Skip to content

Commit 66675d2

Browse files
authored
Merge pull request #296034 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents fbcd480 + c2726d0 commit 66675d2

File tree

11 files changed

+40
-17
lines changed

11 files changed

+40
-17
lines changed

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ The technical profile also returns claims that aren't returned by the identity p
8989
| HttpBinding | No | The expected HTTP binding to the access token and claims token endpoints. Possible values: `GET` or `POST`. |
9090
| ValidTokenIssuerPrefixes | No | A key that can be used to sign in to each of the tenants when using a multi-tenant identity provider such as Microsoft Entra ID. |
9191
| UsePolicyInRedirectUri | No | Indicates whether to use a policy when constructing the redirect URI. When you configure your application in the identity provider, you need to specify the redirect URI. The redirect URI points to Azure AD B2C, `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/oauth2/authresp`. If you specify `true`, you need to add a redirect URI for each policy you use. For example: `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/{policy-name}/oauth2/authresp`. |
92-
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
92+
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the HTTP status code is in the 5xx range. The default is `false`. |
9393
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
9494
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
9595
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic`, `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |

articles/api-management/api-management-howto-disaster-recovery-backup-restore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To recover from availability problems that affect your API Management service, b
2222

2323
Backup and restore operations can also be used for replicating API Management service configuration between operational environments, for example, development and staging. Beware that runtime data such as users and subscriptions will be copied as well, which might not always be desirable.
2424

25-
This article shows how to automate backup and restore operations of your API Management instance using an external storage account. The steps shown here use either the [Backup-AzApiManagement](/powershell/module/az.apimanagement/backup-azapimanagement) and [Restore-AzApiManagement](/powershell/module/az.apimanagement/restore-azapimanagement) Azure PowerShell cmdlets, or the [Api Management Service - Backup](/rest/api/apimanagement/current-ga/api-management-service/backup) and [Api Management Service - Restore](/rest/api/apimanagement/current-ga/api-management-service/restore) REST APIs.
25+
This article shows how to automate backup and restore operations of your API Management instance using an external storage account. The steps shown here use either the [Backup-AzApiManagement](/powershell/module/az.apimanagement/backup-azapimanagement) and [Restore-AzApiManagement](/powershell/module/az.apimanagement/restore-azapimanagement) Azure PowerShell cmdlets, or the [API Management Service - Backup](/rest/api/apimanagement/current-ga/api-management-service/backup) and [API Management Service - Restore](/rest/api/apimanagement/current-ga/api-management-service/restore) REST APIs.
2626

2727

2828
> [!WARNING]

articles/api-management/soft-delete.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Recovery and other operations on a soft-deleted instance are enabled through [RE
3232
| [Create or Update](/rest/api/apimanagement/current-ga/api-management-service/create-or-update) | Creates or updates an API Management service. | API Management Service | Any |
3333
| [Create or Update](/rest/api/apimanagement/current-ga/api-management-service/create-or-update) with `restore` property set to **true** | Recovers (undeletes) an API Management Service if it was previously soft-deleted. If `restore` is specified and set to `true` all other properties will be ignored. | API Management Service | 2020-06-01-preview |
3434
| [Delete](/rest/api/apimanagement/current-ga/api-management-service/delete) | Deletes an existing API Management service. | API Management Service | 2020-06-01-preview|
35-
| [Get By Name](/rest/api/apimanagement/current-ga/deleted-services/get-by-name) | Get soft-deleted Api Management Service by name. | Deleted Services | 2020-06-01-preview |
35+
| [Get By Name](/rest/api/apimanagement/current-ga/deleted-services/get-by-name) | Get soft-deleted API Management service by name. | Deleted Services | 2020-06-01-preview |
3636
| [List By Subscription](/rest/api/apimanagement/current-ga/deleted-services/list-by-subscription) | Lists all soft-deleted services available for undelete for the given subscription. | Deleted Services | 2020-06-01-preview
3737
| [Purge](/rest/api/apimanagement/current-ga/deleted-services/purge) | Purges API Management Service (permanently deletes it with no option to undelete). | Deleted Services | 2020-06-01-preview
3838

articles/app-service/deploy-ftp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Run the [az webapp config set](/cli/azure/webapp/deployment#az-webapp-deployment
9696
az webapp config set --name <app-name> --resource-group <group-name> --ftps-state FtpsOnly
9797
```
9898

99-
Possible values for `--ftps-state` are `AllAllowed` (FTP and FTPS enabled), `Disabled` (FTP and FTPs disabled), and `FtpsOnly` (FTPS only).
99+
Possible values for `--ftps-state` are `AllAllowed` (FTP and FTPS enabled), `Disabled` (FTP and FTPS disabled), and `FtpsOnly` (FTPS only).
100100

101101
# [Azure PowerShell](#tab/powershell)
102102

@@ -106,7 +106,7 @@ Run the [Set-AzWebApp](/powershell/module/az.websites/set-azwebapp) command with
106106
Set-AzWebApp -Name <app-name> -ResourceGroupName <group-name> -FtpsState FtpsOnly
107107
```
108108

109-
Possible values for `--ftps-state` are `AllAllowed` (FTP and FTPS enabled), `Disabled` (FTP and FTPs disabled), and `FtpsOnly` (FTPS only).
109+
Possible values for `--ftps-state` are `AllAllowed` (FTP and FTPS enabled), `Disabled` (FTP and FTPS disabled), and `FtpsOnly` (FTPS only).
110110

111111
-----
112112

articles/azure-vmware/configure-site-to-site-vpn-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ A virtual hub is a virtual network that is created and used by Azure Virtual WAN
8686

8787
:::image type="content" source="../virtual-wan/media/virtual-wan-custom-ipsec-portal/contextmenu.png" alt-text="Screenshot showing the context menu for an existing VPN site." lightbox="../virtual-wan/media/virtual-wan-custom-ipsec-portal/contextmenu.png":::
8888

89-
- Internet Protocol Security (IPSec), select **Custom**.
89+
- Internet Protocol Security (IPsec), select **Custom**.
9090

9191
- Use policy-based traffic selector, select **Enable**
9292

articles/azure-vmware/configure-vmware-hcx.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ VMware HCX Connector deploys a subset of virtual appliances (automated) that req
7878
- Uplink
7979

8080
> [!NOTE]
81-
> * For Azure VMware Solution connected via VPN, set Uplink Network Profile MTU's to 1350 to account for IPSec overhead.
81+
> * For Azure VMware Solution connected via VPN, set Uplink Network Profile MTU's to 1350 to account for IPsec overhead.
8282
> * Azure VMware Solution defaults to 1500 MTU, which is sufficient for most ExpressRoute implementations.
8383
> * If your ExpressRoute provider does not support jumbo frames, you may need to lower the MTU in ExpressRoute setups as well.
8484
> * Adjust MTU settings on both HCX Connector (on-premises) and HCX Cloud Manager (Azure VMware Solution) network profiles.

articles/azure-vmware/configure-vsan.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ In this article, learn how to:
2929
> * Enable or Disable vSAN TRIM/UNMAP
3030
> * Enable vSAN Compression Only
3131
> * Disable vSAN Deduplication and Compression
32+
> * Enable or Disable vSAN Data-In-Transit Encryption
3233
3334
## Set VMware vSAN TRIM/UNMAP
3435

@@ -92,6 +93,30 @@ Run the `Set-vSANCompressDedupe` cmdlet to set preferred space efficiency model.
9293
9394
1. Check **Notifications** to see the progress.
9495

96+
97+
## Set VMware vSAN Data-In-Transit Encryption
98+
99+
Run the `Set-vSANDataInTransitEncryption` cmdlet to enable or disable data-in-transit encryption for all clusters or specified clusters of a SDDC.
100+
101+
>[!NOTE]
102+
>Changing this setting will cause a performance impact. See [VMware KB](https://blogs.vmware.com/virtualblocks/2021/08/12/storageminute-vsan-data-encryption-performance/).
103+
104+
1. Sign in to the [Azure portal](https://portal.azure.com).
105+
106+
1. Select **Run command** > **Packages** > **Set-vSANDataInTransitEncryption**.
107+
108+
1. Provide the required values or change the default values, and then select **Run**.
109+
110+
| **Field** | **Value** |
111+
| --- | --- |
112+
| **ClusterName** | Name of the cluster. Leave blank if required to enable for whole SDDC else enter comma separated list of names. |
113+
| **Enable** | Specify True/False to Enable/Disable the feature.
114+
115+
1. Check **Notifications** to see the progress.
116+
117+
>[!NOTE]
118+
>You can also use the `Get-vSANDataInTransitEncryptionStatus` command to check for the current status or status after performing the `Set-vSANDataInTransitEncryptionStatus` operation and verify the cluster's current encryption state.
119+
95120
## Next steps
96121

97122
Now that you learned how to configure VMware vSAN, learn more about:

articles/baremetal-infrastructure/workloads/nc2-on-azure/architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Each NC2 on Azure architectural component has the following function:
4242
- Nutanix Cost Governance: Provides multi-cloud optimization to reduce cost & enhance cloud security.
4343
- Azure Virtual Network (VNet): Private network used to connect AHV hosts, Azure services and resources together.
4444
- Azure Route Server: Enables network appliances to exchange dynamic route information with Azure networks.
45-
- Azure Virtual Network Gateway: Cross premises gateway for connecting Azure services and resources to other private networks using IPSec VPN, ExpressRoute, and VNet to VNet.
45+
- Azure Virtual Network Gateway: Cross premises gateway for connecting Azure services and resources to other private networks using IPsec VPN, ExpressRoute, and VNet to VNet.
4646
- Azure ExpressRoute: Provides high-speed private connections between Azure data centers and on-premises or colocation infrastructure.
4747
- Azure Virtual WAN (vWAN): Aggregates networking, security, and routing functions together into a single unified Wide Area Network (WAN).
4848

articles/expressroute/cross-network-connectivity.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ ms.service: azure-expressroute
66
ms.topic: concept-article
77
ms.date: 06/30/2023
88
ms.author: duau
9-
109
---
1110

1211
# Cross-network connectivity
@@ -17,7 +16,7 @@ Fabrikam Inc. acquires Contoso Ltd. Following the merger, Fabrikam wants to inte
1716

1817
![The Application scenario](./media/cross-network-connectivity/premergerscenario.png)
1918

20-
The dashed arrows in the middle of the above figure indicate the desired network interconnections. Specifically, there are three types cross connections desired:
19+
The dashed arrows in the middle of the figure above indicate the desired network interconnections. Specifically, there are three types cross connections desired:
2120

2221
1. Fabrikam and Contoso virtual network cross connect
2322
1. Cross regional on-premises and virtual network cross connects. That is, connecting Fabrikam on-premises network to Contoso virtual network and connecting Contoso on-premises network to Fabrikam virtual network.
@@ -49,7 +48,7 @@ In this article, let's go through step by step and discuss how to achieve the de
4948

5049
Virtual network peering (VNet peering) provides the most optimal and the best network performance when connecting two virtual networks. VNet peering supports peering two VNets both within the same Azure region (commonly called VNet peering) and in two different Azure regions (commonly called Global VNet peering).
5150

52-
Let's configure Global VNet peering between the VNets in Contoso and Fabrikam Azure subscriptions. For how to create the virtual network peering between two the virtual networks, see [Create a virtual network peering][Configure VNet peering] article.
51+
Let's configure Global VNet peering between the VNets in Contoso and Fabrikam Azure subscriptions. For how to create the virtual network peering between two virtual networks, see [Create a virtual network peering][Configure VNet peering] article.
5352

5453
The following picture shows the network architecture after configuring Global VNet peering.
5554

@@ -91,9 +90,8 @@ The following table shows the routes known to the Fabrikam subscription VM. Pay
9190

9291
![Fabrikam VM routes after cross connecting ExR and VNets](./media/cross-network-connectivity/fabrikamvm-routes-xconnect.png)
9392

94-
>[!NOTE]
95-
>In either the Fabrikam and/or Contoso subscriptions you can also have spoke VNets to the respective hub VNet (a hub and spoke design is not illustrated in the architecture diagrams in this article). The cross connections between the hub VNet gateways to ExpressRoute will also allow communication between East and West hubs and spokes.
96-
>
93+
> [!NOTE]
94+
> In either the Fabrikam and/or Contoso subscriptions you can also have spoke VNets to the respective hub VNet (a hub and spoke design is not illustrated in the architecture diagrams in this article). The cross connections between the hub VNet gateways to ExpressRoute will also allow communication between East and West hubs and spokes.
9795
9896
## Cross connecting on-premises networks
9997

articles/load-balancer/upgrade-basic-standard-with-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ Install-Module -Name AzureBasicLoadBalancerUpgrade -Scope CurrentUser -Repositor
117117
Validate that a Basic Load Balancer is supported for upgrade
118118
119119
```powershell
120-
Start-AzBasicLoadBalancerUpgrade -ResourceGroupName <loadBalancerRGName> -BasicLoadBalancerName <basicLBName> -validateScenarioOnly
120+
Start-AzBasicLoadBalancerUpgrade -ResourceGroupName <loadBalancerRGName> -BasicLoadBalancerName <basicLBName> -validateScenarioOnly:$true
121121
```
122122

123123
### Example: upgrade by name
@@ -315,4 +315,4 @@ If your failed migration was targeting multiple load balancers at the same time,
315315
## Next steps
316316

317317
- [If skipped, migrate from using NAT Pools to NAT Rules for Virtual Machine Scale Sets](load-balancer-nat-pool-migration.md)
318-
- [Learn about Azure Load Balancer](load-balancer-overview.md)
318+
- [Learn about Azure Load Balancer](load-balancer-overview.md)

0 commit comments

Comments
 (0)