Skip to content

Commit f2111fb

Browse files
authored
Merge pull request #292162 from MicrosoftDocs/main
12/18/2024 PM Publish
2 parents 207b0b0 + beca54d commit f2111fb

File tree

84 files changed

+900
-1339
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+900
-1339
lines changed

.openpublishing.redirection.json

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,29 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/operator-call-protection/deployment-overview.md",
5+
"redirect_url": "/previous-versions/azure/operator-call-protection/deployment-overview",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/operator-call-protection/onboarding.md",
10+
"redirect_url": "/previous-versions/azure/operator-call-protection/onboarding",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/operator-call-protection/overview.md",
15+
"redirect_url": "/previous-versions/azure/operator-call-protection/overview",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/operator-call-protection/responsible-ai-faq.md",
20+
"redirect_url": "/previous-versions/azure/operator-call-protection/responsible-ai-faq",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/operator-call-protection/set-up-operator-call-protection.md",
25+
"redirect_url": "/previous-versions/azure/operator-call-protection/set-up-operator-call-protection",
26+
},
327
{
428
"source_path": "articles/private-multi-access-edge-compute-mec/overview.md",
529
"redirect_url": "/previous-versions/azure/private-multi-access-edge-compute-mec/overview",

articles/azure-cache-for-redis/cache-nodejs-get-started.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -267,6 +267,8 @@ Microsoft Entra ID access tokens have a limited lifespan, [averaging 75 minutes]
267267

268268
## [Access Key Authentication](#tab/accesskey)
269269

270+
[!INCLUDE [redis-access-key-alert](includes/redis-access-key-alert.md)]
271+
270272
[!INCLUDE [redis-cache-access-keys](includes/redis-cache-access-keys.md)]
271273

272274
Add environment variables for your **HOST NAME** and **Primary** access key. Use these variables from your code instead of including the sensitive information directly in your code.

articles/azure-cache-for-redis/cache-python-get-started.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,15 +29,17 @@ If you want to skip straight to the code, see the [Python quickstart](https://gi
2929
- For Windows 11, use the [Windows Store](https://apps.microsoft.com/search/publisher?name=Python+Software+Foundation&hl=en-us&gl=US).
3030

3131
::: zone pivot="azure-managed-redis"
32+
3233
## Create an Azure Managed Redis (preview) instance
33-
[!INCLUDE [managed-redis-create](includes/managed-redis-create.md)]
3434

35+
[!INCLUDE [managed-redis-create](includes/managed-redis-create.md)]
3536

3637
::: zone-end
3738

3839
::: zone pivot="azure-cache-redis"
3940

4041
## Create an Azure Cache for Redis instance
42+
4143
[!INCLUDE [redis-cache-create](~/reusable-content/ce-skilling/azure/includes/azure-cache-for-redis/includes/redis-cache-create.md)]
4244

4345
::: zone-end
@@ -125,11 +127,11 @@ Create a Python script to that uses either Microsoft Entra ID or access keys to
125127

126128
### Create a Python script using reauthentication
127129

128-
Microsoft Entra ID access tokens have limited lifespans, [averaging 75 minutes](/entra/identity-platform/configurable-token-lifetimes#token-lifetime-policies-for-access-saml-and-id-tokens). In order to maintain a connection to your cache, you need to refresh the token. This example demonstrates how to do this using Python.
130+
Microsoft Entra ID access tokens have limited lifespans, [averaging 75 minutes](/entra/identity-platform/configurable-token-lifetimes#token-lifetime-policies-for-access-saml-and-id-tokens). In order to maintain a connection to your cache, you need to refresh the token. This example demonstrates how to do this using Python.
129131

130132
1. Create a new text file, add the following script. Then, save the file as `PythonApplication2.py`.
131133

132-
1. Replace `<Your Host Name>` with the value from your Azure Managed Redis (preview) instance. Your host name is of the form `<DNS name>.<region>.redis.azure.net`.
134+
1. Replace `<Your Host Name>` with the value from your Azure Managed Redis (preview) instance. Your host name is of the form `<DNS name>.<region>.redis.azure.net`.
133135

134136
1. Replace `<Your Username>` with the values from your Microsoft Entra ID user.
135137

@@ -332,11 +334,11 @@ Create a Python script to that uses either Microsoft Entra ID or access keys to
332334

333335
### Create a Python script using reauthentication
334336

335-
Microsoft Entra ID access tokens have limited lifespans, [averaging 75 minutes](/entra/identity-platform/configurable-token-lifetimes#token-lifetime-policies-for-access-saml-and-id-tokens). In order to maintain a connection to your cache, you need to refresh the token. This example demonstrates how to do this using Python.
337+
Microsoft Entra ID access tokens have limited lifespans, [averaging 75 minutes](/entra/identity-platform/configurable-token-lifetimes#token-lifetime-policies-for-access-saml-and-id-tokens). In order to maintain a connection to your cache, you need to refresh the token. This example demonstrates how to do this using Python.
336338

337339
1. Create a new text file, add the following script. Then, save the file as `PythonApplication2.py`.
338340

339-
1. Replace `<Your Host Name>` with the value from your Azure Cache for Redis instance. Your host name is of the form `<DNS name>.redis.cache.windows.net`.
341+
1. Replace `<Your Host Name>` with the value from your Azure Cache for Redis instance. Your host name is of the form `<DNS name>.redis.cache.windows.net`.
340342

341343
1. Replace `<Your Username>` with the values from your Microsoft Entra ID user.
342344

@@ -413,6 +415,8 @@ Microsoft Entra ID access tokens have limited lifespans, [averaging 75 minutes](
413415

414416
## [Access Key Authentication](#tab/accesskey)
415417

418+
[!INCLUDE [redis-access-key-alert](includes/redis-access-key-alert.md)]
419+
416420
[!INCLUDE [redis-cache-access-keys](includes/redis-cache-access-keys.md)]
417421

418422
### Read and write to the cache from the command line
Lines changed: 9 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,23 @@
11
---
2-
ms.date: 08/16/2024
2+
ms.date: 12/17/2024
33

44
ms.topic: include
55
ms.custom:
66
- ignite-2024
77
---
88

9-
### Enable Microsoft Entra ID authentication on your cache
9+
### Use Microsoft Entra ID authentication on your cache
1010

11-
If you have a cache, check to see if Microsoft Entra Authentication has been enabled. If not, then enable it. We recommend using Microsoft Entra ID for your apps.
11+
Azure Redis caches, except for Enterprise and Enterprise Flash tiers, have Microsoft Entra Authentication enabled by default. Access keys are disabled by default.
1212

13-
1. In the Azure portal, select the Azure Cache for Redis instance where you'd like to use Microsoft Entra token-based authentication.
13+
[!INCLUDE [redis-access-key-alert](redis-access-key-alert.md)]
1414

15-
1. Select **Authentication** from the Resource menu.
16-
17-
1. Check in the working pane to see if **Enable Microsoft Entra Authentication** is checked. If so, you can move on.
15+
1. In the Azure portal, select the cache where you'd like to use Microsoft Entra token-based authentication.
1816

19-
1. Select **Enable Microsoft Entra Authentication**, and enter the name of a valid user. The user you enter is automatically assigned _Data Owner Access Policy_ by default when you select **Save**. You can also enter a managed identity or service principal to connect to your cache instance.
20-
21-
:::image type="content" source="media/cache-entra-access/cache-enable-microsoft-entra.png" alt-text="Screenshot showing authentication selected in the resource menu and the enable Microsoft Entra authentication checked.":::
17+
1. Select **Authentication** from the Resource menu.
2218

23-
1. A popup dialog box displays asking if you want to update your configuration, and informing you that it takes several minutes. Select **Yes.**
19+
1. Select **Select member** and enter the name of a valid user. The user you enter is automatically assigned _Data Owner Access Policy_ by default when you select **Save**. You can also enter a managed identity or service principal to connect to your cache instance.
2420

25-
> [!IMPORTANT]
26-
> Once the enable operation is complete, the nodes in your cache instance reboots to load the new configuration. We recommend performing this operation during your maintenance window or outside your peak business hours. The operation can take up to 30 minutes.
21+
:::image type="content" source="media/cache-entra-access/cache-enable-microsoft-entra.png" alt-text="Screenshot showing authentication selected in the resource menu and the enable Microsoft Entra authentication checked.":::
2722

28-
For information on using Microsoft Entra ID with Azure CLI, see the [references pages for identity](/cli/azure/redis/identity).
23+
For information on using Microsoft Entra ID with Azure CLI, see the [reference pages for identity](/cli/azure/redis/identity).
Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
ms.date: 08/16/2024
2+
ms.date: 12/17/2024
33

44
ms.topic: include
55
ms.custom:
@@ -8,10 +8,8 @@ ms.custom:
88

99
1. To create an Azure Managed Redis (preview) instance, sign in to the Azure portal and select **Create a resource**.
1010

11-
1. On the **New** page, select **Databases** and then select **Azure Cache for Redis**.
12-
<!-- Fran, need screenshot. -->
13-
<!-- :::image type="content" source="../media/managed-redis-create/new-cache-menu.png" alt-text="Screenshot showing how to select Azure Managed Redis."::: -->
14-
11+
1. On the **New** page, in the search box type **Azure Cache for Redis**.
12+
1513
1. On the **New Redis Cache** page, configure the settings for your new cache.
1614

1715
| Setting | Choose a value | Description |
@@ -26,23 +24,31 @@ ms.custom:
2624

2725
1. Select **Next: Networking** and select either a public or private endpoint.
2826

29-
1. Select **Next: Advanced**.
30-
Here, you can configure any [Redis modules](../managed-redis/managed-redis-redis-modules.md) to be added to the instance.
31-
27+
1. Select **Next: Advanced**.
28+
29+
Configure any [Redis modules](../managed-redis/managed-redis-redis-modules.md) you wan to add to the instance.
30+
31+
By default, for a new managed cache:
32+
- Microsoft Entra ID is enabled.
33+
- **Access Keys Authentication** is disabled for security reasons.
34+
35+
> [!IMPORTANT]
36+
> For optimal security, we recommend that you use Microsoft Entra ID with managed identities to authorize requests against your cache if possible. Authorization by using Microsoft Entra ID and managed identities provides superior security and ease of use over shared access key authorization. For more information about using managed identities with your cache, see [Use Microsoft Entra ID for cache authentication](/azure/azure-cache-for-redis/cache-azure-active-directory-for-authentication).
37+
3238
Set **Clustering policy** to **Enterprise** for a nonclustered cache, or to **OSS** for a clustered cache. For more information on choosing **Clustering policy**, see [Cluster policy](../managed-redis/managed-redis-architecture.md#cluster-policies).
3339

3440
:::image type="content" source="media/managed-redis-create/managed-redis-advanced-settings.png" alt-text="Screenshot that shows the Azure Managed Redis Advanced tab.":::
3541

36-
If you are using **Active geo-replication**, it must be configured during creation. For instructions on how do to this, see [Configure active geo-replication for Azure Managed Redis instances](../managed-redis/managed-redis-how-to-active-geo-replication.md).
37-
42+
If you're using **Active geo-replication**, it must be configured during creation. For more information, see [Configure active geo-replication for Azure Managed Redis instances](../managed-redis/managed-redis-how-to-active-geo-replication.md).
43+
3844
> [!IMPORTANT]
3945
> You can't change the clustering policy of an Azure Managed Redis (preview) instance after you create it. If you're using [RediSearch](../managed-redis/managed-redis-redis-modules.md#redisearch), the Enterprise cluster policy is required, and `NoEviction` is the only eviction policy supported.
4046
>
4147
4248
> [!IMPORTANT]
43-
> If you're using this cache instance in a geo-replication group, eviction policies cannot be changed after the instance is created. Be sure to know the eviction policies of your primary nodes before you create the cache. For more information on active geo-replication, see [Active geo-replication prerequisites](../managed-redis/managed-redis-how-to-active-geo-replication.md#active-geo-replication-prerequisites).
49+
> If you're using this cache instance in a geo-replication group, eviction policies cannot be changed after the instance is created. Be sure to know the eviction policies of your primary nodes before you create the cache. For more information on active geo-replication, see [Active geo-replication prerequisites](../managed-redis/managed-redis-how-to-active-geo-replication.md#active-geo-replication-prerequisites).
4450
>
45-
51+
4652
> [!IMPORTANT]
4753
> You can't change modules after you create a cache instance. Modules must be enabled at the time you create an Azure Cache for Redis instance. There is no option to enable the configuration of a module after you create a cache.
4854
>
@@ -51,8 +57,6 @@ ms.custom:
5157

5258
1. Select **Next: Review + create**.
5359

54-
:::image type="content" source="media/managed-redis-create/managed-redis-summary.png" alt-text="Screenshot showing the Azure Managed Redis Review + Create tab.":::
55-
5660
1. Review the settings and select **Create**.
5761

58-
It will take several minutes for the Redis instance to create. You can monitor progress on the Azure Managed Redis **Overview** page. When **Status** shows as **Running**, the cache is ready to use.
62+
It takes several minutes for the Redis instance to create. You can monitor progress on the Azure Managed Redis **Overview** page. When **Status** shows as **Running**, the cache is ready to use.
-119 KB
Loading
-33.5 KB
Loading
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
ms.date: 12/12/2024
3+
4+
ms.topic: include
5+
---
6+
7+
> [!IMPORTANT]
8+
> Microsoft recommends using Microsoft Entra ID authentication for the most secure authentication experience instead of using passwords or access keys. The authentication described in this section of the article uses access keys, which require a very high degree of trust in the application and carries risks not present when using Microsoft Entra ID. Use the approach in this document only when Microsoft Entra ID authentication is not viable.

articles/azure-vmware/introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ All traffic from an AV64 host towards a customer network will utilize the IP add
5959

6060
### AV64 Cluster vSAN fault domain (FD) design and recommendations
6161

62-
The traditional Azure VMware Solution host clusters don't have explicit vSAN FD configuration. The reasoning is the host allocation logic ensures, within clusters, that no two hosts reside in the same physical fault domain within an Azure region. This feature inherently brings resilience and high availability for storage, which the vSAN FD configuration is supposed to bring. More information on vSAN FD can be found in the [VMware documentation](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.vsan.doc/GUID-8491C4B0-6F94-4023-8C7A-FD7B40D0368D.html).
62+
The traditional Azure VMware Solution host clusters don't have explicit vSAN FD configuration. The reasoning is the host allocation logic ensures, within clusters, that no two hosts reside in the same physical fault domain within an Azure region. This feature inherently brings resilience and high availability for storage, which the vSAN FD configuration is supposed to bring. More information on vSAN FD can be found in the [VMware documentation](https://techdocs.broadcom.com/us/en/vmware-cis/vsan/vsan/8-0/vsan-administration/expanding-and-managing-a-vsan-cluster/managing-fault-domains-in-vsan-clusters.html).
6363

6464
The Azure VMware Solution AV64 host clusters have an explicit vSAN fault domain (FD) configuration. Azure VMware Solution control plane configures seven vSAN fault domains (FDs) for AV64 clusters. Hosts are balanced evenly across the seven FDs as users scale up the hosts in a cluster from three nodes to 16 nodes. Some Azure regions still support a maximum of five FDs as part of the initial release of the AV64 SKU. Refer to the [Azure Region Availability Zone (AZ) to SKU mapping table](architecture-private-clouds.md#azure-region-availability-zone-az-to-sku-mapping-table) for more information.
6565

0 commit comments

Comments
 (0)