandwest01.afs.azure.net | Switzerland North | https:\//switzerlandnorth01.afs.azure.net<br>https:\//tm-switzerlandnorth01.afs.azure.net |
171+
| Public | UAE Central | https:\//uaecentral01.afs.azure.net | UAE North | https:\//tm-uaecentral01.afs.azure.net |
172+
| Public | UAE North | https:\//uaenorth01.afs.azure.net | UAE Central | https:\//tm-uaenorth01.afs.azure.net |
171173
| Public | UK South | https:\//uksouth01.afs.azure.net<br>https:\//kailani-uks.one.microsoft.com | UK West | https:\//tm-uksouth01.afs.azure.net<br>https:\//tm-kailani-uks.one.microsoft.com |
172174
| Public | UK West | https:\//ukwest01.afs.azure.net<br>https:\//kailani-ukw.one.microsoft.com | UK South | https:\//tm-ukwest01.afs.azure.net<br>https:\//tm-kailani-ukw.one.microsoft.com |
173175
| Public | West Central US | https:\//westcentralus01.afs.azure.net | West US 2 | https:\//tm-westcentralus01.afs.azure.net |
@@ -184,28 +186,28 @@ For business continuity and disaster recovery (BCDR) reasons you may have create
184186
**Example:** You deploy a storage sync service in `"West US"` and register your server with it. The URLs to allow the server to communicate to for this case are:
185187
186188
> - https:\//westus01.afs.azure.net (primary endpoint: West US)
187-
> - https:\//eastus01.afs.azure.net (paired fail-over region: East US)
189+
> - https:\//eastus01.afs.azure.net (paired failover region: East US)
188190
> - https:\//tm-westus01.afs.azure.net (discovery URL of the primary region)
189191
190192
### Allow list for Azure File Sync IP addresses
191193
192194
Azure File Sync supports the use of [service tags](../../virtual-network/service-tags-overview.md), which represent a group of IP address prefixes for a given Azure service. You can use service tags to create firewall rules that enable communication with the Azure File Sync service. The service tag for Azure File Sync is `StorageSyncService`.
193195
194-
If you are using Azure File Sync within Azure, you can use name of service tag directly in your network security group to allow traffic. To learn more about how to do this, see [Network security groups](../../virtual-network/network-security-groups-overview.md).
196+
If you're using Azure File Sync within Azure, you can use name of service tag directly in your network security group to allow traffic. To learn more about how to do this, see [Network security groups](../../virtual-network/network-security-groups-overview.md).
195197
196-
If you are using Azure File Sync on-premises, you can use the service tag API to get specific IP address ranges for your firewall's allow list. There are two methods for getting this information:
198+
If you're using Azure File Sync on-premises, you can use the service tag API to get specific IP address ranges for your firewall's allow list. There are two methods for getting this information:
197199
198200
- The current list of IP address ranges for all Azure services supporting service tags are published weekly on the Microsoft Download Center in the form of a JSON document. Each Azure cloud has its own JSON document with the IP address ranges relevant for that cloud:
199201
- [Azure Public](https://www.microsoft.com/download/details.aspx?id=56519)
200202
- [Azure US Government](https://www.microsoft.com/download/details.aspx?id=57063)
201203
- [Azure China](https://www.microsoft.com/download/details.aspx?id=57062)
202204
- [Azure Germany](https://www.microsoft.com/download/details.aspx?id=57064)
203-
- The service tag discovery API (preview) allows programmatic retrieval of the current list of service tags. In preview, the service tag discovery API may return information that's less current than information returned from the JSON documents published on the Microsoft Download Center. You can use the API surface based on your automation preference:
205+
- The service tag discovery API allows programmatic retrieval of the current list of service tags. You can use the API surface based on your automation preference:
204206
- [REST API](/rest/api/virtualnetwork/servicetags/list)
205207
- [Azure PowerShell](/powershell/module/az.network/Get-AzNetworkServiceTag)
206208
- [Azure CLI](/cli/azure/network#az-network-list-service-tags)
207209
208-
Because the service tag discovery API is not updated as frequently as the JSON documents published to the Microsoft Download Center, we recommend using the JSON document to update your on-premises firewall's allow list. This can be done as follows:
210+
Because the service tag discovery API might not be updated as frequently as the JSON documents published to the Microsoft Download Center, we recommend using the JSON document to update your on-premises firewall's allow list. This can be done as follows:
209211
210212
```powershell
211213
# The specific region to get the IP address ranges for. Replace westus2 with the desired region code

0 commit comments

Comments
 (0)