Skip to content

Commit f4aaa1d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vnet-bicep-graphic
2 parents add7f6c + 2352e6b commit f4aaa1d

22 files changed

+577
-279
lines changed

articles/aks/azure-cni-overlay.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,8 +143,10 @@ az aks nodepool add -g $resourceGroup --cluster-name $clusterName \
143143
144144
> [!NOTE]
145145
> Because Routing domain is not yet supported for ARM, CNI Overlay is not yet supported on ARM-based (ARM64) processor nodes.
146-
>
147-
146+
147+
> [!NOTE]
148+
> Upgrading an existing cluster to CNI Overlay is a non-reversible process.
149+
148150
> [!WARNING]
149151
> Prior to Windows OS Build 20348.1668, there was a limitation around Windows Overlay pods incorrectly SNATing packets from host network pods, which had a more detrimental effect for clusters upgrading to Overlay. To avoid this issue, **use Windows OS Build greater than or equal to 20348.1668**.
150152

articles/communications-gateway/configure-test-customer-teams-direct-routing.md

Lines changed: 18 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -35,34 +35,29 @@ You must be able to sign in to the Microsoft 365 admin center for your test cust
3535

3636
## Choose a DNS subdomain label to use to identify the customer
3737

38-
Azure Communications Gateway has per-region domain names. You need to set up subdomains of these domain names for your test customer. Microsoft Phone System and Azure Communications Gateway use these subdomains to match calls to tenants.
38+
Azure Communications Gateway has _per-region domain names_ for connecting to Microsoft Teams Direct Routing. You need to set up subdomains of these domain names for your test customer. Microsoft Phone System and Azure Communications Gateway use these subdomains to match calls to tenants.
3939

40+
1. Work out the per-region domain names for connecting to Microsoft Teams Direct Routing. These use the form `1-r<region-number>.<base-domain-name>`. The base domain name is the **Domain** on your Azure Communications Gateway resource in the [Azure portal](https://azure.microsoft.com/).
4041
1. Choose a DNS label to identify the test customer.
41-
* The label must be up to **eight** characters in length and can only contain letters, numbers, underscores, and dashes.
42-
* You must not use wildcard subdomains or subdomains with multiple labels.
43-
* For example, you could allocate the label `test`.
42+
- The label must be up to **eight** characters in length and can only contain letters, numbers, underscores, and dashes.
43+
- You must not use wildcard subdomains or subdomains with multiple labels.
44+
- For example, you could allocate the label `test`.
4445
> [!IMPORTANT]
45-
> The full customer subdomains (including the per-region domain names) must be a maximum of 48 characters. Microsoft Entra ID does not support domain names of more than 48 characters. For example, the customer subdomain `contoso1.1-r1.a1b2c3d4e5f6g7h8.commsgw.azure.com` is 48 characters.
46+
> The full customer subdomains (including the per-region domain names) must be a maximum of 48 characters. Microsoft Entra ID does not support domain names of more than 48 characters. For example, the customer subdomain `contoso1.1-r1.a1b2c3d4e5f6g7h8.commsgw.azure.com` is 48 characters.
4647
1. Use this label to create a subdomain of each per-region domain name for your Azure Communications Gateway.
4748
1. Make a note of the label you choose and the corresponding subdomains.
4849

49-
> [!TIP]
50-
> To find your deployment's per-region domain names:
51-
> 1. Sign in to the [Azure portal](https://azure.microsoft.com/).
52-
> 1. Search for your Communications Gateway resource and select it.
53-
> 1. Check that you're on the **Overview** of your Azure Communications Gateway resource.
54-
> 1. Select **Properties**.
55-
> 1. In each **Service Location** section, find the **Hostname** field.
56-
57-
For example, your per-region domain names might be as follows, where the `<deployment_id>` subdomain is autogenerated and unique to the deployment:
58-
59-
* `r1.<deployment_id>.commsgw.azure.com`
60-
* `r2.<deployment_id>.commsgw.azure.com`
50+
For example:
51+
- Your base domain name might be `<deployment-id>.commsgw.azure.com`, where `<deployment-id>` is autogenerated and unique to the deployment.
52+
- Your per-region domain names are therefore:
53+
- `1-r1.<deployment-id>.commsgw.azure.com`
54+
- `1-r2.<deployment-id>.commsgw.azure.com`
55+
- If you allocate the label `test`, this label combined with the per-region domain names creates the following domain names for your test customer:
56+
- `test.1-r1.<deployment-id>.commsgw.azure.com`
57+
- `test.1-r2.<deployment-id>.commsgw.azure.com`
6158

62-
If you allocate the label `test`, this label combined with the per-region domain names creates the following domain names for your test customer:
63-
64-
* `test.r1.<deployment_id>.commsgw.azure.com`
65-
* `test.r2.<deployment_id>.commsgw.azure.com`
59+
> [!IMPORTANT]
60+
> The per-region domain names for connecting to Microsoft Teams Direct Routing are different to the per-region domain names for connecting to your network.
6661
6762
> [!TIP]
6863
> Lab deployments have one per-region domain name. Your test customer therefore also only has one customer-specific per-region domain name.
@@ -73,7 +68,7 @@ To route calls to a customer tenant, the customer tenant must be configured with
7368

7469
1. Sign into the Microsoft 365 admin center for the customer tenant as a Global Administrator.
7570
1. Using [Add a subdomain to the customer tenant and verify it](/microsoftteams/direct-routing-sbc-multiple-tenants#add-a-subdomain-to-the-customer-tenant-and-verify-it):
76-
1. Register the first customer-specific per-region domain name (for example `test.r1.<deployment_id>.commsgw.azure.com`).
71+
1. Register the first customer-specific per-region domain name (for example `test.1-r1.<deployment-id>.commsgw.azure.com`).
7772
1. Start the verification process using TXT records.
7873
1. Note the TXT value that Microsoft 365 provides.
7974
1. (Production deployments only) Repeat the previous step for the second customer-specific per-region domain name.
@@ -104,7 +99,7 @@ When you have used Azure Communications Gateway to generate the DNS records for
10499
## Configure the customer tenant's call routing to use Azure Communications Gateway
105100

106101
In the customer tenant, [configure a call routing policy](/microsoftteams/direct-routing-voice-routing) (also called a voice routing policy) with a voice route that routes calls to Azure Communications Gateway.
107-
- Set the PSTN gateway to the customer-specific per-region domain names for Azure Communications Gateway (for example, `test.r1.<deployment_id>.commsgw.azure.com` and `test.r2.<deployment_id>.commsgw.azure.com`).
102+
- Set the PSTN gateway to the customer-specific per-region domain names for Azure Communications Gateway (for example, `test.1-r1.<deployment-id>.commsgw.azure.com` and `test.1-r2.<deployment-id>.commsgw.azure.com`).
108103
- Don't configure any users to use the call routing policy yet.
109104

110105
## Next step

articles/communications-gateway/connect-teams-direct-routing.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You must be able to sign in to the Microsoft 365 admin center for your tenant as
3131
## Enable Microsoft Teams Direct Routing support
3232

3333
> [!NOTE]
34-
> If you selected Microsoft Teams Direct Routing when you [deployed Azure Communications Gateway](deploy.md), skip this step and go to [Find your Azure Communication Gateway's domain names](#find-your-azure-communication-gateways-domain-names).
34+
> If you selected Microsoft Teams Direct Routing when you [deployed Azure Communications Gateway](deploy.md), skip this step and go to [Find your Azure Communication Gateway's domain names for connecting to Microsoft Teams Direct Routing](#find-your-azure-communication-gateways-domain-names-for-connecting-to-microsoft-teams-direct-routing).
3535
3636
1. Sign in to the [Azure portal](https://azure.microsoft.com/).
3737
1. In the search bar at the top of the page, search for your Communications Gateway resource and select it.
@@ -41,7 +41,7 @@ You must be able to sign in to the Microsoft 365 admin center for your tenant as
4141
1. Select the **Overview** page for your resource.
4242
1. Wait for your resource to be updated. When your resource is ready, the **Provisioning Status** field on the resource overview changes to "Complete." We recommend that you check in periodically to see if the Provisioning Status field is "Complete." This step might take up to two weeks.
4343

44-
## Find your Azure Communication Gateway's domain names
44+
## Find your Azure Communication Gateway's domain names for connecting to Microsoft Teams Direct Routing
4545

4646
Before starting this step, check that the **Provisioning Status** field for your resource is "Complete".
4747

@@ -52,11 +52,14 @@ Microsoft Teams only sends traffic to domains that you confirm that you own. You
5252
1. Select your Communications Gateway resource. Check that you're on the **Overview** of your Azure Communications Gateway resource.
5353
1. Select **Properties**.
5454
1. Find the field named **Domain**. This name is your deployment's _base domain name_.
55-
1. In each **Service Location** section, find the **Hostname** field. This field provides the _per-region domain name_.
56-
- A production deployment has two service regions and therefore two per-region domain names.
57-
- A lab deployment has one service region and therefore one per-region domain name.
55+
1. Work out the _per-region domain names_ for connecting to Microsoft Teams Direct Routing. These use the form `1-r<region-number>.<base-domain-name>`.
56+
- A production deployment has two service regions and therefore two per-region domain names: `1-r1.<base-domain-name>` and `1-r2.<base-domain-name>`
57+
- A lab deployment has one service region and therefore one per-region domain name: `1-r1.<base-domain-name>`.
5858
1. Note down the base domain name and the per-region domain name(s). You'll need these values in the next steps.
5959

60+
> [!IMPORTANT]
61+
> The domain names for connecting to Microsoft Teams Direct Routing are different to the domain names for connecting to your network.
62+
6063
## Register the base domain name for Azure Communications Gateway in your tenant
6164

6265
You need to register the base domain for Azure Communications Gateway in your tenant and verify it. Registering and verifying the base domain proves that you control the domain.
@@ -66,7 +69,7 @@ You need to register the base domain for Azure Communications Gateway in your te
6669
> - You must register Azure Communications Gateway's base domain name.
6770
> - Microsoft 365 automatically verifies the base domain name.
6871
69-
Follow the instructions [to add a base domain to your tenant](/microsoftteams/direct-routing-sbc-multiple-tenants#add-a-base-domain-to-the-tenant-and-verify-it). Use the base domain name that you found in [Find your Azure Communication Gateway's domain names](#find-your-azure-communication-gateways-domain-names).
72+
Follow the instructions [to add a base domain to your tenant](/microsoftteams/direct-routing-sbc-multiple-tenants#add-a-base-domain-to-the-tenant-and-verify-it). Use the base domain name that you found in [Find your Azure Communication Gateway's domain names for connecting to Microsoft Teams Direct Routing](#find-your-azure-communication-gateways-domain-names-for-connecting-to-microsoft-teams-direct-routing).
7073

7174
If Microsoft 365 prompts you to verify the domain name:
7275

@@ -105,7 +108,7 @@ To activate the base domain in Microsoft 365, you must have at least one user or
105108

106109
## Connect your tenant to Azure Communications Gateway
107110

108-
You must configure your Microsoft 365 tenant with SIP trunks to Azure Communications Gateway. Each trunk connects to one of the per-region domain names that you found in [Find your Azure Communication Gateway's domain names](#find-your-azure-communication-gateways-domain-names).
111+
You must configure your Microsoft 365 tenant with SIP trunks to Azure Communications Gateway. Each trunk connects to one of the per-region domain names that you found in [Find your Azure Communication Gateway's domain names for connecting to Microsoft Teams Direct Routing](#find-your-azure-communication-gateways-domain-names-for-connecting-to-microsoft-teams-direct-routing).
109112

110113
Use [Connect your Session Border Controller (SBC) to Direct Routing](/microsoftteams/direct-routing-connect-the-sbc) and the following configuration settings to set up the trunks.
111114

articles/communications-gateway/deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ When your resource has been provisioned, you can connect Azure Communications Ga
174174
1. In the search bar at the top of the page, search for your Communications Gateway resource.
175175
1. Go to the **Overview** page for your Azure Communications Gateway resource.
176176
1. In each **Service Location** section, find the **Hostname** field. You need to validate TLS connections against this hostname to ensure secure connections.
177-
* We recommend configuring an SRV lookup for each region, using `_sip._tls.<regional-FQDN-from-portal>`. Replace *`<regional-FQDN-from-portal>`* with the per-region FQDNs that you found in the **Overview** page for your resource.
177+
* We recommend configuring an SRV lookup for each region, using `_sip._tls.<regional-FQDN-from-portal>`. Replace *`<regional-FQDN-from-portal>`* with the per-region FQDNs from the **Hostname** fields on the **Overview** page for your resource.
178178
1. If your Azure Communications Gateway includes integrated MCP, configure the connection to MCP:
179179
1. Go to the **Overview** page for your Azure Communications Gateway resource.
180180
1. In each **Service Location** section, find the **MCP hostname** field.

articles/communications-gateway/interoperability-teams-direct-routing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ If you believe that media bypass support (preview) would be useful for your depl
159159

160160
## Topology hiding with domain delegation
161161

162-
The domain for your Azure Communications Gateway deployment is visible to customer administrators in their Microsoft 365 admin center. By default, each Azure Communications Gateway deployment receives an automatically generated domain name in the form `<deployment_id>.commsgw.azure.com`, where `<deployment_id>` is autogenerated and unique to the deployment. For example, the domain name might be `a1b2c3d4e5f6g7h8.commsgw.azure.com`.
162+
The domain for your Azure Communications Gateway deployment is visible to customer administrators in their Microsoft 365 admin center. By default, each Azure Communications Gateway deployment receives an automatically generated domain name in the form `<deployment-id>.commsgw.azure.com`, where `<deployment-id>` is autogenerated and unique to the deployment. For example, the domain name might be `a1b2c3d4e5f6g7h8.commsgw.azure.com`.
163163

164164
To hide the details of your deployment, you can configure Azure Communications Gateway to use a subdomain of your own base domain. Customer administrators see subdomains of this domain in their Microsoft 365 admin center. This process uses [DNS delegation with Azure DNS](../dns/dns-domain-delegation.md). You must configure DNS delegation as part of deploying Azure Communications Gateway.
165165

articles/communications-gateway/reliability-communications-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Each site in your network must:
6161
> [!div class="checklist"]
6262
> - Send traffic to its local Azure Communications Gateway service region by default.
6363
> - Locate Azure Communications Gateway peers within a region using DNS SRV, as outlined in RFC 3263.
64-
> - Make a DNS SRV lookup on the domain name for the service region, for example `r1.<deployment_id>.commsgw.azure.com`, where `<deployment_id>` is autogenerated and unique to the deployment.
64+
> - Make a DNS SRV lookup on the domain name for the service region's connection to your network, for example `pstn-region1.<deployment-id>.commsgw.azure.com` (where `<deployment-id>` is autogenerated and unique to the deployment). You can find these domain names from the **Hostname** fields on the ***Overview** of your resource in the Azure portal.
6565
> - If the SRV lookup returns multiple targets, use the weight and priority of each target to select a single target.
6666
> - Send new calls to available Azure Communications Gateway peers.
6767

articles/expressroute/index.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,19 @@ landingContent:
8686
url: designing-for-high-availability-with-expressroute.md
8787
- text: Design for Disaster Recovery with private peering
8888
url: designing-for-disaster-recovery-with-expressroute-privatepeering.md
89+
# Card
90+
- title: Resiliency
91+
linkLists:
92+
- linkListType: how-to-guide
93+
links:
94+
- text: Create maximum resiliency with ExpressRoute circuits
95+
url: expressroute-howto-circuit-portal-resource-manager.md?pivots=expressroute-preview
96+
- text: Create maximum resiliency with ExpressRoute gateways
97+
url: expressroute-howto-linkvnet-portal-resource-manager.md?pivots=expressroute-preview
98+
- linkListType: architecture
99+
links:
100+
- text: ExpressRoute reliability - Azure Well-Architected Framework
101+
url: /azure/well-architected/service-guides/azure-expressroute#reliability
89102
# Card
90103
- title: Learn about ExpressRoute architecture
91104
linkLists:
-46.1 KB
Loading

articles/iot-operations/get-started/quickstart-add-assets.md

Lines changed: 21 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ When you deployed Azure IoT Operations, you chose to include a built-in OPC PLC
5555

5656
To add an asset endpoint:
5757

58-
1. Select **Asset endpoints** and then **Create asset endpoint**:
58+
1. Select **Manage asset endpoints** and then **Create asset endpoint**:
5959

6060
:::image type="content" source="media/quickstart-add-assets/asset-endpoints.png" alt-text="Screenshot that shows the asset endpoints page in the Azure IoT Operations portal.":::
6161

@@ -84,22 +84,27 @@ To add an asset endpoint:
8484

8585
When the OPC PLC simulator is running, data flows from the simulator, to the connector, to the OPC UA broker, and finally to the MQ broker.
8686

87-
To enable the asset endpoint to use an untrusted certificate:
87+
The following step lowers the security level for the OPC PLC so that it accepts connections from any client without an explicit peer certificate trust operation. To enable the asset endpoint to use an untrusted certificate:
8888

8989
> [!CAUTION]
90-
> Don't use untrusted certificates in production environments.
91-
92-
1. Run the following command on the machine where your cluster is running to apply the configuration to use an untrusted certificate:
93-
94-
```console
95-
kubectl apply -f https://raw.githubusercontent.com/Azure-Samples/explore-iot-operations/main/samples/quickstarts/opc-ua-connector-0.yaml
90+
> Don't use untrusted certificates in production environments. To learn more, see [Configure an OPC PLC simulator](../manage-devices-assets/howto-configure-opc-plc-simulator.md).
91+
92+
1. Run the following command to enable the use of an untrusted certificate. Replace the two placeholders with your cluster name and resource group name:
93+
94+
```azurecli
95+
az k8s-extension update \
96+
--version 0.3.0-preview \
97+
--name opc-ua-broker \
98+
--release-train preview \
99+
--cluster-name <cluster-name> \
100+
--resource-group <azure-resource-group> \
101+
--cluster-type connectedClusters \
102+
--auto-upgrade-minor-version false \
103+
--config opcPlcSimulation.deploy=true \
104+
--config opcPlcSimulation.autoAcceptUntrustedCertificates=true
96105
```
97106

98-
The following snippet shows the YAML file that you applied:
99-
100-
:::code language="yaml" source="~/azure-iot-operations-samples/samples/quickstarts/opc-ua-connector-0.yaml":::
101-
102-
1. Find the name of your `aio-opc-supervisor` pod by using the following command:
107+
1. To enable the configuration change to take effect immediately, first find the name of your `aio-opc-supervisor` pod by using the following command:
103108

104109
```console
105110
kubectl get pods -n azure-iot-operations
@@ -177,7 +182,7 @@ Review your asset and tag details and make any adjustments you need before you s
177182

178183
To verify that the thermostat asset you added is publishing data, view the telemetry in the `azure-iot-operations/data` topic:
179184

180-
:::image type="content" source="media/quickstart-add-assets/mqttui-output.png" alt-text="Screenshot of the mqttui topic display showing the temperature telemetry.":::
185+
:::image type="content" source="media/quickstart-add-assets/mqttui-output.png" alt-text="Screenshot of the mqttui topic display showing the temperature telemetry." lightbox="media/quickstart-add-assets/mqttui-output.png":::
181186

182187
If there's no data flowing, restart the `aio-opc-opc.tcp-1` pod:
183188

@@ -199,7 +204,7 @@ The sample tags you added in the previous quickstart generate messages from your
199204

200205
```json
201206
{
202-
"Timestamp": "2023-08-10T00:54:58.6572007Z",
207+
"Timestamp": "2024-03-08T00:54:58.6572007Z",
203208
"MessageType": "ua-deltaframe",
204209
"payload": {
205210
"temperature": {
@@ -211,7 +216,7 @@ The sample tags you added in the previous quickstart generate messages from your
211216
"Value": 7109
212217
}
213218
},
214-
"DataSetWriterName": "oven",
219+
"DataSetWriterName": "thermostat",
215220
"SequenceNumber": 4660
216221
}
217222
```

0 commit comments

Comments
 (0)