Skip to content

Commit 8107e8f

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-vnetflow
2 parents e1410e2 + 8a6c976 commit 8107e8f

File tree

8 files changed

+20
-14
lines changed

8 files changed

+20
-14
lines changed

articles/api-management/api-management-howto-log-event-hubs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@ Once your logger is configured in API Management, you can configure your [log-to
277277
1. Select **Save** to save the updated policy configuration. As soon as it's saved, the policy is active and events are logged to the designated event hub.
278278

279279
> [!NOTE]
280-
> The maximum supported message size that can be sent to an event hub from this API Management policy is 200 kilobytes (KB). If a message that is sent to an event hub is larger than 200 KB, it will be automatically truncated, and the truncated message will be transferred to the event hub.
280+
> The maximum supported message size that can be sent to an event hub from this API Management policy is 200 kilobytes (KB). If a message that is sent to an event hub is larger than 200 KB, it will be automatically truncated, and the truncated message will be transferred to the event hub. For larger messages, consider using Azure Storage with Azure API Management as a workaround to bypass the 200KB limit. More details can be found in [this article](https://techcommunity.microsoft.com/t5/microsoft-developer-community/how-to-send-requests-to-azure-storage-from-azure-api-management/ba-p/3624955).
281281

282282
## Preview the log in Event Hubs by using Azure Stream Analytics
283283

articles/azure-monitor/insights/set-up-code-optimizations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Setting up Code Optimizations to identify and analyze CPU and memory bottlenecks
1919

2020
## Demo video
2121

22-
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/vbi9YQgIgC8" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
22+
> [!VIDEO https://www.youtube-nocookie.com/embed/vbi9YQgIgC8]
2323
2424
## Connect your web app to Application Insights
2525

articles/operator-nexus/concepts-access-control-lists.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,3 +52,7 @@ The action property of an ACL statement can have one of the following types:
5252
- **Permit**: Allows packets that match specified conditions.
5353
- **Drop**: Discards packets that match specified conditions.
5454
- **Count**: Counts the number of packets that match specified conditions.
55+
56+
## Next steps:
57+
58+
[Creating Access Control List (ACL) management for NNI and layer 3 isolation domain external networks](howto-create-access-control-list-for-network-to-network-interconnects.md)
-1.92 KB
Loading

articles/sap/workloads/proximity-placement-scenarios.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Configuration options for optimal network latency with SAP applications | Microsoft Docs
3-
description: Describes SAP deployment scenarios to achieve optimal network latency
2+
title: Configuration options to minimize network latency with SAP applications | Microsoft Docs
3+
description: Describes SAP deployment scenarios to minimize network latency
44
author: msjuergent
55
manager: bburns
66
ms.service: sap-on-azure
77
ms.subservice: sap-vm-workloads
88
ms.custom: devx-track-azurepowershell
99
ms.topic: article
10-
ms.date: 03/15/2024
10+
ms.date: 04/24/2024
1111
ms.author: juergent
1212
---
1313

14-
# Configuration options for optimal network latency with SAP applications
14+
# Configuration options to minimize network latency with SAP applications
1515

1616
> [!IMPORTANT]
1717
> In November 2021 we made significant changes in the way how proximity placement groups should be used with SAP workload in zonal deployments.

articles/sap/workloads/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ items:
8989
href: sap-higher-availability-architecture-scenarios.md
9090
- name: Azure Availability Zones for SAP workloads
9191
href: high-availability-zones.md
92-
- name: Configuration options for optimal network latency with SAP applications
92+
- name: Configuration options to minimize network latency with SAP applications
9393
href: proximity-placement-scenarios.md
9494
- name: Public endpoint connectivity with Azure Load Balancer
9595
href: high-availability-guide-standard-load-balancer-outbound-connections.md

articles/storage/files/storage-files-identity-auth-hybrid-identities-enable.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable identity-based Kerberos authentication for hybr
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 11/21/2023
7+
ms.date: 04/24/2024
88
ms.author: kendownie
99
ms.custom: engagement-fy23
1010
recommendations: false
@@ -47,6 +47,8 @@ Clients must be Microsoft Entra joined or [Microsoft Entra hybrid joined](../../
4747

4848
This feature doesn't currently support user accounts that you create and manage solely in Microsoft Entra ID. User accounts must be [hybrid user identities](../../active-directory/hybrid/whatis-hybrid-identity.md), which means you'll also need AD DS and either [Microsoft Entra Connect](../../active-directory/hybrid/whatis-azure-ad-connect.md) or [Microsoft Entra Connect cloud sync](../../active-directory/cloud-sync/what-is-cloud-sync.md). You must create these accounts in Active Directory and sync them to Microsoft Entra ID. To assign Azure Role-Based Access Control (RBAC) permissions for the Azure file share to a user group, you must create the group in Active Directory and sync it to Microsoft Entra ID.
4949

50+
This feature doesn't currently support cross-tenant access for B2B users or guest users. Users from an Entra tenant other than the one configured won't be able to access the file share.
51+
5052
You must disable multifactor authentication (MFA) on the Microsoft Entra app representing the storage account.
5153

5254
With Microsoft Entra Kerberos, the Kerberos ticket encryption is always AES-256. But you can set the SMB channel encryption that best fits your needs.
@@ -76,7 +78,7 @@ To enable Microsoft Entra Kerberos authentication using the [Azure portal](https
7678

7779
:::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/enable-azure-ad-kerberos.png" alt-text="Screenshot of the Azure portal showing Active Directory configuration settings for a storage account. Microsoft Entra Kerberos is selected." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/enable-azure-ad-kerberos.png" border="true":::
7880

79-
1. **Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, then you need to specify the domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlet from an on-premises AD-joined client: `Get-ADDomain`. Your domain name should be listed in the output under `DNSRoot` and your domain GUID should be listed under `ObjectGUID`. If you'd prefer to configure directory and file-level permissions using icacls, you can skip this step. However, if you want to use icacls, the client will need unimpeded network connectivity to the on-premises AD.
81+
1. **Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, then you must specify the domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlet from an on-premises AD-joined client: `Get-ADDomain`. Your domain name should be listed in the output under `DNSRoot` and your domain GUID should be listed under `ObjectGUID`. If you'd prefer to configure directory and file-level permissions using icacls, you can skip this step. However, if you want to use icacls, the client will need unimpeded network connectivity to the on-premises AD.
8082

8183
1. Select **Save**.
8284

@@ -184,10 +186,10 @@ There are two options for configuring directory and file-level permissions with
184186
- **Windows File Explorer:** If you choose this option, then the client must be domain-joined to the on-premises AD.
185187
- **icacls utility:** If you choose this option, then the client doesn't need to be domain-joined, but needs unimpeded network connectivity to the on-premises AD.
186188

187-
To configure directory and file-level permissions through Windows File Explorer, you also need to specify domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or from an on-premises AD-joined client. If you prefer to configure using icacls, this step is not required.
189+
To configure directory and file-level permissions through Windows File Explorer, you also need to specify domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or from an on-premises AD-joined client. If you prefer to configure using icacls, this step isn't required.
188190

189191
> [!IMPORTANT]
190-
> You can set file/directory level ACLs for identities which are not synced to Microsoft Entra ID. However, these ACLs will not be enforced because the Kerberos ticket used for authentication/authorization will not contain these not-synced identities. In order to enforce set ACLs, identities need to be synced to Microsoft Entra ID.
192+
> You can set file/directory level ACLs for identities which aren't synced to Microsoft Entra ID. However, these ACLs won't be enforced because the Kerberos ticket used for authentication/authorization won't contain these not-synced identities. In order to enforce set ACLs, identities must be synced to Microsoft Entra ID.
191193
192194
> [!TIP]
193195
> If Microsoft Entra hybrid joined users from two different forests will be accessing the share, it's best to use icacls to configure directory and file-level permissions. This is because Windows File Explorer ACL configuration requires the client to be domain joined to the Active Directory domain that the storage account is joined to.

articles/virtual-machines/disks-types.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Select a disk type for Azure IaaS VMs - managed disks
33
description: Learn about the available Azure disk types for virtual machines, including ultra disks, Premium SSDs v2, Premium SSDs, standard SSDs, and Standard HDDs.
44
author: roygara
55
ms.author: rogarana
6-
ms.date: 02/27/2024
6+
ms.date: 04/23/2024
77
ms.topic: conceptual
88
ms.service: azure-disk-storage
99
ms.custom: references_regions
@@ -50,7 +50,7 @@ Ultra disks must be used as data disks and can only be created as empty disks. Y
5050

5151
### Ultra disk size
5252

53-
Azure ultra disks offer up to 32-TiB per region per subscription by default, but ultra disks support higher capacity by request. To request an increase in capacity, request a quota increase or contact Azure Support.
53+
Azure ultra disks offer up to 100 TiB per region per subscription by default, but ultra disks support higher capacity by request. To request an increase in capacity, request a quota increase or contact Azure Support.
5454

5555
The following table provides a comparison of disk sizes and performance caps to help you decide which to use.
5656

@@ -122,7 +122,7 @@ Premium SSD v2 disks are designed to provide sub millisecond latencies and provi
122122

123123
Premium SSD v2 capacities range from 1 GiB to 64 TiBs, in 1-GiB increments. You're billed on a per GiB ratio, see the [pricing page](https://azure.microsoft.com/pricing/details/managed-disks/) for details.
124124

125-
Premium SSD v2 offers up to 100 TiBs per region per subscription by default, but supports higher capacity by request. To request an increase in capacity, request a quota increase or contact Azure Support.
125+
Premium SSD v2 offers up to 100 TiB per region per subscription by default, but supports higher capacity by request. To request an increase in capacity, request a quota increase or contact Azure Support.
126126

127127
#### Premium SSD v2 IOPS
128128

0 commit comments

Comments
 (0)