Skip to content

Commit e5e8ed4

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into azf
2 parents 40cd945 + 5b35eef commit e5e8ed4

File tree

5 files changed

+32
-7
lines changed

5 files changed

+32
-7
lines changed

articles/backup/backup-blobs-storage-account-ps.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -206,8 +206,8 @@ To update the backup instance, run the following cmdlets:
206206
1. Fetch the backup instance that needs to be updated.
207207
208208
```azurepowershell
209-
C:\Users\dapatil> $instance = Search-AzDataProtectionBackupInstanceInAzGraph -Subscription "Demosub" -ResourceGroup Demo-BCDR-RG -Vault BCDR-BV-EastUS -DatasourceType AzureBlob
210-
PS C:\Users\dapatil> $instance
209+
C:\Users\testuser> $instance = Search-AzDataProtectionBackupInstanceInAzGraph -Subscription "Demosub" -ResourceGroup Demo-BCDR-RG -Vault BCDR-BV-EastUS -DatasourceType AzureBlob
210+
PS C:\Users\testuser> $instance
211211
Output
212212
Name BackupInstanceName
213213
---- ------------------
@@ -226,12 +226,12 @@ To update the backup instance, run the following cmdlets:
226226
1. Update the backup instance with new list of container (the existing backed up containers & new containers).
227227
228228
```azurepowershell
229-
PS C:\Users\dapatil> $updateBI = Update-AzDataProtectionBackupInstance -ResourceGroupName Daya-BCDR-RG -VaultName DPBCDR-BV-EastUS -BackupInstanceName $instance[0].Name -SubscriptionId "ef4ab5a7-c2c0-4304-af80-af49f48af3d1" -PolicyId $updatePolicy.id -VaultedBackupContainer $targetContainers.name
229+
PS C:\Users\testuser> $updateBI = Update-AzDataProtectionBackupInstance -ResourceGroupName Daya-BCDR-RG -VaultName DPBCDR-BV-EastUS -BackupInstanceName $instance[0].Name -SubscriptionId "ef4ab5a7-c2c0-4304-af80-af49f48af3d1" -PolicyId $updatePolicy.id -VaultedBackupContainer $targetContainers.name
230230
231231
232-
PS C:\Users\dapatil> $updateBI.Property.PolicyInfo.PolicyId
232+
PS C:\Users\testuser> $updateBI.Property.PolicyInfo.PolicyId
233233
/subscriptions/ef4ab5a7-c2c0-4304-af80-af49f48af3d1/resourceGroups/Daya-BCDR-RG/providers/Microsoft.DataProtection/backupVaults/DPBCDR-BV-EastUS/backupPolicies/continerdeltest-1
234-
PS C:\Users\dapatil> $updateBI.Property.PolicyInfo.PolicyParameter.BackupDatasourceParametersList[0].ContainersList
234+
PS C:\Users\testuser> $updateBI.Property.PolicyInfo.PolicyParameter.BackupDatasourceParametersList[0].ContainersList
235235
cont-01
236236
cont-02
237237
cont-03

articles/cdn/migrate-cdn-to-front-door-retain-edge-domain.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,13 @@ This article provides you with instructions for migrating to Azure Front Door fr
125125
- AFD endpoint hostname (for example, `contoso.azurefd.net`)
126126
- Azure CDN from Edgio endpoint hostname (for example, `contoso.azureedge.net`)
127127

128-
1. The Azure support team makes the necessary DNS changes. Traffic will now start being served by the Azure Front Door service.
128+
1. The Azure support team makes the necessary DNS changes within 24-48 hours of filing the ticket. Traffic will now start being served by the Azure Front Door service.
129+
1. If you face any issues and need to rollback the DNS changes, you can reopen the support ticket and request for rollback.
130+
131+
> [!NOTE]
132+
> - Most of the traffic will immediately switch to Azure Front Door. You may see a small portion of the traffic still served by Edgio. The DNS changes takes time to propagate and some DNS servers have high TTL for DNS record expiry. Wait for 24-48 hours for all the traffic to switch.
133+
> - After the changes, under AFD Domains blade, the 'Certificate state' field may show the value as 'issuing' and the 'DNS state' field may show the value as 'Certificate needed'. This is just a portal bug that will be fixed by January 31st. The bug doesn't impact your certificates or traffic in any manner as the Certificate and DNS State for *.azureedge.net domains are completely managed by AFD.
134+
129135

130136
## Next step
131137

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ Cloud features may be dependent on a specific sensor version. Such features are
4242
| Version / Patch | Release date | Scope | Supported until |
4343
| ------- | ------------ | ----------- | ------------------- |
4444
| **24.1** | | | |
45+
| 24.1.8 |12/2024 | Minor |12/2025 |
4546
| 24.1.7 |12/2024 | Minor |12/2025 |
4647
| 24.1.6 |11/2024 | Minor |12/2025 |
4748
| 24.1.5 |09/2024 | Minor |09/2025 |
@@ -96,6 +97,14 @@ To understand whether a feature is supported in your sensor version, check the r
9697

9798
## Versions 24.1.x
9899

100+
### 24.1.8
101+
102+
**Release date**: 12/2024
103+
104+
**Supported until**: 12/2025
105+
106+
This version includes bug fixes for stability improvements.
107+
99108
### 24.1.7
100109

101110
**Release date**: 12/2024

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,16 @@ Features released earlier than nine months ago are described in the [What's new
2222

2323
The legacy on-premises management console won't be available for download after **January 1st, 2025**. We recommend transitioning to the new architecture using the full spectrum of on-premises and cloud APIs before this date. For more information, see [on-premises management console retirement](ot-deploy/on-premises-management-console-retirement.md).
2424

25+
## December 2024
26+
27+
|Service area |Updates |
28+
|---------|---------|
29+
| **OT networks** | - [Support Multiple Source Devices in DDoS Attack Alerts](#support-multiple-source-devices-in-ddos-attack-alerts) |
30+
31+
### Support Multiple Source Devices in DDoS Attack Alerts
32+
33+
Alert details now display up to 10 source devices involved in DDoS attack.
34+
2535
## October 2024
2636

2737
|Service area |Updates |

articles/virtual-network/ip-services/default-outbound-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ If you deploy a virtual machine in Azure and it doesn't have explicit outbound c
5555

5656
Some examples of configurations that won't work when using default outbound access:
5757
- When you have multiple NICs on the same VM, default outbound IPs won't consistently be the same across all NICs.
58-
- When scaling up/down Virtual Machine Scale sets, default outbound IPs assigned to individual instances can and change.
58+
- When scaling up/down Virtual Machine Scale sets, default outbound IPs assigned to individual instances can change.
5959
- Similarly, default outbound IPs aren't consistent or contiguous across VM instances in a Virtual Machine Scale Set.
6060

6161
## How can I transition to an explicit method of public connectivity (and disable default outbound access)?

0 commit comments

Comments
 (0)