Skip to content

Commit 9b8463b

Browse files
authored
Merge pull request #102678 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 9a65269 + 92d8180 commit 9b8463b

File tree

4 files changed

+23
-23
lines changed

4 files changed

+23
-23
lines changed

articles/app-service-mobile/app-service-mobile-xamarin-forms-get-started-push.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,8 @@ With the back end configured with FCM, you can add components and codes to the c
196196
{
197197
var intent = new Intent(this, typeof(MainActivity));
198198
intent.AddFlags(ActivityFlags.ClearTop);
199-
var pendingIntent = PendingIntent.GetActivity(this, 0, intent, PendingIntentFlags.OneShot);
199+
//Unique request code to avoid PendingIntent collision.
200+
var requestCode = new Random().Next();
200201

201202
var notificationBuilder = new NotificationCompat.Builder(this)
202203
.SetSmallIcon(Resource.Drawable.ic_stat_ic_notification)

articles/azure-resource-manager/templates/template-functions-resource.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -473,7 +473,7 @@ Use `'Full'` when you need resource values that aren't part of the properties sc
473473
"tenantId": "[subscription().tenantId]",
474474
"accessPolicies": [
475475
{
476-
"tenantId": "[reference(reosurceId('Microsoft.Compute/virtualMachines', variables('vmName')), '2019-03-01', 'Full').identity.tenantId]",
476+
"tenantId": "[reference(resourceId('Microsoft.Compute/virtualMachines', variables('vmName')), '2019-03-01', 'Full').identity.tenantId]",
477477
"objectId": "[reference(resourceId('Microsoft.Compute/virtualMachines', variables('vmName')), '2019-03-01', 'Full').identity.principalId]",
478478
"permissions": {
479479
"keys": [

articles/network-watcher/network-watcher-packet-capture-manage-cli.md

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ This article assumes you have the following resources:
4747

4848
### Step 1
4949

50-
Run the `az vm extension set` cmdlet to install the packet capture agent on the guest virtual machine.
50+
Run the `az vm extension set` command to install the packet capture agent on the guest virtual machine.
5151

5252
For Windows virtual machines:
5353

@@ -58,17 +58,23 @@ az vm extension set --resource-group resourceGroupName --vm-name virtualMachineN
5858
For Linux virtual machines:
5959

6060
```azurecli
61-
az vm extension set --resource-group resourceGroupName --vm-name virtualMachineName --publisher Microsoft.Azure.NetworkWatcher --name NetworkWatcherAgentLinux--version 1.4
61+
az vm extension set --resource-group resourceGroupName --vm-name virtualMachineName --publisher Microsoft.Azure.NetworkWatcher --name NetworkWatcherAgentLinux --version 1.4
6262
```
6363

6464
### Step 2
6565

66-
To ensure that the agent is installed, run the `vm extension show` cmdlet and pass it the resource group and virtual machine name. Check the resulting list to ensure the agent is installed.
66+
To ensure that the agent is installed, run the `vm extension show` command and pass it the resource group and virtual machine name. Check the resulting list to ensure the agent is installed.
6767

68+
For Windows virtual machines:
6869
```azurecli
6970
az vm extension show --resource-group resourceGroupName --vm-name virtualMachineName --name NetworkWatcherAgentWindows
7071
```
7172

73+
For Linux virtual machines:
74+
```azurecli
75+
az vm extension show --resource-group resourceGroupName --vm-name virtualMachineName --name AzureNetworkWatcherExtension
76+
```
77+
7278
The following sample is an example of the response from running `az vm extension show`
7379

7480
```json
@@ -95,31 +101,24 @@ The following sample is an example of the response from running `az vm extension
95101

96102
Once the preceding steps are complete, the packet capture agent is installed on the virtual machine.
97103

98-
### Step 1
99-
100-
The next step is to retrieve the Network Watcher instance. TThe name of the Network Watcher is passed to the `az network watcher show` cmdlet in step 4.
101104

102-
```azurecli
103-
az network watcher show --resource-group resourceGroup --name networkWatcherName
104-
```
105-
106-
### Step 2
105+
### Step 1
107106

108107
Retrieve a storage account. This storage account is used to store the packet capture file.
109108

110109
```azurecli
111-
azure storage account list
110+
az storage account list
112111
```
113112

114-
### Step 3
113+
### Step 2
115114

116-
Filters can be used to limit the data that is stored by the packet capture. The following example sets up a packet capture with several filters. The first three filters collect outgoing TCP traffic only from local IP 10.0.0.3 to destination ports 20, 80 and 443. The last filter collects only UDP traffic.
115+
At this point, you are ready to create a packet capture. First, let's examine the parameters you may want to configure. Filters are one such parameter that can be used to limit the data that is stored by the packet capture. The following example sets up a packet capture with several filters. The first three filters collect outgoing TCP traffic only from local IP 10.0.0.3 to destination ports 20, 80 and 443. The last filter collects only UDP traffic.
117116

118117
```azurecli
119118
az network watcher packet-capture create --resource-group {resourceGroupName} --vm {vmName} --name packetCaptureName --storage-account {storageAccountName} --filters "[{\"protocol\":\"TCP\", \"remoteIPAddress\":\"1.1.1.1-255.255.255\",\"localIPAddress\":\"10.0.0.3\", \"remotePort\":\"20\"},{\"protocol\":\"TCP\", \"remoteIPAddress\":\"1.1.1.1-255.255.255\",\"localIPAddress\":\"10.0.0.3\", \"remotePort\":\"80\"},{\"protocol\":\"TCP\", \"remoteIPAddress\":\"1.1.1.1-255.255.255\",\"localIPAddress\":\"10.0.0.3\", \"remotePort\":\"443\"},{\"protocol\":\"UDP\"}]"
120119
```
121120

122-
The following example is the expected output from running the `az network watcher packet-capture create` cmdlet.
121+
The following example is the expected output from running the `az network watcher packet-capture create` command.
123122

124123
```json
125124
{
@@ -174,13 +173,13 @@ roviders/microsoft.compute/virtualmachines/{vmName}/2017/05/25/packetcapture_16_
174173

175174
## Get a packet capture
176175

177-
Running the `az network watcher packet-capture show-status` cmdlet, retrieves the status of a currently running, or completed packet capture.
176+
Running the `az network watcher packet-capture show-status` command, retrieves the status of a currently running, or completed packet capture.
178177

179178
```azurecli
180179
az network watcher packet-capture show-status --name packetCaptureName --location {networkWatcherLocation}
181180
```
182181

183-
The following example is the output from the `az network watcher packet-capture show-status` cmdlet. The following example is when the capture is Stopped, with a StopReason of TimeExceeded.
182+
The following example is the output from the `az network watcher packet-capture show-status` command. The following example is when the capture is Stopped, with a StopReason of TimeExceeded.
184183

185184
```
186185
{
@@ -199,14 +198,14 @@ cketCaptures/packetCaptureName",
199198

200199
## Stop a packet capture
201200

202-
By running the `az network watcher packet-capture stop` cmdlet, if a capture session is in progress it is stopped.
201+
By running the `az network watcher packet-capture stop` command, if a capture session is in progress it is stopped.
203202

204203
```azurecli
205204
az network watcher packet-capture stop --name packetCaptureName --location westcentralus
206205
```
207206

208207
> [!NOTE]
209-
> The cmdlet returns no response when ran on a currently running capture session or an existing session that has already stopped.
208+
> The command returns no response when ran on a currently running capture session or an existing session that has already stopped.
210209
211210
## Delete a packet capture
212211

articles/virtual-network/ddos-protection-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ DDoS Protection Standard can mitigate the following types of attacks:
4747

4848
- **Volumetric attacks**: The attack's goal is to flood the network layer with a substantial amount of seemingly legitimate traffic. It includes UDP floods, amplification floods, and other spoofed-packet floods. DDoS Protection Standard mitigates these potential multi-gigabyte attacks by absorbing and scrubbing them, with Azure’s global network scale, automatically.
4949
- **Protocol attacks**: These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stack. It includes, SYN flood attacks, reflection attacks, and other protocol attacks. DDoS Protection Standard mitigates these attacks, differentiating between malicious and legitimate traffic, by interacting with the client, and blocking malicious traffic.
50-
- **Resource (application) layer attacks**: These attacks target web application packets, to disrupt the transmission of data between hosts. The attacks include HTTP protocol violations, SQL injection, cross-site scripting, and other layer 7 attacks. Use the Azure [Application Gateway web application firewall](../application-gateway/application-gateway-web-application-firewall-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json), with DDoS Protection Standard, to provide defense against these attacks. There are also third-party web application firewall offerings available in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps?page=1&search=web%20application%20firewall).
50+
- **Resource (application) layer attacks**: These attacks target web application packets, to disrupt the transmission of data between hosts. The attacks include HTTP protocol violations, SQL injection, cross-site scripting, and other layer 7 attacks. Use a Web Application Firewall, such as the Azure [Application Gateway web application firewall](../application-gateway/application-gateway-web-application-firewall-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json), as well as DDoS Protection Standard to provide defense against these attacks. There are also third-party web application firewall offerings available in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps?page=1&search=web%20application%20firewall).
5151

52-
DDoS Protection Standard protects resources in a virtual network including public IP addresses associated with virtual machines, load balancers, and application gateways. When coupled with the Application Gateway web application firewall, DDoS Protection Standard can provide full layer 3 to layer 7 mitigation capability.
52+
DDoS Protection Standard protects resources in a virtual network including public IP addresses associated with virtual machines, load balancers, and application gateways. When coupled with the Application Gateway web application firewall, or a third-party web application firewall deployed in a virtual network with a public IP, DDoS Protection Standard can provide full layer 3 to layer 7 mitigation capability.
5353

5454
## DDoS Protection Standard features
5555

0 commit comments

Comments
 (0)