You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-diagnostic-logs.md
+134-1Lines changed: 134 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,9 +39,142 @@ Access logs categories for a network security perimeter are based on the results
39
39
> [!NOTE]
40
40
> The available access modes for a network security perimeter are **Transition** and **Enforced**. The **Transition** mode was previously named **Learning** mode. You may continue to see references to **Learning** mode in some instances.
41
41
42
+
## Access log schema
43
+
44
+
Every PaaS resource associated with the network security perimeter, generates access log(s) with unified log schema when enabled.
45
+
> [!NOTE]
46
+
> Network security perimeter access logs may have been aggregated. If the fields 'count' and 'timeGeneratedEndTime' are missing, consider the aggregation count as 1.
47
+
48
+
|**Value**|**Description**|
49
+
| --- | --- |
50
+
|**time**| The timestamp (UTC) of the first event in log aggregation window. |
51
+
|**timeGeneratedEndTime**| The timestamp (UTC) of the last event in the log aggregation window. |
52
+
|**count**| Number of logs aggregated. |
53
+
|**resourceId**| The resource Id of the network security perimeter.|
54
+
|**location**| The region of network security perimeter.|
55
+
|**operationName**| The name of the PaaS resource operation represented by this event. |
56
+
|**operationVersion**| The api-version associated with the operation. |
57
+
|**category**| Log categories defined for Access logs. |
58
+
|**properties**| Network security perimeter specific extended properties related to this category of events.|
59
+
|**resultDescription**| The static text description of this operation on the PaaS resource, e.g. “Get storage file.” |
60
+
61
+
## Network security perimeter specific properties
62
+
63
+
This section describes the network security perimeter specific properties in the log schema.
64
+
> [!NOTE]
65
+
> Application of the properties is subjected to log category type. Do refer respective log category schemas for applicability.
66
+
67
+
|**Value**|**Description**|
68
+
| --- | --- |
69
+
|**serviceResourceId**| Resource ID of PaaS resource emitting network security perimeter access logs. |
70
+
|**serviceFqdn**| Fully Qualified Domain Name of PaaS resource emitting network security perimeter access logs. |
71
+
|**profile**| Name of the network security perimeter profile associated to the resource. |
72
+
|**parameters**| List of optional PaaS resource properties in JSON string format. E.g., { {Param1}: {value1}, {Param2}: {value2}, ...}. |
73
+
|**appId**| Unique GUID representing the app ID of resource in the Azure Active Directory. |
74
+
|**matchedRule**| JSON property bag containing matched accessRule name, {"accessRule" : "{ruleName}"}. It can be either network security perimeter access rule Name or resource rule name (not the ArmId). |
75
+
|**source**| JSON property bag describing source of the inbound connection. |
76
+
|**destination**| JSON property bag describing destination of the outbound connection. |
77
+
|**accessRulesVersion**| JSON property bag containing access rule version of the resource. |
78
+
79
+
## Source properties
80
+
81
+
Properties describing source of inbound connection.
82
+
83
+
|**Value**|**Description**|
84
+
| --- | --- |
85
+
|**resourceId**| Resource ID of source PaaS resource for an inbound connection. Will exist if applicable. |
86
+
|**ipAddress**| IP address of source making inbound connection. Will exist if applicable. |
87
+
|**port**| Port number of inbound connection. May not exist for all resource types. |
88
+
|**protocol**| Application & transport layer protocols for inbound connection in format {AppProtocol}:{TptProtocol}. E.g., HTTPS:TCP. May not exist for all resource types. |
89
+
|**perimeterGuids**| List of perimeter GUIDs of source resource. It should be specified only if allowed based on perimeter GUID. |
90
+
|**appId**| Unique GUID representing the app ID of source in the Azure Active Directory. |
91
+
|**parameters**| List of optional source properties in JSON string format. E.g., { {Param1}: {value1}, {Param2}: {value2}, ...}. |
92
+
93
+
## Destination properties
94
+
Properties describing destination of outbound connection.
95
+
96
+
|**Value**|**Description**|
97
+
| --- | --- |
98
+
|**resourceId**| Resource ID of destination PaaS resource for an outbound connection. Will exist if applicable. |
99
+
|**fullyQualifiedDomainName**| Fully Qualified Domain (FQDN) name of the destination. |
100
+
|**parameters**| List of optional destination properties in JSON string format. E.g., { {Param1}: {value1}, {Param2}: {value2}, ...}. |
101
+
|**port**| Port number of outbound connection. May not exist for all resource types. |
102
+
|**protocol**| Application & transport layer protocols for outbound connection in the format {AppProtocol}:{TptProtocol}. E.g., HTTPS:TCP. May not exist for all resource types. |
"resultDescription" : "The static text description of this operation on the PaaS resource. For example, \"Get storage file.\""
172
+
}
173
+
```
174
+
42
175
## Logging destination options for access logs
43
176
44
-
The destinations for storing diagnostic logs for a network security perimeter include services like Log Analytic workspace, Azure Storage account, and Azure Event Hubs. For the full list and details of supported destinations, see [Supported destinations for diagnostic logs](/azure/azure-monitor/essentials/diagnostic-settings).
177
+
The destinations for storing diagnostic logs for a network security perimeter include services like Log Analytic workspace (**Table name: NSPAccessLogs**), Azure Storage account, and Azure Event Hubs. For the full list and details of supported destinations, see [Supported destinations for diagnostic logs](/azure/azure-monitor/essentials/diagnostic-settings).
Copy file name to clipboardExpand all lines: articles/sre-agent/overview.md
+26Lines changed: 26 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,6 +103,32 @@ Further, here are some prompts you can use to help you interact with your agent:
103
103
- List [Container Apps/Web Apps/etc.] that you’re managing across all subscriptions.
104
104
- Visualize split of Container Apps vs Web Apps vs AKS clusters managed across all subscriptions as a pie chart.
105
105
106
+
## Supported services
107
+
108
+
While Azure SRE Agent can help you manage and report on all Azure services, the agent features specialized tools for managing the following services:
109
+
110
+
- Azure API Management
111
+
- Azure App Service
112
+
- Azure Cache for Redis
113
+
- Azure Container Apps
114
+
- Azure Cosmos DB
115
+
- Azure Database for PostgreSQL
116
+
- Azure Functions
117
+
- Azure Kubernetes Service
118
+
- Azure SQL
119
+
- Azure Storage
120
+
- Azure Virtual Machines
121
+
122
+
To get the latest list of services with custom agent tooling, you can submit the following prompt to the agent:
123
+
124
+
```text
125
+
Which Azure services do you have specialized tooling available for?
126
+
```
127
+
128
+
### Identifying resource groups
129
+
130
+
As you create an agent, the resource group picker indicates groups that have instances of services with specialized tooling. From the resource group picker you'll see a checkmark (:::image type="icon" source="media/blue-check.png" border="false":::) next to the group name indicating the group includes services with specialized support.
131
+
106
132
## Preview access
107
133
108
134
Access to an SRE Agent is only available as in preview. To sign up for access, fill out the [SRE Agent application](https://go.microsoft.com/fwlink/?linkid=2319540).
Copy file name to clipboardExpand all lines: articles/storage/file-sync/file-sync-planning.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,9 +82,7 @@ Azure File Sync is supported with the following versions of Windows Server:
82
82
| Windows Server 2022 | Azure, Datacenter, Essentials, Standard, and IoT | Full and Core |
83
83
| Windows Server 2019 | Datacenter, Essentials, Standard, and IoT | Full and Core |
84
84
| Windows Server 2016 | Datacenter, Essentials, Standard, and Storage Server | Full and Core |
85
-
| Windows Server 2012 R2*| Datacenter, Essentials, Standard, and Storage Server | Full and Core |
86
85
87
-
*Requires downloading and installing [Windows Management Framework (WMF) 5.1](https://www.microsoft.com/download/details.aspx?id=54616). The appropriate package to download and install for Windows Server 2012 R2 is **Win8.1AndW2K12R2-KB\*\*\*\*\*\*\*-x64.msu**.
88
86
89
87
> [!IMPORTANT]
90
88
> We recommend keeping all servers that you use with Azure File Sync up to date with the latest updates from Windows Update.
title: Release notes for Arc-enabled VM extensions July 2025
3
+
description: Learn about Azure Arc-enabled VM extensions, including their latest releases, known issues, and bug fixes, in the month of July to help you manage updates effectively.
4
+
ms.service: azure-update-manager
5
+
ms.date: 07/09/2025
6
+
ms.topic: overview
7
+
author: habibaum
8
+
ms.author: v-uhabiba
9
+
---
10
+
11
+
# Release notes for Azure Arc-enabled VM extensions - July 25
12
+
13
+
For Azure Arc-enabled machines, two extensions are installed. For more information, see [How Update Manager works](workflow-update-manager.md)
14
+
15
+
16
+
The Azure Arc-enabled VM extensions receive improvements on an ongoing basis. This article provides you with the following information to help you stay up to date with the latest developments:
Copy file name to clipboardExpand all lines: articles/update-manager/overview-arc-enabled-vm-extensions.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Release notes of Arc-enabled VM extensions
2
+
title: Release notes of Arc-enabled VM extensions May 2025
3
3
description: Learn about Azure Arc-enabled VM extensions, including their latest releases, known issues, and bug fixes, to help you manage updates effectively.
4
4
ms.service: azure-update-manager
5
5
ms.date: 03/28/2025
@@ -9,12 +9,12 @@ ms.author: v-uhabiba
9
9
# Customer intent: "As a cloud administrator, I want to stay updated on the latest improvements and bug fixes for Azure Arc-enabled VM extensions, so that I can effectively manage updates and troubleshoot any issues that arise."
10
10
---
11
11
12
-
# Release notes for Azure Arc-enabled VM extensions
12
+
# Release notes for Azure Arc-enabled VM extensions - March 25
13
13
14
14
For Azure Arc-enabled machines, two extensions are installed. For more information, see [How Update Manager works](workflow-update-manager.md)
15
15
16
16
17
-
The Azure Arc-enabled VM extensions receive improvements on an ongoing basis. To stay up to date with the most recent developments, this article provides you with the information about:
17
+
The Azure Arc-enabled VM extensions receive improvements on an ongoing basis. This article provides you with the following information to help you stay up to date with the latest developments:
18
18
19
19
- The latest releases
20
20
- Known issues
@@ -33,7 +33,7 @@ The Azure Arc-enabled VM extensions receive improvements on an ongoing basis. To
33
33
- Current error message: *An internal error occurred while processing the operation.*
34
34
- New error message: *Windows update API threw an exception while assessing the machine for available updates. HResult: 0x80004005*
35
35
> [!NOTE]
36
-
> The HResult could be different, based on the issue.
36
+
> The HResult changes based on the issue.
37
37
38
38
- Fixed an issue where at times the extension status is stuck in **Creating state**. Then the assessment or install updates job fails with the following error: *Extension failed during enable. Extension Enable command timed out.*
39
39
@@ -43,7 +43,6 @@ The Azure Arc-enabled VM extensions receive improvements on an ongoing basis. To
43
43
44
44
To be updated as and when future versions are released.
0 commit comments