Skip to content

Commit 95fbf8c

Browse files
authored
Merge pull request #284920 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 8/18
2 parents 9b8c1b9 + fc555db commit 95fbf8c

File tree

147 files changed

+1077
-569
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+1077
-569
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4554,6 +4554,21 @@
45544554
"source_path_from_root": "/articles/virtual-network/tutorial-restrict-network-access-to-resources-powershell.md",
45554555
"redirect_url": "/azure/virtual-network/tutorial-restrict-network-access-to-resources",
45564556
"redirect_document_id": false
4557+
},
4558+
{
4559+
"source_path_from_root": "/articles/virtual-network/how-to-create-encryption-portal.md",
4560+
"redirect_url": "/azure/virtual-network/how-to-create-encryption",
4561+
"redirect_document_id": false
4562+
},
4563+
{
4564+
"source_path_from_root": "/articles/virtual-network/how-to-create-encryption-powershell.md",
4565+
"redirect_url": "/azure/virtual-network/how-to-create-encryption",
4566+
"redirect_document_id": false
4567+
},
4568+
{
4569+
"source_path_from_root": "/articles/virtual-network/how-to-create-encryption-cli.md",
4570+
"redirect_url": "/azure/virtual-network/how-to-create-encryption",
4571+
"redirect_document_id": false
45574572
}
45584573
]
45594574
}

articles/azure-functions/functions-create-first-quarkus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -305,7 +305,7 @@ Now that you've opened your Azure function in the portal, here are more features
305305
306306
## Clean up resources
307307
308-
If you don't need these resources, you can delete them by running the following command in Azure Cloud Shell or on your local terminal:
308+
If you don't need these resources, you can delete them by running the following command:
309309
310310
```azurecli
311311
az group delete --name <yourResourceGroupName> --yes

articles/azure-monitor/agents/data-collection-log-json.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,10 @@ Invoke-AzRestMethod -Path "/subscriptions/{subscription}/resourcegroups/{resourc
105105
> The agent based JSON custom file ingestion is currently in preview and does not have a complete UI experience in the portal yet. While you can create the DCR using the portal, you must modify it to define the columns in the incoming stream. This section includes details on creating the DCR using an ARM template.
106106
107107
### Incoming stream schema
108+
109+
> [!NOTE]
110+
> Multiline support that uses an [ISO 8601](https://wikipedia.org/wiki/ISO_8601) time stamp to delimited events is expected mid-October 2024
111+
108112
JSON files include a property name with each value, and the incoming stream in the DCR needs to include a column matching the name of each property. You need to modify the `columns` section of the ARM template with the columns from your log.
109113

110114
The following table describes optional columns that you can include in addition to the columns defining the data in your log file.

articles/azure-monitor/agents/data-collection-log-text.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,10 @@ Adhere to the following recommendations to ensure that you don't experience data
4949

5050

5151
## Incoming stream
52+
53+
> [!NOTE]
54+
> Multiline support that uses an [ISO 8601](https://wikipedia.org/wiki/ISO_8601) time stamp to delimited events is expected mid-October 2024
55+
5256
The incoming stream of data includes the columns in the following table.
5357

5458
| Column | Type | Description |

articles/azure-monitor/autoscale/autoscale-custom-metric.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Azure Monitor autoscale applies to:
2727
+ [Azure Cloud Services](https://azure.microsoft.com/services/cloud-services/)
2828
+ [Azure App Service - Web Apps](https://azure.microsoft.com/services/app-service/web/)
2929
+ [Azure Data Explorer cluster](https://azure.microsoft.com/services/data-explorer/)
30-
+ Integration service environment and [Azure API Management](../../api-management/api-management-key-concepts.md)
30+
+ [Azure API Management](../../api-management/api-management-key-concepts.md)
3131

3232
## Prerequisite
3333

articles/connectors/built-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ For a smaller number of services, systems, and protocols, Azure Logic Apps provi
1717

1818
For example, a Standard workflow can use both managed connectors and built-in connectors for Azure Blob Storage, Azure Cosmos DB, Azure Event Hubs, Azure Service Bus, FTP, IBM DB2, IBM MQ, SFTP, and SQL Server. A Consumption workflow doesn't have the built-in versions. A Consumption workflow can use built-in connectors for Azure API Management, and Azure App Service, while a Standard workflow doesn't have these built-in connectors.
1919

20-
Also, in Standard workflows, some [built-in connectors with specific attributes are informally known as *service providers*](../logic-apps/custom-connector-overview.md#service-provider-interface-implementation). Some built-in connectors support only a single way to authenticate a connection to the underlying service. Other built-in connectors can offer a choice, such as using a connection string, Microsoft Entra ID, or a managed identity. All built-in connectors run in the same process as the Azure Logic Apps runtime. For more information, review [Single-tenant versus multitenant and integration service environment (ISE)](../logic-apps/single-tenant-overview-compare.md).
20+
Also, in Standard workflows, some [built-in connectors with specific attributes are informally known as *service providers*](../logic-apps/custom-connector-overview.md#service-provider-interface-implementation). Some built-in connectors support only a single way to authenticate a connection to the underlying service. Other built-in connectors can offer a choice, such as using a connection string, Microsoft Entra ID, or a managed identity. All built-in connectors run in the same process as the Azure Logic Apps runtime. For more information, review [Single-tenant versus multitenant in Azure Logic Apps](../logic-apps/single-tenant-overview-compare.md).
2121

2222
This article provides a general overview about built-in connectors in Consumption workflows versus Standard workflows.
2323

articles/connectors/introduction.md

Lines changed: 22 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This overview provides a high-level introduction to connectors and how they gene
2929

3030
## Built-in connectors versus managed connectors
3131

32-
In Azure Logic Apps, connectors are either *built in* or *managed*. Some connectors have both versions. The available versions depend on whether you create a *Consumption* logic app workflow that runs in multi-tenant Azure Logic Apps or a *Standard* logic app workflow that runs in single-tenant Azure Logic Apps. For more information about logic app resource types, see [Resource types and host environment differences](../logic-apps/logic-apps-overview.md#resource-environment-differences).
32+
In Azure Logic Apps, connectors are either *built in* or *managed*. Some connectors have both versions. The available versions depend on whether you create a *Consumption* logic app workflow that runs in multitenant Azure Logic Apps or a *Standard* logic app workflow that runs in single-tenant Azure Logic Apps. For more information about logic app resource types, see [Resource types and host environment differences](../logic-apps/logic-apps-overview.md#resource-environment-differences).
3333

3434
* [Built-in connectors](built-in.md) are designed to run directly and natively inside Azure Logic Apps.
3535

@@ -120,7 +120,7 @@ If your workflows also use managed connectors, such as the Office 365 Outlook co
120120

121121
## Custom connectors and APIs
122122

123-
In Consumption workflows for multi-tenant Azure Logic Apps, you can call Swagger-based or SOAP-based APIs that aren't available as out-of-the-box connectors. You can also run custom code by creating custom API Apps. For more information, see the following documentation:
123+
In Consumption workflows for multitenant Azure Logic Apps, you can call Swagger-based or SOAP-based APIs that aren't available as out-of-the-box connectors. You can also run custom code by creating custom API Apps. For more information, see the following documentation:
124124

125125
* [Swagger-based or SOAP-based custom connectors for Consumption workflows](../logic-apps/custom-connector-overview.md#custom-connector-consumption)
126126

@@ -138,7 +138,17 @@ In Standard workflows for single-tenant Azure Logic Apps, you can create nativel
138138

139139
## ISE and connectors
140140

141-
For workflows that need direct access to resources in an Azure virtual network, you can use a dedicated [integration service environment (ISE)](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md) where you can build, deploy, and run your workflows on dedicated resources.
141+
> [!IMPORTANT]
142+
>
143+
> On August 31, 2024, the ISE resource retires, due to its dependency on Azure Cloud Services (classic),
144+
> which retires at the same time. Before the retirement date, export any logic apps from your ISE to Standard
145+
> logic apps to avoid service disruption. Standard logic app workflows run in single-tenant Azure Logic Apps
146+
> and provide the same capabilities plus more. For example, Standard workflows support using private endpoints
147+
> for inbound traffic so that your workflows can communicate privately and securely with virtual networks.
148+
> Standard workflows also support virtual network integration for outbound traffic. For more information,
149+
> review [Secure traffic between virtual networks and single-tenant Azure Logic Apps using private endpoints](/azure/logic-apps/secure-single-tenant-workflow-virtual-network-private-endpoint).
150+
151+
If you use a dedicated [integration service environment (ISE)](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md) where workflows can directly access to resources in an Azure virtual network, you can build, deploy, and run your workflows on dedicated resources.
142152

143153
Custom connectors created within an ISE don't work with the on-premises data gateway. However, these connectors can directly access on-premises data sources that are connected to an Azure virtual network hosting the ISE. So, logic app workflows in an ISE most likely don't need the data gateway when communicating with those resources. If you have custom connectors that you created outside an ISE that require the on-premises data gateway, workflows in an ISE can use those connectors.
144154

@@ -147,36 +157,20 @@ In the workflow designer, when you browse the built-in connectors or managed con
147157
:::row:::
148158
:::column:::
149159
![Example CORE connector](./media/apis-list/example-core-connector.png)
150-
\
151-
\
152-
**CORE**
153-
\
154-
\
155-
Built-in connectors with this label run in the same ISE as your workflows.
160+
<br><br>**CORE**
161+
<br><br>Built-in connectors with this label run in the same ISE as your workflows.
156162
:::column-end:::
157163
:::column:::
158164
![Example ISE connector](./media/apis-list/example-ise-connector.png)
159-
\
160-
\
161-
**ISE**
162-
\
163-
\
164-
Managed connectors with this label run in the same ISE as your workflows.
165-
\
166-
\
167-
If you have an on-premises system that's connected to an Azure virtual network, an ISE lets your workflows directly access that system without using the [on-premises data gateway](../logic-apps/logic-apps-gateway-connection.md). Instead, you can either use that system's **ISE** connector if available, an HTTP action, or a [custom connector](#custom-connectors-and-apis).
168-
\
169-
\
170-
For on-premises systems that don't have **ISE** connectors, use the on-premises data gateway. To find available ISE connectors, review [ISE connectors](#ise-and-connectors).
165+
<br><br>**ISE**
166+
<br><br>Managed connectors with this label run in the same ISE as your workflows.
167+
<br><br>If you have an on-premises system that's connected to an Azure virtual network, an ISE lets your workflows directly access that system without using the [on-premises data gateway](../logic-apps/logic-apps-gateway-connection.md). Instead, you can either use that system's **ISE** connector if available, an HTTP action, or a [custom connector](#custom-connectors-and-apis).
168+
<br><br>For on-premises systems that don't have **ISE** connectors, use the on-premises data gateway. To find available ISE connectors, review [ISE connectors](#ise-and-connectors).
171169
:::column-end:::
172170
:::column:::
173-
![Example non-ISE connector](./media/apis-list/example-multi-tenant-connector.png)
174-
\
175-
\
176-
No label
177-
\
178-
\
179-
All other connectors without a label, which you can continue to use, run in the global, multi-tenant Logic Apps service.
171+
![Example non-ISE connector](./media/apis-list/example-multitenant-connector.png)
172+
<br><br>No label
173+
<br><br>All other connectors without a label, which you can continue to use, run in the global, multitenant Logic Apps service.
180174
:::column-end:::
181175
:::column:::
182176
:::column-end:::

articles/connectors/managed.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Managed connectors provide ways for you to access other services and systems whe
1515

1616
For a smaller number of services, systems and protocols, Azure Logic Apps provides a built-in version alongside the managed version. The number and range of built-in connectors vary based on whether you create a Consumption logic app workflow that runs in multitenant Azure Logic Apps or a Standard logic app workflow that runs in single-tenant Azure Logic Apps. In most cases, the built-in version provides better performance, capabilities, pricing, and so on. In a few cases, some built-in connectors are available only in one logic app workflow type, and not the other.
1717

18-
For example, a Standard workflow can use both managed connectors and built-in connectors for Azure Blob, Azure Cosmos DB, Azure Event Hubs, Azure Service Bus, DB2, FTP, MQ, SFTP, and SQL Server, while a Consumption workflow doesn't have the built-in versions. A Consumption workflow can use built-in connectors for Azure API Management, Azure App Services, and Batch, while a Standard workflow doesn't have these built-in connectors. For more information, review [Built-in connectors in Azure Logic Apps](built-in.md) and [Single-tenant versus multitenant and integration service environment (ISE)](../logic-apps/single-tenant-overview-compare.md).
18+
For example, a Standard workflow can use both managed connectors and built-in connectors for Azure Blob, Azure Cosmos DB, Azure Event Hubs, Azure Service Bus, DB2, FTP, MQ, SFTP, and SQL Server, while a Consumption workflow doesn't have the built-in versions. A Consumption workflow can use built-in connectors for Azure API Management, Azure App Services, and Batch, while a Standard workflow doesn't have these built-in connectors. For more information, review [Built-in connectors in Azure Logic Apps](built-in.md) and [Single-tenant versus multitenant in Azure Logic Apps](../logic-apps/single-tenant-overview-compare.md).
1919

2020
This article provides a general overview about managed connectors and the way they're organized in the Consumption workflow designer versus the Standard workflow designer with examples. For technical reference information about each managed connector in Azure Logic Apps, review [Connectors reference for Azure Logic Apps](/connectors/connector-reference/connector-reference-logicapps-connectors).
2121

@@ -37,8 +37,6 @@ Some managed connectors also fall into the following informal groups:
3737

3838
* [Integration account connectors](#integration-account-connectors) help you transform and validate XML, encode and decode flat files, and process business-to-business (B2B) messages using AS2, EDIFACT, and X12 protocols.
3939

40-
* [Integration service environment connectors](#ise-connectors) and are designed to run specifically in an ISE and provide benefits over their non-ISE versions.
41-
4240
<a name="standard-connectors"></a>
4341

4442
## Standard connectors

articles/container-apps/TOC.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -325,8 +325,6 @@
325325
href: user-defined-routes.md
326326
- name: Securing a custom VNET with an NSG
327327
href: firewall-integration.md
328-
- name: Network proxying
329-
href: network-proxy.md
330328
- name: Use a custom VNET
331329
href: vnet-custom.md
332330
- name: Languages and runtimes
@@ -335,6 +333,7 @@
335333
items:
336334
- name: Overview
337335
href: dotnet-overview.md
336+
displayName: .NET overview
338337
- name: Deploy a .NET Aspire app
339338
href: /dotnet/aspire/deployment/azure/aca-deployment
340339
- name: Deploy and scale an ASP.NET Core app

0 commit comments

Comments
 (0)