You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/azure-cni-overlay.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Like Azure CNI Overlay, Kubenet assigns IP addresses to pods from an address spa
43
43
44
44
## IP address planning
45
45
46
-
-**Cluster Nodes**: Cluster nodes go into a subnet in your VNet, so verify you have a subnet large enough to account for future scale. A simple `/24` subnet can host up to 251 nodes (the first three IP addresses in a subnet are reserved for management operations).
46
+
-**Cluster Nodes**: Cluster nodes go into a subnet in your VNet, so verify you have a subnet large enough to account for future scale. Cluster can't scale to another subnet but you can add new nodepools in another subnet within the same VNet for expansion. A simple `/24` subnet can host up to 251 nodes (the first three IP addresses in a subnet are reserved for management operations).
47
47
48
48
-**Pods**: The overlay solution assigns a `/24` address space for pods on every node from the private CIDR that you specify during cluster creation. The `/24` size is fixed and can't be increased or decreased. You can run up to 250 pods on a node. When planning the pod address space, ensure that the private CIDR is large enough to provide `/24` address spaces for new nodes to support future cluster expansion.
Copy file name to clipboardExpand all lines: articles/app-service/environment/migrate.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Migrate to App Service Environment v3 by using the migration feature
3
3
description: Overview of the migration feature for migration to App Service Environment v3
4
4
author: seligj95
5
5
ms.topic: article
6
-
ms.date: 03/20/2023
6
+
ms.date: 04/07/2023
7
7
ms.author: jordanselig
8
8
ms.custom: references_regions
9
9
---
@@ -90,6 +90,7 @@ If your App Service Environment doesn't pass the validation checks or you try to
90
90
|`<ZoneRedundant><DedicatedHosts><ASEv3/ASE>` is not available in this location. |This error appears if you're trying to migrate an App Service Environment in a region that doesn't support one of your requested features. |Migrate using one of the [manual migration options](migration-alternatives.md) if you want to migrate immediately. Otherwise, wait for the migration feature to support this App Service Environment configuration. |
91
91
|Migrate cannot be called on this ASE until the active upgrade has finished. |App Service Environments can't be migrated during platform upgrades. You can set your [upgrade preference](how-to-upgrade-preference.md) from the Azure portal. In some cases, an upgrade is initiated when visiting the migration page if your App Service Environment isn't on the current build. |Wait until the upgrade finishes and then migrate. |
92
92
|App Service Environment management operation in progress. |Your App Service Environment is undergoing a management operation. These operations can include activities such as deployments or upgrades. Migration is blocked until these operations are complete. |You can migrate once these operations are complete. |
93
+
|Migrate is not available for this subscription|Support needs to be engaged for migrating this App Service Environment.|Open a support case to engage support to resolve your issue.|
93
94
94
95
## Overview of the migration process using the migration feature
Copy file name to clipboardExpand all lines: articles/application-gateway/tutorial-protect-application-gateway-ddos.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,22 @@
1
1
---
2
-
title: 'Tutorial: Protect your application gateway with Azure DDoS Protection Standard'
2
+
title: 'Tutorial: Protect your application gateway with Azure DDoS Network Protection'
3
3
titleSuffix: Azure Application Gateway
4
4
description: Learn how to set up an application gateway and protect it with Azure DDoS protection
5
5
services: application-gateway
6
6
author: duongau
7
7
ms.author: duau
8
-
ms.date: 12/21/2022
8
+
ms.date: 04/06/2023
9
9
ms.topic: quickstart
10
10
ms.service: application-gateway
11
11
ms.custom: template tutorial
12
12
---
13
13
14
-
# Tutorial: Protect your application gateway with Azure DDoS Protection Standard
14
+
# Tutorial: Protect your application gateway with Azure DDoS Network Protection
15
15
16
-
This article helps you create an Azure Application Gateway with a DDoS protected virtual network. Azure DDoS Protection Standard enables enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and monitoring to protect your application gateways from large scale DDoS attacks.
16
+
This article helps you create an Azure Application Gateway with a DDoS protected virtual network. Azure DDoS Network Protection enables enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and monitoring to protect your application gateways from large scale DDoS attacks.
17
17
18
18
> [!IMPORTANT]
19
-
> Azure DDoS Protection incurs a cost when you use the Standard SKU. Overages charges only apply if more than 100 public IPs are protected in the tenant. Ensure you delete the resources in this tutorial if you aren't using the resources in the future. For information about pricing, see [Azure DDoS Protection Pricing](https://azure.microsoft.com/pricing/details/ddos-protection/). For more information about Azure DDoS protection, see [What is Azure DDoS Protection?](../ddos-protection/ddos-protection-overview.md).
19
+
> Azure DDoS Protection incurs a cost when you use the Network Protection SKU. Overages charges only apply if more than 100 public IPs are protected in the tenant. Ensure you delete the resources in this tutorial if you aren't using the resources in the future. For information about pricing, see [Azure DDoS Protection Pricing](https://azure.microsoft.com/pricing/details/ddos-protection/). For more information about Azure DDoS protection, see [What is Azure DDoS Protection?](../ddos-protection/ddos-protection-overview.md).
20
20
21
21
In this tutorial, you learn how to:
22
22
@@ -156,7 +156,7 @@ Review the settings on the **Review + create** tab, and then select **Create** t
156
156
157
157
## Enable DDoS protection
158
158
159
-
Azure DDoS protection Standard is enabled at the virtual network where the resource you want to protect reside.
159
+
Azure DDoS Network Protection is enabled at the virtual network where the resource you want to protect reside.
160
160
161
161
1. In the search box at the top of the portal, enter **Virtual network**. Select **Virtual networks** in the search results.
162
162
@@ -168,7 +168,7 @@ Azure DDoS protection Standard is enabled at the virtual network where the resou
168
168
169
169
5. In the pull-down box in DDoS protection plan, select **myDDoSProtectionPlan**.
170
170
171
-
:::image type="content" source="./media/tutorial-protect-application-gateway/enable-ddos-vnet.png" alt-text="Screenshot of ddos protection.":::
171
+
:::image type="content" source="./media/tutorial-protect-application-gateway/enable-ddos-vnet.png" alt-text="Screenshot of D D o S network protection.":::
172
172
173
173
6. Select **Save**.
174
174
@@ -276,4 +276,4 @@ To delete the resource group:
276
276
Advance to the next article to learn how to:
277
277
278
278
> [!div class="nextstepaction"]
279
-
> [Configure an application gateway with TLS termination using the Azure portal](create-ssl-portal.md)
279
+
> [Configure an application gateway with TLS termination using the Azure portal](create-ssl-portal.md)
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-how-to-geo-replication.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -230,7 +230,7 @@ Yes, geo-replication of caches in VNets is supported with caveats:
230
230
- Geo-replication between caches in the same VNet is supported.
231
231
- Geo-replication between caches in different VNets is also supported.
232
232
- If the VNets are in the same region, you can connect them using [VNet peering](../virtual-network/virtual-network-peering-overview.md) or a [VPN Gateway VNet-to-VNet connection](../vpn-gateway/vpn-gateway-howto-vnet-vnet-resource-manager-portal.md).
233
-
- If the VNets are in different regions, geo-replication using VNet peering is supported. A client VM in VNet 1 (region 1) isn't able to access the cache in VNet 2 (region 2) using its DNS name because of a constraint with Basic internal load balancers. For more information about VNet peering constraints, see [Virtual Network - Peering - Requirements and constraints](../virtual-network/virtual-network-manage-peering.md#requirements-and-constraints). We recommend using a VPN Gateway VNet-to-VNet connection.
233
+
- If the VNets are in different regions, geo-replication using VNet peering is not supported. A client VM in VNet 1 (region 1) isn't able to access the cache in VNet 2 (region 2) using its DNS name because of a constraint with Basic internal load balancers. For more information about VNet peering constraints, see [Virtual Network - Peering - Requirements and constraints](../virtual-network/virtual-network-manage-peering.md#requirements-and-constraints). We recommend using a VPN Gateway VNet-to-VNet connection.
234
234
235
235
To configure your VNet effectively and avoid geo-replication issues, you must configure both the inbound and outbound ports correctly. For more information on avoiding the most common VNet misconfiguration issues, see [Geo-replication peer port requirements](cache-how-to-premium-vnet.md#geo-replication-peer-port-requirements).
Copy file name to clipboardExpand all lines: articles/communication-services/concepts/telephony/certified-session-border-controllers.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,19 +14,18 @@ ms.subservice: pstn
14
14
# List of Session Border Controllers certified for Azure Communication Services direct routing
15
15
This document contains a list of Session Border Controllers certified for Azure Communication Services direct routing. It also includes known limitations.
16
16
17
-
Microsoft is working with the selected Session Border Controllers (SBC) vendors certified for Teams Direct Routing to work with Azure direct routing. You can watch the progress on this page. While the SBC, certified for Teams Direct Routing, can work with Azure direct routing, we encourage not to put any workload on the SBC until it appears on this page. We also do not support the uncertified SBC. While Azure direct routing is built on the same backend as Teams Direct Routing, there are some differences. The certification covers comprehensive validation of the SBC for the Azure direct routing.
17
+
Microsoft is working with the selected Session Border Controllers (SBC) vendors certified for Teams Direct Routing to work with Azure direct routing. You can watch the progress on this page. While the SBC, certified for Teams Direct Routing, can work with Azure direct routing, we encourage not to put any workload on the SBC until it appears on this page. We also don't support the uncertified SBC. While Azure direct routing is built on the same backend as Teams Direct Routing, there are some differences. The certification covers comprehensive validation of the SBC for the Azure direct routing.
18
18
19
19
Microsoft works with each vendor to:
20
20
- Jointly work on the SIP interconnection protocols.
21
21
- Perform intense tests using a third-party lab. Only devices that pass the tests are certified.
22
-
- Run daily tests with all certified devices in production and pre-production environments. Validating the devices in pre-production environments guarantees that new versions of Azure Communication Services code in the cloud will work with certified SBCs.
22
+
- Run daily tests with all certified devices in production and preproduction environments. Validating the devices in preproduction environments guarantees that new versions of Azure Communication Services code in the cloud work with certified SBCs.
23
23
- Establish a joint support process with the SBC vendors.
0 commit comments