Skip to content

Commit b959873

Browse files
authored
Merge pull request #262273 from MicrosoftDocs/main
Publish to Live Wednesday 4AM PST 01/03
2 parents b8b1c3d + ab06782 commit b959873

File tree

9 files changed

+72
-28
lines changed

9 files changed

+72
-28
lines changed

articles/app-service/overview-access-restrictions.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: App Service Access restrictions
33
description: This article provides an overview of the access restriction features in App Service
44
author: madsd
55
ms.topic: overview
6-
ms.date: 09/01/2022
6+
ms.date: 01/03/2024
77
ms.author: madsd
88
ms.custom: UpdateFrequency3
99
---
@@ -14,7 +14,7 @@ Access restrictions in App Service are equivalent to a firewall allowing you to
1414

1515
## How it works
1616

17-
When traffic reaches App Service, it first evaluates if the traffic originates from a private endpoint or is coming through the default endpoint. If the traffic is sent through a private endpoint, it's sent directly to the site without any restrictions. Restrictions to private endpoints are configured using network security groups.
17+
When traffic reaches App Service, it first evaluates if the traffic originates from a private endpoint or is coming through the default endpoint. If the traffic is sent through a private endpoint, it sends directly to the site without any restrictions. Restrictions to private endpoints are configured using network security groups.
1818

1919
If you send traffic through the default endpoint (often a public endpoint), the traffic is first evaluated at the app access level. Here you can either enable or disable access. If you enable app access, the traffic is evaluated at the site access level. For any app, you have both the main site and the advanced tools site (also known as scm or kudu site).
2020

@@ -24,7 +24,7 @@ You have the option of configuring a set of access restriction rules for each si
2424

2525
## App access
2626

27-
App access allows you to configure if access is available through the default (public) endpoint. If you've never configured the setting, the default behavior is to enable access unless a private endpoint exists after which it's implicitly disabled. You have the ability to explicitly configure this behavior to either enabled or disabled even if private endpoints exist.
27+
App access allows you to configure if access is available through the default (public) endpoint. If the setting isn't configured, the default behavior is to enable access unless a private endpoint exists which changes the implicit behavior to disable access. You have the ability to explicitly configure this behavior to either enabled or disabled even if private endpoints exist.
2828

2929
:::image type="content" source="media/overview-access-restrictions/app-access-portal.png" alt-text="Screenshot of app access option in Azure portal.":::
3030

@@ -40,7 +40,7 @@ Site access restriction has several types of rules that you can apply:
4040

4141
### Unmatched rule
4242

43-
You can configure the behavior when no rules are matched (the default action). It's a special rule that always appears as the last rule of the rules collection. If the setting has never been configured, the unmatched rule behavior is to allow all access unless one or more rules exists after which it's implicitly changed to deny all access. You can explicitly configure this behavior to either allow or deny access regardless of defined rules.
43+
You can configure the behavior when no rules are matched (the default action). It's a special rule that always appears as the last rule of the rules collection. If the setting isn't configured, the unmatched rule behavior depends on configured rules. If there are no rules, the unmatched rule behavior is to allow all access, but if one or more rules exists it implicitly changes to deny all access. You can explicitly configure this behavior to either allow or deny access regardless of defined rules.
4444

4545
### IP-based access restriction rules
4646

@@ -65,7 +65,7 @@ To learn more about configuring service endpoints with your app, see [Azure App
6565

6666
#### Any service endpoint source
6767

68-
For testing or in specific scenarios, you may want to allow traffic from any service endpoint enabled subnet. You can do that by defining an IP-based rule with the text "AnyVnets" instead of an IP range. You can't create these rules in the portal, but you can modify an existing IP-based rule and replace the IP address with the "AnyVnets" string.
68+
For testing or in specific scenarios, you can allow traffic from any service endpoint enabled subnet. You can do that by defining an IP-based rule with the text "AnyVnets" instead of an IP range. You can't create these rules in the portal, but you can modify an existing IP-based rule and replace the IP address with the "AnyVnets" string.
6969

7070
### Access restriction rules based on service tags
7171

@@ -89,13 +89,17 @@ For any rule, regardless of type, you can add http header filtering. Http header
8989

9090
* **X-Forwarded-For**. [Standard header](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-For) for identifying the originating IP address of a client connecting through a proxy server. Accepts valid CIDR values.
9191
* **X-Forwarded-Host**. [Standard header](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Host) for identifying the original host requested by the client. Accepts any string up to 64 characters in length.
92-
* **X-Azure-FDID**. [Custom header](../frontdoor/front-door-http-headers-protocol.md#from-the-front-door-to-the-backend) for identifying the reverse proxy instance. Azure Front Door sends a guid identifying the instance, but it can for third party proxies be used to identify the specific instance. Accepts any string up to 64 characters in length.
93-
* **X-FD-HealthProbe**. [Custom header](../frontdoor/front-door-http-headers-protocol.md#from-the-front-door-to-the-backend) for identifying the health probe of the reverse proxy. Azure Front Door sends "1" to uniquely identify a health probe request. The header can for third party proxies be used to identify health probes. Accepts any string up to 64 characters in length.
92+
* **X-Azure-FDID**. [Custom header](../frontdoor/front-door-http-headers-protocol.md#from-the-front-door-to-the-backend) for identifying the reverse proxy instance. Azure Front Door sends a guid identifying the instance, but it can also be used for non-Microsoft proxies to identify the specific instance. Accepts any string up to 64 characters in length.
93+
* **X-FD-HealthProbe**. [Custom header](../frontdoor/front-door-http-headers-protocol.md#from-the-front-door-to-the-backend) for identifying the health probe of the reverse proxy. Azure Front Door sends "1" to uniquely identify a health probe request. The header can also be used for non-Microsoft proxies to identify health probes. Accepts any string up to 64 characters in length.
9494

9595
Some use cases for http header filtering are:
9696
* Restrict access to traffic from proxy servers forwarding the host name
9797
* Restrict access to a specific Azure Front Door instance with a service tag rule and X-Azure-FDID header restriction
9898

99+
## Diagnostic logging
100+
101+
App Service can [send various logging categories to Azure Monitor](./troubleshoot-diagnostic-logs.md#send-logs-to-azure-monitor). One of those categories is called *IPSecurity Audit logs* and represent the activities in access restrictions. All requests that match a rule (except the unmatched rule), both allow and deny, is logged and can be used to validate configuration of access restrictions. The logging capability is also a powerful tool when troubleshooting rules configuration.
102+
99103
## Advanced use cases
100104

101105
Combining the above features allow you to solve some specific use cases that are described in the following sections.
@@ -114,7 +118,7 @@ You might have a site that is publicly accessible, but your deployment system is
114118

115119
### Allow external partner access to private endpoint protected site
116120

117-
In this scenario, you're accessing your site through a private endpoint and are deploying through a private endpoint. You may want to temporarily invite an external partner to test the site. You can do that by enabling public app access. Add a rule (IP-based) to identify the client of the partner. Configure unmatched rules action to deny for both main and advanced tools site.
121+
In this scenario, you're accessing your site through a private endpoint and are deploying through a private endpoint. You can temporarily invite an external partner to test the site. You can do that by enabling public app access. Add a rule (IP-based) to identify the client of the partner. Configure unmatched rules action to deny for both main and advanced tools site.
118122

119123
### Restrict access to a specific Azure Front Door instance
120124

articles/azure-arc/vmware-vsphere/enable-virtual-hardware.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Enable virtual hardware and VM CRUD capabilities in a machine with Arc agent installed
33
description: Enable virtual hardware and VM CRUD capabilities in a machine with Arc agent installed
44
ms.topic: how-to
5-
ms.date: 12/29/2023
5+
ms.date: 01/03/2024
66
ms.service: azure-arc
77
ms.subservice: azure-arc-vmware-vsphere
88
author: Farha-Bano
@@ -45,7 +45,7 @@ When you encounter this error message, try performing the **Link to vCenter** op
4545

4646

4747
```azurecli-interactive
48-
az connectedvmware vm create --subscription <subscription-id> --location <Azure region of the machine> --resource-group <resource-group-name> --custom-location /providers/microsoft.extendedlocation/customlocations/<custom-location-name> --name <machine-name> --inventory-item /subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.ConnectedVMwarevSphere/<vcenter-name>/contoso-vcenter/InventoryItems/<machine-name>
48+
az connectedvmware vm create --subscription <subscription-id> --location <Azure region of the machine> --resource-group <resource-group-name> --custom-location /providers/microsoft.extendedlocation/customlocations/<custom-location-name> --name <machine-name> --inventory-item /subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.ConnectedVMwarevSphere/VCenters/<vcenter-name>/InventoryItems/<machine-name>
4949
```
5050

5151
## Next steps

articles/azure-monitor/alerts/alerts-create-log-alert-rule.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,12 +31,13 @@ Alerts triggered by these alert rules contain a payload that uses the [common al
3131
- **Signal source**: The service that sends the "Custom log search" and "Log (saved query)" signals.
3232
Select the **Signal name** and **Apply**.
3333

34-
1. On the **Logs** pane, write a query that returns the log events for which you want to create an alert.
34+
1. On the **Logs** pane, write a query that returns the log events for which you want to create an alert. To use one of the predefined alert rule queries, expand the **Schema and filter** pane on the left of the **Logs** pane. Then select the **Queries** tab, and select one of the queries.
3535

36-
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-log-rule-query-pane.png" alt-text="Screenshot that shows the Query pane when creating a new log alert rule.":::
37-
38-
To use one of the predefined alert rule queries, expand the **Schema and filter** pane on the left of the **Logs** pane. Then select the **Queries** tab, and select one of the queries.
36+
> [!NOTE]
37+
> Log alert rule queries do not support the 'bag_unpack()', 'pivot()' and 'narrow()' plugins.
3938
39+
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-log-rule-query-pane.png" alt-text="Screenshot that shows the Query pane when creating a new log alert rule.":::
40+
4041
1. (Optional) If you're querying an ADX or ARG cluster, Log Analytics can't automatically identify the column with the event timestamp, so we recommend that you add a time range filter to the query. For example:
4142

4243
```KQL
@@ -187,4 +188,4 @@ Alerts triggered by these alert rules contain a payload that uses the [common al
187188
188189
189190
## Next steps
190-
[View and manage your alert instances](alerts-manage-alert-instances.md)
191+
[View and manage your alert instances](alerts-manage-alert-instances.md)

articles/azure-resource-manager/management/move-support-resources.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1146,11 +1146,18 @@ Before starting your move operation, review the [checklist](./move-resource-grou
11461146
11471147
## Microsoft.Maintenance
11481148

1149-
> [!div class="mx-tableFixed"]
1149+
<!-- > [!div class="mx-tableFixed"]
11501150
> | Resource type | Resource group | Subscription | Region move |
11511151
> | ------------- | ----------- | ---------- | ----------- |
11521152
> | configurationassignments | No | No | **Yes**. [Learn more](../../virtual-machines/move-region-maintenance-configuration.md) |
11531153
> | maintenanceconfigurations | **Yes** | **Yes** | **Yes**. [Learn more](../../virtual-machines/move-region-maintenance-configuration-resources.md) |
1154+
> | updates | No | No | No | -->
1155+
1156+
> [!div class="mx-tableFixed"]
1157+
> | Resource type | Resource group | Subscription | Region move |
1158+
> | ------------- | ----------- | ---------- | ----------- |
1159+
> | configurationassignments | No | No | No |
1160+
> | maintenanceconfigurations | No | No | No |
11541161
> | updates | No | No | No |
11551162
11561163
## Microsoft.ManagedIdentity

articles/backup/azure-kubernetes-service-cluster-backup.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: how-to
55
ms.service: backup
66
ms.custom:
77
- ignite-2023
8-
ms.date: 12/25/2023
8+
ms.date: 01/03/2024
99
author: AbhishekMallick-MS
1010
ms.author: v-abhmallick
1111
---
@@ -52,6 +52,11 @@ If you want to use Azure Backup to protect your AKS clusters from any regional o
5252

5353
:::image type="content" source="./media/azure-kubernetes-service-cluster-backup/enable-cross-region-restore-parameter.png" alt-text="Screenshot shows how to enable the Cross Region Restore parameter.":::
5454

55+
3. Create a Backup Instance using a Backup Policy with retention duration set for Vault-standard datastore. Every recovery point stored in this datastore will be in the secondary region.
56+
57+
>[!Note]
58+
>Vault-standard datastore is currently in preview.
59+
5560
## Create a backup policy
5661

5762
Before you configure backups, you need to create a backup policy that defines the frequency of backups and the retention duration of backups.
@@ -98,7 +103,8 @@ To create a backup policy:
98103

99104
>[!Note]
100105
>- In addition to first successful backup of the day, you can define the retention rules for first successful backup of the week, month, and year. In terms of priority, the order is year, month, week, and day.
101-
>- The backups stored in the Vault Tier are also copied in the secondary region (Azure Paired region) which you can use to restore AKS clusters to a secondary region during primary region outage.
106+
>- The Vault-standard datastore is currently in preview. If you don't want to use the feature, edit the retention rule and clear the checkbox next to the **Vault-standard datastore**.
107+
>- The backups stored in the Vault Tier can also copied in the secondary region (Azure Paired region) that you can use to restore AKS clusters to a secondary region when the primary region is unavailable. To opt for this feature, use a *Geo-redundant vault* with *Cross Region Restore* enabled.
102108
103109

104110

articles/backup/back-up-azure-stack-hyperconverged-infrastructure-virtual-machines.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Back up Azure Stack HCI virtual machines with MABS
33
description: This article contains the procedures to back up and recover virtual machines using Microsoft Azure Backup Server (MABS).
44
ms.topic: conceptual
5-
ms.date: 05/15/2022
5+
ms.date: 01/03/2024
66
ms.service: backup
7+
ms.custom: engagement-fy24
78
author: AbhishekMallick-MS
89
ms.author: v-abhmallick
910
---
@@ -45,9 +46,12 @@ These are the prerequisites for backing up virtual machines with MABS:
4546
| Prerequisite | Details |
4647
| ------------ | ------- |
4748
| MABS prerequisites | <ul> <li>If you want to perform item-level recovery for virtual machines (recover files, folders, volumes), then you'll need to install the Hyper-V role on the MABS server. If you only want to recover the virtual machine and not item-level, then the role isn't required.</li> <li>You can protect up to 800 virtual machines of 100 GB each on one MABS server and allow multiple MABS servers that support larger clusters.</li> <li>MABS excludes the page file from incremental backups to improve virtual machine backup performance.</li> <li>MABS can back up a server or cluster in the same domain as the MABS server, or in a child or trusted domain. If you want to back up VMs in a workgroup or an untrusted domain, you'll need to set up authentication. For a single server, you can use NTLM or certificate authentication. For a cluster, you can use certificate authentication only.</li> <li>Using host-level backup to back up virtual machine data on passthrough disks isn't supported. In this scenario, we recommend you use host-level backup to back up VHD files and guest-level backup to back up the other data that isn't visible on the host.</li> <li>You can back up VMs stored on deduplicated volumes.</li> </ul> |
48-
| VM | <ul> <li> The version of Integration Components that's running on the virtual machine should be the same as the version of the Azure Stack HCI host. </li> <li> For each virtual machine backup you'll need free space on the volume hosting the virtual hard disk files to allow enough room for differencing disks (AVHD's) during backup. The space must be at least equal to the calculation Initial disk size*Churn rate*Backup window time. If you're running multiple backups on a cluster, you'll need enough storage capacity to accommodate the AVHDs for each of the virtual machines using this calculation. </li> </ul> |
49+
| VM | <ul> <li> The version of Integration Components that's running on the virtual machine should be the same as the version of the Azure Stack HCI host. </li> <li> For each virtual machine backup you'll need free space on the volume hosting the virtual hard disk files to allow enough room for differencing disks (AVHDs) during backup. The space must be at least equal to the calculation Initial disk size*Churn rate*Backup window time. If you're running multiple backups on a cluster, you'll need enough storage capacity to accommodate the AVHDs for each of the virtual machines using this calculation. </li> </ul> |
4950
| Linux prerequisites | <ul><li> You can back up Linux virtual machines using MABS. Only file-consistent snapshots are supported.</li></ul> |
5051

52+
>[!NOTE]
53+
>MABS doesn't support the backup and restore of the Arc Resource Bridge and Arc VMs.
54+
5155
## Back up virtual machines
5256

5357
1. Set up your [MABS server](backup-azure-microsoft-azure-backup.md) and [your storage](backup-mabs-add-storage.md). When setting up your storage, use these storage capacity guidelines.

articles/data-factory/connector-db2.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: data-factory
77
ms.subservice: data-movement
88
ms.custom: synapse
99
ms.topic: conceptual
10-
ms.date: 07/13/2023
10+
ms.date: 11/16/2023
1111
ms.author: jianleishen
1212
---
1313
# Copy data from DB2 using Azure Data Factory or Synapse Analytics
@@ -33,17 +33,13 @@ Specifically, this DB2 connector supports the following IBM DB2 platforms and ve
3333

3434
* IBM DB2 for z/OS 12.1
3535
* IBM DB2 for z/OS 11.1
36-
* IBM DB2 for z/OS 10.1
3736
* IBM DB2 for i 7.3
3837
* IBM DB2 for i 7.2
3938
* IBM DB2 for i 7.1
4039
* IBM DB2 for LUW 11
4140
* IBM DB2 for LUW 10.5
4241
* IBM DB2 for LUW 10.1
4342

44-
>[!TIP]
45-
>DB2 connector is built on top of Microsoft OLE DB Provider for DB2. To troubleshoot DB2 connector errors, refer to [Data Provider Error Codes](/host-integration-server/db2oledbv/data-provider-error-codes#drda-protocol-errors).
46-
4743
## Prerequisites
4844

4945
[!INCLUDE [data-factory-v2-integration-runtime-requirements](includes/data-factory-v2-integration-runtime-requirements.md)]

0 commit comments

Comments
 (0)