You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/profiler-troubleshooting.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,11 @@ ms.reviewer: mbullwin
13
13
14
14
# Troubleshoot problems enabling or viewing Application Insights Profiler
15
15
16
+
## Active issues
17
+
18
+
* Profiling for ASP.NET Core 3.x applications isn't supported yet.
19
+
* If you must have Profiler on, a workaround is to use [Application Insights Profiler for ASP.NET Core](https://github.com/microsoft/ApplicationInsights-Profiler-AspNetCore). The profiler is labeled for Linux, but it also works with .NET Core 3.0+ applications on Windows. For details, see [Supported versions](https://github.com/microsoft/ApplicationInsights-Profiler-AspNetCore#supported-versions).
Copy file name to clipboardExpand all lines: articles/cloud-shell/troubleshooting.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,8 +32,8 @@ Known resolutions for troubleshooting issues in Azure Cloud Shell include:
32
32
33
33
### Disabling Cloud Shell in a locked down network environment
34
34
35
-
-**Details**: Administrators may wish to disable access to Cloud Shell for their users. Cloud Shell utilizes access to the `ux.console.azure.com` domain, which can be denied, stopping any access to Cloud Shell's entrypoints including portal.azure.com, shell.azure.com, Visual Studio Code Azure Account extension, and docs.microsoft.com.
36
-
-**Resolution**: Restrict access to `ux.console.azure.com` via network settings to your environment. The Cloud Shell icon will still exist in portal.azure.com, but will not successfully connect to the service.
35
+
-**Details**: Administrators may wish to disable access to Cloud Shell for their users. Cloud Shell utilizes access to the `ux.console.azure.com` domain, which can be denied, stopping any access to Cloud Shell's entrypoints including portal.azure.com, shell.azure.com, Visual Studio Code Azure Account extension, and docs.microsoft.com. In the US Government cloud, the entrypoint is `ux.console.azure.us`; there is no corresponding shell.azure.us.
36
+
-**Resolution**: Restrict access to `ux.console.azure.com`or `ux.console.azure.us`via network settings to your environment. The Cloud Shell icon will still exist in the Azure portal, but will not successfully connect to the service.
Copy file name to clipboardExpand all lines: articles/cognitive-services/personalizer/concepts-features.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,6 +128,8 @@ It is possible to improve your feature sets by editing them to make them larger
128
128
129
129
For example, a timestamp down to the second is a very sparse feature. It could be made more dense (effective) by classifying times into "morning", "midday", "afternoon", etc.
130
130
131
+
Location information also typically benefits from creating broader classifications. For example, a Latitude-Longitude coordinate such as Lat: 47.67402° N, Long: 122.12154° W is too precise, and forces the model to learn latitude and longitude as distinct dimensions. When you are trying to personalize based on location information, it helps to group location information in larger sectors. An easy way to do that is to choose an appropriate rounding precision for the Lat-Long numbers, and combine latitude and longitude into "areas" by making them into one string. For example, a good way to represent 47.67402° N, Long: 122.12154° W in regions approximately a few kilometers wide would be "location":"34.3 , 12.1".
132
+
131
133
132
134
#### Expand feature sets with extrapolated information
Copy file name to clipboardExpand all lines: articles/governance/policy/how-to/author-policies-for-arrays.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,8 +163,9 @@ expression. To resolve this error message, change `equals` to either `in` or `no
163
163
164
164
Aliases that have **\[\*\]** attached to their name indicate the **type** is an _array_. Instead of
165
165
evaluating the value of the entire array, **\[\*\]** makes it possible to evaluate each element of
166
-
the array. There are three standard scenarios this per item evaluation is useful in: None, Any, and
167
-
All. For complex scenarios, use [count](../concepts/definition-structure.md#count).
166
+
the array individually, with logical AND between them. There are three standard scenarios this per
167
+
item evaluation is useful in: _None_, _Any_, or _All_ elements match.
168
+
For complex scenarios, use [count](../concepts/definition-structure.md#count).
168
169
169
170
The policy engine triggers the **effect** in **then** only when the **if** rule evaluates as true.
170
171
This fact is important to understand in context of the way **\[\*\]** evaluates each individual
@@ -209,16 +210,16 @@ For each condition example below, replace `<field>` with `"field": "Microsoft.St
209
210
The following outcomes are the result of the combination of the condition and the example policy
210
211
rule and array of existing values above:
211
212
212
-
|Condition |Outcome |Explanation |
213
-
|-|-|-|
214
-
|`{<field>,"notEquals":"127.0.0.1"}`|Nothing |One array element evaluates as false (127.0.0.1 != 127.0.0.1) and one as true (127.0.0.1 != 192.168.1.1), so the **notEquals** condition is _false_ and the effect isn't triggered. |
215
-
|`{<field>,"notEquals":"10.0.4.1"}`|Policy effect |Both array elements evaluate as true (10.0.4.1 != 127.0.0.1 and 10.0.4.1 != 192.168.1.1), so the **notEquals** condition is _true_ and the effect is triggered. |
216
-
|`"not":{<field>,"Equals":"127.0.0.1"}`|Policy effect |One array element evaluates as true (127.0.0.1 == 127.0.0.1) and one as false (127.0.0.1 == 192.168.1.1), so the **Equals** condition is _false_. The logical operator evaluates as true (**not**_false_), so the effect is triggered. |
217
-
|`"not":{<field>,"Equals":"10.0.4.1"}`|Policy effect |Both array elements evaluate as false (10.0.4.1 == 127.0.0.1 and 10.0.4.1 == 192.168.1.1), so the **Equals** condition is _false_. The logical operator evaluates as true (**not**_false_), so the effect is triggered. |
218
-
|`"not":{<field>,"notEquals":"127.0.0.1"}`|Policy effect |One array element evaluates as false (127.0.0.1 != 127.0.0.1) and one as true (127.0.0.1 != 192.168.1.1), so the **notEquals** condition is _false_. The logical operator evaluates as true (**not**_false_), so the effect is triggered. |
219
-
|`"not":{<field>,"notEquals":"10.0.4.1"}`|Nothing |Both array elements evaluate as true (10.0.4.1 != 127.0.0.1 and 10.0.4.1 != 192.168.1.1), so the **notEquals** condition is _true_. The logical operator evaluates as false (**not**_true_), so the effect isn't triggered. |
220
-
|`{<field>,"Equals":"127.0.0.1"}`|Nothing |One array element evaluates as true (127.0.0.1 == 127.0.0.1) and one as false (127.0.0.1 == 192.168.1.1), so the **Equals** condition is _false_ and the effect isn't triggered. |
221
-
|`{<field>,"Equals":"10.0.4.1"}`|Nothing |Both array elements evaluate as false (10.0.4.1 == 127.0.0.1 and 10.0.4.1 == 192.168.1.1), so the **Equals** condition is _false_ and the effect isn't triggered. |
213
+
|Condition |Outcome | Scenario |Explanation |
214
+
|-|-|-|-|
215
+
|`{<field>,"notEquals":"127.0.0.1"}`|Nothing |None match |One array element evaluates as false (127.0.0.1 != 127.0.0.1) and one as true (127.0.0.1 != 192.168.1.1), so the **notEquals** condition is _false_ and the effect isn't triggered. |
216
+
|`{<field>,"notEquals":"10.0.4.1"}`|Policy effect |None match |Both array elements evaluate as true (10.0.4.1 != 127.0.0.1 and 10.0.4.1 != 192.168.1.1), so the **notEquals** condition is _true_ and the effect is triggered. |
217
+
|`"not":{<field>,"notEquals":"127.0.0.1"}`|Policy effect |One or more match |One array element evaluates as false (127.0.0.1 != 127.0.0.1) and one as true (127.0.0.1 != 192.168.1.1), so the **notEquals** condition is _false_. The logical operator evaluates as true (**not**_false_), so the effect is triggered. |
218
+
|`"not":{<field>,"notEquals":"10.0.4.1"}`|Nothing |One or more match |Both array elements evaluate as true (10.0.4.1 != 127.0.0.1 and 10.0.4.1 != 192.168.1.1), so the **notEquals** condition is _true_. The logical operator evaluates as false (**not**_true_), so the effect isn't triggered. |
219
+
|`"not":{<field>,"Equals":"127.0.0.1"}`|Policy effect |Not all match |One array element evaluates as true (127.0.0.1 == 127.0.0.1) and one as false (127.0.0.1 == 192.168.1.1), so the **Equals** condition is _false_. The logical operator evaluates as true (**not**_false_), so the effect is triggered. |
220
+
|`"not":{<field>,"Equals":"10.0.4.1"}`|Policy effect |Not all match |Both array elements evaluate as false (10.0.4.1 == 127.0.0.1 and 10.0.4.1 == 192.168.1.1), so the **Equals** condition is _false_. The logical operator evaluates as true (**not**_false_), so the effect is triggered. |
221
+
|`{<field>,"Equals":"127.0.0.1"}`|Nothing |All match |One array element evaluates as true (127.0.0.1 == 127.0.0.1) and one as false (127.0.0.1 == 192.168.1.1), so the **Equals** condition is _false_ and the effect isn't triggered. |
222
+
|`{<field>,"Equals":"10.0.4.1"}`|Nothing |All match |Both array elements evaluate as false (10.0.4.1 == 127.0.0.1 and 10.0.4.1 == 192.168.1.1), so the **Equals** condition is _false_ and the effect isn't triggered. |
222
223
223
224
## The append effect and arrays
224
225
@@ -238,4 +239,4 @@ For more information, see the [append examples](../concepts/effects.md#append-ex
When using private endpoints for Azure services, traffic is secured to a specific private link resource. The platform performs an access control to validate network connections reaching only the specified private link resource. To access additional resources within the same Azure service, additional private endpoints are required.
@@ -114,6 +115,7 @@ For Azure services, use the recommended zone names as described in the following
114
115
|Azure Database for PostgreSQL - Single server (Microsoft.DBforPostgreSQL/servers)|postgresqlServer|privatelink.postgres.database.azure.com|
115
116
|Azure Database for MySQL (Microsoft.DBforMySQL/servers)|mysqlServer|privatelink.mysql.database.azure.com|
116
117
|Azure Database for MariaDB (Microsoft.DBforMariaDB/servers)|mariadbServer|privatelink.mariadb.database.azure.com|
Azure will create a canonical name DNS record (CNAME) on the public DNS to redirect the resolution to the suggested domain names. You'll be able to override the resolution with the private IP address of your private endpoints.
Copy file name to clipboardExpand all lines: articles/virtual-desktop/create-host-pools-azure-marketplace.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ Here's what you do for the **Basics** blade:
50
50
3. Enter a comma-separated list of users who can sign in to the Windows Virtual Desktop clients and access a desktop after the Azure Marketplace offering finishes. For example, if you want to assign [email protected] and [email protected] access, enter "[email protected],[email protected]."
51
51
4. Select **Create new** and provide a name for the new resource group.
52
52
5. For **Location**, select the same location as the virtual network that has connectivity to the Active Directory server.
>If you're using a pure Azure Active Directory Domain Services and Azure Active Directory solution, make sure to deploy your host pool in the same region as your Azure Active Directory Domain Services to avoid domain-join and credential errors.
@@ -61,7 +61,7 @@ For the **Configure virtual machines** blade:
61
61
62
62
1. Either accept the defaults or customize the number and size of the VMs.
63
63
2. Enter a prefix for the names of the virtual machines. For example, if you enter the name "prefix," the virtual machines will be called "prefix-0," "prefix-1," and so on.
64
-
3. Select **OK**.
64
+
3. Select **Next : Virtual machine settings**.
65
65
66
66
### Virtual machine settings
67
67
@@ -75,7 +75,7 @@ For the **Virtual machine settings** blade:
75
75
1. For **Image source**, select the source and enter the appropriate information for how to find it and how to store it. If you choose not to use managed disks, select the storage account that contains the .vhd file.
76
76
2. Enter the user principal name and password for the domain account that will join the VMs to the Active Directory domain. This same username and password will be created on the virtual machines as a local account. You can reset these local accounts later.
77
77
3. Select the virtual network that has connectivity to the Active Directory server, and then choose a subnet to host the virtual machines.
78
-
4. Select **OK**.
78
+
4. Select **Next: Windows Virtual Desktop information**.
79
79
80
80
### Windows Virtual Desktop tenant information
81
81
@@ -85,15 +85,14 @@ For the **Windows Virtual Desktop tenant information** blade:
85
85
2. For **Windows Virtual Desktop tenant name**, enter the name of the tenant where you'll be creating this host pool.
86
86
3. Specify the type of credentials that you want to use to authenticate as the Windows Virtual Desktop tenant RDS Owner. If you completed the [Create service principals and role assignments with PowerShell tutorial](./create-service-principal-role-powershell.md), select **Service principal**. When **Azure AD tenant ID** appears, enter the ID for the Azure Active Directory instance that contains the service principal.
87
87
4. Enter the credentials for the tenant admin account. Only service principals with a password credential are supported.
88
-
5. Select **OK**.
88
+
5. Select **Next : Review + create**.
89
89
90
90
## Complete setup and create the virtual machine
91
91
92
92
For the last two blades:
93
93
94
-
1. On the **Summary** blade, review the setup information. If you need to change something, go back to the appropriate blade and make your change before continuing. If the information looks right, select **OK**.
95
-
2. On the **Buy** blade, review the additional information about your purchase from the Azure Marketplace.
96
-
3. Select **Create** to deploy your host pool.
94
+
1. On the **Review and Create** blade, review the setup information. If you need to change something, go back to the appropriate blade and make your change before continuing. If the information looks right, select **OK**.
95
+
2. Select **Create** to deploy your host pool.
97
96
98
97
Depending on how many VMs you’re creating, this process can take 30 minutes or more to complete.
Route-based gateways implement the route-based VPNs. Route-based VPNs use "routes" in the IP forwarding or routing table to direct packets into their corresponding tunnel interfaces. The tunnel interfaces then encrypt or decrypt the packets in and out of the tunnels. The policy or traffic selector for route-based VPNs are configured as any-to-any (or wild cards).
65
65
66
-
### Can I update my Policy-based VPN gateway to Route-based?
66
+
### Can I update my policy-based VPN gateway to route-based?
67
+
67
68
No. An Azure Vnet gateway type cannot be changed from policy-based to route-based or the other way. The gateway must be deleted and recreated, a process taking around 60 minutes. The IP address of the gateway will not be preserved nor will the Pre-Shared Key (PSK).
68
69
1. Delete any connections associated with the gateway to be deleted.
1.[Create a new gateway of the type you want and complete the VPN setup](vpn-gateway-howto-site-to-site-resource-manager-portal.md#VNetGateway).
74
75
75
76
### Do I need a 'GatewaySubnet'?
76
77
@@ -84,11 +85,15 @@ No.
84
85
85
86
### Can I get my VPN gateway IP address before I create it?
86
87
87
-
No. You have to create your gateway first to get the IP address. The IP address changes if you delete and recreate your VPN gateway.
88
+
Zone-redundant and zonal gateways (gateway SKUs that have _AZ_ in the name) both rely on a _Standard SKU_ Azure public IP resource. Azure Standard SKU public IP resources must use a static allocation method. Therefore, you will have the public IP address for your VPN gateway as soon as you create the Standard SKU public IP resource you intend to use for it.
89
+
90
+
For non-zone-redundant and non-zonal gateways (gateway SKUs that do _not_ have _AZ_ in the name), you cannot get the VPN gateway IP address before it is created. The IP address changes only if you delete and re-create your VPN gateway.
88
91
89
92
### Can I request a Static Public IP address for my VPN gateway?
90
93
91
-
No. Only Dynamic IP address assignment is supported. However, this does not mean that the IP address changes after it has been assigned to your VPN gateway. The only time the VPN gateway IP address changes is when the gateway is deleted and re-created. The VPN gateway public IP address doesn't change across resizing, resetting, or other internal maintenance/upgrades of your VPN gateway.
94
+
As stated above, zone-redundant and zonal gateways (gateway SKUs that have _AZ_ in the name) both rely on a _Standard SKU_ Azure public IP resource. Azure Standard SKU public IP resources must use a static allocation method.
95
+
96
+
For non-zone-redundant and non-zonal gateways (gateway SKUs that do _not_ have _AZ_ in the name), only dynamic IP address assignment is supported. However, this doesn't mean that the IP address changes after it has been assigned to your VPN gateway. The only time the VPN gateway IP address changes is when the gateway is deleted and then re-created. The VPN gateway public IP address doesn't change when you resize, reset, or complete other internal maintenance and upgrades of your VPN gateway.
0 commit comments