Skip to content

Commit 71c80a2

Browse files
authored
Merge pull request #285608 from MicrosoftDocs/main
8/27/2024 AM Publish
2 parents f966e4c + 7f7be0f commit 71c80a2

32 files changed

+196
-52
lines changed

articles/azure-app-configuration/concept-feature-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 02/20/2024
1313

1414
Traditionally, shipping a new application feature requires a complete redeployment of the application itself. Testing a feature often requires multiple deployments of the application. Each deployment might change the feature or expose the feature to different customers for testing.
1515

16-
Feature management is a modern software-development practice that decouples feature release from code deployment and enables quick changes to feature availability on demand. It uses a technique called *feature flags* (also known as *feature toggles* and *feature switches*) to dynamically administer a feature's lifecycle.
16+
Feature management is a software-development practice that decouples feature release from code deployment and enables quick changes to feature availability on demand. It uses a technique called *feature flags* (also known as *feature toggles* and *feature switches*) to dynamically administer a feature's lifecycle.
1717

1818
Feature management helps developers address the following problems:
1919

articles/azure-monitor/agents/azure-monitor-agent-migration-data-collection-rule-generator.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,8 @@ To run script, copy the following command and replace the parameters with your v
7373

7474
For information on deploying the DCRs, see [Data collection rules in Azure Monitor](/azure/azure-monitor/essentials/data-collection-rule-overview) and [Create and edit data collection rules (DCRs) in Azure Monitor](/azure/azure-monitor/essentials/data-collection-rule-create-edit)
7575

76+
> [!Warning]
77+
> You shouldn’t use an existing custom log table used by MMA agents. Your MMA agents won't be able to write to the table once the first AMA agent writes to the table. You should create a new table for AMA to use to prevent MMA data loss.
7678
7779
## Next steps
7880

articles/azure-monitor/logs/manage-table-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The user can now read workspace details and run a query, but can't read data fro
9090
1. From the **Log Analytics workspaces** menu, select **Tables**.
9191
1. Select the ellipsis ( **...** ) to the right of your table and select **Access control (IAM)**.
9292

93-
:::image type="content" source="media/manage-access/table-level-access-control.png" alt-text="Screenshot that shows the Log Analytics workspace table management screen with the table-level access control button highlighted." lightbox="media/manage-access/manage-access-create-custom-role-json.png":::
93+
:::image type="content" source="media/manage-access/table-level-access-control.png" alt-text="Screenshot that shows the Log Analytics workspace table management screen with the table-level access control button highlighted." lightbox="media/manage-access/table-level-access-control.png":::
9494

9595
1. On the **Access control (IAM)** screen, select **Add** > **Add role assignment**.
9696
1. Select the **Reader** role and select **Next**.

articles/azure-netapp-files/manage-cool-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The storage with cool access feature provides options for the “coolness period
2828
* You can't use [large volume](large-volumes-requirements-considerations.md) with cool access.
2929
* See [Resource limits for Azure NetApp Files](azure-netapp-files-resource-limits.md#resource-limits) for maximum number of volumes supported for cool access per subscription per region.
3030
* Considerations for using cool access with [cross-region replication](cross-region-replication-requirements-considerations.md) and [cross-zone replication](cross-zone-replication-introduction.md):
31-
* The cool access setting on the destination is updated automatically to match the source volume whenever the setting is changed on the source volume or during authorizing or performing a reverse resync of the replication. Changes to the cool access setting on the destination volume don't affect the setting on the source volume.
31+
* The cool access setting on the destination volume is updated automatically to match the source volume whenever the setting is changed on the source volume or during authorizing or performing a reverse resync of the replication only if the destination volume is in a cool access-enabled capacity pool. Changes to the cool access setting on the destination volume don't affect the setting on the source volume.
3232
* In cross-region or cross-zone replication configuration, you can enable cool access exclusively for destination volumes to enhance data protection and create cost savings without affecting latency in source volumes.
3333
* Considerations for using cool access with [snapshot restore](snapshots-restore-new-volume.md):
3434
* When restoring a snapshot of a cool access enabled volume to a new volume, the new volume inherits the cool access configuration from the parent volume. Once the new volume is created, the cool access settings can be modified.

articles/azure-signalr/concept-connection-string.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article gives an overview of connection strings in Azure Signa
44
author: chenkennt
55
ms.service: azure-signalr-service
66
ms.topic: conceptual
7-
ms.date: 03/29/2023
7+
ms.date: 08/09/2024
88
ms.author: kenchen
99
---
1010

articles/azure-web-pubsub/howto-disable-local-auth.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,26 +4,32 @@ description: This article provides information about how to disable access key a
44
author: terencefan
55

66
ms.author: tefa
7-
ms.date: 03/31/2023
7+
ms.date: 08/09/2024
88
ms.service: azure-web-pubsub
99
ms.custom: devx-track-arm-template
1010
ms.topic: conceptual
1111
---
1212

1313
# Disable local (access key) authentication with Azure Web PubSub Service
1414

15-
There are two ways to authenticate to Azure Web PubSub Service resources: Microsoft Entra ID and Access Key. Microsoft Entra ID provides superior security and ease of use over access key. With Microsoft Entra ID, there’s no need to store the tokens in your code and risk potential security vulnerabilities. We recommend that you use Microsoft Entra ID with your Azure Web PubSub Service resources when possible.
15+
There are two ways to authenticate to Azure Web PubSub Service resources:
16+
17+
1. Microsoft Entra ID
18+
19+
2. Access Keys
20+
21+
**Recommendation:** Microsoft Entra ID provides superior security and ease of use over access keys. With Microsoft Entra ID, there’s no need to store the tokens in your code and risk potential security vulnerabilities. We recommend that you use Microsoft Entra ID with your Azure Web PubSub Service resources when possible.
1622

1723
> [!IMPORTANT]
18-
> Disabling local authentication can have following influences.
24+
> Disabling local authentication has the following effects:
1925
>
20-
> - The current set of access keys will be permanently deleted.
26+
> - Access keys' current set is permanently deleted.
2127
> - Tokens signed with current set of access keys will become unavailable.
22-
> - Signature will **NOT** be attached in the upstream request header. Please visit _[how to validate access token](./howto-use-managed-identity.md#validate-access-tokens)_ to learn how to validate requests via Microsoft Entra token.
28+
> - The signature will **NOT** be attached in the upstream request header. Please visit _[how to validate access token](./howto-use-managed-identity.md#validate-access-tokens)_ to learn how to validate requests via Microsoft Entra token.
2329
2430
## Use Azure portal
2531

26-
In this section, you will learn how to use the Azure portal to disable local authentication.
32+
In this section, you learn how to use the Azure portal to disable local authentication.
2733

2834
1. Navigate to your Web PubSub Service resource in the [Azure portal](https://portal.azure.com).
2935

@@ -89,7 +95,7 @@ You can disable local authentication by setting `disableLocalAuth` property to t
8995

9096
## Use Azure Policy
9197

92-
You can assign the [Azure Web PubSub Service should have local authentication methods disabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fb66ab71c-582d-4330-adfd-ac162e78691e) Azure policy to an Azure subscription or a resource group to enforce disabling of local authentication for all Web PubSub resources in the subscription or the resource group.
98+
You can assign the [Azure Web PubSub Service should have local authentication methods disabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fb66ab71c-582d-4330-adfd-ac162e78691e) Azure policy to an Azure subscription or a resource group. Doing so enforces disabling of local authentication for all Web PubSub resources in the subscription or the resource group.
9399

94100
![Screenshot of disabling local auth policy.](./media/howto-disable-local-auth/disable-local-auth-policy.png)
95101

articles/cost-management-billing/manage/change-azure-account-profile.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
author: bandersmsft
77
ms.author: banders
88
ms.reviewer: judupont
9-
ms.date: 08/19/2024
9+
ms.date: 08/27/2024
1010
ms.service: cost-management-billing
1111
ms.subservice: billing
1212
ms.topic: how-to
@@ -91,7 +91,7 @@ procedureSection:
9191
- title: |
9292
Add a PO number
9393
summary: |
94-
By default, invoices for the billing profile don't have an associated PO number. After you add a PO number for a billing profile, the system regenerates the invoices within 24 hours. Afterward, the PO number appears on invoices for the billing profile.
94+
By default, invoices for the billing profile don't have an associated PO number. After you add a PO number for a billing profile, the system uses the updated PO number in the next invoice. Afterward, the PO number appears in invoices for the billing profile.
9595
9696
To add a PO number for a billing profile, use the following steps.
9797
steps:

articles/ddos-protection/ddos-protection-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure DDoS Protection monitors actual traffic utilization and constantly compare
2121
During mitigation, traffic sent to the protected resource is redirected by the DDoS protection service and several checks are performed, such as:
2222

2323
- Ensure packets conform to internet specifications and aren't malformed.
24-
- Interact with the client to determine if the traffic is potentially a spoofed packet (e.g: SYN Auth or SYN Cookie or by dropping a packet for the source to retransmit it).
24+
- Interact with the client to determine if the traffic is potentially a spoofed packet (for example: SYN Auth or SYN Cookie or by dropping a packet for the source to retransmit it).
2525
- Rate-limit packets, if no other enforcement method can be performed.
2626

2727
Azure DDoS Protection drops attack traffic and forwards the remaining traffic to its intended destination. Within a few minutes of attack detection, you're notified using Azure Monitor metrics. By configuring logging on DDoS Protection telemetry, you can write the logs to available options for future analysis. Metric data in Azure Monitor for DDoS Protection is retained for 30 days.

articles/expressroute/expressroute-howto-circuit-portal-resource-manager.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -166,11 +166,12 @@ You can do the following tasks with no downtime:
166166
> [!IMPORTANT]
167167
> Changing the SKU from **Standard/Premium** to **Local** is not supported in Azure portal. To downgrade the SKU to **Local**, you can use [Azure PowerShell](expressroute-howto-circuit-arm.md) or [Azure CLI](howto-circuit-cli.md).
168168
169-
* Increase the bandwidth of your ExpressRoute circuit, provided there's capacity available on the port.
169+
* Increase the bandwidth of your ExpressRoute circuit, provided there's capacity available on the port.
170170

171171
> [!IMPORTANT]
172172
> * Downgrading the bandwidth of a circuit is not supported.
173-
> * To determine if there is available capacity for a bandwidth upgrade, submit a support request.
173+
> * When upgrading the bandwidth of an ExpressRoute circuit, the Azure portal provides a list of available bandwidth options based on the capacity of the port. If the desired bandwidth isn't available, you need to recreate the circuit to get the desired bandwidth.
174+
> :::image type="content" source="./media/expressroute-howto-circuit-portal-resource-manager/circuit-bandwidth-upgrade.png" alt-text="Screenshot of the bandwidth upgrade available for an ExpressRoute circuit.":::
174175
175176
* Change the metering plan from *Metered Data* to *Unlimited Data*.
176177

articles/expressroute/maintenance-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ ExpressRoute uses Azure Service Health to notify you of planned and upcoming Exp
4141

4242
:::image type="content" source="./media/maintenance-alerts/health-history.png" alt-text="Screenshot of selecting Health history in Service Health." lightbox="./media/maintenance-alerts/health-history-expanded.png":::
4343

44-
1. On this page, you can review individual maintenance events by filtering on a target subscription and Azure Region. To further narrow the scope of health history events, you can select the health event type and define a past time range. To filer for planned ExpressRoute circuit maintenance, set the Health Event Type to **Planned Maintenance**.
44+
1. On this page, you can review individual maintenance events by filtering on a target subscription and Azure Region. To further narrow the scope of health history events, you can select the health event type and define a past time range. To filter for planned ExpressRoute circuit maintenance, set the Health Event Type to **Planned Maintenance**.
4545

4646
:::image type="content" source="./media/maintenance-alerts/past-maintenance.png" alt-text="Screenshot of past maintenance on Health history page." lightbox="./media/maintenance-alerts/past-maintenance-expanded.png":::
4747

0 commit comments

Comments
 (0)