Skip to content

Commit f083af5

Browse files
authored
Merge pull request #261234 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents c7eec30 + 2f6510d commit f083af5

File tree

8 files changed

+18
-15
lines changed

8 files changed

+18
-15
lines changed

articles/automation/change-tracking/overview-monitoring-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ This article explains on the latest version of change tracking support using Azu
2323
2424
## Key benefits
2525

26-
- **Compatibility with the unified monitoring agent** - Compatible with the [Azure Monitor Agent (Preview)](../../azure-monitor/agents/agents-overview.md) that enhances security, reliability, and facilitates multi-homing experience to store data.
26+
- **Compatibility with the unified monitoring agent** - Compatible with the [Azure Monitor Agent](../../azure-monitor/agents/agents-overview.md) that enhances security, reliability, and facilitates multi-homing experience to store data.
2727
- **Compatibility with tracking tool**- Compatible with the Change tracking (CT) extension deployed through the Azure Policy on the client's virtual machine. You can switch to Azure Monitor Agent (AMA), and then the CT extension pushes the software, files, and registry to AMA.
2828
- **Multi-homing experience** – Provides standardization of management from one central workspace. You can [transition from Log Analytics (LA) to AMA](../../azure-monitor/agents/azure-monitor-agent-migration.md)
2929
so that all VMs point to a single workspace for data collection and maintenance.
30-
- **Rules management** – Uses [Data Collection Rules](https://azure.microsoft.com/updates/azure-monitor-agent-and-data-collection-rules-public-preview/) to configure or customize various aspects of data collection. For example, you can change the frequency of file collection.
30+
- **Rules management** – Uses [Data Collection Rules](../../azure-monitor/essentials/data-collection-rule-overview.md) to configure or customize various aspects of data collection. For example, you can change the frequency of file collection.
3131

3232
## Current limitations
3333

articles/azure-arc/servers/run-command.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Run Command on Azure Arc-enabled servers (Public Preview) uses the Connected Mac
2020
- **Cost:** Run Command is free of charge, however storage of scripts in Azure may incur billing.
2121

2222
- **Configuration:** Run Command doesn't require more configuration or the deployment of any extensions. The
23-
Connected Machine agent version must be or higher.
23+
Connected Machine agent version must be 1.37 or higher.
2424

2525
## Run Command operations
2626

@@ -45,7 +45,7 @@ Start off by creating a Run Command script to provide endpoint access to the `mi
4545
To directly provide the script in line, use the following operation:
4646

4747
```
48-
PUT https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand
48+
PUT https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand?api-version=2023-10-03-preview
4949
5050
{
5151
"location": "eastus2",
@@ -85,7 +85,7 @@ PUT https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaa
8585
To instead link to the script file, you can use the Run Command operation’s ScriptURI option. For this it's assumed you have prepared a `newnetfirewallrule.ps1` file containing the in-line script and uploaded this script to blob storage.
8686

8787
```
88-
PUT https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand
88+
PUT https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand?api-version=2023-10-03-preview
8989
9090
{
9191
"location": "eastus2",
@@ -131,7 +131,7 @@ Output and error blobs must be the AppendBlob type and their SAS URLs must provi
131131
To verify that you've correctly provisioned the Run Command, use the GET command to retrieve details on the provisioned Run Command:
132132

133133
```
134-
GET https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand
134+
GET https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand?api-version=2023-10-03-preview
135135
```
136136

137137
### Example 3: Update the Run Command
@@ -140,7 +140,7 @@ Let’s suppose you want to open up access to an additional endpoint `*.waconazu
140140

141141

142142
```
143-
PATCH https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand
143+
PATCH https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand?api-version=2023-10-03-preview
144144
145145
{
146146
"location": "eastus2",
@@ -190,6 +190,6 @@ LIST https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaa
190190
If you no longer need the Run Command extension, you can delete it using the following command:
191191

192192
```
193-
DELETE https://management.azure.com/subscriptions/ aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand
193+
DELETE https://management.azure.com/subscriptions/ aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa/resourceGroups/ContosoRG/providers/Microsoft.HybridCompute/machines/2012DatacenterServer1/runCommands/EndpointAccessCommand?api-version=2023-10-03-preview
194194
```
195195

articles/cosmos-db/how-to-configure-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can secure the data stored in your Azure Cosmos DB account by using IP firew
3030

3131
## <a id="configure-ip-policy"></a> Configure an IP firewall by using the Azure portal
3232

33-
To set the IP access control policy in the Azure portal, go to the Azure Cosmos DB account page and select **Firewall and virtual networks** on the navigation menu. Change the **Allow access from** value to **Selected networks**, and then select **Save**.
33+
To set the IP access control policy in the Azure portal, go to the Azure Cosmos DB account page and select **Firewall and virtual networks** on the navigation menu. Change the **Allow access from** value to **Selected networks**, and then select **Save**. If you change the public access network settings, either by disabling it or allowing it for all networks, you will lose the firewall IP that you may have set up before.
3434

3535
:::image type="content" source="./media/how-to-configure-firewall/azure-portal-firewall.png" alt-text="Screenshot showing how to open the Firewall page in the Azure portal" border="true":::
3636

articles/migrate/tutorial-app-containerization-java-kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Before you begin this tutorial, you should:
5858
--- | ---
5959
**Identify a machine to install the tool** | A Windows machine to install and run the Azure Migrate: App Containerization tool. The Windows machine could be a server (Windows Server 2016 or later) or client (Windows 10) operating system, meaning that the tool can run on your desktop as well. <br/><br/> The Windows machine running the tool should have network connectivity to the servers/virtual machines hosting the Java web applications to be containerized.<br/><br/> Ensure that 6-GB space is available on the Windows machine running the Azure Migrate: App Containerization tool for storing application artifacts. <br/><br/> The Windows machine should have internet access, directly or via a proxy.
6060
**Application servers** | - Enable Secure Shell (SSH) connection on port 22 on the server(s) running the Java application(s) to be containerized. <br/>
61-
**Java web application** | The tool currently supports <br/><br/> - Applications running on Tomcat 8 or later.<br/> - Application servers on Ubuntu Linux 16.04/18.04/20.04, Debian 7/8, CentOS 6/7, Red Hat Enterprise Linux 5/6/7. <br/> - Applications using Java version 7 or later. <br/><br/> The tool currently doesn't support <br/><br/> - Applications servers running multiple Tomcat instances <br/>
61+
**Java web application** | The tool currently supports <br/><br/> - Applications running on Tomcat 8 or Tomcat 9.<br/> - Application servers on Ubuntu Linux 16.04/18.04/20.04, Debian 7/8, CentOS 6/7, Red Hat Enterprise Linux 5/6/7. <br/> - Applications using Java 7 or Java 8. <br/> If you have version outside of this, find an image that supports your required versions and modify the dockerfile to replace image <br/><br/> The tool currently doesn't support <br/><br/> - Applications servers running multiple Tomcat instances <br/>
6262

6363

6464
## Prepare an Azure user account

articles/operator-service-manager/best-practices-onboard-deploy.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ NFDG represents the smallest component that you plan to reuse independently acro
3838

3939
For Containerized Network Function Definition Versions (CNF NFDVs), the networkFunctionApplications list can only contain helm packages. It's reasonable to include multiple helm packages if they're always deployed and deleted together.
4040

41-
For Virtualized Network Function Definition Versions (VNF NFDVs), the networkFunctionApplications list must contain one VhdImageFile and one ARM template. The ARM template should deploy a single VM. To deploy multiple VMs for a single VNF, make sure to use separate ARM templates for each VM.
41+
For Virtualized Network Function Definition Versions (VNF NFDVs), the networkFunctionApplications list must contain at least one VhdImageFile and one ARM template. The ARM template should deploy a single VM. To deploy multiple VMs for a single VNF, make sure to use separate ARM templates for each VM.
4242

4343
The ARM template can only deploy ARM resources from the following Resource Providers:
4444

@@ -50,6 +50,9 @@ The ARM template can only deploy ARM resources from the following Resource Provi
5050
- Microsoft.Authorization
5151
- Microsoft.ManagedIdentity
5252

53+
>[!NOTE]
54+
> For ARM templates containing anything beyond the above list, all PUT calls and Re-PUT on the VNF will result in validation error.
55+
5356
### Common use cases that trigger Network Function Design Version minor or major version update
5457

5558
- Updating CGS / CGV for an existing release that triggers changing the deployParametersMappingRuleProfile.

articles/private-link/tutorial-private-endpoint-sql-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ In this tutorial, you learn how to:
2020
> [!div class="checklist"]
2121
> * Create a virtual network and bastion host.
2222
> * Create a virtual machine.
23-
> * Create a Azure SQL server and private endpoint.
23+
> * Create an Azure SQL server and private endpoint.
2424
> * Test connectivity to the SQL server private endpoint.
2525
2626
## Prerequisites

articles/vpn-gateway/about-site-to-site-tunneling.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ There are a few different ways that you can configure forced tunneling.
2525

2626
### Configure using BGP
2727

28-
You can configure forced tunneling for VPN Gateway via BGP. You need to advertise a default rout of 0.0.0.0/0 via BGP from your on-premises location to Azure so that all your Azure traffic is sent via the VPN Gateway S2S tunnel.
28+
You can configure forced tunneling for VPN Gateway via BGP. You need to advertise a default route of 0.0.0.0/0 via BGP from your on-premises location to Azure so that all your Azure traffic is sent via the VPN Gateway S2S tunnel.
2929

3030
### Configure using Default Site
3131

@@ -44,4 +44,4 @@ In some cases, you may want Internet-bound traffic only from certain subnets (bu
4444

4545
* See [How to configure forced tunneling via Default Site for VPN Gateway S2S connections](site-to-site-tunneling.md).
4646

47-
* For more information about virtual network traffic routing, see [VNet traffic routing](../virtual-network/virtual-networks-udr-overview.md).
47+
* For more information about virtual network traffic routing, see [VNet traffic routing](../virtual-network/virtual-networks-udr-overview.md).

includes/site-recovery-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The following limits apply to Azure Site Recovery.
2121
| Limit identifier | Limit |
2222
| --- | --- |
2323
| Number of vaults per subscription |500 |
24-
| Number of servers per Recovery Services vault |250 |
24+
| Number of appliances per Recovery Services vault |250 |
2525
| Number of protection groups per Recovery Services vault |No limit |
2626
| Number of recovery plans per Recovery Services vault |No limit |
2727
| Number of servers per protection group |No limit |

0 commit comments

Comments
 (0)