Skip to content

Commit c3cf2bf

Browse files
authored
Merge pull request #286796 from mbender-ms/release-pp-nsp
network security perimeter - release branch
2 parents 6c0b852 + 4ec28cf commit c3cf2bf

11 files changed

+22
-22
lines changed

articles/private-link/create-network-security-perimeter-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Quickstart - Create a network security perimeter - Azure CLI
33
description: Learn how to create a network security perimeter for an Azure resource using Azure CLI. This example demonstrates the creation of a network security perimeter for an Azure Key Vault.
44
author: mbender-ms
55
ms.author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: quickstart
8-
ms.date: 06/04/2024
8+
ms.date: 09/16/2024
99
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure CLI, so that I can control the network traffic to and from the resource.
1010
---
1111

articles/private-link/create-network-security-perimeter-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Quickstart - Create a network security perimeter - Azure portal
33
description: Learn how to create a network security perimeter for an Azure resource using the Azure portal. This example demonstrates the creation of a network security perimeter for an Azure Key Vault.
44
author: mbender-ms
55
ms.author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: quickstart
8-
ms.date: 06/04/2024
8+
ms.date: 09/16/2024
99
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource in the Azure portal, so that I can control the network traffic to and from the resource.
1010
---
1111

articles/private-link/create-network-security-perimeter-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Quickstart - Create a network security perimeter - Azure PowerShell
33
description: Learn how to create a network security perimeter for an Azure resource using Azure PowerShell. This example demonstrates the creation of a network security perimeter for an Azure Key Vault.
44
author: mbender-ms
55
ms.author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: quickstart
8-
ms.date: 06/04/2024
8+
ms.date: 09/16/2024
99
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure PowerShell, so that I can control the network traffic to and from the resource.
1010
---
1111

@@ -52,7 +52,7 @@ Connect-AzAccount
5252
Then, connect to your subscription:
5353

5454
```azurepowershell
55-
Set-AzContext -Subscription <subscription name or id>
55+
Set-AzContext -Subscription 6a5f35e9-6951-499d-a36b-83c6c6eed44a
5656
```
5757

5858
## Create a resource group and key vault

articles/private-link/network-security-perimeter-collect-resource-logs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: 'Collecting resource logs for Azure Network Security Perimeter'
33
description: Learn the options for collecting resource logs for Azure Network Security Perimeter and how to enable logging through the Azure portal.
44
author: mbender-ms
55
ms.author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: conceptual
8-
ms.date: 06/04/2024
8+
ms.date: 09/16/2024
99
#CustomerIntent: As a network administrator, I want to collect resource logging for Azure Network Security Perimeter, so that I can monitor and analyze the network traffic to and from my resources.
1010
---
1111

@@ -56,7 +56,7 @@ You can enable resource logging for network security perimeter by using the Azur
5656
5757
## Activity log
5858

59-
Azure generates the activity log by default. The logs are preserved for 90 days in the Azure event logs store. Learn more about these logs by reading the[View events and activity log](../azure-monitor/essentials/activity-log.md) article.
59+
Azure generates the activity log by default. The logs are preserved for 90 days in the Azure event logs store. Learn more about these logs with [Use the Azure Monitor activity log and activity log insights](/azure/azure-monitor/essentials/activity-log-insights).
6060

6161
## Next steps
6262

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: What is Azure Network Security Perimeter?
33
description: Learn about the components of Azure Network Security Perimeter, a feature that allows Azure PaaS resources to communicate within an explicit trusted boundary, or perimeter.
44
author: mbender-ms
55
ms.author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: overview
8-
ms.date: 07/19/2024
8+
ms.date: 09/16/2024
99
ms.custom: references_regions
1010
#CustomerIntent: As a network security administrator, I want to understand how to use Azure Network Security Perimeter to control network access to Azure PaaS resources.
1111
---

articles/private-link/network-security-perimeter-diagnostic-logs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: 'Diagnostic logging for Azure Network Security Perimeter'
33
description: Learn the options for storing diagnostic logs for Azure Network Security Perimeter and how to enable logging through the Azure portal.
44
author: mbender-ms
55
ms.author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: conceptual
8-
ms.date: 06/04/2024
8+
ms.date: 09/16/2024
99
#CustomerIntent: As a network administrator, I want to enable diagnostic logging for Azure Network Security Perimeter, so that I can monitor and analyze the network traffic to and from my resources.
1010
---
1111

@@ -56,7 +56,7 @@ You can enable diagnostic logging for a network security perimeter by using the
5656
5757
## Activity log
5858

59-
Azure generates the activity log by default. The logs are preserved for 90 days in the Azure event logs store. Learn more about these logs by reading the[View events and activity log](../azure-monitor/essentials/activity-log.md) article.
59+
Azure generates the activity log by default. The logs are preserved for 90 days in the Azure event logs store. Learn more about these logs with [Use the Azure Monitor activity log and activity log insights](/azure/azure-monitor/essentials/activity-log-insights).
6060

6161
## Next steps
6262

articles/private-link/network-security-perimeter-role-based-access-control-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Azure role-based access control permissions required for Azure Network Se
33
description: Learn about the Azure role-based access control permissions required to use Azure Network Security Perimeter.
44
author: mbender-ms
55
ms.author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: conceptual
8-
ms.date: 06/04/2024
8+
ms.date: 09/16/2024
99
# customer intent: As a network administrator, I want to know the Azure role-based access control permissions required to use network security perimeter capabilities, so that I can assign the correct permissions to my team members.
1010
---
1111

articles/private-link/network-security-perimeter-transition.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Transition to a network security perimeter in Azure
33
description: Learn about the different access modes and how to transition to a network security perimeter in Azure.
44
author: mbender-ms
55
ms.author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: overview
8-
ms.date: 06/05/2024
8+
ms.date: 09/16/2024
99
#CustomerIntent: As a network administrator, I want to understand the different access modes and how to transition to a network security perimeter in Azure.
1010
---
1111

includes/network-security-perimeter-add-preview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
description: include file
44
services: private-link
55
author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: include
88
ms.date: 04/19/2024
99
ms.author: mbender> -ms

includes/network-security-perimeter-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
description: include file
44
services: private-link
55
author: mbender
6-
ms.service: private-link
6+
ms.service: azure-private-link
77
ms.topic: include
88
ms.date: 06/04/2024
99
ms.author: mbender-ms

0 commit comments

Comments
 (0)