Skip to content

Commit c3a2ca4

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nat-patch
2 parents ffa30e4 + efef008 commit c3a2ca4

File tree

2 files changed

+4
-3
lines changed

2 files changed

+4
-3
lines changed

articles/application-gateway/configuration-infrastructure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ For this scenario, use NSGs on the Application Gateway subnet. Put the following
8080

8181
**v2 supported scenarios**
8282
> [!WARNING]
83-
> An incorrect configuration of the route table could result in asymmetrical routing in Application Gateway v2. Ensure that all management/control plane traffic is sent directly to the Internet and not through a virtual appliance. Logging and metrics could also be affected.
83+
> An incorrect configuration of the route table could result in asymmetrical routing in Application Gateway v2. Ensure that all management/control plane traffic is sent directly to the Internet and not through a virtual appliance. Logging, metrics, and CRL checks could also be affected.
8484
8585

8686
**Scenario 1**: UDR to disable Border Gateway Protocol (BGP) Route Propagation to the Application Gateway subnet

articles/data-factory/managed-virtual-network-private-endpoint.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,15 +146,16 @@ The following data sources have native Private Endpoint support and can be conne
146146
- Azure Machine Learning
147147
- Azure Private Link Service
148148
- Azure Purview
149-
- Azure SQL Database (not including Azure SQL Managed Instance)
149+
- Azure SQL Database
150+
- Azure SQL Managed Instance - (public preview)
150151
- Azure Synapse Analytics
151152
- Azure Table Storage (not including Storage account V1)
152153

153154
> [!Note]
154155
> You still can access all data sources that are supported by Data Factory through public network.
155156
156157
> [!NOTE]
157-
> Because Azure SQL Managed Instance doesn't support native Private Endpoint right now, you can access it from managed Virtual Network using Private Linked Service and Load Balancer. Please see [How to access SQL Managed Instance from Data Factory Managed VNET using Private Endpoint](tutorial-managed-virtual-network-sql-managed-instance.md).
158+
> Because Azure SQL Managed Instance native Private Endpoint in public preview, you can access it from managed Virtual Network using Private Linked Service and Load Balancer. Please see [How to access SQL Managed Instance from Data Factory Managed VNET using Private Endpoint](tutorial-managed-virtual-network-sql-managed-instance.md).
158159
159160
### On-premises data sources
160161
To access on-premises data sources from managed Virtual Network using Private Endpoint, please see this tutorial [How to access on-premises SQL Server from Data Factory Managed VNET using Private Endpoint](tutorial-managed-virtual-network-on-premise-sql-server.md).

0 commit comments

Comments
 (0)