Skip to content

Commit e83ad43

Browse files
committed
Azure Relay freshness review
1 parent b3bc7c3 commit e83ad43

File tree

4 files changed

+12
-12
lines changed

4 files changed

+12
-12
lines changed

articles/azure-relay/includes/trusted-services.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: spelluru
33
ms.service: azure-relay
44
ms.topic: include
5-
ms.date: 06/26/2023
5+
ms.date: 12/11/2024
66
ms.author: spelluru
77
---
88

@@ -11,11 +11,11 @@ When you enable the **Allow trusted Microsoft services to bypass this firewall**
1111

1212
| Trusted service | Supported usage scenarios |
1313
| --------------- | ------------------------- |
14-
| Azure Machine Learning | AML Kubernetes uses Azure Relay to facilitate communication between AML services and the Kubernetes cluster. Azure Relay is a fully managed service that provides secure bi-directional communication between applications hosted on different networks. This makes it ideal for use in private link environments, where communication between Azure resources and on-premises resources is restricted. |
15-
| Azure Arc | Azure Arc-enabled services associated with the Resource Providers above will be able to connect to the hybrid connections in your Azure Relay namespace as a sender without being blocked by the IP firewall rules set on the Azure Relay namespace. `Microsoft.Hybridconnectivity` service creates the hybrid connections in your Azure Relay namespace and provides the connection information to the relevant Arc service based on the scenario. These services communicate only with your Azure Relay namespace if you're using Azure Arc, with the following Azure Services: <br/><br> - Azure Kubernetes<br/> - Azure Machine Learning <br/> - Microsoft Purview |
14+
| Azure Machine Learning | AML Kubernetes uses Azure Relay to facilitate communication between AML services and the Kubernetes cluster. Azure Relay is a fully managed service that provides secure bi-directional communication between applications hosted on different networks. This feature makes it ideal for use in private link environments, where communication between Azure resources and on-premises resources is restricted. |
15+
| Azure Arc | Azure Arc-enabled services associated with the resource providers can connect to the hybrid connections in your Azure Relay namespace as a sender without being blocked by the IP firewall rules set on the Azure Relay namespace. `Microsoft.Hybridconnectivity` service creates the hybrid connections in your Azure Relay namespace and provides the connection information to the relevant Arc service based on the scenario. These services communicate only with your Azure Relay namespace if you're using Azure Arc, with the following Azure Services: <br/><br> - Azure Kubernetes<br/> - Azure Machine Learning <br/> - Microsoft Purview |
1616

1717

18-
The other trusted services for Azure Relay can be found below:
18+
The other trusted services for Azure Relay are:
1919
- Azure Event Grid
2020
- Azure IoT Hub
2121
- Azure Stream Analytics
@@ -35,7 +35,7 @@ The other trusted services for Azure Relay can be found below:
3535
> "trustedServiceAccessEnabled": "True"
3636
> ```
3737
38-
For example, based on the ARM template provided above, we can modify it to include this Network Rule Set property for the enablement of Trusted Services:
38+
For example, based on the ARM template provided, you can modify it to include this Network Rule Set property for the enablement of Trusted Services:
3939
4040
```json
4141
{

articles/azure-relay/relay-metrics-azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Relay metrics in Azure Monitor | Microsoft Docs
33
description: This article provides information on how you can use Azure Monitor to monitor to state of Azure Relay.
44
services: service-bus-relay
55
ms.topic: article
6-
ms.date: 08/10/2023
6+
ms.date: 12/11/2024
77
---
88

99
# Azure Relay metrics in Azure Monitor
@@ -32,7 +32,7 @@ For metrics supporting dimensions, you must filter with the desired dimension va
3232

3333
## Billing
3434

35-
Using metrics in Azure Monitor is currently free while in preview. However, if you use additional solutions that ingest metrics data, you may be billed by these solutions. For example, you're billed by Azure Storage if you archive metrics data to an Azure Storage account. You're also billed by Azure Monitor logs if you stream metrics data to Azure Monitor logs for advanced analysis.
35+
Using metrics in Azure Monitor is currently free while in preview. However, if you use additional solutions that ingest metrics data, you might be billed by these solutions. For example, you're billed by Azure Storage if you archive metrics data to an Azure Storage account. You're also billed by Azure Monitor logs if you stream metrics data to Azure Monitor logs for advanced analysis.
3636

3737
The following metrics give you an overview of the health of your service.
3838

articles/azure-relay/relay-port-settings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Relay port settings | Microsoft Docs
33
description: This article includes a table that describes the required configuration for port values for Azure Relay.
44
ms.topic: article
5-
ms.date: 08/10/2023
5+
ms.date: 12/11/2024
66
---
77

88
# Azure Relay port settings
@@ -11,9 +11,9 @@ The following table describes the required configuration for port values for Azu
1111

1212
## Hybrid Connections
1313

14-
Hybrid Connections uses WebSockets on port 443 with TLS as the underlying transport mechanism, which uses **HTTPS** only.
14+
Hybrid Connections uses WebSockets on port 443 with Transport Layer Security (TLS) as the underlying transport mechanism, which uses **HTTPS** only.
1515

16-
## WCF Relays
16+
## Windows Communication Foundation (WCF) Relays
1717

1818
|Binding|Transport Security|Port|
1919
|-------------|------------------------|----------|

articles/azure-relay/service-bus-relay-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -433,7 +433,7 @@ The next task is to create a client application and define the service contract
433433

434434
1. In **Solution Explorer**, right-click the current solution (not the project), and select **Add** > **New Project**.
435435
1. In **Add a new project**, select **Console App (.NET Framework)** for C#, and select **Next**.
436-
1. Name project *EchoClient* and select **Create**.
436+
1. Specify *EchoClient* as the name of the proejct and select **Create**.
437437

438438
1. In **Solution Explorer**, in the **EchoClient** project, double-click **Program.cs** to open the file in the editor, if it isn't already open.
439439
1. Change the namespace name from its default name of `EchoClient` to `Microsoft.ServiceBus.Samples`.
@@ -744,7 +744,7 @@ namespace Microsoft.ServiceBus.Samples
744744
`Press [Enter] to exit`
745745

746746
1. In the **EchoClient** console window, enter the same information that you entered previously for the service application. Enter the same service namespace and SAS key values for the client application.
747-
1. After entering these values, the client opens a channel to the service and prompts you to enter some text as seen in the following console output example.
747+
1. After you enter these values, the client opens a channel to the service and prompts you to enter some text as seen in the following console output example.
748748

749749
`Enter text to echo (or [Enter] to exit):`
750750

0 commit comments

Comments
 (0)