Skip to content

Commit b5ad7e3

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into us303970-content-curation
2 parents 878ee75 + aae5c92 commit b5ad7e3

File tree

8 files changed

+23
-19
lines changed

8 files changed

+23
-19
lines changed

articles/expressroute/about-fastpath.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: expressroute
55
author: duongau
66
ms.service: azure-expressroute
77
ms.topic: conceptual
8-
ms.date: 09/02/2024
8+
ms.date: 11/7/2024
99
ms.author: duau
1010
ms.custom: template-concept, references_regions, engagement-fy23
1111
---
@@ -40,6 +40,10 @@ While FastPath supports many configurations, it doesn't support the following fe
4040

4141
* Load Balancers: If you deploy an Azure internal load balancer in your virtual network or the Azure PaaS service you deploy in your virtual network, the network traffic from your on-premises network to the virtual IPs hosted on the load balancer is sent to the virtual network gateway.
4242

43+
* Gateway Transit: If you deploy two peered hub virtual networks connected to one circuit, you need to make sure to set the Allow Gateway Transit on the virtual network peering to false, otherwise you will experience connectivity issues.
44+
45+
* Use Remote Gateway: If you deploy a spoke vnet peered to two hub vnets, you can only use one hub gateway as the remote gateway. If you use both as a remote gateway, you will experience connectivity issues.
46+
4347
* Private Link: FastPath Connectivity to a private endpoint or Private Link service over an ExpressRoute Direct circuit is supported for limited scenarios. For more information, see [enable FastPath and Private Link for 100-Gbps ExpressRoute Direct](expressroute-howto-linkvnet-arm.md#fastpath-virtual-network-peering-user-defined-routes-udrs-and-private-link-support-for-expressroute-direct-connections). FastPath connectivity to a Private endpoint/Private Link service isn't supported for ExpressRoute partner provider circuits.
4448

4549
* DNS Private Resolver: Azure ExpressRoute FastPath doesn't support connectivity to [DNS Private Resolver](../dns/dns-private-resolver-overview.md).

articles/storage-actions/storage-tasks/storage-task-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ The following table shows the supported operations, parameters, and parameter va
9494

9595
| Operation | Parameters | Values |
9696
|------------------------------|----------------------|------------------------------------------------|
97-
| SetBlobTier | tier | Hot \| Cold \| Archive |
97+
| SetBlobTier | tier | Hot \| Cool \| Archive |
9898
| SetBlobExpiry | expiryTime, expiryOption |(expiryTime): Number of milliseconds<br>(expiryOption): Absolute \| NeverExpire \| RelativeToCreation \| RelativeToNow |
9999
| DeleteBlob | None | None |
100100
| UndeleteBlob | None | None |

articles/synapse-analytics/sql/sql-authentication.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vvasic-msft
55
ms.service: azure-synapse-analytics
66
ms.subservice: sql
77
ms.topic: overview
8-
ms.date: 03/07/2022
8+
ms.date: 11/07/2024
99
ms.author: vvasic
1010
ms.reviewer: whhender, wiassaf
1111
---
@@ -14,30 +14,30 @@ ms.reviewer: whhender, wiassaf
1414

1515
Azure Synapse Analytics has two SQL form-factors that enable you to control your resource consumption. This article explains how the two form-factors control the user authentication.
1616

17-
To authorize to Synapse SQL, you can use two authorization types:
17+
To authenticate to Synapse SQL, you can use two options:
1818

19-
- Microsoft Entra authorization
20-
- SQL authorization
19+
- Microsoft Entra authentication
20+
- SQL authentication
2121

22-
SQL authorization enables legacy applications to connect to Azure Synapse SQL in a familiar way. However, Microsoft Entra authentication allows you to centrally manage access to Azure Synapse resources, such as SQL pools. Azure Synapse Analytics supports disabling local authentication, such as SQL authentication, both during and after workspace creation. Once disabled, local authentication can be enabled at any time by authorized users. For more information on Microsoft Entra-only authentication, see [Disabling local authentication in Azure Synapse Analytics](active-directory-authentication.md).
22+
SQL authentication enables legacy applications to connect to Azure Synapse SQL in a familiar way, with a user name and password. However, Microsoft Entra authentication allows you to centrally manage access to Azure Synapse resources, such as SQL pools. Azure Synapse Analytics supports disabling local authentication, such as SQL authentication, both during and after workspace creation. Once disabled, local authentication can be enabled at any time by authorized users. For more information on Microsoft Entra-only authentication, see [Disabling local authentication in Azure Synapse Analytics](active-directory-authentication.md).
2323

2424
## Administrative accounts
2525

26-
There are two administrative accounts (**SQL admin username** and **SQL Active Directory admin**) that act as administrators. To identify these administrator accounts for your SQL pools open the Azure portal, and navigate to the Properties tab of your Synapse workspace.
26+
There are two administrative accounts (**SQL admin username** and **Microsoft Entra admin**) that act as administrators. To identify these administrator accounts for your SQL pools open the Azure portal, and navigate to the Properties tab of your Synapse workspace.
2727

2828
![SQL Server Admins](./media/sql-authentication/sql-admins.png)
2929

3030
- **SQL admin username**
3131

3232
When you create an Azure Synapse Analytics, you must name a **Server admin login**. SQL server creates that account as a login in the `master` database. This account connects using SQL Server authentication (user name and password). Only one of these accounts can exist.
3333

34-
- **SQL Active Directory admin**
34+
- **Microsoft Entra admin**
3535

3636
One Microsoft Entra account, either an individual or security group account, can also be configured as an administrator. It's optional to configure a Microsoft Entra administrator, but a Microsoft Entra administrator **must** be configured if you want to use Microsoft Entra accounts to connect to Synapse SQL.
3737

3838
- The Microsoft Entra admin account controls access to dedicated SQL pools, while Synapse RBAC roles can be used to control access to serverless pools, for example, with the **Synapse Administrator** and **Synapse SQL Administrator** role.
3939

40-
The **SQL admin username** and **SQL Active Directory admin** accounts have the following characteristics:
40+
The **SQL admin username** and **Microsoft Entra admin** accounts have the following characteristics:
4141

4242
- Are the only accounts that can automatically connect to any SQL Database on the server. (To connect to a user database, other accounts must either be the owner of the database, or have a user account in the user database.)
4343
- These accounts enter user databases as the `dbo` user and they have all the permissions in the user databases. (The owner of a user database also enters the database as the `dbo` user.)
@@ -48,7 +48,7 @@ The **SQL admin username** and **SQL Active Directory admin** accounts have the
4848
- Can view the `sys.sql_logins` system table.
4949

5050
>[!Note]
51-
>If a user is configured as an Active Directory admin and Synapse Administrator, and then removed from the Active Directory admin role, then the user will lose access to the dedicated SQL pools in Synapse. They must be removed and then added to the Synapse Administrator role to regain access to dedicated SQL pools.
51+
>If a user is configured as an Microsoft Entra admin and Synapse Administrator, and then removed from the Microsoft Entra admin role, then the user will lose access to the dedicated SQL pools in Synapse. They must be removed and then added to the Synapse Administrator role to regain access to dedicated SQL pools.
5252
5353
## [Serverless SQL pool](#tab/serverless)
5454

@@ -78,7 +78,7 @@ Once login and user are created, you can use the regular SQL Server syntax to gr
7878

7979
### Administrator access path
8080

81-
When the workspace-level firewall is properly configured, the **SQL admin username** and the **SQL Active Directory admin** can connect using client tools such as SQL Server Management Studio or SQL Server Data Tools. Only the latest tools provide all the features and capabilities.
81+
When the workspace-level firewall is properly configured, the **SQL admin username** and the **SQL Microsoft Entra admin** can connect using client tools such as SQL Server Management Studio or SQL Server Data Tools. Only the latest tools provide all the features and capabilities.
8282

8383
The following diagram shows a typical configuration for the two administrator accounts:
8484

@@ -220,6 +220,6 @@ When managing logins and users in SQL Database, consider the following points:
220220
- To `CREATE/ALTER/DROP` a user requires the `ALTER ANY USER` permission on the database.
221221
- When the owner of a database role tries to add or remove another database user to or from that database role, the following error may occur: **User or role 'Name' does not exist in this database.** This error occurs because the user isn't visible to the owner. To resolve this issue, grant the role owner the `VIEW DEFINITION` permission on the user.
222222

223-
## Next steps
223+
## Related content
224224

225225
For more information, see [Contained Database Users - Making Your Database Portable](/sql/relational-databases/security/contained-database-users-making-your-database-portable).

articles/virtual-network-manager/concept-limitations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,8 @@ This article provides an overview of the current limitations when you're using [
3232
* By default, a virtual network can be part of up to two connected groups. For example, a virtual network:
3333
* Can be part of two mesh configurations.
3434
* Can be part of a mesh topology and a network group that has direct connectivity enabled in a hub-and-spoke topology.
35-
* Can be part of two network groups with direct connectivity enabled in the same or a different hub-and-spoke configuration.
35+
* Can be part of two network groups with direct connectivity enabled in the same or a different hub-and-spoke configuration.
36+
* This is a soft limit and can be adjusted by submitting a request using [this form](https://forms.office.com/r/xXxYrQt0NQ).
3637
* The following BareMetal Infrastructures are not supported:
3738
* [Azure NetApp Files](../azure-netapp-files/index.yml)
3839
* [Azure VMware Solution](../azure-vmware/index.yml)

articles/virtual-network/virtual-networks-udr-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ You create custom routes by either creating [user-defined](#user-defined) routes
7272

7373
To customize your traffic routes, you shouldn't modify the default routes but you should create custom, or user-defined(static) routes which override Azure's default system routes. In Azure, you create a route table, then associate the route table to zero or more virtual network subnets. Each subnet can have zero or one route table associated to it. To learn about the maximum number of routes you can add to a route table and the maximum number of user-defined route tables you can create per Azure subscription, see [Azure limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=%2fazure%2fvirtual-network%2ftoc.json#networking-limits).
7474

75-
By default, a route table can contain up to 1000 user-defined routes (UDRs). With Azure Virtual Network Manager’s [routing configuration](../virtual-network-manager/concept-user-defined-route.md), this can be expanded to 1000 UDRs per route table. This increased limit supports more advanced routing setups, such as directing traffic from on-premises data centers through a firewall to each spoke virtual network in a hub-and-spoke topology when you have a higher number of spoke virtual networks.
75+
By default, a route table can contain up to 400 user-defined routes (UDRs). With Azure Virtual Network Manager’s [routing configuration](../virtual-network-manager/concept-user-defined-route.md), this can be expanded to 1000 UDRs per route table. This increased limit supports more advanced routing setups, such as directing traffic from on-premises data centers through a firewall to each spoke virtual network in a hub-and-spoke topology when you have a higher number of spoke virtual networks.
7676

7777
When you create a route table and associate it to a subnet, the table's routes are combined with the subnet's default routes. If there are conflicting route assignments, user-defined routes override the default routes.
7878

azure-docs-pr

Lines changed: 0 additions & 1 deletion
This file was deleted.

includes/firewall-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
| Resource | Limit |
1414
| --- | --- |
1515
| Max Data throughput | 100 Gbps for Premium, 30 Gbps for Standard, 250 Mbps for Basic (preview) SKU<br><br> For more information, see [Azure Firewall performance](../articles/firewall/firewall-performance.md#performance-data). |
16-
|Rule limits|20,000 unique source/destinations in network rules <br><br> **Unique source/destinations in network** = sum of (unique source addresses * unique destination addresses for each rule)<br><br>An IP group counts as one address, regardless of how many IP addresses it contains.<br><br>You can track the Firewall Policy network rule count in the [policy analytics](../articles/firewall/policy-analytics.md) under the **Insights** tab. As a proxy, you can also monitor your Firewall Latency Probe metrics to ensure it stays within 20 ms even during peak hours.|
16+
|Rule limits|20,000 unique source/destinations in network rules <br><br> **Unique source/destinations in network** = (Source addresses + Source IP Groups) * (Destination addresses + Destination Fqdn count + Destination IP Groups) * (IP protocols count) * (Destination ports)<br><br>You can track the Firewall Policy network rule count in the [policy analytics](../articles/firewall/policy-analytics.md) under the **Insights** tab. As a proxy, you can also monitor your Firewall Latency Probe metrics to ensure it stays within 20 ms even during peak hours.|
1717
|Total size of rules within a single Rule Collection Group| 1 MB for Firewall policies created before July 2022<br>2 MB for Firewall policies created after July 2022|
1818
|Number of Rule Collection Groups in a firewall policy|50 for Firewall policies created before July 2022<br>90 for Firewall policies created after July 2022|
1919
|Maximum DNAT rules (Maximum external destinations)|250 maximum [number of firewall public IP addresses + unique destinations (destination address, port, and protocol)]<br><br> The DNAT limitation is due to the underlying platform.<br><br>For example, you can configure 500 UDP rules to the same destination IP address and port (one unique destination), while 500 rules to the same IP address but to 500 different ports exceeds the limit (500 unique destinations).<br><br>If you need more than 250, you'll need to add another firewall.|

includes/functions-supported-languages.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: ggailey777
33
ms.service: azure-functions
44
ms.topic: include
5-
ms.date: 02/05/2024
5+
ms.date: 11/05/2024
66
ms.author: glenga
77
ms.custom:
88
- include file
@@ -51,7 +51,7 @@ For more information, see [Develop C# class library functions using Azure Functi
5151
| .NET 9 | Preview | [See policy][dotnet-policy] |
5252
| .NET 8 | GA | [November 10, 2026][dotnet-policy] |
5353
| .NET 6 | GA | [November 12, 2024][dotnet-policy] |
54-
| .NET Framework 4.8 | GA | [See policy][dotnet-framework-policy] |
54+
| .NET Framework 4.8.1 | GA | [See policy][dotnet-framework-policy] |
5555

5656
[dotnet-policy]: https://dotnet.microsoft.com/platform/support/policy/dotnet-core#lifecycle
5757
[dotnet-framework-policy]: https://dotnet.microsoft.com/platform/support/policy/dotnet-framework

0 commit comments

Comments
 (0)