Skip to content

Commit 6fe4817

Browse files
authored
Merge branch 'MicrosoftDocs:main' into patch-2
2 parents e9b0ce2 + 2f933e4 commit 6fe4817

File tree

70 files changed

+23112
-22511
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+23112
-22511
lines changed

.openpublishing.redirection.json

Lines changed: 22411 additions & 22406 deletions
Large diffs are not rendered by default.

articles/active-directory/roles/permissions-reference.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,7 @@ This article lists the Azure AD built-in roles you can assign to allow managemen
114114
> | [Usage Summary Reports Reader](#usage-summary-reports-reader) | Can see only tenant level aggregates in Microsoft 365 Usage Analytics and Productivity Score. | 75934031-6c7e-415a-99d7-48dbd49e875e |
115115
> | [User Administrator](#user-administrator) | Can manage all aspects of users and groups, including resetting passwords for limited admins. | fe930be7-5e62-47db-91af-98c3a49a38b1 |
116116
> | [Virtual Visits Administrator](#virtual-visits-administrator) | Manage and share Virtual Visits information and metrics from admin centers or the Virtual Visits app. | e300d9e7-4a2b-4295-9eff-f1c78b36cc98 |
117+
> | [Viva Goals Administrator](#viva-goals-administrator) | Manage and configure all aspects of Microsoft Viva Goals. | 92b086b3-e367-4ef2-b869-1de128fb986e |
117118
> | [Windows 365 Administrator](#windows-365-administrator) | Can provision and manage all aspects of Cloud PCs. | 11451d60-acb2-45eb-a7d6-43d0f0125c13 |
118119
> | [Windows Update Deployment Administrator](#windows-update-deployment-administrator) | Can create and manage all aspects of Windows Update deployments through the Windows Update for Business deployment service. | 32696413-001a-46ae-978c-ce0f6b3620d2 |
119120
> | [Yammer Administrator](#yammer-administrator) | Manage all aspects of the Yammer service. | 810a2642-a034-447f-a5e8-41beaa378541 |
@@ -2413,6 +2414,24 @@ Virtual Visits are a simple way to schedule and manage online and video appointm
24132414
> | microsoft.virtualVisits/allEntities/allProperties/allTasks | Manage and share Virtual Visits information and metrics from admin centers or the Virtual Visits app |
24142415
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
24152416
2417+
## Viva Goals Administrator
2418+
2419+
Assign the Viva Goals Administrator role to users who need to do the following tasks:
2420+
2421+
- Manage and configure all aspects of the Microsoft Viva Goals application
2422+
- Configure Microsoft Viva Goals admin settings
2423+
- Read Azure AD tenant information
2424+
- Monitor Microsoft 365 service health
2425+
- Create and manage Microsoft 365 service requests
2426+
2427+
For more information, see [Roles and permissions in Viva Goals](/viva/goals/roles-permissions-in-viva-goals) and [Introduction to Microsoft Viva Goals](/viva/goals/intro-to-ms-viva-goals).
2428+
2429+
> [!div class="mx-tableFixed"]
2430+
> | Actions | Description |
2431+
> | --- | --- |
2432+
> | microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Microsoft 365 service requests |
2433+
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
2434+
24162435
## Windows 365 Administrator
24172436

24182437
Users with this role have global permissions on Windows 365 resources, when the service is present. Additionally, this role contains the ability to manage users and devices in order to associate policy, as well as create and manage groups.

articles/aks/trusted-access-feature.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enable Azure resources to access Azure Kubernetes Service (AKS) clusters
33
description: Learn how to use the Trusted Access feature to enable Azure resources to access Azure Kubernetes Service (AKS) clusters.
44
author: schaffererin
55
ms.topic: article
6-
ms.date: 02/23/2023
6+
ms.date: 03/03/2023
77
ms.author: schaffererin
88
---
99

@@ -89,7 +89,7 @@ az aks trustedaccess rolebinding create --resource-group <AKS resource group> -
8989
az aks trustedaccess rolebinding create \
9090
-g myResourceGroup \
9191
--cluster-name myAKSCluster -n test-binding \
92-
-s /subscriptions/000-000-000-000-000/resourceGroups/myResourceGroup/providers/Microsoft.MachineLearningServices/workspaces/MyMachineLearning \
92+
--source-resource-id /subscriptions/000-000-000-000-000/resourceGroups/myResourceGroup/providers/Microsoft.MachineLearningServices/workspaces/MyMachineLearning \
9393
--roles Microsoft.Compute/virtualMachineScaleSets/test-node-reader,Microsoft.Compute/virtualMachineScaleSets/test-admin
9494
```
9595

articles/api-management/breaking-changes/api-version-retirement-sep-2023.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ After 30 September 2023, if you prefer not to update your tools, scripts, and pr
3232

3333
* **ARM, Bicep, or Terraform templates** - Update the template to use API version 2021-08-01 or later.
3434

35-
* **Azure CLI** - Run `az version -help` to check your version. If you're running version 2.38.0 or later, no action is required. Use the `az upgrade` command to upgrade the Azure CLI if necessary. For more information, see [How to update the Azure CLI](/cli/azure/update-azure-cli).
35+
* **Azure CLI** - Run `az version` to check your version. If you're running version 2.38.0 or later, no action is required. Use the `az upgrade` command to upgrade the Azure CLI if necessary. For more information, see [How to update the Azure CLI](/cli/azure/update-azure-cli).
3636

3737
* **Azure PowerShell** - Run `Get-Module -ListAvailable -Name Az` to check your version. If you're running version 8.1.0 or later, no action is required. Use `Update-Module -Name Az -Repository PSGallery` to update the module if necessary. For more information, see [Install the Azure Az PowerShell module](/powershell/azure/install-az-ps).
3838

@@ -59,4 +59,4 @@ After 30 September 2023, if you prefer not to update your tools, scripts, and pr
5959

6060
## Next steps
6161

62-
See all [upcoming breaking changes and feature retirements](overview.md).
62+
See all [upcoming breaking changes and feature retirements](overview.md).

articles/app-service/app-service-asp-net-migration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ These tools are developed to support different kinds of scenarios, focused on di
1919
## Migrate from multiple servers at-scale
2020

2121
> [!NOTE]
22-
> [Learn how to migrate .NET apps to App Service using the .NET migration tutorial.](../migrate/tutorial-migrate-webapps.md)
22+
> [Learn how to migrate .NET apps to App Service using the .NET migration tutorial.](../migrate/tutorial-modernize-asp-net-appservice-code.md)
2323
>
2424
2525
Azure Migrate recently announced at-scale, agentless discovery, and assessment of ASP.NET web apps. You can now easily discover ASP.NET web apps running on Internet Information Services (IIS) servers in a VMware environment and assess them for migration to Azure App Service. Assessments will help you determine the web app migration readiness, migration blockers, remediation guidance, recommended SKU, and hosting costs. At-scale migration resources for are found below.
2626

2727
Once you have successfully assessed readiness, you should proceed with migration of ASP.NET web apps to Azure App Services.
2828

29-
There are existing tools which enable migration of a standalone ASP.Net web app or multiple ASP.NET web apps hosted on a single IIS server as explained in [Migrate .NET apps to Azure App Service](../migrate/tutorial-migrate-webapps.md). With introduction of At-Scale or bulk migration feature integrated with Azure Migrate we are now opening up the possibilities to migrate multiple ASP.NET application hosted on multiple on-premises IIS servers.
29+
There are existing tools which enable migration of a standalone ASP.NET web app or multiple ASP.NET web apps hosted on a single IIS server as explained in [Migrate .NET apps to Azure App Service](../migrate/tutorial-modernize-asp-net-appservice-code.md). With introduction of At-Scale or bulk migration feature integrated with Azure Migrate we are now opening up the possibilities to migrate multiple ASP.NET application hosted on multiple on-premises IIS servers.
3030

3131
Azure Migrate provides at-scale, agentless discovery, and assessment of ASP.NET web apps. You can discover ASP.NET web apps running on Internet Information Services (IIS) servers in a VMware environment and assess them for migration to Azure App Service. Assessments will help you determine the web app migration readiness, migration blockers, remediation guidance, recommended SKU, and hosting costs. At-scale migration resources for are found below.
3232

@@ -50,7 +50,7 @@ Bulk migration provides the following key capabilities:
5050
| [Create an Azure App Service assessment](../migrate/how-to-create-azure-app-service-assessment.md) |
5151
| [Tutorial to assess web apps for migration to Azure App Service](../migrate/tutorial-assess-webapps.md) |
5252
| [Discover software inventory on on-premises servers with Azure Migrate](../migrate/how-to-discover-applications.md) |
53-
| [Migrate .NET apps to App Service](../migrate/tutorial-migrate-webapps.md) |
53+
| [Migrate .NET apps to App Service](../migrate/tutorial-modernize-asp-net-appservice-code.md) |
5454
| **Blog** |
5555
| [Discover and assess ASP.NET apps at-scale with Azure Migrate](https://azure.microsoft.com/blog/discover-and-assess-aspnet-apps-atscale-with-azure-migrate/) |
5656
| **FAQ** |

articles/application-gateway/application-gateway-faq.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,10 @@ sections:
186186
- question: Can Application Gateway communicate with instances outside of its virtual network or outside of its subscription?
187187
answer: |
188188
As long as you have IP connectivity, Application Gateway can communicate with instances outside of the virtual network that it's in. Application Gateway can also communicate with instances outside of the subscription it's in. If you plan to use internal IPs as backend pool members, use [virtual network peering](../virtual-network/virtual-network-peering-overview.md) or [Azure VPN Gateway](../vpn-gateway/vpn-gateway-about-vpngateways.md).
189-
189+
190+
- question: Why am I seeing 502 errors or unhealthy backend servers after I changed the DNS servers for the virtual network?
191+
answer: The instances of your application gateway use the virtual network's DNS configuration for name resolution. After changing any DNS server configuration, you need to restart (Stop and Start) the application gateway for the new DNS servers to get assigned. Until then, FQDN-based name resolutions for outbound connectivity could fail.
192+
190193
- question: Can I deploy anything else in the application gateway subnet?
191194
answer: No. But you can deploy other application gateways in the subnet.
192195

articles/application-gateway/configuration-infrastructure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: conceptual
8-
ms.date: 02/23/2023
8+
ms.date: 03/03/2023
99
ms.author: greglin
1010
---
1111

@@ -54,6 +54,9 @@ Subnet Size /24 = 256 IP addresses - 5 reserved from the platform = 251 availabl
5454
> [!TIP]
5555
> It is possible to change the subnet of an existing Application Gateway within the same virtual network. You can do this using Azure PowerShell or Azure CLI. For more information, see [Frequently asked questions about Application Gateway](application-gateway-faq.yml#can-i-change-the-virtual-network-or-subnet-for-an-existing-application-gateway)
5656
57+
### DNS Servers for name resolution
58+
The virtual network resource supports [DNS server](../virtual-network/manage-virtual-network.md#view-virtual-networks-and-settings-using-the-azure-portal) configuration, allowing you to choose between Azure-provided default or Custom DNS servers. The instances of your application gateway also honor this DNS configuration for any name resolution. Thus, after you change this setting, you must restart ([Stop](/powershell/module/az.network/Stop-AzApplicationGateway) and [Start](/powershell/module/az.network/start-azapplicationgateway)) your application gateway for these changes to take effect on the instances.
59+
5760
### Virtual network permission
5861
Since the application gateway resource is deployed inside a virtual network, we also perform a check to verify the permission on the provided virtual network resource. This validation is performed during both creation and management operations. You should check your [Azure role-based access control](../role-based-access-control/role-assignments-list-portal.md) to verify the users or service principals that operate application gateways also have at least **Microsoft.Network/virtualNetworks/subnets/join/action** permission on the Virtual Network or Subnet.
5962

articles/azure-functions/functions-hybrid-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ Hybrid connections are configured from the networking section of the function ap
104104

105105
:::image type="content" source="./media/functions-hybrid-powershell/hybrid-connection-overview.png" alt-text="Add a hybrid connection." border="true":::
106106

107-
1. Enter information about the hybrid connection as shown right after the following screenshot. You have the option of making the **Endpoint Host** setting match the host name of the on-premises server to make it easier to remember the server later when you're running remote commands. The port matches the default Windows remote management service port that was defined on the server earlier.
107+
1. Enter information about the hybrid connection as shown after the following screenshot. For **Endpoint Host**, use the host name of the on-premises server for which you created the self-signed certificate. You'll have connection issues when the certificate name and the host name of the on-premise server don't match. The port matches the default Windows remote management service port that was defined on the server earlier.
108108

109109
:::image type="content" source="./media/functions-hybrid-powershell/add-hybrid-connection.png" alt-text="Add hybrid connection." border="true":::
110110

articles/backup/disk-backup-support-matrix.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Disk Backup support matrix
33
description: Provides a summary of support settings and limitations Azure Disk Backup.
44
ms.topic: conceptual
5-
ms.date: 03/30/2022
5+
ms.date: 03/03/2023
66
ms.custom: references_regions
77
ms.service: backup
88
author: jyothisuri
@@ -19,15 +19,15 @@ Azure Disk Backup is available in all public cloud and Sovereign cloud regions.
1919

2020
## Limitations
2121

22-
- Azure Disk Backup is supported for Azure Managed Disks, including shared disks (Shared premium SSDs). Unmanaged disks aren't supported. Currently this solution doesn't support Ultra-disks, including shared ultra-disks, because of lack of snapshot capability.
22+
- Azure Disk Backup is supported for Azure Managed Disks, including shared disks (Shared premium SSDs). Unmanaged disks aren't supported. Currently, this solution doesn't support Premium SSD v2 disks and Ultra-disks, including shared disk, because of lack of snapshot capability.
2323

2424
- Azure Disk Backup supports backup of Write Accelerator disk. However, during restore the disk would be restored as a normal disk. Write Accelerated cache can be enabled on the disk after mounting it to a VM.
2525

2626
- Azure Backup provides operational (snapshot) tier backup of Azure managed disks with support for multiple backups per day. The backups aren't copied to the backup vault.
2727

2828
- Currently, the Original-Location Recovery (OLR) option to restore by replacing existing source disks from where the backups were taken isn't supported. You can restore from recovery point to create a new disk either in the same resource group as that of the source disk from where the backups were taken or in any other resource group. This is known as Alternate-Location Recovery (ALR).
2929

30-
- Azure Backup for Managed Disks uses incremental snapshots, which are limited to 200 snapshots per disk. To allow you to take on-demand backup aside from scheduled backups, Backup policy limits the total backups to 180. Learn more about [incremental snapshot](../virtual-machines/disks-incremental-snapshots.md#restrictions) for managed disks.
30+
- Azure Backup for Managed Disks uses incremental snapshots, which are limited to 500 snapshots per disk. To allow you to take on-demand backup aside from scheduled backups, Backup policy limits the total backups to 480. Learn more about [incremental snapshot](../virtual-machines/disks-incremental-snapshots.md#restrictions) for managed disks.
3131

3232
- Azure [subscription and service limits](../azure-resource-manager/management/azure-subscription-service-limits.md#virtual-machine-disk-limits) apply to the total number of disk snapshots per region per subscription.
3333

articles/cosmos-db/continuous-backup-restore-introduction.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Azure Cosmos DB's point-in-time restore feature helps to recover da
44
author: kanshiG
55
ms.service: cosmos-db
66
ms.topic: conceptual
7-
ms.date: 08/24/2022
7+
ms.date: 03/02/2023
88
ms.author: govindk
99
ms.reviewer: mjbrown
1010
ms.custom: references_regions, cosmos-db-video, ignite-2022
@@ -43,7 +43,7 @@ By default, Azure Cosmos DB stores continuous mode backup data in locally redund
4343

4444
In a steady state, all mutations performed on the source account (which includes databases, containers, and items) are backed up asynchronously within 100 seconds. If the Azure Storage backup media is down or unavailable, the mutations are persisted locally until the media is available. Then the mutations are flushed out to prevent any loss in fidelity of operations that can be restored.
4545

46-
You can choose to restore any combination of provisioned throughput containers, shared throughput database, or the entire account. The restore action restores all data and its index properties into a new account. The restore process ensures that all the data restored in an account, database, or a container is guaranteed to be consistent up to the restore time specified. The duration of restore will depend on the amount of data that needs to be restored.
46+
You can choose to restore any combination of provisioned throughput containers, shared throughput database, or the entire account. The restore action restores all data and its index properties into a new account. The restore process ensures that all the data restored in an account, database, or a container is guaranteed to be consistent up to the restore time specified. The duration of restore will depend on the amount of data that needs to be restored. The newly restored database account’s consistency setting will be same as the source database account’s consistency settings.
4747

4848
> [!NOTE]
4949
> With the continuous backup mode, the backups are taken in every region where your Azure Cosmos DB account is available. Backups taken for each region account are Locally redundant by default and Zone redundant if your account has [availability zone](/azure/architecture/reliability/architect) feature enabled for that region. The restore action always restores data into a new account.
@@ -52,13 +52,12 @@ You can choose to restore any combination of provisioned throughput containers,
5252

5353
The following configurations aren't restored after the point-in-time recovery:
5454

55-
* Firewall, VNET, Data plane RBAC or private endpoint settings.
56-
* Consistency settings. By default, the account is restored with session consistency.  
55+
* Firewall, VNET, Data plane RBAC or private endpoint settings.
5756
* Regions.
5857
* Stored procedures, triggers, UDFs.
5958
* Role-based access control assignments. These will need to be re-assigned.
6059

61-
You can add these configurations to the restored account after the restore is completed.
60+
You can add these configurations to the restored account after the restore is completed. An ability to prevent public access to restored account is described [here-to-befilled with url]().
6261

6362
## Restorable timestamp for live accounts
6463

0 commit comments

Comments
 (0)