You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/azure-cni-overlay.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -143,8 +143,10 @@ az aks nodepool add -g $resourceGroup --cluster-name $clusterName \
143
143
144
144
> [!NOTE]
145
145
> Because Routing domain is not yet supported for ARM, CNI Overlay is not yet supported on ARM-based (ARM64) processor nodes.
146
-
>
147
-
146
+
147
+
> [!NOTE]
148
+
> Upgrading an existing cluster to CNI Overlay is a non-reversible process.
149
+
148
150
> [!WARNING]
149
151
> Prior to Windows OS Build 20348.1668, there was a limitation around Windows Overlay pods incorrectly SNATing packets from host network pods, which had a more detrimental effect for clusters upgrading to Overlay. To avoid this issue, **use Windows OS Build greater than or equal to 20348.1668**.
Copy file name to clipboardExpand all lines: articles/communications-gateway/configure-test-customer-teams-direct-routing.md
+18-23Lines changed: 18 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,34 +35,29 @@ You must be able to sign in to the Microsoft 365 admin center for your test cust
35
35
36
36
## Choose a DNS subdomain label to use to identify the customer
37
37
38
-
Azure Communications Gateway has per-region domain names. You need to set up subdomains of these domain names for your test customer. Microsoft Phone System and Azure Communications Gateway use these subdomains to match calls to tenants.
38
+
Azure Communications Gateway has _per-region domain names_ for connecting to Microsoft Teams Direct Routing. You need to set up subdomains of these domain names for your test customer. Microsoft Phone System and Azure Communications Gateway use these subdomains to match calls to tenants.
39
39
40
+
1. Work out the per-region domain names for connecting to Microsoft Teams Direct Routing. These use the form `1-r<region-number>.<base-domain-name>`. The base domain name is the **Domain** on your Azure Communications Gateway resource in the [Azure portal](https://azure.microsoft.com/).
40
41
1. Choose a DNS label to identify the test customer.
41
-
* The label must be up to **eight** characters in length and can only contain letters, numbers, underscores, and dashes.
42
-
* You must not use wildcard subdomains or subdomains with multiple labels.
43
-
* For example, you could allocate the label `test`.
42
+
- The label must be up to **eight** characters in length and can only contain letters, numbers, underscores, and dashes.
43
+
- You must not use wildcard subdomains or subdomains with multiple labels.
44
+
- For example, you could allocate the label `test`.
44
45
> [!IMPORTANT]
45
-
> The full customer subdomains (including the per-region domain names) must be a maximum of 48 characters. Microsoft Entra ID does not support domain names of more than 48 characters. For example, the customer subdomain `contoso1.1-r1.a1b2c3d4e5f6g7h8.commsgw.azure.com` is 48 characters.
46
+
> The full customer subdomains (including the per-region domain names) must be a maximum of 48 characters. Microsoft Entra ID does not support domain names of more than 48 characters. For example, the customer subdomain `contoso1.1-r1.a1b2c3d4e5f6g7h8.commsgw.azure.com` is 48 characters.
46
47
1. Use this label to create a subdomain of each per-region domain name for your Azure Communications Gateway.
47
48
1. Make a note of the label you choose and the corresponding subdomains.
48
49
49
-
> [!TIP]
50
-
> To find your deployment's per-region domain names:
51
-
> 1. Sign in to the [Azure portal](https://azure.microsoft.com/).
52
-
> 1. Search for your Communications Gateway resource and select it.
53
-
> 1. Check that you're on the **Overview** of your Azure Communications Gateway resource.
54
-
> 1. Select **Properties**.
55
-
> 1. In each **Service Location** section, find the **Hostname** field.
56
-
57
-
For example, your per-region domain names might be as follows, where the `<deployment_id>` subdomain is autogenerated and unique to the deployment:
58
-
59
-
*`r1.<deployment_id>.commsgw.azure.com`
60
-
*`r2.<deployment_id>.commsgw.azure.com`
50
+
For example:
51
+
- Your base domain name might be `<deployment-id>.commsgw.azure.com`, where `<deployment-id>` is autogenerated and unique to the deployment.
52
+
- Your per-region domain names are therefore:
53
+
-`1-r1.<deployment-id>.commsgw.azure.com`
54
+
-`1-r2.<deployment-id>.commsgw.azure.com`
55
+
- If you allocate the label `test`, this label combined with the per-region domain names creates the following domain names for your test customer:
56
+
-`test.1-r1.<deployment-id>.commsgw.azure.com`
57
+
-`test.1-r2.<deployment-id>.commsgw.azure.com`
61
58
62
-
If you allocate the label `test`, this label combined with the per-region domain names creates the following domain names for your test customer:
63
-
64
-
*`test.r1.<deployment_id>.commsgw.azure.com`
65
-
*`test.r2.<deployment_id>.commsgw.azure.com`
59
+
> [!IMPORTANT]
60
+
> The per-region domain names for connecting to Microsoft Teams Direct Routing are different to the per-region domain names for connecting to your network.
66
61
67
62
> [!TIP]
68
63
> Lab deployments have one per-region domain name. Your test customer therefore also only has one customer-specific per-region domain name.
@@ -73,7 +68,7 @@ To route calls to a customer tenant, the customer tenant must be configured with
73
68
74
69
1. Sign into the Microsoft 365 admin center for the customer tenant as a Global Administrator.
75
70
1. Using [Add a subdomain to the customer tenant and verify it](/microsoftteams/direct-routing-sbc-multiple-tenants#add-a-subdomain-to-the-customer-tenant-and-verify-it):
76
-
1. Register the first customer-specific per-region domain name (for example `test.r1.<deployment_id>.commsgw.azure.com`).
71
+
1. Register the first customer-specific per-region domain name (for example `test.1-r1.<deployment-id>.commsgw.azure.com`).
77
72
1. Start the verification process using TXT records.
78
73
1. Note the TXT value that Microsoft 365 provides.
79
74
1. (Production deployments only) Repeat the previous step for the second customer-specific per-region domain name.
@@ -104,7 +99,7 @@ When you have used Azure Communications Gateway to generate the DNS records for
104
99
## Configure the customer tenant's call routing to use Azure Communications Gateway
105
100
106
101
In the customer tenant, [configure a call routing policy](/microsoftteams/direct-routing-voice-routing) (also called a voice routing policy) with a voice route that routes calls to Azure Communications Gateway.
107
-
- Set the PSTN gateway to the customer-specific per-region domain names for Azure Communications Gateway (for example, `test.r1.<deployment_id>.commsgw.azure.com` and `test.r2.<deployment_id>.commsgw.azure.com`).
102
+
- Set the PSTN gateway to the customer-specific per-region domain names for Azure Communications Gateway (for example, `test.1-r1.<deployment-id>.commsgw.azure.com` and `test.1-r2.<deployment-id>.commsgw.azure.com`).
108
103
- Don't configure any users to use the call routing policy yet.
Copy file name to clipboardExpand all lines: articles/communications-gateway/connect-teams-direct-routing.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ You must be able to sign in to the Microsoft 365 admin center for your tenant as
31
31
## Enable Microsoft Teams Direct Routing support
32
32
33
33
> [!NOTE]
34
-
> If you selected Microsoft Teams Direct Routing when you [deployed Azure Communications Gateway](deploy.md), skip this step and go to [Find your Azure Communication Gateway's domain names](#find-your-azure-communication-gateways-domain-names).
34
+
> If you selected Microsoft Teams Direct Routing when you [deployed Azure Communications Gateway](deploy.md), skip this step and go to [Find your Azure Communication Gateway's domain names for connecting to Microsoft Teams Direct Routing](#find-your-azure-communication-gateways-domain-names-for-connecting-to-microsoft-teams-direct-routing).
35
35
36
36
1. Sign in to the [Azure portal](https://azure.microsoft.com/).
37
37
1. In the search bar at the top of the page, search for your Communications Gateway resource and select it.
@@ -41,7 +41,7 @@ You must be able to sign in to the Microsoft 365 admin center for your tenant as
41
41
1. Select the **Overview** page for your resource.
42
42
1. Wait for your resource to be updated. When your resource is ready, the **Provisioning Status** field on the resource overview changes to "Complete." We recommend that you check in periodically to see if the Provisioning Status field is "Complete." This step might take up to two weeks.
43
43
44
-
## Find your Azure Communication Gateway's domain names
44
+
## Find your Azure Communication Gateway's domain names for connecting to Microsoft Teams Direct Routing
45
45
46
46
Before starting this step, check that the **Provisioning Status** field for your resource is "Complete".
47
47
@@ -52,11 +52,14 @@ Microsoft Teams only sends traffic to domains that you confirm that you own. You
52
52
1. Select your Communications Gateway resource. Check that you're on the **Overview** of your Azure Communications Gateway resource.
53
53
1. Select **Properties**.
54
54
1. Find the field named **Domain**. This name is your deployment's _base domain name_.
55
-
1.In each **Service Location** section, find the **Hostname** field. This field provides the _per-regiondomain name_.
56
-
- A production deployment has two service regions and therefore two per-region domain names.
57
-
- A lab deployment has one service region and therefore one per-region domain name.
55
+
1.Work out the _per-region domain names_ for connecting to Microsoft Teams Direct Routing. These use the form `1-r<region-number>.<base-domain-name>`.
56
+
- A production deployment has two service regions and therefore two per-region domain names: `1-r1.<base-domain-name>` and `1-r2.<base-domain-name>`
57
+
- A lab deployment has one service region and therefore one per-region domain name: `1-r1.<base-domain-name>`.
58
58
1. Note down the base domain name and the per-region domain name(s). You'll need these values in the next steps.
59
59
60
+
> [!IMPORTANT]
61
+
> The domain names for connecting to Microsoft Teams Direct Routing are different to the domain names for connecting to your network.
62
+
60
63
## Register the base domain name for Azure Communications Gateway in your tenant
61
64
62
65
You need to register the base domain for Azure Communications Gateway in your tenant and verify it. Registering and verifying the base domain proves that you control the domain.
@@ -66,7 +69,7 @@ You need to register the base domain for Azure Communications Gateway in your te
66
69
> - You must register Azure Communications Gateway's base domain name.
67
70
> - Microsoft 365 automatically verifies the base domain name.
68
71
69
-
Follow the instructions [to add a base domain to your tenant](/microsoftteams/direct-routing-sbc-multiple-tenants#add-a-base-domain-to-the-tenant-and-verify-it). Use the base domain name that you found in [Find your Azure Communication Gateway's domain names](#find-your-azure-communication-gateways-domain-names).
72
+
Follow the instructions [to add a base domain to your tenant](/microsoftteams/direct-routing-sbc-multiple-tenants#add-a-base-domain-to-the-tenant-and-verify-it). Use the base domain name that you found in [Find your Azure Communication Gateway's domain names for connecting to Microsoft Teams Direct Routing](#find-your-azure-communication-gateways-domain-names-for-connecting-to-microsoft-teams-direct-routing).
70
73
71
74
If Microsoft 365 prompts you to verify the domain name:
72
75
@@ -105,7 +108,7 @@ To activate the base domain in Microsoft 365, you must have at least one user or
105
108
106
109
## Connect your tenant to Azure Communications Gateway
107
110
108
-
You must configure your Microsoft 365 tenant with SIP trunks to Azure Communications Gateway. Each trunk connects to one of the per-region domain names that you found in [Find your Azure Communication Gateway's domain names](#find-your-azure-communication-gateways-domain-names).
111
+
You must configure your Microsoft 365 tenant with SIP trunks to Azure Communications Gateway. Each trunk connects to one of the per-region domain names that you found in [Find your Azure Communication Gateway's domain names for connecting to Microsoft Teams Direct Routing](#find-your-azure-communication-gateways-domain-names-for-connecting-to-microsoft-teams-direct-routing).
109
112
110
113
Use [Connect your Session Border Controller (SBC) to Direct Routing](/microsoftteams/direct-routing-connect-the-sbc) and the following configuration settings to set up the trunks.
Copy file name to clipboardExpand all lines: articles/communications-gateway/deploy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -174,7 +174,7 @@ When your resource has been provisioned, you can connect Azure Communications Ga
174
174
1. In the search bar at the top of the page, search for your Communications Gateway resource.
175
175
1. Go to the **Overview** page for your Azure Communications Gateway resource.
176
176
1. In each **Service Location** section, find the **Hostname** field. You need to validate TLS connections against this hostname to ensure secure connections.
177
-
* We recommend configuring an SRV lookup for each region, using `_sip._tls.<regional-FQDN-from-portal>`. Replace *`<regional-FQDN-from-portal>`* with the per-region FQDNs that you found in the **Overview** page for your resource.
177
+
* We recommend configuring an SRV lookup for each region, using `_sip._tls.<regional-FQDN-from-portal>`. Replace *`<regional-FQDN-from-portal>`* with the per-region FQDNs from the **Hostname** fields on the **Overview** page for your resource.
178
178
1. If your Azure Communications Gateway includes integrated MCP, configure the connection to MCP:
179
179
1. Go to the **Overview** page for your Azure Communications Gateway resource.
180
180
1. In each **Service Location** section, find the **MCP hostname** field.
Copy file name to clipboardExpand all lines: articles/communications-gateway/interoperability-teams-direct-routing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -159,7 +159,7 @@ If you believe that media bypass support (preview) would be useful for your depl
159
159
160
160
## Topology hiding with domain delegation
161
161
162
-
The domain for your Azure Communications Gateway deployment is visible to customer administrators in their Microsoft 365 admin center. By default, each Azure Communications Gateway deployment receives an automatically generated domain name in the form `<deployment_id>.commsgw.azure.com`, where `<deployment_id>` is autogenerated and unique to the deployment. For example, the domain name might be `a1b2c3d4e5f6g7h8.commsgw.azure.com`.
162
+
The domain for your Azure Communications Gateway deployment is visible to customer administrators in their Microsoft 365 admin center. By default, each Azure Communications Gateway deployment receives an automatically generated domain name in the form `<deployment-id>.commsgw.azure.com`, where `<deployment-id>` is autogenerated and unique to the deployment. For example, the domain name might be `a1b2c3d4e5f6g7h8.commsgw.azure.com`.
163
163
164
164
To hide the details of your deployment, you can configure Azure Communications Gateway to use a subdomain of your own base domain. Customer administrators see subdomains of this domain in their Microsoft 365 admin center. This process uses [DNS delegation with Azure DNS](../dns/dns-domain-delegation.md). You must configure DNS delegation as part of deploying Azure Communications Gateway.
Copy file name to clipboardExpand all lines: articles/communications-gateway/reliability-communications-gateway.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ Each site in your network must:
61
61
> [!div class="checklist"]
62
62
> - Send traffic to its local Azure Communications Gateway service region by default.
63
63
> - Locate Azure Communications Gateway peers within a region using DNS SRV, as outlined in RFC 3263.
64
-
> - Make a DNS SRV lookup on the domain name for the service region, for example `r1.<deployment_id>.commsgw.azure.com`, where `<deployment_id>` is autogenerated and unique to the deployment.
64
+
> - Make a DNS SRV lookup on the domain name for the service region's connection to your network, for example `pstn-region1.<deployment-id>.commsgw.azure.com` (where `<deployment-id>` is autogenerated and unique to the deployment). You can find these domain names from the **Hostname** fields on the ***Overview** of your resource in the Azure portal.
65
65
> - If the SRV lookup returns multiple targets, use the weight and priority of each target to select a single target.
66
66
> - Send new calls to available Azure Communications Gateway peers.
Copy file name to clipboardExpand all lines: articles/iot-operations/get-started/quickstart-add-assets.md
+21-16Lines changed: 21 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ When you deployed Azure IoT Operations, you chose to include a built-in OPC PLC
55
55
56
56
To add an asset endpoint:
57
57
58
-
1. Select **Asset endpoints** and then **Create asset endpoint**:
58
+
1. Select **Manage asset endpoints** and then **Create asset endpoint**:
59
59
60
60
:::image type="content" source="media/quickstart-add-assets/asset-endpoints.png" alt-text="Screenshot that shows the asset endpoints page in the Azure IoT Operations portal.":::
61
61
@@ -84,22 +84,27 @@ To add an asset endpoint:
84
84
85
85
When the OPC PLC simulator is running, data flows from the simulator, to the connector, to the OPC UA broker, and finally to the MQ broker.
86
86
87
-
To enable the asset endpoint to use an untrusted certificate:
87
+
The following step lowers the security level for the OPC PLC so that it accepts connections from any client without an explicit peer certificate trust operation. To enable the asset endpoint to use an untrusted certificate:
88
88
89
89
> [!CAUTION]
90
-
> Don't use untrusted certificates in production environments.
91
-
92
-
1. Run the following command on the machine where your cluster is running to apply the configuration to use an untrusted certificate:
> Don't use untrusted certificates in production environments. To learn more, see [Configure an OPC PLC simulator](../manage-devices-assets/howto-configure-opc-plc-simulator.md).
91
+
92
+
1. Run the following command to enable the use of an untrusted certificate. Replace the two placeholders with your cluster name and resource group name:
1. Find the name of your `aio-opc-supervisor` pod by using the following command:
107
+
1. To enable the configuration change to take effect immediately, first find the name of your `aio-opc-supervisor` pod by using the following command:
103
108
104
109
```console
105
110
kubectl get pods -n azure-iot-operations
@@ -177,7 +182,7 @@ Review your asset and tag details and make any adjustments you need before you s
177
182
178
183
To verify that the thermostat asset you added is publishing data, view the telemetry in the `azure-iot-operations/data` topic:
179
184
180
-
:::image type="content" source="media/quickstart-add-assets/mqttui-output.png" alt-text="Screenshot of the mqttui topic display showing the temperature telemetry.":::
185
+
:::image type="content" source="media/quickstart-add-assets/mqttui-output.png" alt-text="Screenshot of the mqttui topic display showing the temperature telemetry." lightbox="media/quickstart-add-assets/mqttui-output.png":::
181
186
182
187
If there's no data flowing, restart the `aio-opc-opc.tcp-1` pod:
183
188
@@ -199,7 +204,7 @@ The sample tags you added in the previous quickstart generate messages from your
199
204
200
205
```json
201
206
{
202
-
"Timestamp": "2023-08-10T00:54:58.6572007Z",
207
+
"Timestamp": "2024-03-08T00:54:58.6572007Z",
203
208
"MessageType": "ua-deltaframe",
204
209
"payload": {
205
210
"temperature": {
@@ -211,7 +216,7 @@ The sample tags you added in the previous quickstart generate messages from your
0 commit comments