Skip to content

Commit 8ca598a

Browse files
authored
Merge pull request #294733 from MicrosoftDocs/main
2/17/2025 11:00 AM IST Publish
2 parents e859cbb + 4c2781d commit 8ca598a

File tree

4 files changed

+18
-11
lines changed

4 files changed

+18
-11
lines changed

articles/application-gateway/custom-error.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: how-to
8-
ms.date: 12/19/2023
8+
ms.date: 01/27/2025
99
ms.author: jaysoni
1010
ms.custom: devx-track-azurepowershell
1111
---
@@ -23,17 +23,17 @@ The custom error pages are supported for the following response codes:
2323

2424
| Response code | Description |
2525
| ---------- | ---------- |
26-
| 400 | Bad request (In preview) |
26+
| 400 | Bad request |
2727
| 403 | Forbidden |
28-
| 405 | Method not allowed (In preview) |
29-
| 408 | Request timeout (In preview) |
30-
| 500 | Internal Server Error (In preview) |
28+
| 405 | Method not allowed |
29+
| 408 | Request timeout |
30+
| 500 | Internal Server Error |
3131
| 502 | Bad gateway |
32-
| 503 | Service unavailable (In preview) |
33-
| 504 | Gateway timeout (In preview) |
32+
| 503 | Service unavailable |
33+
| 504 | Gateway timeout |
3434

3535
> [!Note]
36-
> - API version 2022-09-01 or later should be used to configure error pages for the new response codes (in preview).
36+
> - API version 2022-09-01 or later should be used to configure error pages for all available response codes.
3737
> - Response code 404 (Page not found) is currently unsupported.
3838
> - The custom error pages are displayed for response codes generated by Application Gateway. If an error originates from the backend server, it is passed along unmodified to the client.
3939

articles/communication-services/concepts/service-limits.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,13 @@ The following table lists limits for [Azure managed domains](../quickstarts/emai
163163

164164
For all message size limits, consider that Base64 encoding increases the size of the message. You need to increase the size value to account for the message size increase that occurs after the message attachments and any other binary data are Base64 encoded. Base64 encoding increases the size of the message by about 33%, so the message size is about 33% larger than the message sizes before encoding. For example, if you specify a maximum message size value of approximately 10 MB, you can expect a realistic maximum message size value of approximately 7.5 MB.
165165

166+
### Resource limits
167+
168+
| Name | Limit |
169+
| --- | --- |
170+
| SenderUsername/Mailfrom resource per domain | 100 |
171+
| Domains linked to a Communication Service resource | 100 |
172+
166173
### Send attachments larger than 10 MB
167174

168175
To email file attachments up to 30 MB, make a [support request](../support.md).

articles/data-factory/connector-microsoft-fabric-warehouse.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: jianleishen
77
ms.subservice: data-movement
88
ms.topic: conceptual
99
ms.custom: synapse
10-
ms.date: 09/04/2024
10+
ms.date: 02/11/2025
1111
---
1212

1313
# Copy and transform data in Microsoft Fabric Warehouse using Azure Data Factory or Azure Synapse Analytics
@@ -469,7 +469,7 @@ The following COPY statement settings are supported under `allowCopyCommand` in
469469

470470
When your source data is not natively compatible with COPY statement, enable data copying via an interim staging Azure Blob or Azure Data Lake Storage Gen2 (it can't be Azure Premium Storage). In this case, the service automatically converts the data to meet the data format requirements of COPY statement. Then it invokes COPY statement to load data into Microsoft Fabric Warehouse. Finally, it cleans up your temporary data from the storage. See [Staged copy](copy-activity-performance-features.md#staged-copy) for details about copying data via a staging.
471471

472-
To use this feature, create an [Azure Blob Storage linked service](connector-azure-blob-storage.md#linked-service-properties) or [Azure Data Lake Storage Gen2 linked service](connector-azure-data-lake-storage.md#linked-service-properties) with **account key or system-managed identity authentication** that refers to the Azure storage account as the interim storage.
472+
To use this feature, create an [Azure Blob Storage linked service](connector-azure-blob-storage.md#linked-service-properties) or [Azure Data Lake Storage Gen2 linked service](connector-azure-data-lake-storage.md#linked-service-properties) with **Shared access signature, anonymous or account key authentication** that refers to the Azure storage account as the interim storage.
473473

474474
>[!IMPORTANT]
475475
>- When you use managed identity authentication for your staging linked service, learn the needed configurations for [Azure Blob](connector-azure-blob-storage.md#managed-identity) and [Azure Data Lake Storage Gen2](connector-azure-data-lake-storage.md#managed-identity) respectively.

articles/virtual-network/virtual-network-encryption-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Azure Virtual Network encryption has the following limitations:
5151

5252
- In scenarios where a PaaS is involved, the virtual machine where the PaaS is hosted dictates if virtual network encryption is supported. The virtual machine must meet the listed requirements.
5353

54-
- For Internal load balancer, all virtual machines behind the load balancer must be a supported virtual machine SKU.
54+
- For Internal load balancer, all virtual machines behind the load balancer must be on a supported virtual machine SKU.
5555

5656
- **AllowUnencrypted** is the only supported enforcement at general availability. **DropUnencrypted** enforcement will be supported in the future.
5757

0 commit comments

Comments
 (0)