Skip to content

Commit d19cff2

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into dmlib-update
2 parents a991355 + f57df16 commit d19cff2

File tree

495 files changed

+3858
-8004
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

495 files changed

+3858
-8004
lines changed

.openpublishing.redirection.json

Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,100 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/network-watcher/network-watcher-packet-capture-manage-portal-vmss.md",
5+
"redirect_url": "/previous-versions/azure/network-watcher/network-watcher-packet-capture-manage-portal-vmss",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/network-watcher/network-watcher-packet-capture-manage-powershell-vmss.md",
10+
"redirect_url": "/previous-versions/azure/network-watcher/network-watcher-packet-capture-manage-powershell-vmss",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/cdn/cdn-analyze-usage-patterns.md",
15+
"redirect_url": "/previous-versions/azure/cdn/cdn-analyze-usage-patterns",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/cdn/cdn-http-debug-headers.md",
20+
"redirect_url": "/previous-versions/azure/cdn/cdn-http-debug-headers",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/cdn/cdn-migrate.md",
25+
"redirect_url": "/previous-versions/azure/cdn/cdn-migrate",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/cdn/cdn-pop-abbreviations.md",
30+
"redirect_url": "/previous-versions/azure/cdn/cdn-pop-abbreviations",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/cdn/cdn-query-string-premium.md",
35+
"redirect_url": "/previous-versions/azure/cdn/cdn-query-string-premium",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/cdn/cdn-query-string.md",
40+
"redirect_url": "/previous-versions/azure/cdn/cdn-query-string",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/cdn/cdn-real-time-alerts.md",
45+
"redirect_url": "/previous-versions/azure/cdn/cdn-real-time-alerts",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/cdn/cdn-restrict-access-by-country-region.md",
50+
"redirect_url": "/previous-versions/azure/cdn/cdn-restrict-access-by-country-region",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/cdn/cdn-verizon-custom-reports.md",
55+
"redirect_url": "/previous-versions/azure/cdn/cdn-verizon-custom-reports",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/cdn/cdn-verizon-http-headers.md",
60+
"redirect_url": "/previous-versions/azure/cdn/cdn-verizon-http-headers",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/cdn/cdn-verizon-premium-rules-engine-reference-conditional-expressions.md",
65+
"redirect_url": "/previous-versions/azure/cdn/cdn-verizon-premium-rules-engine-reference-conditional-expressions",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/cdn/cdn-verizon-premium-rules-engine-reference-features.md",
70+
"redirect_url": "/previous-versions/azure/cdn/cdn-verizon-premium-rules-engine-reference-features",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "articles/cdn/cdn-verizon-premium-rules-engine-reference-match-conditions.md",
75+
"redirect_url": "/previous-versions/azure/cdn/cdn-verizon-premium-rules-engine-reference-match-conditions",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "articles/cdn/cdn-verizon-premium-rules-engine-reference.md",
80+
"redirect_url": "/previous-versions/azure/cdn/cdn-verizon-premium-rules-engine-reference",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path": "articles/cdn/cdn-verizon-premium-rules-engine.md",
85+
"redirect_url": "/previous-versions/azure/cdn/cdn-verizon-premium-rules-engine",
86+
"redirect_document_id": false
87+
},
88+
{
89+
"source_path": "articles/network-watcher/network-watcher-nsg-auditing-powershell.md",
90+
"redirect_url": "/previous-versions/azure/network-watcher/network-watcher-nsg-auditing-powershell",
91+
"redirect_document_id": false
92+
},
93+
{
94+
"source_path": "articles/network-watcher/view-relative-latencies.md",
95+
"redirect_url": "/previous-versions/azure/network-watcher/view-relative-latencies",
96+
"redirect_document_id": false
97+
},
398
{
499
"source_path": "articles/virtual-network/migrate-classic-vnet-powershell.md",
5100
"redirect_url": "/previous-versions/azure/virtual-network/migrate-classic-vnet-powershell",
@@ -1990,6 +2085,11 @@
19902085
"redirect_url": "/azure/cdn/monitoring-and-access-log",
19912086
"redirect_document_id": true
19922087
},
2088+
{
2089+
"source_path_from_root": "/articles/cdn/cdn-features.md",
2090+
"redirect_url": "/azure/frontdoor/front-door-cdn-comparison",
2091+
"redirect_document_id": false
2092+
},
19932093
{
19942094
"source_path_from_root": "/articles/chef/chef-automation.md",
19952095
"redirect_url": "/azure/developer/chef/windows-vm-configure",
@@ -5113,6 +5213,11 @@
51135213
"source_path_from_root": "/articles/reliability/disaster-recovery-overview.md",
51145214
"redirect_url": "/azure/reliability/concept-business-continuity-high-availability-disaster-recovery",
51155215
"redirect_document_id": false
5216+
},
5217+
{
5218+
"source_path_from_root": "/articles/reliability/cross-region-replication-azure-no-pair.md",
5219+
"redirect_url": "/azure/reliability/regions-multi-region-nonpaired",
5220+
"redirect_document_id": false
51165221
}
51175222
]
51185223
}

articles/active-directory-b2c/partner-n8identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: b2c
1717

1818
# Configure TheAccessHub Admin Tool with Azure Active Directory B2C
1919

20-
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [TheAccessHub Admin Tool](https://n8id.com/products/theaccesshub-admintool/) from N8 Identity [N8ID](https://n8id.com/). The solution addresses customer account migration and customer service request (CSR) administration.
20+
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [TheAccessHub Admin Tool](https://n8identity.com/products/theaccesshub-admintool/) from N8 Identity [N8ID](https://n8identity.com/). The solution addresses customer account migration and customer service request (CSR) administration.
2121

2222
Use this solution for the following scenarios:
2323

@@ -36,7 +36,7 @@ To get started, you need:
3636
- If you don't have a one, you can get an [Azure free account](https://azure.microsoft.com/free/)
3737
- An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
3838
- TheAccessHub Admin Tool environment
39-
- See, [N8 Identity/contact](https://n8id.com/contact/) for a new environment
39+
- See, [N8 Identity/contact](https://n8identity.com/contact/) for a new environment
4040
- Optional:
4141
- Connection and credential information for databases or Lightweight Directory Access Protocols (LDAPs), from which you want to migrate customer data
4242
- A configured Azure AD B2C environment for [custom policies](./tutorial-create-user-flows.md?pivots=b2c-custom-policy) to integrate TheAccessHub Admin Tool into your sign-up policy flow

articles/api-management/api-management-howto-add-products.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ In this tutorial, you learn how to:
5353
| State | Select **Published** if you want to publish the product to the developer portal. Before the APIs in a product can be discovered by developers, the product must be published. By default, new products are unpublished. |
5454
| Requires subscription | Select if a user is required to subscribe to use the product (the product is *protected*) and a subscription key must be used to access the product's APIs. If a subscription isn't required (the product is *open*), a subscription key isn't required to access the product's APIs. See [Access to product APIs](#access-to-product-apis) later in this article. |
5555
| Requires approval | Select if you want an administrator to review and accept or reject subscription attempts to this product. If not selected, subscription attempts are auto-approved. |
56-
| Subscription count limit | Optionally limit the count of multiple simultaneous subscriptions. |
56+
| Subscription count limit | Optionally limit the count of multiple simultaneous subscriptions. Minimum value: 1 |
5757
| Legal terms | You can include the terms of use for the product which subscribers must accept in order to use the product. |
5858
| APIs | Select one or more APIs. You can also add APIs after creating the product. For more information, see [Add APIs to a product](#add-apis-to-a-product) later in this article. <br/><br/>If the product is open (doesn't require a subscription), you can only add an API that isn't associated with another open product. |
5959

articles/api-management/automate-portal-deployments.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
1111

1212
# Automate developer portal deployments
1313

14-
[!INCLUDE [api-management-availability-premium-dev-standard-basic-premiumv2-standardv2-basicv2](../../includes/api-management-availability-premium-dev-standard-basic-premiumv2-standardv2-basicv2.md)]
14+
[!INCLUDE [api-management-availability-premium-dev-standard-basic](../../includes/api-management-availability-premium-dev-standard-basic.md)]
1515

1616
The API Management developer portal supports programmatic access to content. It allows you to import data to or export from an API Management service through the [content management REST API](/rest/api/apimanagement/). The REST API access works for both managed and self-hosted portals.
1717

@@ -22,6 +22,9 @@ You can use the API to automate migration of content between two API Management
2222
> [!WARNING]
2323
> The script removes contents of the developer portal in your destination API Management service. If you're concerned about it, make sure you perform a backup.
2424
25+
> [!NOTE]
26+
> Using the script to migrate developer portal content between an API Management instance in a classic tier (for example, Standard) and an instance in a v2 tier (for example, Standard v2) isn't currently supported. Migration of portal content between instances in the v2 tiers is also not supported.
27+
2528
> [!NOTE]
2629
> If you're using a self-hosted portal with an explicitly defined custom storage account to host media files (i.e., you define the `blobStorageUrl` setting in the `config.design.json` configuration file), you need to use the original `scripts/migrate.js` [script](https://github.com/Azure/api-management-developer-portal/blob/master/scripts.v2/migrate.js). The original script doesn't work for managed or self-hosted portals with the media storage account managed by API Management. In that case, use the script from the `/scripts.v3` folder instead.
2730
@@ -42,4 +45,4 @@ After the script is successfully executed, the target API Management service sho
4245
Learn more about the developer portal:
4346

4447
- [Azure API Management developer portal overview](api-management-howto-developer-portal.md)
45-
- [Self-host the developer portal](developer-portal-self-host.md)
48+
- [Self-host the developer portal](developer-portal-self-host.md)

articles/api-management/inject-vnet-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,9 @@ If you want to enable *public* inbound access to an API Management instance in t
4343

4444
* The virtual network must be in the same region and Azure subscription as the API Management instance.
4545

46-
### Subnet requirements
46+
### Dedicated subnet
4747

48-
* The subnet for the API Management instance can't be shared with another Azure resource.
48+
* The subnet used for virtual network injection can only be used by a single API Management instance. It can't be shared with another Azure resource.
4949

5050
### Subnet size
5151

articles/api-management/integrate-vnet-outbound.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ If you want to inject a Premium v2 API Management instance into a virtual networ
3737

3838
* The virtual network must be in the same region and Azure subscription as the API Management instance.
3939

40-
### Subnet requirements
40+
### Dedicated subnet
4141

42-
* The subnet can't be shared with another Azure resource.
42+
* The subnet used for virtual network integration can only be used by a single API Management instance. It can't be shared with another Azure resource.
4343

4444
### Subnet size
4545

articles/api-management/private-endpoint.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -256,6 +256,8 @@ To optionally limit incoming traffic to the API Management instance only to priv
256256
> [!NOTE]
257257
> Public network access can only be disabled in API Management instances configured with a private endpoint, not with other networking configurations.
258258
259+
#### [Classic](#tab/classic)
260+
259261
To disable the public network access property using the Azure CLI, run the following [az apim update](/cli/azure/apim#az-apim-update) command, substituting the names of your API Management instance and resource group:
260262

261263
```azurecli
@@ -264,6 +266,22 @@ az apim update --name my-apim-service --resource-group my-resource-group --publi
264266

265267
You can also use the [API Management Service - Update](/rest/api/apimanagement/api-management-service/update) REST API to disable public network access, by setting the `publicNetworkAccess` property to `Disabled`.
266268

269+
#### [Standard v2](#tab/v2)
270+
271+
To disable the public network access property in a Standard v2 instance using the Azure CLI, run the following [az rest](/cli/azure/reference-index#az-rest) command.
272+
273+
274+
```azurecli
275+
SUBSCRIPTION_ID=<your-subscription-id>
276+
RESOURCE_GROUP=<your-resource-group>
277+
SERVICE_NAME=<your-api-management-service-name>
278+
279+
az rest --method patch \
280+
--uri "https://management.azure.com/subscriptions/$SUBSCRIPTION_ID/resourceGroups/$RESOURCE_GROUP/providers/Microsoft.ApiManagement/service/$SERVICE_NAME?api-version=2024-05-01" \
281+
--body "{ \"properties\": { \"publicNetworkAccess\": \"Disabled\" } }"
282+
```
283+
---
284+
267285
## Validate private endpoint connection
268286

269287
After the private endpoint is created, confirm its DNS settings in the portal:

articles/api-management/virtual-network-workspaces-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ For information about networking options in API Management, see [Use a virtual n
2727

2828
* The virtual network must be in the same region and Azure subscription as the API Management instance.
2929

30-
## Subnet requirements
30+
### Dedicated subnet
3131

32-
* The subnet can't be shared with another Azure resource, including another workspace gateway.
32+
* The subnet used for virtual network integration can only be used by a single workspace gateway. It can't be shared with another Azure resource.
3333

3434
## Subnet size
3535

0 commit comments

Comments
 (0)