Skip to content

Commit f647869

Browse files
authored
Merge pull request #286541 from MicrosoftDocs/main
9/11/2024 AM Publish
2 parents 57aef26 + 382c7d6 commit f647869

File tree

52 files changed

+742
-877
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+742
-877
lines changed

.openpublishing.redirection.json

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2135,16 +2135,46 @@
21352135
"redirect_url": "/azure/firewall/ftp-support",
21362136
"redirect_document_id": false
21372137
},
2138+
{
2139+
"source_path_from_root": "/articles/firewall/diagnostic-logs.md",
2140+
"redirect_url": "/azure/firewall/monitor-firewall",
2141+
"redirect_document_id": false
2142+
},
2143+
{
2144+
"source_path_from_root": "/articles/firewall/enable-top-ten-and-flow-trace.md",
2145+
"redirect_url": "/azure/firewall/monitor-firewall-reference",
2146+
"redirect_document_id": false
2147+
},
2148+
{
2149+
"source_path_from_root": "/articles/firewall/firewall-diagnostics.md",
2150+
"redirect_url": "/azure/firewall/monitor-firewall",
2151+
"redirect_document_id": false
2152+
},
21382153
{
21392154
"source_path_from_root": "/articles/firewall/firewall-network-rule-logging.md",
2140-
"redirect_url": "/azure/firewall/firewall-diagnostics",
2155+
"redirect_url": "/azure/firewall/monitor-firewall",
2156+
"redirect_document_id": false
2157+
},
2158+
{
2159+
"source_path_from_root": "/articles/firewall/firewall-structured-logs.md",
2160+
"redirect_url": "/azure/firewall/monitor-firewall",
21412161
"redirect_document_id": false
21422162
},
21432163
{
21442164
"source_path_from_root": "/articles/firewall/log-analytics-samples.md",
21452165
"redirect_url": "/azure/firewall/firewall-workbook",
21462166
"redirect_document_id": false
21472167
},
2168+
{
2169+
"source_path_from_root": "/articles/firewall/logs-and-metrics.md",
2170+
"redirect_url": "/azure/firewall/monitor-firewall",
2171+
"redirect_document_id": true
2172+
},
2173+
{
2174+
"source_path_from_root": "/articles/firewall/metrics.md",
2175+
"redirect_url": "/azure/firewall/monitor-firewall-reference",
2176+
"redirect_document_id": false
2177+
},
21482178
{
21492179
"source_path_from_root": "/articles/firewall/protect-windows-virtual-desktop.md",
21502180
"redirect_url": "/azure/firewall/protect-azure-virtual-desktop",
@@ -2167,7 +2197,7 @@
21672197
},
21682198
{
21692199
"source_path_from_root": "/articles/firewall/tutorial-diagnostics.md",
2170-
"redirect_url": "/azure/firewall/firewall-diagnostics",
2200+
"redirect_url": "/azure/firewall/monitor-firewall",
21712201
"redirect_document_id": false
21722202
},
21732203
{
Lines changed: 10 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 07/31/2024
4+
ms.date: 09/11/2024
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: whats-new
@@ -19,6 +19,14 @@ manager: CelesteDG
1919

2020
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
2121

22+
## August 2024
23+
24+
This month, we changed Twitter to X in numerous articles and code samples.
25+
26+
### Updated articles
27+
28+
- [Tutorial: Configure Keyless with Azure Active Directory B2C](partner-keyless.md) - Editorial updates
29+
2230
## July 2024
2331

2432
### Updated articles
@@ -31,17 +39,4 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
3139
### Updated articles
3240

3341
- [Define an OAuth2 custom error technical profile in an Azure Active Directory B2C custom policy](oauth2-error-technical-profile.md) - Error code updates
34-
- [Configure authentication in a sample Python web app by using Azure AD B2C](configure-authentication-sample-python-web-app.md) - Python version update
35-
36-
37-
## May 2024
38-
39-
### New articles
40-
41-
- [Configure Transmit Security with Azure Active Directory B2C for risk detection and prevention](partner-transmit-security.md)
42-
43-
### Updated articles
44-
45-
- [Set up sign-up and sign-in with a LinkedIn account using Azure Active Directory B2C](identity-provider-linkedin.md) - Updated LinkedIn instructions
46-
- [Page layout versions](page-layout.md) - Updated page layout versions
47-
42+
- [Configure authentication in a sample Python web app by using Azure AD B2C](configure-authentication-sample-python-web-app.md) - Python version updates

articles/azure-app-configuration/howto-geo-replication.md

Lines changed: 27 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-app-configuration
77
ms.devlang: csharp
88
# ms.devlang: csharp, java
99
ms.topic: how-to
10-
ms.date: 05/24/2024
10+
ms.date: 09/09/2024
1111
ms.author: mametcal
1212
ms.custom: devx-track-azurecli
1313

@@ -16,7 +16,7 @@ ms.custom: devx-track-azurecli
1616

1717
# Enable geo-replication
1818

19-
This article covers replication of Azure App Configuration stores. You'll learn about how to create, use and delete a replica in your configuration store.
19+
This article covers replication of Azure App Configuration stores. You learn about how to create, use, and delete a replica in your configuration store.
2020

2121
To learn more about the concept of geo-replication, see [Geo-replication in Azure App Configuration](./concept-geo-replication.md).
2222

@@ -90,7 +90,7 @@ To delete a replica in the portal, follow the steps below.
9090

9191
## Automatic replica discovery
9292

93-
The App Configuration providers can automatically discover any additional replicas from a given App Configuration endpoint and attempt to connect to them. This feature allows you to benefit from geo-replication without having to change your code or redeploy your application. This means you can enable geo-replication or add extra replicas even after your application has been deployed.
93+
The App Configuration providers can automatically discover any replicas from a given App Configuration endpoint and attempt to connect to them. This feature allows you to benefit from geo-replication without having to change your code or redeploy your application. This means you can enable geo-replication or add extra replicas even after your application has been deployed.
9494

9595
Automatic replica discovery is enabled by default, but you can refer to the following sample code to disable it (not recommended).
9696

@@ -147,13 +147,25 @@ spec:
147147
> [!NOTE]
148148
> The automatic replica discovery and failover support is available if you use version **1.3.0** or later of [Azure App Configuration Kubernetes Provider](./quickstart-azure-kubernetes-service.md).
149149
150+
### [Python](#tab/python)
151+
152+
Specify the `replica_discovery_enabled` property when loading the configuration store and set it to `False`.
153+
154+
155+
```python
156+
config = load(endpoint=endpoint, credential=credential, replica_discovery_enabled=False)
157+
```
158+
159+
> [!NOTE]
160+
> The automatic replica discovery support is available if you use version **1.3.0** or later.
161+
150162
---
151163

152164
## Scale and failover with replicas
153165

154166
Each replica you create has its dedicated endpoint. If your application resides in multiple geo-locations, you can update each deployment of your application in a location to connect to the replica closer to that location, which helps minimize the network latency between your application and App Configuration. Since each replica has its separate request quota, this setup also helps the scalability of your application while it grows to a multi-region distributed service.
155167

156-
When geo-replication is enabled, and if one replica isn't accessible, you can let your application failover to another replica for improved resiliency. App Configuration providers have built-in failover support through user provided replicas as well as additional automatically discovered replicas. You can provide a list of your replica endpoints in the order of the most preferred to the least preferred endpoint. When the current endpoint isn't accessible, the provider will fail over to a less preferred endpoint, but it will try to connect to the more preferred endpoints from time to time. If all user provided replicas are not accessible, the automatically discovered replicas will be randomly selected and used. When a more preferred endpoint becomes available, the provider will switch to it for future requests.
168+
When geo-replication is enabled, and if one replica isn't accessible, you can let your application failover to another replica for improved resiliency. App Configuration providers have built-in failover support through user provided replicas and/or additional automatically discovered replicas. You can provide a list of your replica endpoints in the order of the most preferred to the least preferred endpoint. When the current endpoint isn't accessible, the provider will fail over to a less preferred endpoint, but it tries to connect to the more preferred endpoints from time to time. If all user provided replicas aren't accessible, the automatically discovered replicas will be randomly selected and used. When a more preferred endpoint becomes available, the provider will switch to it for future requests.
157169

158170
Assuming you have an application using Azure App Configuration, you can update it as the following sample code to take advantage of the failover feature. You can either provide a list of endpoints for Microsoft Entra authentication or a list of connection strings for access key-based authentication.
159171

@@ -227,7 +239,11 @@ spring.cloud.azure.appconfiguration.stores[0].connection-strings[1]="${SECOND_RE
227239

228240
### [Kubernetes](#tab/kubernetes)
229241

230-
The Azure App Configuration Kubernetes Provider supports failover with automatically discovered replicas by default, as long as automatic replica discovery is not disabled. It does not support or require user-provided replicas.
242+
The Azure App Configuration Kubernetes Provider supports failover with automatically discovered replicas by default, as long as automatic replica discovery isn't disabled. It doesn't support or require user-provided replicas.
243+
244+
### [Python](#tab/python)
245+
246+
The Azure App Configuration Python Provider supports failover with automatically discovered replicas by default, as long as automatic replica discovery isn't disabled. It doesn't support or require user-provided replicas.
231247

232248
---
233249

@@ -266,11 +282,15 @@ configurationBuilder.AddAzureAppConfiguration(options =>
266282

267283
### [Java Spring](#tab/spring)
268284

269-
This feature is not yet supported in the Azure App Configuration Java Spring Provider.
285+
This feature isn't yet supported in the Azure App Configuration Java Spring Provider.
270286

271287
### [Kubernetes](#tab/kubernetes)
272288

273-
This feature is not yet supported in the Azure App Configuration Kubernetes Provider.
289+
This feature isn't yet supported in the Azure App Configuration Kubernetes Provider.
290+
291+
### [Python](#tab/python)
292+
293+
This feature isn't yet supported in the Azure App Configuration Python Provider.
274294

275295
---
276296

4.21 KB
Loading

articles/azure-netapp-files/application-volume-group-introduction.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.topic: conceptual
8-
ms.date: 06/18/2024
8+
ms.date: 09/11/2024
99
ms.author: anfdocs
1010
---
1111
# Understand Azure NetApp Files application volume group for SAP HANA
@@ -56,8 +56,7 @@ Application volume group for SAP HANA extension one offers support for:
5656

5757
* [Standard network features](azure-netapp-files-network-topologies.md)
5858

59-
Application volume group for SAP HANA now supports selecting Standard network features for all volumes in the volume group. The availability of Standard network features simplifies deployment, avoiding the manual process for AvSet pinning and eliminating the need for availability sets.
60-
59+
Application volume group for SAP HANA now supports selecting Standard network features for all volumes in the volume group. Standard network features support enhanced security including [network security groups (NSGs)](../virtual-network/network-security-group-how-it-works.md)
6160

6261
## Next steps
6362

0 commit comments

Comments
 (0)