Skip to content

Commit 7998ef1

Browse files
authored
Merge pull request #288072 from MicrosoftDocs/main
10/8/2024 PM Publish
2 parents 04cd3f4 + 5ba1a2d commit 7998ef1

File tree

33 files changed

+289
-83
lines changed

33 files changed

+289
-83
lines changed

.github/policies/disallow-edits.yml

Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
name: GitOps.PullRequestIssueManagement
2+
description: GitOps.PullRequestIssueManagement primitive
3+
resource: repository
4+
5+
configuration:
6+
resourceManagementConfiguration:
7+
eventResponderTasks:
8+
- description: Close PRs that contain content for services that have been migrated out of the azure-docs-pr repository.
9+
if:
10+
- payloadType: Pull_Request
11+
- isAction:
12+
action: Opened
13+
- or:
14+
- filesMatchPattern:
15+
pattern: articles/aks/*
16+
- filesMatchPattern:
17+
pattern: articles/defender-for-cloud/*
18+
- filesMatchPattern:
19+
pattern: articles/attestation/*
20+
- filesMatchPattern:
21+
pattern: articles/confidential-ledger/*
22+
- filesMatchPattern:
23+
pattern: articles/dedicated-hsm/*
24+
- filesMatchPattern:
25+
pattern: articles/key-vault/*
26+
- includesModifiedFiles:
27+
files:
28+
- articles/payment-hsm/*
29+
- filesMatchPattern:
30+
pattern: articles/postgresql/*
31+
- filesMatchPattern:
32+
pattern: articles/cosmos-db/*
33+
- filesMatchPattern:
34+
pattern: articles/dms/*
35+
- filesMatchPattern:
36+
pattern: articles/mariadb/*
37+
- filesMatchPattern:
38+
pattern: articles/mysql/*
39+
- filesMatchPattern:
40+
pattern: articles/managed-instance-apache-cassandra/*
41+
- filesMatchPattern:
42+
pattern: articles/virtual-machines/*
43+
- filesMatchPattern:
44+
pattern: articles/virtual-machines-scale-sets/*
45+
- filesMatchPattern:
46+
pattern: articles/container-instances/*
47+
- filesMatchPattern:
48+
pattern: articles/service-fabric/*
49+
- filesMatchPattern:
50+
pattern: articles/machine-learning/*
51+
- filesMatchPattern:
52+
pattern: articles/ai-studio/*
53+
- filesMatchPattern:
54+
pattern: articles/ai-services/*
55+
- filesMatchPattern:
56+
pattern: articles/genomics/*
57+
- filesMatchPattern:
58+
pattern: articles/open-datasets/*
59+
- filesMatchPattern:
60+
pattern: articles/search/*
61+
- filesMatchPattern:
62+
pattern: articles/azure-monitor/*
63+
- filesMatchPattern:
64+
pattern: articles/advisor/*
65+
- filesMatchPattern:
66+
pattern: articles/chaos-studio/*
67+
- filesMatchPattern:
68+
pattern: articles/service-health/*
69+
- filesMatchPattern:
70+
pattern: articles/azure-arc/*
71+
- filesMatchPattern:
72+
pattern: articles/azure-linux/*
73+
- filesMatchPattern:
74+
pattern: articles/azure-portal/*
75+
- filesMatchPattern:
76+
pattern: articles/copilot/*
77+
- filesMatchPattern:
78+
pattern: articles/lighthouse/*
79+
- filesMatchPattern:
80+
pattern: articles/quotas/*
81+
- filesMatchPattern:
82+
pattern: articles/container-registry/*
83+
- filesMatchPattern:
84+
pattern: articles/kubernetes-fleet/*
85+
then:
86+
- addReply:
87+
reply: >-
88+
@${issueAuthor} - You tried to add content to a folder path that has been removed from this repository. Your pull request will be automatically closed. Submit your changes to the updated repository, which can be identified by clicking the Edit this Document link at the top of any published article for that product or service.
89+
- closePullRequest

articles/api-management/quota-by-key-policy.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: article
9-
ms.date: 07/23/2024
9+
ms.date: 09/16/2024
1010
ms.author: danlep
1111
---
1212
# Set usage quota by key
@@ -29,6 +29,7 @@ To understand the difference between rate limits and quotas, [see Rate limits an
2929
bandwidth="kilobytes"
3030
renewal-period="seconds"
3131
increment-condition="condition"
32+
increment-count="number"
3233
counter-key="key value"
3334
first-period-start="date-time" />
3435
```
@@ -41,6 +42,7 @@ To understand the difference between rate limits and quotas, [see Rate limits an
4142
| calls | The maximum total number of calls allowed during the time interval specified in the `renewal-period`. Policy expressions aren't allowed. | Either `calls`, `bandwidth`, or both together must be specified. | N/A |
4243
| counter-key | The key to use for the `quota policy`. For each key value, a single counter is used for all scopes at which the policy is configured. Policy expressions are allowed. | Yes | N/A |
4344
| increment-condition | The Boolean expression specifying if the request should be counted towards the quota (`true`). Policy expressions are allowed. | No | N/A |
45+
| increment-count | The number by which the counter is increased per request. Policy expressions are allowed. | No | 1 |
4446
| renewal-period | The length in seconds of the fixed window after which the quota resets. The start of each period is calculated relative to `first-period-start`. Minimum period: 300 seconds. When `renewal-period` is set to 0, the period is set to infinite. Policy expressions aren't allowed. | Yes | N/A |
4547
| first-period-start | The starting date and time for quota renewal periods, in the following format: `yyyy-MM-ddTHH:mm:ssZ` as specified by the ISO 8601 standard. Policy expressions aren't allowed. | No | `0001-01-01T00:00:00Z` |
4648

articles/api-management/xml-to-json-policy.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: article
9-
ms.date: 07/23/2024
9+
ms.date: 09/06/2024
1010
ms.author: danlep
1111
---
1212

@@ -21,7 +21,7 @@ The `xml-to-json` policy converts a request or response body from XML to JSON. T
2121
## Policy statement
2222

2323
```xml
24-
<xml-to-json kind="javascript-friendly | direct" apply="always | content-type-xml" consider-accept-header="true | false"/>
24+
<xml-to-json kind="javascript-friendly | direct" apply="always | content-type-xml" consider-accept-header="true | false" always-array-children="true | false"/>
2525
```
2626

2727

@@ -32,6 +32,7 @@ The `xml-to-json` policy converts a request or response body from XML to JSON. T
3232
|kind|The attribute must be set to one of the following values.<br /><br /> - `javascript-friendly` - the converted JSON has a form friendly to JavaScript developers.<br />- `direct` - the converted JSON reflects the original XML document's structure.<br/><br/>Policy expressions are allowed.|Yes|N/A|
3333
|apply|The attribute must be set to one of the following values.<br /><br /> - `always` - convert always.<br />- `content-type-xml` - convert only if response Content-Type header indicates presence of XML.<br/><br/>Policy expressions are allowed.|Yes|N/A|
3434
|consider-accept-header|The attribute must be set to one of the following values.<br /><br /> - `true` - apply conversion if JSON is requested in request Accept header.<br />- `false` -always apply conversion.<br/><br/>Policy expressions are allowed.|No|`true`|
35+
|always-array-children|The attribute must be set to one of the following values.<br /><br /> - `true` - Always convert child elements into a JSON array.<br />- `false` - Only convert multiple child elements into a JSON array. Convert a single child element into a JSON object.<br/><br/>Policy expressions are allowed.|No|`false`|
3536

3637
## Usage
3738

articles/app-service/overview-tls.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ You can use Azure Policy to help audit your resources when it comes to minimum T
4545

4646
### Minimum TLS Version and SCM Minimum TLS Version
4747

48-
App Service also allows you to set minimum TLS version for incoming requests to your web app and to SCM site. By default, the minimum TLS version for incoming requests to your web app and to SCM would be set to 1.2 on both portal and API.
48+
App Service also allows you to set minimum TLS version for incoming requests to your web app and to SCM site. By default, the minimum TLS version for incoming requests to your web app and to SCM is set to 1.2 on both portal and API.
4949

5050
### TLS 1.3
5151
A [Minimum TLS Cipher Suite](#minimum-tls-cipher-suite-preview) setting is available with TLS 1.3. This includes two cipher suites at the top of the cipher suite order:
@@ -54,12 +54,12 @@ A [Minimum TLS Cipher Suite](#minimum-tls-cipher-suite-preview) setting is avail
5454

5555
### TLS 1.0 and 1.1
5656

57-
TLS 1.0 and 1.1 are considered legacy protocols and are no longer considered secure. It's generally recommended for customers to use TLS 1.2 or above as the minimum TLS version. When creating a web app, the default minimum TLS version would be TLS 1.2.
57+
TLS 1.0 and 1.1 are considered legacy protocols and are no longer considered secure. It's generally recommended for customers to use TLS 1.2 or above as the minimum TLS version. When creating a web app, the default minimum TLS version is TLS 1.2.
5858

5959
To ensure backward compatibility for TLS 1.0 and TLS 1.1, App Service will continue to support TLS 1.0 and 1.1 for incoming requests to your web app. However, since the default minimum TLS version is set to TLS 1.2, you need to update the minimum TLS version configurations on your web app to either TLS 1.0 or 1.1 so the requests won't be rejected.
6060

6161
> [!IMPORTANT]
62-
> Incoming requests to web apps and incoming requests to Azure are treated differently. App Service will continue to support TLS 1.0 and 1.1 for incoming requests to the web apps. For incoming requests directly to Azure, for example through ARM or API, it's not recommended to use TLS 1.0 or 1.1.
62+
> Incoming requests to web apps and incoming requests to Azure are treated differently. App Service will continue to support TLS 1.0 and 1.1 for incoming requests to the web apps. For incoming requests directly to the Azure control plane, for example through ARM or API calls, it is not recommended to use TLS 1.0 or 1.1.
6363
>
6464
6565
## Minimum TLS cipher suite (preview)

articles/container-apps/plans.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,10 @@ You can select from general purpose or specialized compute
3131

3232
Use the Dedicated plan when you need any of the following in a single environment:
3333

34-
- **Secure outbound traffic**: You can assign single outbound network path to systems protected by firewalls or other network appliances.
35-
36-
- **Environment isolation**: Dedicated workload profiles provide access to dedicated hardware with a single tenant guarantee.
34+
- **Compute isolation**: Dedicated workload profiles provide access to dedicated hardware with a single tenant guarantee.
3735

3836
- **Customized compute**: Select from many types and sizes of workload profiles based on your apps requirements. You can deploy many apps to each workload profile. Each workload profile can scale independently as more apps are added or removed or as apps scale their replicas up or down.
3937

40-
41-
- **Cost control**: Traditional serverless compute options optimize for scale in response to events and may not provide cost control options. Dedicated workload profiles let you set minimum and maximum scaling to help you better control costs.
42-
4338
The Dedicated plan can be more cost effective when you're running higher scale deployments with steady throughput.
4439

4540
> [!NOTE]

articles/cost-management-billing/understand/pay-bill.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: lishepar
77
ms.service: cost-management-billing
88
ms.subservice: billing
99
ms.topic: how-to
10-
ms.date: 10/04/2024
10+
ms.date: 10/08/2024
1111
ms.author: banders
1212
---
1313

@@ -116,9 +116,12 @@ Although you can generally use debit cards to pay your Azure bill, consider thes
116116

117117
If the default payment method of your billing profile is wire transfer, follow the payment instructions on your invoice PDF file.
118118

119+
> [!NOTE]
120+
> When you pay your bill by wire transfer, the payment might take up to 10 business days to get processed.
121+
119122
Alternatively, if your invoice is under the threshold amount for your currency, you can make a one-time payment in the Azure portal with a credit or debit card by using **Pay now**. If your invoice amount exceeds the threshold, you can't pay your invoice with a credit or debit card. You'll find the threshold amount for your currency in the Azure portal after you select **Pay now**.
120123

121-
> [!NOTE]
124+
>[!NOTE]
122125
> When multiple invoices are remitted in a single wire transfer, you must specify the invoice numbers for all of the invoices.
123126
124127
### Bank details used to send wire transfer payments

articles/expressroute/expressroute-howto-linkvnet-portal-resource-manager.md

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -223,16 +223,6 @@ When adding a new connection for your ExpressRoute gateway, select the checkbox
223223
> [!NOTE]
224224
> You can use [Connection Monitor](how-to-configure-connection-monitor.md) to verify that your traffic is reaching the destination using FastPath.
225225
226-
## Enroll in ExpressRoute FastPath features (preview)
227-
228-
FastPath support for virtual network peering is now in Public preview. Enrollment is only available through Azure PowerShell. For instructions on how to enroll, see [FastPath preview features](expressroute-howto-linkvnet-arm.md#fastpath-virtual-network-peering-user-defined-routes-udrs-and-private-link-support-for-expressroute-direct-connections).
229-
230-
> [!NOTE]
231-
> Any connections configured for FastPath in the target subscription will be enrolled in this preview. We do not advise enabling this preview in production subscriptions.
232-
> If you already have FastPath configured and want to enroll in the preview feature, you need to do the following:
233-
> 1. Enroll in the FastPath preview feature with the Azure PowerShell command.
234-
> 1. Disable and then re-enable FastPath on the target connection.
235-
236226
## Clean up resources
237227

238228
You can delete a connection and unlink your virtual network to an ExpressRoute circuit by selecting the **Delete** icon on the page for your connection.

articles/frontdoor/standard-premium/how-to-configure-https-custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ There are currently two ways to authenticate Azure Front Door to access your Key
9191
Register the service principal for Azure Front Door as an app in your Microsoft Entra ID by using Microsoft Graph PowerShell or the Azure CLI.
9292

9393
> [!NOTE]
94-
> * This action requires you to have Global Administrator permissions in Microsoft Entra ID. The registration only needs to be performed *once per Microsoft Entra tenant*.
94+
> * This action requires you to have User Access Administrator permissions in Microsoft Entra ID. The registration only needs to be performed *once per Microsoft Entra tenant*.
9595
> * The application IDs of **205478c0-bd83-4e1b-a9d6-db63a3e1e1c8** and **d4631ece-daab-479b-be77-ccb713491fc0** are predefined by Azure for Azure Front Door Standard and Premium across all Azure tenants and subscriptions. Azure Front Door (classic) has a different application ID.
9696
9797
# [Microsoft Graph PowerShell](#tab/powershell)

articles/governance/policy/concepts/definition-structure-basics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ When Azure Policy versioning is released, the following Resource Provider modes
127127

128128
Built-in policy definitions can host multiple versions with the same `definitionID`. If no version number is specified, all experiences will show the latest version of the definition. To see a specific version of a built-in, it must be specified in API, SDK or UI. To reference a specific version of a definition within an assignment, see [definition version within assignment](../concepts/assignment-structure.md#policy-definition-id-and-version-preview)
129129

130-
The Azure Policy service uses `version`, `preview`, and `deprecated` properties to convey level of change to a built-in policy definition or initiative and state. The format of `version` is: `{Major}.{Minor}.{Patch}`. Specific states, such as _deprecated_ or _preview_, are appended to the `version` property or in another property as a **boolean**.
130+
The Azure Policy service uses `version`, `preview`, and `deprecated` properties to convey state and level of change to a built-in policy definition or initiative. The format of `version` is: `{Major}.{Minor}.{Patch}`. When a policy definition is in preview state, the suffix _preview_ is appended to the `version` property and treated as a **boolean**. When a policy definition is deprecated, the deprecation is captured as a boolean in the definition's metadata using `"deprecated": "true"`.
131131

132132
- Major Version (example: 2.0.0): introduce breaking changes such as major rule logic changes, removing parameters, adding an enforcement effect by default.
133133
- Minor Version (example: 2.1.0): introduce changes such as minor rule logic changes, adding new parameter allowed values, change to `roleDefinitionIds`, adding or moving definitions within an initiative.

articles/governance/policy/concepts/initiative-definition-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ there are some _common_ properties used by Azure Policy and in built-ins.
128128
## Version (preview)
129129
Built-in policy initiatives can host multiple versions with the same `definitionID`. If no version number is specified, all experiences will show the latest version of the definition. To see a specific version of a built-in, it must be specified in API, SDK or UI. To reference a specific version of a definition within an assignment, see [definition version within assignment](../concepts/assignment-structure.md#policy-definition-id-and-version-preview)
130130

131-
The Azure Policy service uses `version`, `preview`, and `deprecated` properties to convey the level of change to a built-in policy definition or initiative and state. The format of `version` is: `{Major}.{Minor}.{Patch}`. Specific states, such as _deprecated_ or _preview_, are appended to the `version` property or in another property as a **boolean** as shown in the common metadata properties.
131+
The Azure Policy service uses `version`, `preview`, and `deprecated` properties to convey state and level of change to a built-in policy definition or initiative. The format of `version` is: `{Major}.{Minor}.{Patch}`. When a policy definition is in preview state, the suffix _preview_ is appended to the `version` property and treated as a **boolean**. When a policy definition is deprecated, the deprecation is captured as a boolean in the definition's metadata using `"deprecated": "true"`.
132132

133133
- Major Version (example: 2.0.0): introduce breaking changes such as major rule logic changes, removing parameters, adding an enforcement effect by default.
134134
- Minor Version (example: 2.1.0): introduce changes such as minor rule logic changes, adding new parameter allowed values, change to role definitionIds, adding or removing definitions within an initiative.

0 commit comments

Comments
 (0)