You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-email-mailjet.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ If you don't already have one, start by setting up a Mailjet account (Azure cust
45
45
2. Navigate to the [API Key Management page](https://dev.mailjet.com/email/guides/senders-and-domains/#use-a-sender-on-all-api-keys-(metasender)). Record the **API Key** and **Secret Key** for use in a later step. Both keys are generated automatically when your account is created.
46
46
47
47
> [!IMPORTANT]
48
-
> Mailjet offers customers the ability to send emails from shared IP and [dedicated IP addresses](https://documentation.mailjet.com/hc/articles/360043101973-What-is-a-dedicated-IP). When using dedicated IP addresses, you need to build your own reputation properly with an IP address warm-up. For more information, see [How do I warm up my IP ?](https://documentation.mailjet.com/hc/articles/1260803352789-How-do-I-warm-up-my-IP-).
48
+
> Mailjet offers customers the ability to send emails from shared IP and [dedicated IP addresses](https://documentation.mailjet.com/hc/en-us/articles/1260803352789-Dedicated-IPs-What-They-Are-and-How-to-Warm-Them-Up). When using dedicated IP addresses, you need to build your own reputation properly with an IP address warm-up. For more information, see [How do I warm up my IP ?](https://documentation.mailjet.com/hc/articles/1260803352789-How-do-I-warm-up-my-IP-).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-f5.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -140,7 +140,7 @@ To upgrade the Guided Configuration, go to my.f5.com for [K85454683: Upgrade F5
140
140
141
141
Use BIG-IP configured with a client SSL profile to secure client-side traffic over TLS. Import a certificate that matches the domain name, used by the public-facing URL for your app. We recommend you use a public certificate authority, but you can use BIG-IP self-signed certificates for testing.
142
142
143
-
To add and manage certificates in the BIG-IP VE, go to techdocs.f5.com for [BIG-IP System: SSL Administration](https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/bigip-ssl-administration-13-0-0.html).
143
+
To add and manage certificates in the BIG-IP VE, go to techdocs.f5.com for [BIG-IP System: SSL Administration](https://techdocs.f5.com/en-us/bigip-17-5-0/big-ip-system-ssl-administration.html).
144
144
145
145
146
146
## Guided Configuration
@@ -453,4 +453,4 @@ The same access log provides detail.
453
453
9. In the top-left corner, select **Apply Access Policy**.
454
454
10. Select **Apply**.
455
455
456
-
For more information, go to techdocs.f5.com for [OAuth client and resource server troubleshooting tips](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-sso-13-0-0/37.html#GUID-774384BC-CF63-469D-A589-1595D0DDFBA2)
456
+
For more information, go to techdocs.f5.com for [OAuth client and resource server troubleshooting tips](https://techdocs.f5.com/en-us/bigip-17-0-0/big-ip-access-policy-manager-oauth-configuration/apm-oauth-client-and-resource-server.html)
HowtousethecommandlinetodowhatthistutorialshowshowtodoinVisualStudio. [Glimpse](https://www.hanselman.com/blog/IfYoureNotUsingGlimpseWithASPNETForDebuggingAndProfilingYoureMissingOut.aspx) is a tool for debugging ASP.NET applications.
671
-
* [UsingWebAppsLoggingandDiagnostics-withDavidEbbo](https://azure.microsoft.com/documentation/videos/azure-web-site-logging-and-diagnostics/) and [Streaming Logs from Web Apps - with David Ebbo](https://azure.microsoft.com/documentation/videos/log-streaming-with-azure-web-sites/)<br>
672
-
VideosbyScottHanselmanandDavidEbbo.
673
671
674
672
Forerrorlogging, analternativetowritingyourowntracingcodeistouseanopen-sourceloggingframeworksuchas [ELMAH](https://nuget.org/packages/elmah/). For more information, see [Scott Hanselman's blog posts about ELMAH](https://www.hanselman.com/blog/NuGetPackageOfTheWeek7ELMAHErrorLoggingModulesAndHandlersWithSQLServerCompact.aspx).
description: This article describes how to configure Azure Application Gateway listeners.
3
+
description: Learn how Application Gateway listeners handle incoming web requests efficiently. Configure protocols, certificates, HTTP2 support, and WebSocket connectivity for optimal performance.
4
+
#customer intent: As a network administrator, I want to understand how to configure Application Gateway listeners so that I can properly handle incoming web requests for my organization's applications.
4
5
services: application-gateway
5
6
author: mbender-ms
6
7
ms.service: azure-application-gateway
7
8
ms.topic: concept-article
8
-
ms.date: 07/19/2023
9
-
ms.author: mbender
9
+
ms.date: 06/16/2025
10
+
ms.author: mbender
11
+
ms.custom:
12
+
- ai-gen-docs-bap
13
+
- ai-gen-description
14
+
- ai-seo-date:06/16/2025
10
15
---
11
16
12
17
# Application Gateway listener configuration
@@ -23,7 +28,7 @@ When you create a new listener, you choose between [*basic* and *multi-site*](./
23
28
24
29
- If you want all of your requests (for any domain) to be accepted and forwarded to backend pools, choose basic. Learn [how to create an application gateway with a basic listener](./quick-create-portal.md).
25
30
26
-
- If you want to forward requests to different backend pools based on the *host* header or host names, choose multi-site listener. Application Gateway relies on HTTP 1.1 host headers to host more than one website on the same public IP address and port. To differentiate requests on the same port, you must specify a host name that matches with the incoming request. To learn more, see [hosting multiple sites using Application Gateway](multiple-site-overview.md).
31
+
- If you want to forward requests to different backend pools based on the *host* header or host names, choose multi-site listener. Application Gateway relies on HTTP 1.1 host headers to host more than one website on the same public IP address and port. To differentiate requests on the same port, you must specify a host name that matches with the incoming request. To learn more, see [hosting multiple sites using Application Gateway](multiple-site-overview.md).
> When creating an application gateway resource through the Azure portal, the default option for **HTTP2** is set as enabled. You can choose **Disabled** during creation, and re-enabled HTTP2 support using the Azure portal by selecting **Enabled** under **HTTP2** in **Application gateway > Configuration**.
90
95
>
96
+
> In instances where HTTP2 isn't supported by a client, HTTP1.1 will be used. Enabling HTTP2 doesn't disable HTTP1.1; it allows support for both.
Copy file name to clipboardExpand all lines: articles/application-gateway/private-link-configure.md
+27-21Lines changed: 27 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,25 @@
1
1
---
2
2
title: Configure Azure Application Gateway Private Link
3
-
description: This article shows you how to configure Application Gateway Private Link.
3
+
description: Learn how-to to set up Azure Application Gateway Private Link using the Azure portal, PowerShell, or CLI.
4
+
#customer intent: As a network administrator, I want to configure Azure Application Gateway Private Link so that I can securely connect workloads across VNets and subscriptions.
# Configure Azure Application Gateway Private Link
14
19
15
20
Application Gateway Private Link allows you to connect your workloads over a private connection spanning across VNets and subscriptions. For more information, see [Application Gateway Private Link](private-link.md).
@@ -24,9 +29,9 @@ Application Gateway Private Link can be configured via multiple options, such as
24
29
25
30
**Define a subnet for Private Link Configuration**
26
31
27
-
To enable Private Link Configuration, a subnet, different from the Application Gateway subnet, is required for the private link IP configuration. Private Link must use a subnet that doesn't contain any Application Gateways. Subnet sizing is determined by the number of connections required for your deployment. Each IP address allocated to this subnet ensures 64-K concurrent TCP connections that can be established via Private Link at single point in time. Allocate more IP addresses to allow more connections via Private Link. For example: `n * 64K`; where `n` is the number of IP addresses being provisioned.
32
+
To enable Private Link Configuration, a subnet, different from the Application Gateway subnet, is required for the private link IP configuration. Private Link must use a subnet that doesn't contain any Application Gateways. Subnet sizing is determined by the number of connections required for your deployment. Each IP address allocated to this subnet ensures 64-K concurrent TCP connections that can be established via Private Link at single point in time. Allocate more IP addresses to allow more connections via Private Link. For example: `n * 64K`; where `n` is the number of IP addresses being provisioned.
28
33
29
-
> [!Note]
34
+
> [!NOTE]
30
35
> The maximum number of IP addresses per private link configuration is eight. Only dynamic allocation is supported.
31
36
32
37
Complete the following steps to create a new subnet:
@@ -35,41 +40,42 @@ Complete the following steps to create a new subnet:
35
40
36
41
**Configure Private Link**
37
42
38
-
The Private link configuration defines the infrastructure used by Application Gateway to enable connections from Private Endpoints. While creating the Private Link configuration ensure a listener is actively utilizing the respected frontend IP configuration.Complete the following steps to create the Private Link configuration:
43
+
The Private link configuration defines the infrastructure used by Application Gateway to enable connections from Private Endpoints. While creating the Private Link configuration ensure a listener is actively utilizing the respected frontend IP configuration.Complete the following steps to create the Private Link configuration:
39
44
40
45
1. Go to the [Azure portal](https://portal.azure.com)
41
46
1. Search for and select **Application Gateways**.
42
47
1. Select the name of the application gateway you want to enable private link.
43
-
1. Select **Private link**
48
+
1. Select **Private link** then select **+ Add**.
44
49
1. Configure the following items:
45
50
46
51
-**Name**: The name of the private link configuration.
47
52
-**Private link subnet**: The subnet IP addresses should be consumed from.
48
53
-**Frontend IP Configuration**: The frontend IP address that private link should forward traffic to on Application Gateway.
49
54
-**Private IP address settings**: specify at least one IP address
55
+
50
56
1. Select **Add**.
51
-
1. Within your **Application Gateways** properties blade, obtain and make a note of the **Resource ID**, this is required if you are setting up a Private Endpoint within a different Microsoft Entra tenant.
57
+
1. Within your Application Gateway's settings, obtain and make a note of the **Resource ID**. This is required if you're setting up a Private Endpoint within a different Microsoft Entra tenant.
52
58
53
59
**Configure Private Endpoint**
54
60
55
61
A private endpoint is a network interface that uses a private IP address from the virtual network containing clients wishing to connect to your Application Gateway. Each of the clients uses the private IP address of the Private Endpoint to tunnel traffic to the Application Gateway. To create a private endpoint, complete the following steps:
56
62
57
63
1. Select the **Private endpoint connections** tab.
58
-
1. Select **Create**.
59
-
1. On the **Basics** tab, configure a resource group, name, and region for the Private Endpoint. Select **Next**.
60
-
1. On the **Resource** tab, select **Next**.
61
-
1. On the **Virtual Network** tab, configure a virtual network and subnet where the private endpoint network interface should be provisioned to. Select **Next**.
62
-
1. On the **Tags** tab, optionally configure resource tags. Select **Next**.
63
-
1. Select **Create**.
64
-
65
-
> [!Note]
64
+
1. Select **+ Private endpoint**.
65
+
1. On the **Basics** tab, configure a resource group, name, and region for the Private Endpoint. Select **Next: Resource >**.
66
+
1. On the **Resource** tab, select **Next: Virtual Network >**.
67
+
1. On the **Virtual Network** tab, configure a virtual network and subnet where the private endpoint network interface should be provisioned to. Select **Next: DNS >**.
68
+
1. On the **Tags** tab, optionally configure resource tags. Select **Next: Tags >**.
69
+
1. Select **Next: Review + create >** then select **Create**.
70
+
71
+
> [!NOTE]
66
72
> If the public or private IP configuration resource is missing when trying to select a _Target sub-resource_ on the _Resource_ tab of private endpoint creation, please ensure a listener is actively utilizing the respected frontend IP configuration. Frontend IP configurations without an associated listener won't be shown as a _Target sub-resource_.
67
73
68
-
> [!Note]
74
+
> [!NOTE]
69
75
> If you're provisioning a **Private Endpoint** from within another tenant, you will need to utilize the Azure Application Gateway Resource ID and the _Name_ of the Frontend IP configuration as the target sub-resource. For example, if I had a private IP associated to the Application Gateway and the Name listed in Frontend IP configuration of the portal for the private IP is _PrivateFrontendIp_, the target sub-resource value would be: _PrivateFrontendIp_.
70
76
71
-
> [!Note]
72
-
> If you have to move a **Private Endpoint** to another subscription, you must first delete the existing **Private Endpoint** connection between the **Private Link** and **Private Endpoint**. Once this is completed, you have to re-create a new **Private Endpoint** connection in the new subscription to establish connection between **Private Link** and**Private Endpoint**.
77
+
> [!NOTE]
78
+
> If you have to move a **Private Endpoint** to another subscription, you must first delete the existing **Private Endpoint** connection between the **Private Link** and **Private Endpoint**. Once this is completed, you have to re-create a new **Private Endpoint** connection in the new subscription to establish connection between **Private Link** and **Private Endpoint**.
73
79
74
80
75
81
@@ -199,4 +205,4 @@ A list of all Azure CLI references for Private Link Configuration on Application
199
205
200
206
## Next steps
201
207
202
-
- Learn about Azure Private Link: [What is Azure Private Link](../private-link/private-link-overview.md).
208
+
- Learn about Azure Private Link: [What is Azure Private Link](../private-link/private-link-overview.md).
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-reference-powershell.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -379,7 +379,7 @@ In PowerShell, there's the concept of a PowerShell profile. If you're not famili
379
379
In PowerShell Functions, the profile script is executed once per PowerShell worker instance in the app when first deployed and after being idled ([cold start](#cold-start). When concurrency is enabled by setting the [PSWorkerInProcConcurrencyUpperBound](#concurrency) value, the profile script is run for each runspace created.
380
380
381
381
When you create a function app using tools, such as Visual Studio Code and Azure Functions Core Tools, a default `profile.ps1` is created for you. The default profile is maintained
382
-
[on the Core Tools GitHub repository](https://github.com/Azure/azure-functions-core-tools/blob/main/src/Azure.Functions.Cli/StaticResources/profile.ps1)
382
+
[on the Core Tools GitHub repository](https://github.com/Azure/azure-functions-core-tools/blob/main/src/Cli/func/StaticResources/profile.ps1)
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-vmware-hcx.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -153,7 +153,7 @@ For an end-to-end overview of this procedure, view the [Azure VMware Solution: C
153
153
## Create a service mesh
154
154
155
155
> [!IMPORTANT]
156
-
> Make sure port UDP 4500 is open between your on-premises VMware HCX Connector 'uplink' network profile addresses and the Azure VMware Solution HCX Cloud 'uplink' network profile addresses. (UDP 500 was required in legacy versions of HCX. See https://ports.vmware.com for the latest information.)
156
+
> Make sure port UDP 4500 is open between your on-premises VMware HCX Connector 'uplink' network profile addresses and the Azure VMware Solution HCX Cloud 'uplink' network profile addresses. (UDP 500 was required in legacy versions of HCX. See https://ports.broadcom.com/ for the latest information.)
157
157
158
158
1. Under **Infrastructure**, select **Interconnect** > **Service Mesh** > **Create Service Mesh**.
0 commit comments