Skip to content

Commit c5ec035

Browse files
authored
Merge pull request #103674 from rdeltcheva/stilb-scs
Update NSG screen shot and clarify NSG rules
2 parents 9d05e67 + 3389cde commit c5ec035

File tree

3 files changed

+3
-2
lines changed

3 files changed

+3
-2
lines changed

articles/virtual-machines/workloads/sap/get-started.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,7 @@ For information on integration of Azure services into SAP components, see:
120120

121121
## Change Log
122122

123+
- 02/07/2020: Change in [Public endpoint connectivity for VMs using Azure Standard ILB in SAP HA scenarios](https://docs.microsoft.com/azure/virtual-machines/workloads/sap/high-availability-guide-standard-load-balancer-outbound-connections) to update sample NSG screenshot
123124
- 02/03/2020: Change in [High availability for SAP NW on Azure VMs on SLES for SAP applications](https://docs.microsoft.com/azure/virtual-machines/workloads/sap/high-availability-guide-suse) and [High availability for SAP NW on Azure VMs on SLES with ANF for SAP applications](https://docs.microsoft.com/azure/virtual-machines/workloads/sap/high-availability-guide-suse-netapp-files) to remove the warning about using dash in the host names of cluster nodes on SLES
124125
- 01/28/2020: Change in [High availability of SAP HANA on Azure VMs on RHEL](https://docs.microsoft.com/azure/virtual-machines/workloads/sap/sap-hana-high-availability-rhel) to align the SAP HANA cluster resources timeouts to the Red Hat timeout recommendations
125126
- 01/17/2020: Change in [Azure proximity placement groups for optimal network latency with SAP applications](https://docs.microsoft.com/azure/virtual-machines/workloads/sap/sap-proximity-placement-scenarios) to change the section of moving existing VMs into a proximity placement group

articles/virtual-machines/workloads/sap/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: NA
1414
ms.topic: article
1515
ms.tgt_pltfrm: vm-windows
1616
ms.workload: infrastructure-services
17-
ms.date: 10/28/2019
17+
ms.date: 02/07/2020
1818
ms.author: radeltch
1919

2020
---
@@ -103,7 +103,7 @@ The configuration would look like:
103103
az network lb outbound-rule create --address-pool MyBackendPoolOfPublicILB --frontend-ip-configs MyPublicILBFrondEndIP --idle-timeout 30 --lb-name MyPublicILB --name MyOutBoundRules --outbound-ports 10000 --enable-tcp-reset true --protocol All --resource-group MyResourceGroup
104104
```
105105

106-
4. Create Network Security group rules to restrict access to specific Public End Points. If there is existing Network Security Group, you can adjust it. The example below shows how to for allow access only to the Azure management API:
106+
4. Create Network Security group rules to restrict access to specific Public End Points. If there is existing Network Security Group, you can adjust it. The example below shows how to enable access to the Azure management API:
107107
1. Navigate to the Network Security Group
108108
1. Click Outbound Security Rules
109109
1. Add a rule to **Deny** all outbound Access to **Internet**.

0 commit comments

Comments
 (0)