You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-backup-concept.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,8 @@ Azure Backup now allows you to back up AKS clusters (cluster resources and persi
37
37
38
38
- If Storage Account, to be provided as input for Extension installation, is under Virtual Network/Firewall, then BackupVault needs to be added as trusted access in Storage Account Network Settings. [Learn how to grant access to trusted Azure service](../storage/common/storage-network-security.md?tabs=azure-portal#grant-access-to-trusted-azure-services), which helps to store backups in the Vault datastore
39
39
40
+
- The blob container provided in input during extension installation should not contain any files unrelated to backup.
41
+
40
42
Learn [how to manage the operation to install Backup Extension using Azure CLI](azure-kubernetes-service-cluster-manage-backups.md#backup-extension-related-operations).
41
43
42
44
## Trusted Access
@@ -70,10 +72,14 @@ To enable backup for an AKS cluster, see the following prerequisites: .
70
72
71
73
- The Backup Extension during installation fetches Container Images stored in Microsoft Container Registry (MCR). If you enable a firewall on the AKS cluster, the extension installation process might fail due to access issues on the Registry. Learn [how to allow MCR access from the firewall](/azure/container-registry/container-registry-firewall-access-rules#configure-client-firewall-rules-for-mcr).
72
74
73
-
- In case you have the cluster in a Private Virtual Network and Firewall, apply the following FQDN/application rules: `*.microsoft.com`, `*.azure.com`, `*.core.windows.net`, `*.azmk8s.io`, `*.digicert.com`, `*.digicert.cn`, `*.geotrust.com`, `*.msocsp.com`. Learn [how to apply FQDN rules](../firewall/dns-settings.md).
75
+
- In case you have the cluster in a Private Virtual Network and Firewall, apply the following FQDN/application rules: `*.microsoft.com`, `mcr.microsoft.com`, `data.mcr.microsoft.com`, `crl.microsoft.com`, `mscrl.microsoft.com`, `oneocsp.microsoft.com` , `*.azure.com`, `management.azure.com`, `gcs.prod.monitoring.core.windows.net`, `*.prod.warm.ingest.monitor.core.windows.net`, `*.blob.core.windows.net`, `*.azmk8s.io`, `ocsp.digicert.com`, `cacerts.digicert.com`, `crl3.digicert.com`, `crl4.digicert.com`, `ocsp.digicert.cn`, `cacerts.digicert.cn`, `cacerts.geotrust.com`, `cdp.geotrust.com`, `status.geotrust.com`, `ocsp.msocsp.com`, `*.azurecr.io`, `docker.io`, `*.dp.kubernetesconfiguration.azure.com`. Learn [how to apply FQDN rules](../firewall/dns-settings.md).
74
76
75
77
- If you have any previous installation of *Velero* in the AKS cluster, you need to delete it before installing Backup Extension.
76
78
79
+
- If you are using [Azure policies in your AKS cluster](/azure/aks/policy-reference), ensure that the extension namespace *dataprotection-microsoft* is excluded from these policies to allow backup and restore operations to run successfully.
80
+
81
+
- If you are using Azure network security group to filter network traffic between Azure resources in an Azure virtual network then set an inbound rule to allow service tags *azurebackup* and *azurecloud*.
Copy file name to clipboardExpand all lines: articles/cdn/edgio-retirement-faq.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ The following process is a recap of the migration options we sent to all users:
48
48
49
49
If Azure CDN from Edgio customers don't [set the Feature Flag](../azure-resource-manager/management/preview-features.md)`DoNotForceMigrateEdgioCDNProfiles` before 7 January 2025, Microsoft will migrate existing Azure CDN from Edgio profiles to Azure Front Door Standard profiles. Migration is happening between January 7th and 14th, 2025. These migrations to Azure Front Door are performed on a "best effort" basis, and doing so might cause issues related to the billing, features, availability, and/or performance you're currently consuming with Azure CDN from Edgio. Hence, as noted previously, customers should migrate themselves and not rely on this automatic migration.
50
50
Important notes regarding these "best effort" automatic migrations to Azure Front Door Standard:
51
-
- Between January 7th and 14th, 2025 you'll receive an email notification confirming if your workloads have been successfully migrated to Azure Front Door Standard or if the migration was unsuccessful. If the migration was successful and you encounter issues with availability, performance, or feature functionality, contact Microsoft support for assistance. For customers whom the migration unsuccessful will be provided guidance on possible next steps they can take.
51
+
- Between January 7th and 14th, 2025 you'll receive an email notification confirming if your workloads have been successfully migrated to Azure Front Door Standard or if the migration was unsuccessful. If the migration was successful and you encounter issues with availability, performance, or feature functionality, contact Microsoft support for assistance. For customers whom the migration unsuccessful should reach out to Azure support for assistance and move to Akamai/another CDN provider if AFD is not suitable for their traffic.
52
52
- We're migrating customers to Azure Front Door Standard as it may be more cost-effective. If you need the extra features of Azure Front Door Premium, you can [upgrade your service](../frontdoor/tier-upgrade.md).
53
53
- Existing Azure CDN from Edgio domains (custom domains and/or *.azureedge.net domains) will be added as custom domains on the new Front Door endpoints and we'll switch the traffic from Edgio platform to Front Door platform.
54
54
- We are not able to roll back the automatic migration.
@@ -121,6 +121,10 @@ No.
121
121
122
122
No. We're doing this migration on a "best effort" basis between January 7th and 14th, 2025 for customers who did not take action prior. Therefore we can't inform each customer regarding migration timings, but as noted previously after the migration we'll inform you as to whether it was successful.
123
123
124
+
### I am not able to stop my Azure CDN from Edgio anymore. What is happening?
125
+
126
+
For profiles that didn't apply the feature flag, configuration was frozen on January 3rd. These profiles will no longer be allowed to stop their endpoints. You can delete the profile instead. Do note that for Azure CDN from Edgio, stopping an endpoint has always meant as a configuration deletion. When an endpoint is disabled or stopped for any reason, all resources configured through the Edgio supplemental portal will be cleaned up. These configurations can't be restored automatically by restarting the endpoint.
127
+
124
128
## Next steps
125
129
126
130
[Set up preview features](../azure-resource-manager/management/preview-features.md)
@@ -513,6 +513,8 @@ We also improved the out-of-box dashboards both at the cluster-level. There's a
513
513
514
514
* Microsoft will not patch the Azure Monitor integration (preview) clusters except for critical security issues.
515
515
516
+
* `HDInsightGatewayAuditLogs_CL` table will no longer be functional from September 14, 2026, as The [Azure Monitor HTTP Data Collector API](/previous-versions/azure/azure-monitor/logs/data-collector-api?tabs=powershell) is being deprecated.
517
+
516
518
## Appendix: Table mapping
517
519
518
520
For the log table mappings from the classic Azure Monitor integration to the new one, see [Log table mapping](./monitor-hdinsight-reference.md#log-table-mapping).
text: Build modern search experiences and maximize visibility into the health, performance, and security of your infrastructure, applications, and data.
36
-
# Card 2
33
+
- url: ./astronomer/astronomer-overview.md
34
+
text: Deploy a fully managed and seamless Apache Airflow on Astro on Azure.
35
+
- title: Confluent
36
+
imageSrc: ./media/index/confluent.svg
37
+
links:
38
+
- url: ./apache-kafka-confluent-cloud/overview.md
39
+
text: Deploy a fully managed, cloud-native Apache Kafka service.
37
40
- title: Datadog
38
41
imageSrc: ./media/index/datadog.svg
39
42
links:
40
43
- url: ./datadog/overview.md
41
44
text: Cloud-scale observability and security for your Azure, hybrid, or multicloud environment to troubleshoot quickly, increase uptime, and control costs.
42
-
# Card 3
43
-
- title: Logz.io
44
-
imageSrc: ./media/index/logz.io.svg
45
-
links:
46
-
- url: ./logzio/overview.md
47
-
text: Centralize log, metric, and tracing analytics in one observability platform.
48
-
# Card 4
49
45
- title: Dynatrace
50
46
imageSrc: ./media/index/dynatrace.svg
51
47
links:
52
48
- url: ./dynatrace/dynatrace-overview.md
53
49
text: Get deep cloud observability, advanced AIOps, and continuous runtime application security.
54
-
# Card 5
55
-
- title: Confluent
56
-
imageSrc: ./media/index/confluent.svg
50
+
- title: Elastic
51
+
imageSrc: ./media/index/elastic.svg
57
52
links:
58
-
- url: ./apache-kafka-confluent-cloud/overview.md
59
-
text: Deploy a fully managed, cloud-native Apache Kafka service.
60
-
# Card 6
61
-
- title: NGINX
62
-
imageSrc: ./media/index/nginx.svg
53
+
- url: ./elastic/overview.md
54
+
text: Build modern search experiences and maximize visibility into the health, performance, and security of your infrastructure, applications, and data.
55
+
- title: Informatica
56
+
imageSrc: ./media/index/informatica.svg
63
57
links:
64
-
- url: ./nginx/nginx-overview.md
65
-
text: Deliver secure, high-performance applications by using familiar and trusted load-balancing solutions.
66
-
# Card 7
67
-
- title: Qumulo
68
-
imageSrc: ./media/index/qumulo.svg
58
+
- url: ./informatica/informatica-overview.md
59
+
text: A comprehensive AI-powered cloud data management platform for data and application integration, data quality, data governance and privacy and master data management.
60
+
- title: Logz.io
61
+
imageSrc: ./media/index/logz.io.svg
69
62
links:
70
-
- url: ./qumulo/qumulo-overview.md
71
-
text: Use a multi-petabyte scale, single namespace, multi-protocol file data platform with the performance, security, and simplicity to meet the most demanding enterprise workloads.
72
-
# Card 8
63
+
- url: ./logzio/overview.md
64
+
text: Centralize log, metric, and tracing analytics in one observability platform.
65
+
- title: Neon Serverless Postgres
66
+
imageSrc: ./media/index/neon.svg
67
+
links:
68
+
- url: ./neon/overview.md
69
+
text: Neon offers a serverless Postgres solution that leverages the principles of serverless computing to provide scalable and flexible database services.
73
70
- title: New Relic
74
71
imageSrc: ./media/index/new-relic.svg
75
72
links:
76
73
- url: ./new-relic/new-relic-overview.md
77
74
text: Get end-to-end cloud observability to analyze and troubleshoot performance of applications, infrastructure, logs, real-user monitoring and more.
78
-
# Card 9
75
+
- title: NGINX
76
+
imageSrc: ./media/index/nginx.svg
77
+
links:
78
+
- url: ./nginx/nginx-overview.md
79
+
text: Deliver secure, high-performance applications by using familiar and trusted load-balancing solutions.
79
80
- title: Palo Alto Networks
80
81
imageSrc: ./media/index/palo-alto.svg
81
82
links:
82
83
- url: ./palo-alto/palo-alto-overview.md
83
84
text: Get a next generation firewall solution integrated with Azure that you can use to protect your organization.
84
-
# Card 10
85
-
- title: Astro
86
-
imageSrc: ./media/index/astronomer.svg
87
-
links:
88
-
- url: ./astronomer/astronomer-overview.md
89
-
text: Deploy a fully managed and seamless Apache Airflow on Astro on Azure.
90
-
# Card 11
91
-
- title: Informatica
92
-
imageSrc: ./media/index/informatica.svg
93
-
links:
94
-
- url: ./informatica/informatica-overview.md
95
-
text: A comprehensive AI-powered cloud data management platform for data and application integration, data quality, data governance and privacy and master data management.
96
-
# Card 12
97
-
- title: Neon Serverless Postgres
98
-
imageSrc: ./media/index/neon.svg
85
+
- title: Qumulo
86
+
imageSrc: ./media/index/qumulo.svg
99
87
links:
100
-
- url: ./neon/overview.md
101
-
text: Neon offers a serverless Postgres solution that leverages the principles of serverless computing to provide scalable and flexible database services.
88
+
- url: ./qumulo/qumulo-overview.md
89
+
text: Use a multi-petabyte scale, single namespace, multi-protocol file data platform with the performance, security, and simplicity to meet the most demanding enterprise workloads.
description: Learn about the Azure Native ISV Services' features and benefits, including unified operations and integrations.
4
-
5
-
6
4
ms.topic: conceptual
7
-
ms.date: 10/30/2024
5
+
ms.date: 01/06/2025
8
6
9
7
---
10
8
11
9
# Azure Native ISV Services overview
12
10
13
-
Easily provision, manage, and tightly integrate *independent software vendor (ISV)* software and services on Azure with Azure Native ISV Services. Microsoft and the ISV work together to develop and manage the service. Currently, several services are publicly available across these areas: observability, data, networking, and storage.
11
+
Easily provision, manage, and tightly integrate *independent software vendor (ISV)* software and services on Azure with Azure Native ISV Services. Microsoft and the ISV work together to develop and manage the service.
12
+
13
+
Currently, services are publicly available in these areas:
14
+
15
+
- Observability
16
+
- Data and storage
17
+
- Networking and security
14
18
15
-
For a list of all our current ISV partner services, see [Extend Azure with Azure Native ISV Services](partners.md).
19
+
For a list of available partner services, see [Extend Azure with Azure Native ISV Services](partners.md).
16
20
17
-
## Features of Azure Native ISV Services
21
+
## Features
18
22
19
-
A list of features of any Azure Native ISV Service listed follows.
23
+
Each Azure Native ISV Service offers unified operations and integrations.
20
24
21
25
### Unified operations
22
26
23
-
- Integrated onboarding: Use ARM template, SDK, CLI, and the Azure portal to create and manage services.
24
-
- Unified management: Manage entire lifecycle of these ISV services through the Azure portal.
25
-
- Unified access: Use Single Sign-on (SSO) through Microsoft Entra ID--no need for separate ISV authentications for subscribing to the service.
27
+
-**Integrated onboarding:** Use ARM template, SDK, CLI, and the Azure portal to create and manage services.
28
+
-**Unified management:** Manage the service's entire lifecycle through the Azure portal.
29
+
-**Unified access:** Utilize Single Sign-on (SSO) through [Microsoft Entra ID](/entra/fundamentals/whatis).
26
30
27
31
### Integrations
28
32
29
-
- Logs and metrics: Seamlessly direct logs and metrics from Azure Monitor to the Azure Native ISV Service using just a few gestures. You can configure autodiscovery of resources to monitor, and set up automatic log forwarding and metrics shipping. You can easily do the setup in Azure, without needing to create more infrastructure or write custom code.
30
-
- Virtual network injection: Provides private data plane access to Azure Native ISV services from customers’ virtual networks.
31
-
- Unified billing: Engage with a single entity, Microsoft Azure Marketplace, for billing. No separate license purchase is required to use Azure Native ISV Services.
33
+
-**Logs and metrics:** Seamlessly direct logs and metrics from Azure Monitor to the Azure Native ISV Service using just a few gestures. You can configure autodiscovery of resources to monitor, and set up automatic log forwarding and metrics shipping. You can easily do the setup in Azure, without needing to create more infrastructure or write custom code.
34
+
-**Virtual network injection:** Provides private data plane access to Azure Native ISV services from customers’ virtual networks.
35
+
-**Unified billing:** Engage with a single entity, Microsoft Azure Marketplace, for billing. No separate license purchase is required to use Azure Native ISV Services.
0 commit comments