Skip to content

Commit 72e10f7

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into azure-operator-service-manager-best-practices
2 parents 6944b2b + 334aead commit 72e10f7

File tree

440 files changed

+2043
-1002
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

440 files changed

+2043
-1002
lines changed

articles/app-service/app-service-configure-premium-v4-tier.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure Premium V4 tier
33
description: Learn how to better performance for your web, mobile, and API app in Azure App Service by scaling to the new Premium V4 pricing tier.
44
keywords: app service, azure app service, scale, scalable, app service plan, app service cost
55
ms.topic: article
6-
ms.date: 06/18/2025
6+
ms.date: 07/17/2025
77
ms.author: msangapu
88
author: msangapu-msft
99
ms.custom:
@@ -102,9 +102,11 @@ Premium V4 is available in the following regions:
102102
- East US
103103
- East US 2
104104
- France Central
105+
- Japan East
105106
- North Central US
106107
- North Europe
107108
- Norway East
109+
- Poland Central
108110
- Southeast Asia
109111
- Sweden Central
110112
- Switzerland North

articles/application-gateway/application-gateway-tls-version-retirement.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: jaesoni
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
8-
ms.date: 05/15/2025
8+
ms.date: 07/18/2025
99
ms.author: mbender
1010
ms.custom:
1111
- build-2025
@@ -84,7 +84,26 @@ You don't need to configure anything on your Application Gateway for the backend
8484
* For V2 SKUs: the connections to backend servers will always be with preferred TLS v1.3 and minimum up to TLS v1.2
8585
* For V1 SKUs: the connections to backend servers will always be with TLS v1.2
8686

87-
You must ensure that your servers in the backend pools are compatible with these updated protocol versions. This compatibility avoids any disruptions when establishing a TLS/HTTPS connection with those backend servers.
87+
You must ensure that your servers in the backend pools are compatible with these updated protocol versions. This compatibility avoids any disruptions when establishing an TLS/HTTPS connection with those backend servers.
88+
89+
## Identification methods
90+
91+
### Metrics
92+
To determine whether clients connecting to your Application Gateway resource are utilizing TLS 1.0 or 1.1, use the `Client TLS protocol` metric provided by Application Gateway. For more information, see the [metrics documentation](monitor-application-gateway-reference.md#metrics). You can view it from the Portal by following these steps.
93+
94+
1. Go to the Application Gateway resource in the Azure portal.
95+
2. In the left menu pane, open the "Metrics" blade in Monitoring section.
96+
3. Select metric as `Client TLS protocol` from the dropdown.
97+
4. To view granular protocol version information, select "Apply splitting" and choose "TLS protocol".
98+
99+
[![A diagram showing metrics page with TLS version split for application gateway traffic.](media/application-gateway-tls-version-retirement/metric-tls-version.png)](media/application-gateway-tls-version-retirement/metric-tls-version.png#lightbox)
100+
101+
### Logs
102+
You can also check the [Application Gateway Access logs](monitor-application-gateway-reference.md#access-log-category) to view this information in log format.
103+
104+
### Error information
105+
Once support for TLS versions 1.0 and 1.1 is discontinued, clients may encounter errors such as `curl: (35) error:0A000410:SSL routines::sslv3 alert handshake failure`. Depending on the browser being used, various messages indicating TLS handshake failures may be displayed.
106+
88107

89108
## Next steps
90109

articles/application-gateway/for-containers/faq.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,9 @@ sections:
3030
- question: Does Application Gateway for Containers support Kubenet?
3131
answer: No, Application Gateway for Containers doesn't support Kubenet in favor of [CNI Overlay](/azure/aks/azure-cni-overlay). [Learn more](/azure/aks/upgrade-aks-ipam-and-dataplane) about migrating from Kubenet to CNI Overlay.
3232

33+
- question: Why does the frontend resolve to an IP address with an ASN location outside the region Application Gateway for Containers is deployed to?
34+
answer: Application Gateway for Containers frontends resolve to any anycast IP address. Anycast IP addresses are advertised globally, which may lead to the ASN location being different from Application Gateway for Containers. The resolved location of the IP address is cosmetic and has no bearing on availability or performance in how clients connect.
35+
3336
- name: Performance
3437
questions:
3538
- question: How does Application Gateway for Containers support high availability and scalability?
@@ -67,4 +70,4 @@ sections:
6770
answer: No. Each ALB controller must use its own unique managed identity.
6871

6972
- question: Can I share the same frontend resource between multiple Gateway and/or Ingress resources in Kubernetes?
70-
answer: No. A frontend should be unique to a single Ingress or Gateway resource. Multiple hostnames and routes can be defined in a given Gateway or Ingress resource to eliminate the need for numerous frontend resources.
73+
answer: No. A frontend should be unique to a single Ingress or Gateway resource. Multiple hostnames and routes can be defined in a given Gateway or Ingress resource to eliminate the need for numerous frontend resources.
137 KB
Loading

articles/azure-app-configuration/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -81,12 +81,16 @@
8181
href: quickstart-go-console-app.md
8282
- name: Dynamic configuration
8383
href: enable-dynamic-configuration-go-console-app.md
84+
- name: Feature management
85+
href: quickstart-feature-flag-go-console.md
8486
- name: Go Gin
8587
items:
8688
- name: Configuration
8789
href: quickstart-go-web-app.md
8890
- name: Dynamic configuration
8991
href: enable-dynamic-configuration-gin-web-app.md
92+
- name: Feature management
93+
href: quickstart-feature-flag-go-gin.md
9094
- name: Azure Functions
9195
items:
9296
- name: Configuration
@@ -431,6 +435,10 @@
431435
items:
432436
- name: Feature reference
433437
href: ./feature-management-javascript-reference.md
438+
- name: Go
439+
items:
440+
- name: Feature reference
441+
href: https://pkg.go.dev/github.com/microsoft/Featuremanagement-Go/featuremanagement
434442
- name: Telemetry
435443
items:
436444
- name: Feature flag telemetry reference

articles/azure-app-configuration/concept-private-endpoint.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,12 @@ Service account owners can manage consent requests and private endpoints through
4343

4444
When creating a private endpoint, you must specify the App Configuration store to which it connects. If you enable the geo-replication for an App Configuration store, you can connect to all replicas of the store using the same private endpoint. If you have multiple App Configuration stores, you need a separate private endpoint for each store.
4545

46+
### Considerations for geo-replicated App Configuration stores
47+
48+
When geo-replication is enabled for your App Configuration store, you can use a single private endpoint to connect to all replicas. However, since private endpoints are regional resources, this approach may not ensure connectivity in the event of a regional outage.
49+
50+
For enhanced resilience, consider creating private endpoints for each replica of your geo-replicated store, in addition to a private endpoint for the origin store. This ensures that if one region becomes unavailable, clients can access the store through private endpoints provisioned in the same region as a replica. Ensure the relevant [DNS changes](#dns-changes-for-private-endpoints) are made so the endpoint for each replica resolves to the relevant IP address for the private endpoint in the respective replica's region.
51+
4652
### Connecting to private endpoints
4753

4854
Azure relies upon DNS resolution to route connections from the VNet to the configuration store over a private link. You can quickly find connections strings in the Azure portal by selecting your App Configuration store, then selecting **Settings** > **Access Keys**.

articles/azure-app-configuration/index.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,10 @@ landingContent:
151151
url: quickstart-feature-flag-python.md
152152
- text: Node.js app
153153
url: quickstart-feature-flag-javascript.md
154+
- text: Go console app
155+
url: quickstart-feature-flag-go-console.md
156+
- text: Go Gin web app
157+
url: quickstart-feature-flag-go-gin.md
154158
- linkListType: tutorial
155159
links:
156160
- text: Enable conditional features with feature filters
@@ -179,6 +183,8 @@ landingContent:
179183
url: https://microsoft.github.io/FeatureManagement-Python/html/index.html
180184
- text: JavaScript feature management
181185
url: feature-management-javascript-reference.md
186+
- text: Go feature management
187+
url: https://pkg.go.dev/github.com/microsoft/Featuremanagement-Go/featuremanagement
182188

183189
- title: Client libraries and tools
184190
linkLists:
30 KB
Loading
27.4 KB
Loading
25.2 KB
Loading

0 commit comments

Comments
 (0)