Skip to content

Commit e09d4cd

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-sfi
2 parents 4593751 + 5727f0a commit e09d4cd

21 files changed

+60
-58
lines changed

articles/azure-arc/kubernetes/cluster-connect.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,22 @@ Before you begin, review the [conceptual overview of the cluster connect feature
2424
- An existing Azure Arc-enabled Kubernetes connected cluster.
2525
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
2626
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
27+
28+
- Enable the [network requirements for Arc-enabled Kubernetes](network-requirements.md)
29+
30+
- Enable these endpoints for outbound access:
31+
32+
| Endpoint | Port |
33+
|----------------|-------|
34+
|`*.servicebus.windows.net` | 443 |
35+
|`guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com` | 443 |
36+
37+
> [!NOTE]
38+
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
39+
40+
[!INCLUDE [arc-region-note](../includes/arc-region-note.md)]
41+
42+
2743

2844
### [Azure CLI](#tab/azure-cli)
2945

@@ -64,18 +80,6 @@ Before you begin, review the [conceptual overview of the cluster connect feature
6480

6581
---
6682

67-
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
68-
69-
| Endpoint | Port |
70-
|----------------|-------|
71-
|`*.servicebus.windows.net` | 443 |
72-
|`guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com` | 443 |
73-
74-
> [!NOTE]
75-
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
76-
77-
[!INCLUDE [arc-region-note](../includes/arc-region-note.md)]
78-
7983
## Set up authentication
8084

8185
On the existing Arc-enabled cluster, create the ClusterRoleBinding with either Microsoft Entra authentication or service account token.

articles/azure-netapp-files/understand-guidelines-active-directory-domain-service-site.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,15 +29,18 @@ Azure NetApp Files supports identity-based authentication over SMB through the f
2929

3030
### <a name="network-requirements"></a>Network requirements
3131

32-
Azure NetApp Files SMB, dual-protocol, and Kerberos NFSv4.1 volumes require reliable and low-latency network connectivity (less than 10 ms RTT) to AD DS domain controllers. Poor network connectivity or high network latency between Azure NetApp Files and AD DS domain controllers can cause client access interruptions or client timeouts.
32+
For predictable Active Directory Domain Services operations with Azure NetApp Files volumes, reliable and low-latency network connectivity (equal to or less than 10 ms RTT) to AD DS domain controllers is highly recommended. Poor network connectivity or high network latency between Azure NetApp Files and AD DS domain controllers can cause client access interruptions or client timeouts.
33+
34+
>[!NOTE]
35+
>The 10ms recommendation adheres to guidance in [Creating a Site Design: Deciding which locations will become sites](/windows-server/identity/ad-ds/plan/creating-a-site-design#deciding-which-locations-will-become-sites).
3336
3437
Ensure that you meet the following requirements about network topology and configurations:
3538

3639
* Ensure that a [supported network topology for Azure NetApp Files](azure-netapp-files-network-topologies.md) is used.
3740
* Ensure that AD DS domain controllers have network connectivity from the Azure NetApp Files delegated subnet hosting the Azure NetApp Files volumes.
3841
* Peered virtual network topologies with AD DS domain controllers must have peering configured correctly to support Azure NetApp Files to AD DS domain controller network connectivity.
3942
* Network Security Groups (NSGs) and AD DS domain controller firewalls must have appropriately configured rules to support Azure NetApp Files connectivity to AD DS and DNS.
40-
* Ensure that the network latency is less than 10 ms RTT between Azure NetApp Files and AD DS domain controllers.
43+
* For optimal experience, ensure the network latency is equal to or less than 10ms RTT between Azure NetApp Files and AD DS domain controllers. Any RTT higher than 10ms can lead to degraded application or user experience in latency-sensitive applications/environments. In case RTT is too high for desirable user experience, consider deploying replica domain controllers in your Azure NetApp Files environment.
4144

4245
For more information on Microsoft Active Directory requirements for network latency over a WAN, see
4346
[Creating a Site Design](/windows-server/identity/ad-ds/plan/creating-a-site-design).

articles/communication-services/concepts/government.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,11 @@ ms.service: azure-communication-services
1818

1919
[!INCLUDE [Public Preview Notice](../includes/public-preview-include.md)]
2020

21-
Azure Communication Services can be used within [Azure Government](https://azure.microsoft.com/global-infrastructure/government/) to provide compliance with US government requirements for cloud services. In addition to enjoying the features and capabilities of Messaging, Voice and Video calling, developers benefit from the following features that are unique to Azure Government:
21+
Azure Communication Services (ACS) can be used within [Azure Government](https://azure.microsoft.com/global-infrastructure/government/) to provide compliance with US government requirements for cloud services. In addition to enjoying the features and capabilities of Messaging, Voice and Video calling, developers benefit from the following features that are unique to Azure Government:
2222
- Your personal data is logically segregated from customer content in the commercial Azure cloud.
2323
- Your resource’s customer content is stored within the United States.
2424
- Access to your organization's customer content is restricted to screened Microsoft personnel.
2525

26+
Azure Communication Services in Azure Government is currently In Process for the FedRAMP High accreditation as part of the [M365 GCC-High service offering](https://marketplace.fedramp.gov/products/FR1824057433). Once the FedRAMP High certification process is completed and the authorization is granted, Azure Communication Services in the Azure Government cloud will GA and be officially recognized as meeting the requirements set forth by the FedRAMP, providing government customers with the confidence that the service is secure and compliant with federal standards.
27+
2628
You can find more information about the Office 365 Government – GCC High offering for US Government customers at [Office 365 Government plans](https://products.office.com/government/compare-office-365-government-plans). Please see [eligibility requirements](https://azure.microsoft.com/global-infrastructure/government/how-to-buy/) for Azure Government.

articles/container-apps/firewall-integration.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,7 @@ You can lock down a network via NSGs with more restrictive rules than the defaul
1717

1818
In the workload profiles environment, user-defined routes (UDRs) and [securing outbound traffic with a firewall](./networking.md#configuring-udr-with-azure-firewall) are supported. When using an external workload profiles environment, inbound traffic to Azure Container Apps is routed through the public IP that exists in the [managed resource group](./networking.md#workload-profiles-environment-2) rather than through your subnet. This means that locking down inbound traffic via NSG or Firewall on an external workload profiles environment isn't supported. For more information, see [Networking in Azure Container Apps environments](./networking.md#user-defined-routes-udr).
1919

20-
In the Consumption only environment, custom user-defined routes (UDRs).
21-
22-
In the Consumption only environment, express routes are not supported, and custom user-defined routes (UDRs) have limited support. For more details on what level of UDR support is available on Consumption only environment, see the [FAQ](faq.yml).
20+
In the Consumption only environment, custom user-defined routes (UDRs). In the Consumption only environment, express routes are not supported, and custom user-defined routes (UDRs) have limited support. For more details on what level of UDR support is available on Consumption only environment, see the [FAQ](faq.yml#do-consumption-only-environments-support-custom-user-defined-routes-).
2321

2422
## NSG allow rules
2523

articles/iot-central/core/howto-control-devices-with-rest-api.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,6 @@ Every IoT Central REST API call requires an authorization header. To learn more,
2727

2828
For the reference documentation for the IoT Central REST API, see [Azure IoT Central REST API reference](/rest/api/iotcentral/).
2929

30-
[!INCLUDE [iot-central-postman-collection](../../../includes/iot-central-postman-collection.md)]
31-
3230
To learn how to control devices by using the IoT Central UI, see
3331

3432
- [Use properties in an Azure IoT Central solution](../core/howto-use-properties.md).

articles/iot-central/core/howto-manage-data-export-with-rest-api.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ Every IoT Central REST API call requires an authorization header. To learn more,
1919

2020
For the reference documentation for the IoT Central REST API, see [Azure IoT Central REST API reference](/rest/api/iotcentral/).
2121

22-
[!INCLUDE [iot-central-postman-collection](../../../includes/iot-central-postman-collection.md)]
23-
2422
To learn how to manage data export by using the IoT Central UI, see [Export IoT data to Blob Storage.](../core/howto-export-to-blob-storage.md)
2523

2624
## Data export

articles/iot-central/core/howto-manage-deployment-manifests-with-rest-api.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,6 @@ Every IoT Central REST API call requires an authorization header. To learn more,
2020

2121
For the reference documentation for the IoT Central REST API, see [Azure IoT Central REST API reference](/rest/api/iotcentral/).
2222

23-
[!INCLUDE [iot-central-postman-collection](../../../includes/iot-central-postman-collection.md)]
24-
2523
To learn how to manage deployment manifests by using the IoT Central UI, see [Manage IoT Edge deployment manifests in your IoT Central application](howto-manage-deployment-manifests.md).
2624

2725
## Deployment manifests REST API

articles/iot-central/core/howto-manage-device-templates-with-rest-api.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,6 @@ Every IoT Central REST API call requires an authorization header. To learn more,
1818

1919
For the reference documentation for the IoT Central REST API, see [Azure IoT Central REST API reference](/rest/api/iotcentral/).
2020

21-
[!INCLUDE [iot-central-postman-collection](../../../includes/iot-central-postman-collection.md)]
22-
2321
To learn how to manage device templates by using the IoT Central UI, see [How to set up device templates](../core/howto-set-up-template.md) and [How to edit device templates](../core/howto-edit-device-template.md)
2422

2523
## Device templates

articles/iot-central/core/howto-manage-devices-with-rest-api.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,6 @@ Every IoT Central REST API call requires an authorization header. To learn more,
1818

1919
For the reference documentation for the IoT Central REST API, see [Azure IoT Central REST API reference](/rest/api/iotcentral/).
2020

21-
[!INCLUDE [iot-central-postman-collection](../../../includes/iot-central-postman-collection.md)]
22-
2321
To learn how to manage devices by using the IoT Central UI, see [Manage individual devices in your Azure IoT Central application.](../core/howto-manage-devices-individually.md)
2422

2523
## Devices REST API

articles/iot-central/core/howto-manage-jobs-with-rest-api.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,6 @@ For the reference documentation for the IoT Central REST API, see [Azure IoT Cen
2929

3030
To learn how to create and manage jobs in the UI, see [Manage devices in bulk in your Azure IoT Central application](howto-manage-devices-in-bulk.md).
3131

32-
[!INCLUDE [iot-central-postman-collection](../../../includes/iot-central-postman-collection.md)]
33-
3432
## Job payloads
3533

3634
Many of the APIs described in this article include a definition that looks like the following JSON snippet:

0 commit comments

Comments
 (0)