You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-language-java.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -440,7 +440,7 @@ By default, any public or private certificates [uploaded to App Service Linux](c
440
440
441
441
More configuration may be necessary for encrypting your JDBC connection with certificates in the Java Key Store. Refer to the documentation for your chosen JDBC driver.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-network-isolation.md
+21-19Lines changed: 21 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,19 +18,19 @@ Azure Private Link provides private connectivity from a virtual network to Azure
18
18
19
19
### Advantages of Private Link
20
20
21
-
* Supported on Basic, Standard, and Premium Azure Cache for Redis instances.
22
-
* By using [Azure Private Link](../private-link/private-link-overview.md), you can connect to an Azure Cache instance from your virtual network via a private endpoint. The endpoint is assigned a private IP address in a subnet within the virtual network. With this private link, cache instances are available from both within the VNet and publicly.
23
-
* Once a private endpoint is created, access to the public network can be restricted through the `publicNetworkAccess` flag. This flag is set to `Disabled` by default, which will only allow private link access. You can set the value to `Enabled` or `Disabled` with a PATCH request. For more information, see [Azure Cache for Redis with Azure Private Link](cache-private-link.md).
24
-
* All external cache dependencies won't affect the VNet's NSG rules.
21
+
- Supported on Basic, Standard, and Premium Azure Cache for Redis instances.
22
+
- By using [Azure Private Link](../private-link/private-link-overview.md), you can connect to an Azure Cache instance from your virtual network via a private endpoint. The endpoint is assigned a private IP address in a subnet within the virtual network. With this private link, cache instances are available from both within the VNet and publicly.
23
+
- Once a private endpoint is created, access to the public network can be restricted through the `publicNetworkAccess` flag. This flag is set to `Disabled` by default, which will only allow private link access. You can set the value to `Enabled` or `Disabled` with a PATCH request. For more information, see [Azure Cache for Redis with Azure Private Link](cache-private-link.md).
24
+
- All external cache dependencies won't affect the VNet's NSG rules.
25
25
26
26
### Limitations of Private Link
27
27
28
-
* Network security groups (NSG) are disabled for private endpoints. However, if there are other resources on the subnet, NSG enforcement will apply to those resources.
29
-
* Currently, portal console support, and persistence to firewall storage accounts aren't supported.
30
-
* To connect to a clustered cache, `publicNetworkAccess` needs to be set to `Disabled` and there can only be one private endpoint connection.
28
+
- Network security groups (NSG) are disabled for private endpoints. However, if there are other resources on the subnet, NSG enforcement will apply to those resources.
29
+
- Currently, portal console support, and persistence to firewall storage accounts aren't supported.
30
+
- To connect to a clustered cache, `publicNetworkAccess` needs to be set to `Disabled`, and there can only be one private endpoint connection.
31
31
32
32
> [!NOTE]
33
-
> When adding a private endpoint to a cache instance, all Redis traffic will be moved to the private endpoint because of the DNS.
33
+
> When adding a private endpoint to a cache instance, all Redis traffic is moved to the private endpoint because of the DNS.
34
34
> Ensure previous firewall rules are adjusted before.
35
35
36
36
## Azure Virtual Network injection
@@ -39,30 +39,32 @@ VNet is the fundamental building block for your private network in Azure. VNet e
39
39
40
40
### Advantages of VNet injection
41
41
42
-
* When an Azure Cache for Redis instance is configured with a VNet, it's not publicly addressable. It can only be accessed from virtual machines and applications within the VNet.
43
-
* When VNet is combined with restricted NSG policies, it helps reduce the risk of data exfiltration.
44
-
* VNet deployment provides enhanced security and isolation for your Azure Cache for Redis. Subnets, access control policies, and other features further restrict access.
45
-
* Geo-replication is supported.
42
+
- When an Azure Cache for Redis instance is configured with a VNet, it's not publicly addressable. It can only be accessed from virtual machines and applications within the VNet.
43
+
- When VNet is combined with restricted NSG policies, it helps reduce the risk of data exfiltration.
44
+
- VNet deployment provides enhanced security and isolation for your Azure Cache for Redis. Subnets, access control policies, and other features further restrict access.
45
+
- Geo-replication is supported.
46
46
47
47
### Limitations of VNet injection
48
48
49
-
* VNet injected caches are only available for Premium Azure Cache for Redis.
50
-
* When using a VNet injected cache, you must change your VNet to cache dependencies such as CRLs/PKI, AKV, Azure Storage, Azure Monitor, and more.
49
+
- VNet injected caches are only available for Premium Azure Cache for Redis.
50
+
- When using a VNet injected cache, you must change your VNet to cache dependencies such as CRLs/PKI, AKV, Azure Storage, Azure Monitor, and more.
51
51
52
52
## Azure Firewall rules
53
53
54
54
[Azure Firewall](../firewall/overview.md) is a managed, cloud-based network security service that protects your Azure VNet resources. It’s a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.
55
55
56
56
### Advantages of firewall rules
57
57
58
-
* When firewall rules are configured, only client connections from the specified IP address ranges can connect to the cache. Connections from Azure Cache for Redis monitoring systems are always permitted, even if firewall rules are configured. NSG rules that you define are also permitted.
58
+
- When firewall rules are configured, only client connections from the specified IP address ranges can connect to the cache. Connections from Azure Cache for Redis monitoring systems are always permitted, even if firewall rules are configured. NSG rules that you define are also permitted.
59
59
60
60
### Limitations of firewall rules
61
61
62
-
* Firewall rules can be used with VNet injected caches, but not private endpoints currently.
62
+
- Firewall rules can be used with VNet injected caches, but not private endpoints.
63
+
- Firewall rules configuration is available for all Basic, Standard, and Premium tiers.
64
+
- Firewall rules configuration isn't available for Enterprise nor Enterprise Flash tiers.
63
65
64
66
## Next steps
65
67
66
-
* Learn how to configure a [VNet injected cache for a Premium Azure Cache for Redis instance](cache-how-to-premium-vnet.md).
67
-
* Learn how to configure [firewall rules for all Azure Cache for Redis tiers](cache-configure.md#firewall).
68
-
* Learn how to [configure private endpoints for all Azure Cache for Redis tiers](cache-private-link.md).
68
+
- Learn how to configure a [VNet injected cache for a Premium Azure Cache for Redis instance](cache-how-to-premium-vnet.md).
69
+
- Learn how to configure [firewall rules for all Azure Cache for Redis tiers](cache-configure.md#firewall).
70
+
- Learn how to [configure private endpoints for all Azure Cache for Redis tiers](cache-private-link.md).
Copy file name to clipboardExpand all lines: articles/data-factory/connector-azure-databricks-delta-lake.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ During copy activity execution, if the cluster you configured has been terminate
56
56
57
57
2. In the **Databricks Runtime Version** drop-down, select a Databricks runtime version.
58
58
59
-
3. Turn on [Auto Optimize](/azure/databricks/delta/optimizations/auto-optimize) by adding the following properties to your [Spark configuration](/azure/databricks/clusters/configure#spark-config):
59
+
3. Turn on [Auto Optimize](/azure/databricks/optimizations/auto-optimize) by adding the following properties to your [Spark configuration](/azure/databricks/clusters/configure#spark-config):
Copy file name to clipboardExpand all lines: articles/healthcare-apis/events/events-disable-delete-workspace.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,37 +1,36 @@
1
1
---
2
-
title: Disable events and delete workspaces - Azure Health Data Services
3
-
description: This article provides resources on how to disable Events and delete workspaces.
2
+
title: Disable Events and delete workspaces - Azure Health Data Services
3
+
description: This article provides resources on how to disable the Events service and delete workspaces.
4
4
services: healthcare-apis
5
5
author: msjasteppe
6
6
ms.service: healthcare-apis
7
7
ms.subservice: fhir
8
8
ms.topic: how-to
9
-
ms.date: 07/06/2022
9
+
ms.date: 09/22/2022
10
10
ms.author: jasteppe
11
11
---
12
12
13
-
# Disable events and delete workspaces
13
+
# Disable Events and delete workspaces
14
14
15
15
In this article, you'll learn how to disable the Events feature and delete workspaces in the Azure Health Data Services.
16
16
17
-
## Disable events
17
+
## Disable Events
18
18
19
-
To disable events from sending event messages for a single Event Subscription, the Event Subscription must be deleted.
19
+
To disable Events from sending event messages for a single **Event Subscription**, the **Event Subscription** must be deleted.
20
20
21
-
1. Select the Event Subscription to be deleted. In this example, we'll be selecting an Event Subscription named **fhir-events**.
21
+
1. Select the **Event Subscription** to be deleted. In this example, we'll be selecting an Event Subscription named **fhir-events**.
22
22
23
23
:::image type="content" source="media/disable-delete-workspaces/events-select-subscription.png" alt-text="Screenshot of Events subscriptions and select event subscription to be deleted." lightbox="media/disable-delete-workspaces/events-select-subscription.png":::
24
24
25
25
2. Select **Delete** and confirm the Event Subscription deletion.
26
26
27
27
:::image type="content" source="media/disable-delete-workspaces/events-select-subscription-delete.png" alt-text="Screenshot of events subscriptions and select delete and confirm the event subscription to be deleted." lightbox="media/disable-delete-workspaces/events-select-subscription-delete.png":::
28
28
29
-
3. To completely disable Events, delete all Event Subscriptions so that no Event Subscriptions remain.
29
+
3. To completely disable Events, delete all **Event Subscriptions** so that no **Event Subscriptions** remain.
30
30
31
31
:::image type="content" source="media/disable-delete-workspaces/events-disable-no-subscriptions.png" alt-text="Screenshot of Events subscriptions and delete all event subscriptions to disable events." lightbox="media/disable-delete-workspaces/events-disable-no-subscriptions.png":::
32
32
33
33
> [!NOTE]
34
-
>
35
34
> The Fast Healthcare Interoperability Resources (FHIR®) service will automatically go into an **Updating** status to disable the Events extension when a full delete of Event Subscriptions is executed. The FHIR service will remain online while the operation is completing.
36
35
37
36
## Delete workspaces
@@ -46,7 +45,7 @@ As an example:
46
45
47
46
## Next steps
48
47
49
-
For more information about how to troubleshoot Events, see
48
+
For more information about troubleshooting Events, see the Events troubleshooting guide:
Copy file name to clipboardExpand all lines: articles/mysql/flexible-server/concepts-high-availability.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,7 +163,7 @@ You can disable HA on a server after you create it. Billing stops immediately.
163
163
You need to be able to mitigate downtime for your application even when you're not using HA. Service downtime, like scheduled patches, minor version upgrades, or customer-initiated operations like scaling of compute can be performed during scheduled maintenance windows. To mitigate application impact for Azure-initiated maintenance tasks, you can schedule them on a day of the week and time that minimizes the impact on the application.</br>
164
164
165
165
-**Can I use a read replica for an HA-enabled server?**</br>
166
-
Read replicas aren't supported for HA servers. This feature is on our roadmap, and we're working to make it available soon.</br>
166
+
Yes, read replicas are supported for HA servers.</br>
167
167
168
168
-**Can I use Data-in Replication for HA servers?**</br>
169
169
Data-in Replication isn't supported for HA servers. But Data-in Replication for HA servers is on our roadmap and will be available soon. For now, if you want to use Data-in Replication for migration, you can follow these steps:
Copy file name to clipboardExpand all lines: articles/mysql/flexible-server/concepts-read-replicas.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,6 +75,9 @@ Azure Database for MySQL Flexible Server provides the **Replication lag in secon
75
75
76
76
If you see increased replication lag, refer to [troubleshooting replication latency](./../howto-troubleshoot-replication-latency.md) to troubleshoot and understand possible causes.
77
77
78
+
>[!IMPORTANT]
79
+
>Read Replica on HA server uses storage based replication technology, which no longer uses 'SLAVE_IO_RUNNING' metric available in MySQL's 'SHOW SLAVE STATUS' command. The value of it will always be displayed as "No" and is not indicative of replication status.
80
+
78
81
## Stop replication
79
82
80
83
You can stop replication between a source and a replica. After replication is stopped between a source server and a read replica, the replica becomes a standalone server. The data in the standalone server is the data that was available on the replica at the time the stop replication command was started. The standalone server doesn't catch up with the source server.
@@ -138,7 +141,6 @@ If GTID is enabled on a source server (`gtid_mode` = ON), newly created replicas
138
141
139
142
| Scenario | Limitation/Consideration |
140
143
|:-|:-|
141
-
| Replica on server with HA enabled | Not supported |
142
144
| Replica on server in Burstable Pricing Tier| Not supported |
143
145
| Cross region read replication | Not supported |
144
146
| Pricing | The cost of running the replica server is based on the region where the replica server is running |
Copy file name to clipboardExpand all lines: articles/mysql/flexible-server/how-to-read-replicas-cli.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,6 @@ In this article, you will learn how to create and manage read replicas in the Az
18
18
19
19
[!Note]
20
20
>
21
-
> * Replica is not supported on high availability enabled server.
22
-
>
23
21
> * If GTID is enabled on a primary server (`gtid_mode` = ON), newly created replicas will also have GTID enabled and use GTID based replication. To learn more refer to [Global transaction identifier (GTID)](concepts-read-replicas.md#global-transaction-identifier-gtid)
Copy file name to clipboardExpand all lines: articles/mysql/flexible-server/how-to-read-replicas-portal.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ ms.date: 06/17/2021
16
16
In this article, you will learn how to create and manage read replicas in the Azure Database for MySQL flexible server using the Azure portal.
17
17
18
18
> [!Note]
19
-
>
20
-
> * Replica is not supported on high availability enabled server.
21
-
>
19
+
>
22
20
> * If GTID is enabled on a primary server (`gtid_mode` = ON), newly created replicas will also have GTID enabled and use GTID based replication. To learn more refer to [Global transaction identifier (GTID)](concepts-read-replicas.md#global-transaction-identifier-gtid)
Copy file name to clipboardExpand all lines: articles/mysql/flexible-server/whats-new.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,17 @@ This article summarizes new releases and features in Azure Database for MySQL -
23
23
> This article contains references to the term slave, a term that Microsoft no longer uses. When the term is removed from the software, we'll remove it from this article.
24
24
25
25
## September 2022
26
+
-**Read replica for HA enabled Azure Database for MySQL - Flexible Server (General Availability)**
27
+
28
+
The read replica feature allows you to replicate data from an Azure Database for MySQL flexible server to a read-only server. You can replicate the source server to up to 10 replicas. This functionality is now extended to support HA enabled servers within same region.[Learn more](concepts-read-replicas.md)
29
+
30
+
31
+
32
+
-**Azure Active Directory authentication for Azure Database for MySQL – Flexible Server (Public Preview)**
33
+
34
+
You can now authenticate to Azure Database for MySQL - Flexible server using Microsoft Azure Active Directory (Azure AD) using identities. With Azure AD authentication, you can manage database user identities and other Microsoft services in a central location, which simplifies permission management. [Learn More](concepts-azure-ad-authentication.md)
35
+
36
+
26
37
27
38
-**Customer managed keys data encryption – Azure Database for MySQL – Flexible Server (Preview)**
0 commit comments