Skip to content

Commit 78d3a9c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ps-req
2 parents ff966e3 + dff5bd4 commit 78d3a9c

File tree

8 files changed

+22
-7
lines changed

8 files changed

+22
-7
lines changed

.github/policies/disallow-edits.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,3 +86,4 @@ configuration:
8686
reply: >-
8787
@${issueAuthor} - You tried to add content to a folder path that has been removed from this repository. Your pull request will be automatically closed. Submit your changes to the updated repository, which can be identified by clicking the Edit this Document link at the top of any published article for that product or service.
8888
- closePullRequest
89+

articles/azure-cache-for-redis/cache-how-to-scale.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -369,7 +369,9 @@ Scaling time depends on a few factors. Here are some factors that can affect how
369369
- High write requests: Higher number of writes mean more data replicates across nodes or shards
370370
- High server load: Higher server load means the Redis server is busy and limited CPU cycles are available to complete data redistribution
371371

372-
Generally, when you scale a cache with no data, it takes approximately 20 minutes. For clustered caches, scaling takes approximately 20 minutes per shard with minimal data.
372+
Scaling a cache is non-trivial action and can take a long time.
373+
374+
Based on real world examples, the time to scale cache with one to two shards can be 1 to 2 hours when the cache is not under heavy loads.If you have more shards, the time to scale doesn't increase in a linear way.
373375

374376
### How can I tell when scaling is complete?
375377

articles/expressroute/about-fastpath.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ FastPath Private endpoint/Private Link connectivity is supported for the followi
8989
> * FastPath supports a max of 100Gbps connectivity to a single Availability Zone.
9090
9191
> [!IMPORTANT]
92-
> For more information about supported scenarios and to enroll in the limited GA offering, complete this [Microsoft Form](https://aka.ms/FastPathLimitedGA). Once Microsoft has reached out to you, [enable Private Link over FastPath](expressroute-howto-linkvnet-arm.md#fastpath-virtual-network-peering-user-defined-routes-udrs-and-private-link-support-for-expressroute-direct-connections) by running the commands in Step 2.
92+
> For more information about supported scenarios and to enroll in the limited GA offering, complete this [Microsoft Form](https://aka.ms/FPlimitedga). Once Microsoft has reached out to you, [enable Private Link over FastPath](expressroute-howto-linkvnet-arm.md#fastpath-virtual-network-peering-user-defined-routes-udrs-and-private-link-support-for-expressroute-direct-connections) by running the commands in Step 2.
9393
9494
## Next steps
9595

articles/expressroute/expressroute-howto-linkvnet-arm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ With Virtual Network Peering and UDR support, FastPath will send traffic directl
255255
With FastPath and Private Link, Private Link traffic sent over ExpressRoute bypasses the ExpressRoute virtual network gateway in the data path. With both of these features enabled, FastPath will directly send traffic to a Private Endpoint deployed in a "spoke" Virtual Network.
256256

257257
These scenarios are Generally Available for limited scenarios with connections associated to 10 Gbps and 100 Gbps ExpressRoute Direct circuits. To enable, follow the below guidance:
258-
1. Complete this [Microsoft Form](https://aka.ms/fastpathlimitedga) to request to enroll your subscription. Requests may take up to 4 weeks to complete, so plan deployments accordingly.
258+
1. Complete this [Microsoft Form](https://aka.ms/fplimitedga) to request to enroll your subscription. Requests may take up to 4 weeks to complete, so plan deployments accordingly.
259259
2. Once you receive a confirmation from Step 1, run the following Azure PowerShell command in the target Azure subscription.
260260
```azurepowershell-interactive
261261
$connection = Get-AzVirtualNetworkGatewayConnection -ResourceGroupName <resource-group> -ResourceName <connection-name>

articles/firewall/features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Forced Tunnel mode can't be configured at run time. You can either redeploy the
116116

117117
## Outbound SNAT support
118118

119-
All outbound virtual network traffic IP addresses are translated to the Azure Firewall public IP (Source Network Address Translation). You can identify and allow traffic originating from your virtual network to remote Internet destinations. When Azure Firewall has multiple public IPs configured for providing outbound connectivity, it will use the Public IPs as needed based on available ports. It will **randomly pick the first Public IP** and only use the **next available Public IP** after no more connections can be made from the current public IP **due to SNAT port exhaustion**.
119+
All outbound virtual network traffic IP addresses are translated to the Azure Firewall public IP (Source Network Address Translation). You can identify and allow traffic originating from your virtual network to remote Internet destinations. When Azure Firewall has multiple public IPs configured for providing outbound connectivity, any public IP may be chosen and we do not recommend building any dependencies on which public IP may be used for outbound connections.
120120

121121
In scenarios where you have high throughput or dynamic traffic patterns, it is recommended to use an [Azure NAT Gateway](/azure/nat-gateway/nat-overview). Azure NAT Gateway dynamically selects public IPs for providing outbound connectivity. To learn more about how to integrate NAT Gateway with Azure Firewall, see [Scale SNAT ports with Azure NAT Gateway](/azure/firewall/integrate-with-nat-gateway).
122122

articles/governance/policy/concepts/policy-for-kubernetes.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -606,18 +606,28 @@ Finally, to identify the AKS cluster version that you're using, follow the linke
606606

607607
### Add-on versions available per each AKS cluster version
608608

609+
#### 1.8.0
610+
Policy can now be used to evaluate CONNECT operations, for instance, to deny `exec`s. Note that there is no brownfield compliance available for noncompliant CONNECT operations, so a policy with Audit effect that targets CONNECTs is a no op.
611+
612+
Security improvements.
613+
- Released November 2024
614+
- Kubernetes 1.27+
615+
- Gatekeeper 3.17.1
616+
609617
#### 1.7.1
610618
Introducing CEL and VAP. Common Expression Language (CEL) is a Kubernetes-native expression language that can be used to declare validation rules of a policy. Validating Admission Policy (VAP) feature provides in-tree policy evaluation, reduces admission request latency, and improves reliability and availability. The supported validation actions include Deny, Warn, and Audit. Custom policy authoring for CEL/VAP is allowed, and existing users won't need to convert their Rego to CEL as they will both be supported and be used to enforce policies. To use CEL and VAP, users need to enroll in the feature flag `AKS-AzurePolicyK8sNativeValidation` in the `Microsoft.ContainerService` namespace. For more information, view the [Gatekeeper Documentation](https://open-policy-agent.github.io/gatekeeper/website/docs/validating-admission-policy/).
611619

612620
Security improvements.
613-
- Released Sep 2024
621+
- Released September 2024
614622
- Kubernetes 1.27+ (VAP generation is only supported on 1.30+)
615623
- Gatekeeper 3.17.1
616624

617625
#### 1.7.0
618626

619627
Introducing expansion, a shift left feature that lets you know up front whether your workload resources (Deployments, ReplicaSets, Jobs, etc.) will produce admissible pods. Expansion shouldn't change the behavior of your policies; rather, it just shifts Gatekeeper's evaluation of pod-scoped policies to occur at workload admission time rather than pod admission time. However, to perform this evaluation it must generate and evaluate a what-if pod that is based on the pod spec defined in the workload, which might have incomplete metadata. For instance, the what-if pod won't contain the proper owner references. Because of this small risk of policy behavior changing, we're introducing expansion as disabled by default. To enable expansion for a given policy definition, set `.policyRule.then.details.source` to `All`. Built-ins will be updated soon to enable parameterization of this field. If you test your policy definition and find that the what-if pod being generated for evaluation purposes is incomplete, you can also use a mutation with source `Generated` to mutate the what-if pods. For more information on this option, view the [Gatekeeper documentation](https://open-policy-agent.github.io/gatekeeper/website/docs/expansion#mutating-example).
620628

629+
Expansion is currently only available on AKS clusters, not Arc clusters.
630+
621631
Security improvements.
622632
- Released July 2024
623633
- Kubernetes 1.27+

articles/load-balancer/load-balancer-outbound-connections.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ Calculate ports per instance as follows:
5252

5353
If you have Virtual Machine Scale Sets in the backend, it's recommended to allocate ports by "maximum number of backend instances". If more VMs are added to the backend than remaining SNAT ports allowed, scale out of Virtual Machine Scale Sets could be blocked, or the new VMs won't receive sufficient SNAT ports.
5454

55+
When multiple frontend IPs are configured using outbound rules, outbound connections may come from any of the frontend IPs configured to the backend instance. We do not recommend building any dependencies on which frontend IP may be selected for connections.
56+
5557
For more information about outbound rules, see [Outbound rules](outbound-rules.md).
5658

5759
## 2. Associate a NAT gateway to the subnet

articles/peering-service/faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
ms.author: halkazwini
77
ms.service: azure-peering-service
88
ms.topic: faq
9-
ms.date: 09/27/2023
9+
ms.date: 10/08/2024
1010
title: Azure Peering Service frequently asked questions (FAQ)
1111
summary: |
1212
@@ -32,7 +32,7 @@ sections:
3232
- question: |
3333
What Microsoft routes will be advertised over Peering Service connections?
3434
answer: |
35-
Microsoft advertises all of Microsoft's public service prefixes over the Peering Service connections. This will ensure not only communications, but other cloud services are accessible from the same connection.
35+
Microsoft advertises all of Microsoft's public service prefixes over the Peering Service connections. This ensures not only communications, but other cloud services are accessible from the same connection.
3636
3737
- question: |
3838
Can customers sign up for Peering Service with multiple providers?

0 commit comments

Comments
 (0)