Skip to content

Commit 75394e4

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into redis12
2 parents 39ffaa4 + f6b72c0 commit 75394e4

19 files changed

+150
-32
lines changed
14.6 KB
Loading

articles/active-directory-b2c/troubleshoot-with-application-insights.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ To create an instance of Application Insights in your subscription, follow these
6161
1. Complete the form, select **Review + create**, and then select **Create**.
6262
1. Once the deployment completes, select **Go to resource**.
6363
1. Under **Configure** in Application Insights menu, select **Properties**.
64-
1. Record the **CONNECTION STRING** for use in a later step.
64+
1. Record the **Connection String** for use in a later step.
6565

6666
## Configure the custom policy
6767

@@ -77,7 +77,7 @@ To create an instance of Application Insights in your subscription, follow these
7777
1. Add the following node as a child of the `<UserJourneyBehaviors>` element. Make sure to replace `{Your Application Insights Key}` with the Application Insights **Connection String** that you recorded earlier.
7878

7979
```xml
80-
<JourneyInsights TelemetryEngine="ApplicationInsights" ConnectionString="{Your Application Insights Connection String}" DeveloperMode="true" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
80+
<JourneyInsights TelemetryEngine="ApplicationInsights" ConnectionString="{Your Application Insights ConnectionString}" DeveloperMode="true" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
8181
```
8282

8383
* `DeveloperMode="true"` tells ApplicationInsights to expedite the telemetry through the processing pipeline. Good for development, but constrained at high volumes. In production, set the `DeveloperMode` to `false`.
@@ -102,7 +102,7 @@ To create an instance of Application Insights in your subscription, follow these
102102
<Endpoint Id="Token" UserJourneyReferenceId="RedeemRefreshToken" />
103103
</Endpoints>
104104
<UserJourneyBehaviors>
105-
<JourneyInsights TelemetryEngine="ApplicationInsights" ConnectionString="{Your Application Insights Connection String}" DeveloperMode="true" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
105+
<JourneyInsights TelemetryEngine="ApplicationInsights" ConnectionString="{Your Application Insights ConnectionString}" DeveloperMode="true" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
106106
</UserJourneyBehaviors>
107107
...
108108
</TrustFrameworkPolicy>
@@ -144,7 +144,7 @@ We recommend you to install the [Azure AD B2C extension](https://marketplace.vis
144144
After you set up the Application Insights, and configure the custom policy, you need to get your Application Insights **API ID**, and create **API Key**. Both the API ID and API key are used by Azure AD B2C extension to read the Application Insights events (telemetries). Your API keys should be managed like passwords. Keep it secret.
145145

146146
> [!NOTE]
147-
> Application Insights connection string that your create earlier is used by Azure AD B2C to send telemetries to Application Insights. You use the connection string only in your Azure AD B2C policy, not in the VS Code extension.
147+
> Application Insights Connection String that your create earlier is used by Azure AD B2C to send telemetries to Application Insights. You use the Connection String only in your Azure AD B2C policy, not in the VS Code extension.
148148

149149
To get Application Insights ID and key:
150150

@@ -195,7 +195,7 @@ To improve your production environment performance and better user experience, i
195195

196196
```xml
197197
<UserJourneyBehaviors>
198-
<JourneyInsights TelemetryEngine="ApplicationInsights" ConnectionString="{Your Application Insights Connection String}" DeveloperMode="false" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
198+
<JourneyInsights TelemetryEngine="ApplicationInsights" ConnectionString="{Your Application Insights ConnectionString}" DeveloperMode="false" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
199199
</UserJourneyBehaviors>
200200
```
201201

articles/api-center/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,8 @@
5050
href: design-api-github-copilot-azure.md
5151
- name: Register APIs - GitHub Actions
5252
href: register-apis-github-actions.md
53+
- name: Register and discover MCP servers
54+
href: register-discover-mcp-server.md
5355
- name: Export API from API Center to Copilot Studio
5456
href: export-to-copilot-studio.yml
5557
- name: API governance
56.8 KB
Loading
93.7 KB
Loading
176 KB
Loading
Lines changed: 102 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,102 @@
1+
---
2+
title: Inventory and Discover MCP Servers in Your API Center
3+
description: Learn about how Azure API Center can be a centralized registry for MCP servers in your organization. Developers and other stakeholders can use the API Center portal to discover MCP servers.
4+
author: dlepow
5+
ms.service: azure-api-center
6+
ms.custom:
7+
ms.topic: concept-article
8+
ms.date: 04/28/2025
9+
ms.author: danlep
10+
# Customer intent: As an API program manager, I want to register and discover MCP servers as APIs in my API Center inventory.
11+
---
12+
13+
# Register and discover remote MCP servers in your API inventory
14+
15+
This article describes how to use Azure API Center to maintain an inventory (or *registry*) of remote model context protocol (MCP) servers and help stakeholders discover them using the API Center portal. MCP servers expose backend APIs or data sources in a standard way to AI agents and models that consume them.
16+
17+
## About MCP servers
18+
19+
AI agents are becoming widely adopted because of enhanced large language model (LLM) capabilities. However, even the most advanced models face limitations because of their isolation from external data. Each new data source potentially requires custom implementations to extract, prepare, and make data accessible for the models.
20+
21+
The [model context protocol](https://www.anthropic.com/news/model-context-protocol) (MCP) helps solve this problem. MCP is an open standard for connecting AI models and agents with external data sources such as local data sources (databases or computer files) or remote services (systems available over the internet, such as remote databases or APIs).
22+
23+
### MCP architecture
24+
25+
The following diagram illustrates the MCP architecture:
26+
27+
:::image type="content" source="media/register-discover-mcp-server/mcp-architecture.png" alt-text="Diagram of model context protocol (MCP) architecture.":::
28+
29+
The architecture consists of the following components:
30+
31+
| Component | Description |
32+
|----------------|-------------------------------------------------------------------------------------------------|
33+
| **MCP hosts** | LLM applications such as chat apps or AI assistants in your IDEs (like GitHub Copilot in Visual Studio Code) that need to access external capabilities |
34+
| **MCP clients**| Protocol clients, inside the host application, that maintain 1:1 connections with servers |
35+
| **MCP servers**| Lightweight programs that each expose specific capabilities and provide context, tools, and prompts to clients |
36+
| **MCP protocol**| Transport layer in the middle |
37+
38+
MCP follows a client-server architecture where a host application can connect to multiple servers. Whenever your MCP host or client needs a tool, it connects to the MCP server. The MCP server then connects to, for example, a database or an API. MCP hosts and servers connect with each other through the MCP protocol.
39+
40+
### Remote versus local MCP servers
41+
42+
MCP utilizes a client-host-server architecture built on [JSON-RPC 2.0 for messaging](https://modelcontextprotocol.io/docs/concepts/architecture). Communication between clients and servers occurs over defined transport layers, and supports primarily two modes of operation:
43+
44+
* **Remote MCP servers** - MCP clients connect to MCP servers over the internet, establishing a connection using HTTP and server-sent events (SSE), and authorizing the MCP client access to resources on the user's account using OAuth.
45+
46+
* **Local MCP servers** MCP clients connect to MCP servers on the same machine, using standard input/output as a local transport method.
47+
48+
## MCP servers in your API inventory
49+
50+
The following sections describe how to inventory and discover a remote MCP server in your API Center.
51+
52+
### MCP API type
53+
54+
To register an MCP server in your API center inventory, specify the API type as **MCP**. To register an API using the Azure portal, see [Tutorial: Register APIs in your API inventory](register-apis.md).
55+
56+
As described in the following sections, when you register an MCP server, you can specify an environment, deployment, and definition.
57+
58+
59+
### Environment and deployment for MCP server
60+
61+
In API Center, specify an *environment* and a *deployment* for your MCP server. The environment is the location of the MCP server, such as an API management platform or a compute service, and the deployment is a runtime URL for the MCP service.
62+
63+
For information about creating an environment and a deployment, see [Tutorial: Add environments and deployments for APIs](configure-environments-deployments.md).
64+
65+
### Definition for remote MCP server
66+
67+
Optionally, add an API definition for a remote MCP server in OpenAPI 3.0 format. The API definition must include a URL endpoint for the MCP server. For an example of adding an OpenAPI definition, see [Tutorial: Register APIs in your API inventory](register-apis.md#add-a-definition-to-your-version).
68+
69+
70+
You can use the following lightweight OpenAPI 3.0 API definition for your MCP server, which includes a `url` endpoint for the MCP server:
71+
72+
73+
```json
74+
{
75+
"openapi": "3.0.0",
76+
"info": {
77+
"title": "Demo MCP server",
78+
"description": "Very basic MCP server that exposes mock tools and prompts.",
79+
"version": "1.0"
80+
},
81+
"servers": [
82+
{
83+
"url": "https://my-mcp-server.contoso.com"
84+
}
85+
]
86+
}
87+
```
88+
89+
### Discover MCP servers using API Center portal
90+
91+
Set up the [API Center portal](set-up-api-center-portal.md) so that developers and other stakeholders in your organization can discover MCP servers in your API inventory. Users can browse and filter MCP servers in the inventory and view details such as the URL endpoint of the MCP server, if available in the MCP server's API definition.
92+
93+
:::image type="content" source="media/register-discover-mcp-server/mcp-server-portal-small.png" lightbox="media/register-discover-mcp-server/mcp-server-portal.png" alt-text="Screenshot of MCP server in API Center portal.":::
94+
95+
> [!NOTE]
96+
> The URL endpoint for the MCP server is only visible in the API Center portal if you add an MCP deployment and an API definition for the MCP server.
97+
98+
## Related content
99+
100+
* [Import APIs to your API center from API Management](import-api-management-apis.md)
101+
* [Use the Visual Studio extension for API Center](build-register-apis-vscode-extension.md) to build and register APIs from Visual Studio Code.
102+

articles/azure-vmware/azure-vmware-solution-known-issues.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ Refer to the table to find details about resolution dates or possible workaround
1515

1616
|Issue | Date discovered | Workaround | Date resolved |
1717
| :------------------------------------- | :------------ | :------------- | :------------- |
18-
| If you're a user of AV64, you may notice a “Status of other hardware objects” alarm on your hosts in vCenter Server. This alarm doesn't indicate a hardware issue. It's triggered when the System Event Log (SEL) reaches its capacity threshold according to vCenter Server. Despite the alarm, the host remains healthy with no hardware-related error signatures detected, and no high availability (HA) events are expected as a result. It's safe to continue operating your private cloud without interruption. The alarm has only two possible states—green and red—with no intermediate warning state. Once the status changes to red, it will remain red even if conditions improve to what would typically qualify as a warning. | April 2025 | This alarm should be treated as a warning and won't affect operability of your private cloud. Microsoft will adjust thresholds for the alarm so it doesn't alert in vCenter Server. | May 2025 |
18+
|[VMSA-2025-0005](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.broadcom.com%2Fweb%2Fecx%2Fsupport-content-notification%2F-%2Fexternal%2Fcontent%2FSecurityAdvisories%2F0%2F25518&data=05%7C02%7Cjacobjaygbay%40microsoft.com%7C63a10c374bad4e1e21ca08dd88002ad4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638816256483262655%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=U4GruR4roReR8NNKCd8vT%2BqP5117ROHVHU9hikBWH8w%3D&reserved=0) VMware Tools for Windows update addresses an authentication bypass vulnerability (CVE-2025-22230). | April 2025 |To remediate CVE-2025-22230, apply version 12.5.1 of VMware Tools, use the RUN Command ``Set-Tools-Repo.`` | May 2025 |
19+
| If you're a user of AV64, you may notice a “Status of other hardware objects” alarm on your hosts in vCenter Server. This alarm doesn't indicate a hardware issue. It's triggered when the System Event Log (SEL) reaches its capacity threshold according to vCenter Server. Despite the alarm, the host remains healthy with no hardware-related error signatures detected, and no high availability (HA) events are expected as a result. It's safe to continue operating your private cloud without interruption. The alarm has only two possible states—green and red—with no intermediate warning state. Once the status changes to red, it will remain red even if conditions improve to what would typically qualify as a warning. | April 2025 | This alarm should be treated as a warning and won't affect operability of your private cloud. Microsoft adjusts thresholds for the alarm, so it doesn't alert in vCenter Server. | May 2025 |
1920
| After deploying an AV48 private cloud, you may see a High pNIC error rate detected. Check the host's vSAN performance view for details if alert is active in the vSphere Client. | April 2025 | The alert should be considered an informational message, since Microsoft manages the service. Select the **Reset to Green** link to clear it. | April 2025 |
2021
| [VMSA-2025-0004](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390) VMCI Heap-overflow, ESXi arbitrary write, and Information disclosure vulnerabilities | March 2025 | Microsoft has verified the applicability of the vulnerabilities within the Azure VMware Solution service and have adjudicated the vulnerabilities at a combined adjusted Environmental Score of [9.4](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/MAC:L/MPR:N/MUI:N/MS:C/MC:H/MI:H/MA:H). Customers are advised to take additional precautions when granting administrative access to, and monitor any administrative activities on, guest VMs until the update is fully addressed. For additional information on the vulnerability and Microsoft’s involvement, please see [this blog post](https://techcommunity.microsoft.com/blog/azuremigrationblog/azure-vmware-solution-broadcom-vmsa-2025-0004-remediation/4388074). (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) | March 2025 - Resolved in [ESXi 8.0_U2d](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html) |
2122
|Issue 3464419: After upgrading HCX 4.10.2 users are unable to log in or perform various management operations. | 2024 | None | December 2024- Resolved in [HCX 4.10.3](https://techdocs.broadcom.com/us/en/vmware-cis/hcx/vmware-hcx/4-10/hcx-4-10-release-notes/vmware-hcx-4103-release-notes.html#GUID-ca55e2de-cd98-494d-b026-201132967232-en_id-6fc83b19-af5d-4a89-a258-3ce63559ffb8) |

articles/backup/azure-file-share-support-matrix.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Support Matrix for Azure files backup by using Azure Backup
33
description: Provides a summary of support settings and limitations when backing up Azure files.
44
ms.topic: reference
5-
ms.date: 03/24/2025
5+
ms.date: 04/30/2025
66
ms.custom: references_regions, engagement-fy24
77
ms.service: azure-backup
88
author: jyothisuri
@@ -140,7 +140,7 @@ Migration of File Shares protected with snapshot backup to vaulted backup is su
140140
| Maximum size of a file (if the destination account is in a Vnet) | 1 TB |
141141
| Maximum number of individual files or folders per restore, if ILR (Item level recovery) | 99 |
142142
| Maximum recommended restore size per restore for large File Shares | 15 TiB |
143-
| Maximum duration of a restore job | 15 days
143+
| Maximum duration of a restore job | 7 days
144144

145145
# [Vault-standard tier](#tab/vault-tier)
146146

@@ -217,6 +217,18 @@ The following table lists the behavior of backups due to customer-initiated fail
217217
| Customer-managed planned failover | Supported | Supported | Not supported |
218218
| Customer-managed unplanned failover | Not supported | Only cross-region restore from the vault is supported. | Not supported |
219219

220+
## Permitted scope for copy operations(preview)
221+
222+
The following table lists the scope for copy operation:
223+
224+
| Configuration | Support |
225+
| --- | --- |
226+
| From any storage account | Supported |
227+
| From storage accounts in the same Microsoft Entra tenant | Supported |
228+
| From storage accounts with a private endpoint to the same virtual network | Unsupported |
229+
230+
Azure Trusted Services are allowed, but private endpoints take priority; so, this won't work.
231+
220232

221233
## Next steps
222234

articles/backup/backup-azure-files.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Back up Azure Files in the Azure portal
33
description: Learn how to use the Azure portal to back up Azure Files in the Recovery Services vault
44
ms.topic: how-to
5-
ms.date: 03/11/2025
5+
ms.date: 04/30/2025
66
ms.service: azure-backup
77
ms.custom: engagement-fy23
88
author: jyothisuri
@@ -28,6 +28,7 @@ Azure Files backup is a native cloud solution that protects your data and elimin
2828
* [Create a backup policy for protection of Azure Files](quick-backup-azure-files-vault-tier-portal.md).
2929
* If the storage account access has restrictions, check the firewall settings of the account to ensure the exception **Allow Azure services on the trusted services list to access this storage account** is in grant state. You can refer to [this](../storage/common/storage-network-security.md?tabs=azure-portal#manage-exceptions) link for the steps to grant an exception.
3030
* Ensure that you allow the **Storage account key access** in the required storage account.
31+
* Ensure that the target storage account has the [supported configurations](azure-file-share-support-matrix.md#permitted-scope-for-copy-operationspreview).
3132

3233
>[!IMPORTANT]
3334
>To perform [Cross Subscription Backup (CSB) for protecting Azure Files (preview)](azure-file-share-backup-overview.md#how-cross-subscription-backup-for-azure-files-works) in another subscription, ensure you register `Microsoft.RecoveryServices` in the **subscription of the file share** in addition to the given prerequisites.

0 commit comments

Comments
 (0)