Skip to content

Commit f3f81e1

Browse files
committed
Merge branch 'main' into reliability-bc-ha-dr
2 parents d71b274 + eca28d2 commit f3f81e1

File tree

542 files changed

+2978
-4918
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

542 files changed

+2978
-4918
lines changed

.openpublishing.redirection.json

Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2244,6 +2244,20 @@
22442244
"source_path_from_root": "/articles/ddos-protection/telemetry-monitoring-alerting.md",
22452245
"redirect_url": "/azure/ddos-protection/telemetry",
22462246
"redirect_document_id": false
2247+
}, {
2248+
"source_path_from_root": "/articles/ddos-protection/telemetry.md",
2249+
"redirect_url": "/azure/ddos-protection/monitor-ddos-protection",
2250+
"redirect_document_id": false
2251+
},
2252+
{
2253+
"source_path_from_root": "/articles/ddos-protection/ddos-configure-log-analytics-workspace.md",
2254+
"redirect_url": "/azure/azure-monitor/logs/quick-create-workspace",
2255+
"redirect_document_id": false
2256+
},
2257+
{
2258+
"source_path_from_root": "/articles/ddos-protection/diagnostic-logging.md",
2259+
"redirect_url": "/azure/azure-monitor/essentials/tutorial-resource-logs",
2260+
"redirect_document_id": false
22472261
},
22482262
{
22492263
"source_path_from_root": "/articles/defender-for-iot/concept-pricing.md",
@@ -5000,6 +5014,91 @@
50005014
"redirect_url": "/azure/reliability/regions-paired",
50015015
"redirect_document_id": false
50025016
},
5017+
{
5018+
"source_path": "articles/virtual-desktop/troubleshoot-agent.md",
5019+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-agent",
5020+
"redirect_document_id": false
5021+
},
5022+
{
5023+
"source_path": "articles/virtual-desktop/troubleshoot-app-attach.md",
5024+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-app-attach",
5025+
"redirect_document_id": false
5026+
},
5027+
{
5028+
"source_path": "articles/virtual-desktop/troubleshoot-authorization.md",
5029+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-authorization",
5030+
"redirect_document_id": false
5031+
},
5032+
{
5033+
"source_path": "articles/virtual-desktop/troubleshoot-azure-ad-connections.md",
5034+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-azure-ad-connections",
5035+
"redirect_document_id": false
5036+
},
5037+
{
5038+
"source_path": "articles/virtual-desktop/troubleshoot-connection-quality.md",
5039+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-connection-quality",
5040+
"redirect_document_id": false
5041+
},
5042+
{
5043+
"source_path": "articles/virtual-desktop/troubleshoot-custom-image-templates.md",
5044+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-custom-image-templates",
5045+
"redirect_document_id": false
5046+
},
5047+
{
5048+
"source_path": "articles/virtual-desktop/troubleshoot-device-redirections.md",
5049+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-device-redirections",
5050+
"redirect_document_id": false
5051+
},
5052+
{
5053+
"source_path": "articles/virtual-desktop/troubleshoot-insights.md",
5054+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-insights",
5055+
"redirect_document_id": false
5056+
},
5057+
{
5058+
"source_path": "articles/virtual-desktop/troubleshoot-management-issues.md",
5059+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-management-issues",
5060+
"redirect_document_id": false
5061+
},
5062+
{
5063+
"source_path": "articles/virtual-desktop/troubleshoot-multimedia-redirection.md",
5064+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-multimedia-redirection",
5065+
"redirect_document_id": false
5066+
},
5067+
{
5068+
"source_path": "articles/virtual-desktop/troubleshoot-powershell.md",
5069+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-powershell",
5070+
"redirect_document_id": false
5071+
},
5072+
{
5073+
"source_path": "articles/virtual-desktop/troubleshoot-rdp-shortpath.md",
5074+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-rdp-shortpath",
5075+
"redirect_document_id": false
5076+
},
5077+
{
5078+
"source_path": "articles/virtual-desktop/troubleshoot-service-connection.md",
5079+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-service-connection",
5080+
"redirect_document_id": false
5081+
},
5082+
{
5083+
"source_path": "articles/virtual-desktop/troubleshoot-session-host-configuration-update.md",
5084+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-session-host-configuration-update",
5085+
"redirect_document_id": false
5086+
},
5087+
{
5088+
"source_path": "articles/virtual-desktop/troubleshoot-set-up-issues.md",
5089+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-set-up-issues",
5090+
"redirect_document_id": false
5091+
},
5092+
{
5093+
"source_path": "articles/virtual-desktop/troubleshoot-set-up-overview.md",
5094+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-set-up-overview",
5095+
"redirect_document_id": false
5096+
},
5097+
{
5098+
"source_path": "articles/virtual-desktop/troubleshoot-vm-configuration.md",
5099+
"redirect_url": "/troubleshoot/azure/virtual-desktop/troubleshoot-vm-configuration",
5100+
"redirect_document_id": false
5101+
},
50035102
{
50045103
"source_path_from_root": "/articles/reliability/business-continuity-management-program.md",
50055104
"redirect_url": "/azure/reliability/concept-business-continuity-high-availability-disaster-recovery",

articles/active-directory-b2c/service-limits.md

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,51 @@ The following table lists the administrative configuration limits in the Azure A
177177

178178
<sup>1</sup> See also [Microsoft Entra service limits and restrictions](../active-directory/enterprise-users/directory-service-limits-restrictions.md).
179179

180+
## Region specific service limits
181+
182+
As a protection for our customers, Microsoft places some restrictions on telephony verification for certain region codes. The following table lists the region codes and their corresponding limits.
183+
184+
| Region Code | Region Name | Limit per tenant per 60 minutes | Limit per tenant per 24 hours |
185+
|:----------- |:---------------------------------------------- |:------------------------------- | :----------------------------------------|
186+
| 228 | Togo | 10 | 30 |
187+
| 257 | Uzbek | 10 | 30 |
188+
| 970 | State of Plaestine | 10 | 30 |
189+
| 249 | Sudan | 10 | 30 |
190+
| 226 | Burina Faso | 10 | 30 |
191+
| 252 | Somalia | 10 | 30 |
192+
| 501 | Belize | 10 | 30 |
193+
| 855 | Cambodia | 50 | 200 |
194+
| 84 | Vietnam | 150 | 500 |
195+
| 94 | Sri Lanka | 100 | 500 |
196+
| 63 | Philippines | 50 | 200 |
197+
| 62 | Indonesia | 50 | 200 |
198+
| 7 | Russia | 100 | 1000 |
199+
| 258 | Mozambique | 50 | 200 |
200+
| 92 | Pakistan | 100 | 1000 |
201+
| 994 | Azerbaijan | 50 | 200 |
202+
| 880 | Bangladesh | 50 | 200 |
203+
| 20 | Egypt | 50 | 200 |
204+
| 260 | Zambia | 50 | 200 |
205+
| 502 | Guatemala | 10 | 50
206+
| 255 | Tanzania | 10 | 50
207+
| 261 | Madagascar | 10 | 30
208+
| 998 | Uzbekistan | 10 | 30
209+
| 223 | Mali | 20 | 100
210+
| 52 | Mexico | 100 | 500
211+
| 60 | Malaysia | 50 | 200 |
212+
| 221 | Senegal | 10 | 30 |
213+
| 216 | Tunisia | 20 | 100 |
214+
| 503 | El Salvador | 10 | 30 |
215+
| 234 | Nigeria | 20 | 100 |
216+
| 386 | Slovenia | 10 | 50 |
217+
| 591 | Bolivia | 10 | 30 |
218+
| 263 | Zimbabwe | 10 | 30 |
219+
| 261 | Madagascar | 10 | 30 |
220+
| 995 | Georgia | 10 | 30 |
221+
| 993 | Turkmenistan | 10 | 30 |
222+
| 256 | Uganda | 20 | 100 |
223+
| 212 | Moroccoa | 20 | 100 |
224+
180225
## Next steps
181226

182227
- Learn about [Microsoft Graph's throttling guidance](/graph/throttling)

articles/automation/enable-managed-identity-for-automation.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Using a system-assigned managed identity for an Azure Automation account
33
description: This article describes how to set up managed identity for Azure Automation accounts.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 09/09/2024
6+
ms.date: 01/20/2025
77
ms.topic: how-to
88
ms.custom: devx-track-azurepowershell
99
ms.service: azure-automation
@@ -23,7 +23,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
2323

2424
- An Azure resource that you want to access from your Automation runbook. This resource needs to have a role defined for the managed identity, which helps the Automation runbook authenticate access to the resource. To add roles, you need to be an owner for the resource in the corresponding Microsoft Entra tenant.
2525

26-
- If you want to execute hybrid jobs using a managed identity, update the agent-based Hybrid Runbook Worker to the latest version. There is no minimum version requirement for extension-based Hybrid Runbook Worker, and all the versions would work. The minimum required versions for the agent-based Hybrid Worker are:
26+
- There is no minimum version requirement for extension-based Hybrid Runbook Worker, and all the versions would work. The minimum required versions for the agent-based Hybrid Worker are:
2727

2828
- Windows Hybrid Runbook Worker: version 7.3.1125.0
2929
- Linux Hybrid Runbook Worker: version 1.7.4.0
@@ -67,7 +67,7 @@ $automationAccount = "automationAccountName"
6767
```
6868

6969
> [!IMPORTANT]
70-
> The new Automation account-level identity overrides any previous VM-level system-assigned identities which are described in [Use runbook authentication with managed identities](./automation-hrw-run-runbooks.md#runbook-auth-managed-identities). If you're running hybrid jobs on Azure VMs that use a VM's system-assigned identity to access runbook resources, then the Automation account identity will be used for the hybrid jobs. This means your existing job execution may be affected if you've been using the Customer Managed Keys (CMK) feature of your Automation account.<br/><br/>If you wish to continue using the VM's managed identity, you shouldn't enable the Automation account-level identity. If you've already enabled it, you can disable the Automation account system-assigned managed identity. See [Disable your Azure Automation account managed identity](./disable-managed-identity-for-automation.md).
70+
> The new Automation account-level identity overrides any previous VM-level system-assigned identities which are described in [Use runbook authentication with managed identities](./automation-hrw-run-runbooks.md#runbook-auth-managed-identities). If you're running hybrid jobs on Azure VMs that use a VM's system-assigned identity to access runbook resources, then the Automation account identity will be used for the hybrid jobs. <br/><br/>If you wish to continue using the VM's managed identity, you shouldn't enable the Automation account-level identity. If you've already enabled it, you can disable the Automation account system-assigned managed identity. See [Disable your Azure Automation account managed identity](./disable-managed-identity-for-automation.md).
7171
7272
### Enable using the Azure portal
7373

@@ -258,7 +258,7 @@ Perform the following steps.
258258
259259
An Automation account can use its system-assigned managed identity to get tokens to access other resources protected by Microsoft Entra ID, such as Azure Key Vault. These tokens don't represent any specific user of the application. Instead, they represent the application that's accessing the resource. In this case, for example, the token represents an Automation account.
260260
261-
Before you can use your system-assigned managed identity for authentication, set up access for that identity on the Azure resource where you plan to use the identity. To complete this task, assign the appropriate role to that identity on the target Azure resource.
261+
Before you can use your system-assigned managed identity to perform any actions within Azure, set up access for that identity on the Azure resource where you plan to use the identity. To complete this task, assign the appropriate role to that identity on the target Azure resource.
262262
263263
Follow the principal of least privilege and carefully assign permissions only required to execute your runbook. For example, if the Automation account is only required to start or stop an Azure VM, then the permissions assigned to the Run As account or managed identity needs to be only for starting or stopping the VM. Similarly, if a runbook is reading from blob storage, then assign read-only permissions.
264264

articles/azure-functions/functions-bindings-error-pages.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,9 @@ To avoid loss of data or missed messages, it's important to practice good error
3434
| **Plan your retry strategy** | Several Functions bindings extensions provide built-in support for retries and others let you define retry policies, which are implemented by the Functions runtime. For triggers that don't provide retry behaviors, you should consider implementing your own retry scheme. For more information, see [Retries](#retries).|
3535
| **Design for idempotency** | The occurrence of errors when you're processing data can be a problem for your functions, especially when you're processing messages. It's important to consider what happens when the error occurs and how to avoid duplicate processing. To learn more, see [Designing Azure Functions for identical input](functions-idempotent.md). |
3636

37+
>[!TIP]
38+
> When using output bindings, you aren't able to handle errors that occur when accessing the remote service. Because of this, you should validate all data passed to your output bindings to avoid raising any known exceptions. If you must be able to handle such exceptions in your function code, you should access the remote service by using the client SDK instead of relying on output bindings.
39+
3740
## Retries
3841

3942
There are two kinds of retries available for your functions:

articles/azure-netapp-files/configure-customer-managed-keys.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ The following diagram demonstrates how customer-managed keys work with Azure Net
3434
* Applying Azure network security groups on the private link subnet to Azure Key Vault isn't supported for Azure NetApp Files customer-managed keys. Network security groups don't affect connectivity to Private Link unless `Private endpoint network policy` is enabled on the subnet. It's _required_ to keep this option disabled.
3535
* If Azure NetApp Files fails to create a customer-managed key volume, error messages are displayed. Refer to the [Error messages and troubleshooting](#error-messages-and-troubleshooting) section for more information.
3636
* Do not make any changes to the underlying Azure Key Vault or Azure Private Endpoint after creating a customer-managed keys volume. Making changes can make the volumes inaccessible.
37+
* Azure NetApp Files supports the ability to [seamlessly transition existing volumes from platform-managed keys to customer-managed-keys](#transition-volumes).
3738
* If Azure Key Vault becomes inaccessible, Azure NetApp Files loses its access to the encryption keys and the ability to read or write data to volumes enabled with customer-managed keys. In this situation, create a support ticket to have access manually restored for the affected volumes.
3839
* Azure NetApp Files supports customer-managed keys on source and data replication volumes with cross-region replication or cross-zone replication relationships.
3940

articles/azure-web-pubsub/concept-client-protocols.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,25 @@ var client1 = new WebSocket('wss://test.webpubsub.azure.com/client/hubs/hub1');
5959
var client2 = new WebSocket('wss://test.webpubsub.azure.com/client/hubs/hub1', 'custom.subprotocol')
6060
```
6161

62+
Simple WebSocket client has two modes: `sendEvent` and `sendToGroup`. The mode is determined once the connection is established and cannot be changed later.
63+
64+
`sendEvent` is the default mode for the simple WebSocket client. In `sendEvent` mode, every WebSocket frame the client sent is considered as a `message` event. Users can configure [event handlers](./concept-service-internals.md#event-handler) or [event listeners](./concept-service-internals.md#event-listener) to handle these `message` events.
65+
66+
```javascript
67+
// Every data frame is considered as a `message` event
68+
var client3 = new WebSocket('wss://test.webpubsub.azure.com/client/hubs/hub1');
69+
70+
// Or explicitly set the mode
71+
var client4 = new WebSocket('wss://test.webpubsub.azure.com/client/hubs/hub1?webpubsub_mode=sendEvent');
72+
```
73+
74+
In `sendToGroup` mode, every WebSocket frame the client sent is considered as a message to be published to a specific group. `group` is a required query parameter in this mode, and only a single value is allowed. The connection should also have corresponding [permissions](#permissions) to send messages to the target group. Both `webpubsub.sendToGroup.<group>` and `webpubsub.sendToGroup` roles work for it.
75+
76+
For example, in JavaScript, you can create a simple WebSocket client in `sendToGroup` mode with `group=group1` by using the following code:
77+
```javascript
78+
var client5 = new WebSocket('wss://test.webpubsub.azure.com/client/hubs/hub1?webpubsub_mode=sendToGroup&group=group1');
79+
```
80+
6281
## The PubSub WebSocket client
6382

6483
A **PubSub WebSocket client** is the WebSocket client using subprotocols defined by the Azure Web PubSub service:

0 commit comments

Comments
 (0)