You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: mbender-ms
7
7
ms.service: azure-appgw-for-containers
8
8
ms.custom: devx-track-azurecli
9
9
ms.topic: quickstart
10
-
ms.date: 5/2/2025
10
+
ms.date: 7/9/2025
11
11
ms.author: mbender
12
12
# Customer intent: As a Kubernetes administrator, I want to install the Application Gateway for Containers ALB Controller on my AKS cluster, so that I can efficiently manage load balancing rules and enhance application traffic handling.
13
13
---
@@ -181,7 +181,6 @@ You need to complete the following tasks before deploying Application Gateway fo
Copy file name to clipboardExpand all lines: articles/bastion/quickstart-developer.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.custom: references_regions
15
15
In this quickstart, you learn how to connect to VMs using Azure Bastion Developer. In just a few seconds, you can connect to virtual machines (VM) in the virtual network at no extra cost via Bastion Developer using the private IP address of the VM. The VMs you connect to don't need a public IP address, client software, agent, or a special configuration. For more information about Azure Bastion, see [What is Azure Bastion](bastion-overview.md)?
16
16
17
17
> [!IMPORTANT]
18
-
> Bastion Developer is currently unavailable. We're working to restore service. As a workaround, you can use the [Basic SKU](tutorial-create-host-portal.md) or the [Standard SKU](quickstart-host-portal.md) to connect to your VMs. We'll update this article when Bastion Developer is available again.
18
+
> Bastion Developer is currently only available in East Asia, West Central US, UK South, and Central US. We're working to restore service in all public regions. As a workaround, you can use the [Basic SKU](tutorial-create-host-portal.md) or the [Standard SKU](quickstart-host-portal.md) to connect to your VMs. We'll update this article periodically as Bastion Developer becomes available in more regions.
19
19
20
20
[!INCLUDE [Bastion developer](../../includes/bastion-developer-description.md)] Virtual network peering isn't currently supported for Bastion Developer.
For more information, see [Microsoft.App/managedEnvironments](/azure/templates/microsoft.app/2024-02-02-preview/managedenvironments).
747
747
748
+
## Data resilience
749
+
750
+
In the event of a messaging inturruptions to an endpoint, the OpenTelemetry agent uses the following procedure to support data resilience:
751
+
752
+
-**In-memory buffering and retries**: The agent holds data in memory and keeps retrying (with backoff) for up to five minutes.
753
+
-**Dropping data**: If the buffered queue fills up, or the endpoint is still down after retries, the agent discards the oldest batches to avoid running out of memory.
754
+
748
755
## Environment variables
749
756
750
757
The OpenTelemetry agent automatically injects a set of environment variables into your application at runtime.
Copy file name to clipboardExpand all lines: articles/digital-twins/includes/digital-twins-sdks-control-plane.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,5 +18,5 @@ Here are the SDKs currently available for the Azure Digital Twins control plane
18
18
| .NET (C#) |[Azure.ResourceManager.DigitalTwins on NuGet](https://www.nuget.org/packages/Azure.ResourceManager.DigitalTwins)|[Reference for Azure DigitalTwins SDK for .NET](/dotnet/api/overview/azure/digitaltwins)|[Microsoft Azure Digital Twins management client library for .NET on GitHub](https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/digitaltwins/Azure.ResourceManager.DigitalTwins)|
19
19
| Java |[azure-resourcemanager-digitaltwins on Maven](https://repo1.maven.org/maven2/com/azure/resourcemanager/azure-resourcemanager-digitaltwins/)|[Reference for Resource Management - Digital Twins](/java/api/overview/azure/digital-twins)|[Azure Resource Manager AzureDigitalTwins client library for Java on GitHub](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/digitaltwins)|
20
20
| JavaScript |[AzureDigitalTwinsManagement client library for JavaScript on npm](https://www.npmjs.com/package/@azure/arm-digitaltwins)||[AzureDigitalTwinsManagement client library for JavaScript on GitHub](https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/digitaltwins/arm-digitaltwins)|
21
-
| Python |[azure-mgmt-digitaltwins on PyPI](https://pypi.org/project/azure-mgmt-digitaltwins/)||[Microsoft Azure SDK for Python on GitHub](https://github.com/Azure/azure-sdk-for-python/tree/release/v3/sdk/digitaltwins/azure-mgmt-digitaltwins)|
21
+
| Python |[azure-mgmt-digitaltwins on PyPI](https://pypi.org/project/azure-mgmt-digitaltwins/)||[Microsoft Azure SDK for Python on GitHub](https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/digitaltwins/azure-mgmt-digitaltwins)|
22
22
| Go | [azure-sdk-for-go/services/digitaltwins/mgmt](https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/services/digitaltwins/mgmt) | | [Azure SDK for Go on GitHub](https://github.com/Azure/azure-sdk-for-go)
Copy file name to clipboardExpand all lines: articles/firewall-manager/policy-overview.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Azure Firewall Manager policy overview
3
3
description: Learn about Azure Firewall Manager policies.
4
-
author: duongau
4
+
author: sujamiya
5
5
ms.service: azure-firewall-manager
6
6
services: firewall-manager
7
7
ms.topic: concept-article
8
-
ms.date: 03/06/2024
9
-
ms.author: duau
8
+
ms.date: 07/09/2025
9
+
ms.author: sujamiya
10
10
---
11
11
12
12
# Azure Firewall Manager policy overview
@@ -21,7 +21,7 @@ A policy can be created and managed in multiple ways, including the Azure portal
21
21
22
22
You can also migrate existing Classic rules from Azure Firewall using the portal or Azure PowerShell to create policies. For more information, see [How to migrate Azure Firewall configurations to Azure Firewall policy](migrate-to-policy.md).
23
23
24
-
Policies can be associated with one or more virtual hubs or VNets. The firewall can be in any subscription associated with your account and in any region.
24
+
Policies can be associated with one or more firewalls deployed in either a Virtual WAN (creating a Secured Virtual Hub) or a Virtual Network (creating a Hub Virtual Network). Firewalls can reside in any region or subscription linked to your account.
25
25
26
26
## Classic rules and policies
27
27
@@ -31,7 +31,7 @@ Azure Firewall supports both Classic rules and policies, but policies is the rec
31
31
| Subject | Policy | Classic rules |
32
32
| ------- | ------- | ----- |
33
33
|Contains |NAT, Network, Application rules, custom DNS and DNS proxy settings, IP Groups, and Threat Intelligence settings (including allowlist), IDPS, TLS Inspection, Web Categories, URL Filtering|NAT, Network, and Application rules, custom DNS and DNS proxy settings, IP Groups, and Threat Intelligence settings (including allowlist)|
34
-
|Protects |Virtual hubs and Virtual Networks|Virtual Networks only|
34
+
|Protects |Virtual Hubs (VWAN) and Virtual Networks|Virtual Networks only|
35
35
|Portal experience |Central management using Firewall Manager|Standalone firewall experience|
36
36
|Multiple firewall support |Firewall Policy is a separate resource that can be used across firewalls|Manually export and import rules, or using third-party management solutions |
37
37
|Pricing |Billed based on firewall association. See [Pricing](#pricing).|Free|
@@ -51,17 +51,19 @@ Azure Firewall supports Basic, Standard, and Premium policies. The following tab
51
51
52
52
## Hierarchical policies
53
53
54
-
New policies can be created from scratch or inherited from existing policies. Inheritance allows DevOps to create local firewall policies on top of organization mandated base policy.
54
+
New firewall policies can either be created from scratch or inherited from existing policies. Inheritance allows DevOps to define local firewall policies on top of organization mandated base policies.
55
55
56
-
Policies created with non-empty parent policies inherit all rule collections from the parent policy. The parent policy and the child policy must be in the same region. A firewall policycan be associated with firewalls across regions regardless where they're stored.
56
+
When a new policy is created with a non-empty parent policy, it inherits all rule collections from the parent. Both the parent and child policies must reside in the same region. However, a firewall policy, regardless of where it is stored, can be associated with firewalls in any region.
57
57
58
-
Network rule collections inherited from a parent policy are always prioritized over network rule collections defined as part of a new policy. The same logic also applies to application rule collections. However, network rule collections are always processed before application rule collections regardless of inheritance.
58
+
### Rule inheritance ###
59
+
Network rule collections inherited from the parent policy are always prioritized over network rule collections defined as part of a new policy. The same logic also applies to application rule collections. Regardless of inheritance, network rule collections are processed before application rule collections.
59
60
60
-
Threat Intelligence mode is also inherited from the parent policy. You can set your threat Intelligence mode to a different value to override this behavior, but you can't turn it off. It's only possible to override with a stricter value. For example, if your parent policy is set to **Alert only**, you can configure this local policy to **Alert and deny**.
61
+
NAT rule collections are not inherited, as they are specific to individual firewalls. If you want to use NAT rules, you must define them in the child policy.
61
62
62
-
Like Threat Intelligence mode, the Threat Intelligence allowlist is inherited from the parent policy. The child policy can add more IP addresses to the allowlist.
63
+
### Threat Intelligence mode and allowlist inheritance ###
64
+
Threat Intelligence mode is also inherited from the parent policy. While you can override this setting in the child policy, it must be with a stricter mode - you cannot disable it. For example, if your parent policy is set to **Alert only**, the child policy can be set to **Alert and deny**, but not to a less strict mode.
63
65
64
-
NAT rule collections aren't inherited because they're specific to a given firewall.
66
+
Similarly, the Threat Intelligence allowlist is inherited from the parent policy, and the child policy can append additional IP addresses to this list.
65
67
66
68
With inheritance, any changes to the parent policy are automatically applied down to associated firewall child policies.
Copy file name to clipboardExpand all lines: articles/oracle/oracle-db/oracle-database-regions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ The list below mentions the Azure and corresponding OCI regions with the regiona
57
57
| West US | US West (San Jose) | ✓ | ✓ | ✓|| Preview available | Single |
58
58
| Central US | US Midwest (Chicago) | ✓ | ✓ | ✓ ||| Dual |
59
59
| East US 2 | US East (Ashburn) | ✓ ||||| Dual |
60
-
| South Central US | ✓ |||||| Dual |
60
+
| South Central US |Dallas| ✓ ||||| Dual |
61
61
62
62
> [!NOTE]
63
63
> To provision Oracle Database@Azure resources in a supported region, your tenancy must be subscribed to the target region. Learn how to [manage regions](https://docs.oracle.com/iaas/Content/Identity/regions/managingregions.htm#Managing_Regions) and [subscribe to an infrastructure region](https://docs.oracle.com/iaas/Content/Identity/regions/To_subscribe_to_an_infrastructure_region.htm#subscribe).
0 commit comments