Skip to content

Commit f797c8b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into azure-migrate-articles
2 parents 87c8d74 + d6718f4 commit f797c8b

File tree

92 files changed

+6286
-25663
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

92 files changed

+6286
-25663
lines changed

articles/app-service/app-service-hybrid-connections.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create and use hybrid connections in Azure App Service
44
author: madsd
55
ms.assetid: 66774bde-13f5-45d0-9a70-4e9536a4f619
66
ms.topic: article
7-
ms.date: 04/10/2025
7+
ms.date: 04/29/2025
88
ms.author: madsd
99
ms.custom: "UpdateFrequency3, fasttrack-edit"
1010
#customer intent: As an app developer, I want to understand the usage of Hybrid Connections to provide access to apps in Azure App Service.
@@ -237,10 +237,10 @@ The status of **Connected** means that at least one HCM is configured with that
237237

238238
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-service-bus-endpoint.png" alt-text="Screenshot of Hybrid Connection Service Bus endpoint.":::
239239

240-
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through the Azure Relay. You need to allowlist all 128 of the gateways. The gateways are in the format: `G#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure data center where your Service Bus endpoint exists.
240+
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through the Azure Relay. You need to allowlist all of the gateways. The gateways are in the format: `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure data center where your Service Bus endpoint exists.
241241

242242
- If you can use a wildcard, you can allowlist *\*.servicebus.windows.net*.
243-
- If you can't use a wildcard, you must allowlist all 128 gateways.
243+
- If you can't use a wildcard, you must allowlist all 256 of the gateways.
244244

245245
You can find out the stamp using *nslookup* on the Service Bus endpoint URL.
246246

@@ -255,6 +255,13 @@ The status of **Connected** means that at least one HCM is configured with that
255255
...
256256
G126-prod-sn3-010-sb.servicebus.windows.net
257257
G127-prod-sn3-010-sb.servicebus.windows.net
258+
GV0-prod-sn3-010-sb.servicebus.windows.net
259+
GV1-prod-sn3-010-sb.servicebus.windows.net
260+
GV2-prod-sn3-010-sb.servicebus.windows.net
261+
GV3-prod-sn3-010-sb.servicebus.windows.net
262+
...
263+
GV126-prod-sn3-010-sb.servicebus.windows.net
264+
GV127-prod-sn3-010-sb.servicebus.windows.net
258265

259266
If your status says **Connected** but your app can't reach your endpoint then:
260267

articles/azure-resource-manager/management/move-support-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure resource types for move operations
33
description: Lists the Azure resource types that can be moved to a new resource group, subscription, or region.
44
ms.topic: conceptual
5-
ms.date: 01/23/2025
5+
ms.date: 04/29/2025
66
ms.custom: tbd
77
---
88

@@ -460,7 +460,7 @@ Review the [Checklist before moving resources](./move-resource-group-and-subscri
460460
> | sharedvmextensions | No | No | No |
461461
> | sharedvmimages | No | No | No |
462462
> | sharedvmimages / versions | No | No | No |
463-
> | snapshots | **Yes** - Full <br> No - Incremental | **Yes** - Full <br> No - Incremental | No - Full <br> **Yes** - Incremental |
463+
> | snapshots | **Yes** - Full <br> No - Incremental | **Yes** - Full <br> No - Incremental | No - Full <br> No - Incremental |
464464
> | sshpublickeys | No | No | No |
465465
> | virtualmachines | **Yes** | **Yes** | **Yes** <br/><br/> Use [Azure Resource Mover](../../resource-mover/tutorial-move-region-virtual-machines.md) to move Azure Virtual Machines. |
466466
> | virtualmachines / extensions | **Yes** | **Yes** | No |

articles/container-apps/storage-mounts.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.custom: devx-track-azurecli
88
ms.topic: conceptual
9-
ms.date: 03/20/2025
9+
ms.date: 04/17/2025
1010
ms.author: cshoe
1111
zone_pivot_groups: arm-azure-cli-portal
1212
---
@@ -235,9 +235,6 @@ Azure Files storage has the following characteristics:
235235

236236
Azure Files supports both SMB (Server Message Block) and NFS (Network File System) protocols. You can mount an Azure Files share using either protocol. The file share you define in the environment must be configured with the same protocol used by the file share in the storage account.
237237

238-
> [!NOTE]
239-
> Support for mounting NFS shares in Azure Container Apps is in preview.
240-
241238
To enable Azure Files storage in your container, you need to set up your environment and container app as follows:
242239

243240
* Create a storage definition in the Container Apps environment.

articles/iot-operations/.openpublishing.redirection.iot-operations.json

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -135,41 +135,6 @@
135135
"redirect_url": "https://github.com/Azure-Samples/iot-edge-opc-plc/blob/main/README.md",
136136
"redirect_document_id": false
137137
},
138-
{
139-
"source_path_from_root": "/articles/iot-operations/manage-devices-assets/howto-autodetect-opcua-assets-using-akri.md",
140-
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-manage-assets",
141-
"redirect_document_id": false
142-
},
143-
{
144-
"source_path_from_root": "/articles/iot-operations/manage-devices-assets/concept-akri-architecture.md",
145-
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-manage-assets",
146-
"redirect_document_id": false
147-
},
148-
{
149-
"source_path_from_root": "/articles/iot-operations/manage-devices-assets/overview-akri.md",
150-
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-manage-assets",
151-
"redirect_document_id": false
152-
},
153-
{
154-
"source_path_from_root": "/articles/iot-operations/discover-manage-assets/concept-akri-architecture.md",
155-
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-manage-assets",
156-
"redirect_document_id": false
157-
},
158-
{
159-
"source_path_from_root": "/articles/iot-operations/discover-manage-assets/howto-autodetect-opcua-assets-using-akri.md",
160-
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-manage-assets",
161-
"redirect_document_id": false
162-
},
163-
{
164-
"source_path_from_root": "/articles/iot-operations/discover-manage-assets/overview-akri.md",
165-
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-manage-assets",
166-
"redirect_document_id": false
167-
},
168-
{
169-
"source_path_from_root": "/articles/iot-operations/reference/observability-metrics-akri.md",
170-
"redirect_url": "/azure/iot-operations/reference/observability-metrics-opcua-broker",
171-
"redirect_document_id": false
172-
},
173138
{
174139
"source_path_from_root": "/articles/iot-operations/configure-observability-monitoring/howto-add-cluster.md",
175140
"redirect_url": "/azure/iot-operations/configure-observability-monitoring/howto-configure-observability",
@@ -544,6 +509,41 @@
544509
"source_path_from_root": "/articles/iot-operations/view-analyze-telemetry/tutorial-real-time-dashboard-fabric.md",
545510
"redirect_url": "/azure/iot-operations/end-to-end-tutorials/tutorial-add-assets",
546511
"redirect_document_id": false
512+
},
513+
{
514+
"source_path_from_root": "/articles/iot-operations/discover-manage-assets/howto-secure-assets.md",
515+
"redirect_url": "/azure/iot-operations/reference/custom-rbac",
516+
"redirect_document_id": true
517+
},
518+
{
519+
"source_path_from_root": "/articles/iot-operations/manage-devices-assets/howto-autodetect-opcua-assets-using-akri.md",
520+
"redirect_url": "/azure/iot-operations/discover-manage-assets/howto-autodetect-opc-ua-assets-use-akri",
521+
"redirect_document_id": false
522+
},
523+
{
524+
"source_path_from_root": "/articles/iot-operations/discover-manage-assets/howto-autodetect-opcua-assets-using-akri.md",
525+
"redirect_url": "/azure/iot-operations/discover-manage-assets/howto-autodetect-opc-ua-assets-use-akri",
526+
"redirect_document_id": false
527+
},
528+
{
529+
"source_path_from_root": "/articles/iot-operations/discover-manage-assets/concept-akri-architecture.md",
530+
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-akri",
531+
"redirect_document_id": false
532+
},
533+
{
534+
"source_path_from_root": "/articles/iot-operations/manage-devices-assets/concept-akri-architecture.md",
535+
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-akri",
536+
"redirect_document_id": false
537+
},
538+
{
539+
"source_path_from_root": "/articles/iot-operations/manage-devices-assets/overview-akri.md",
540+
"redirect_url": "/azure/iot-operations/discover-manage-assets/overview-akri",
541+
"redirect_document_id": false
542+
},
543+
{
544+
"source_path_from_root": "/articles/iot-operations/reference/observability-metrics-akri.md",
545+
"redirect_url": "/azure/iot-operations/reference/observability-metrics-opcua-broker",
546+
"redirect_document_id": false
547547
}
548548
]
549549
}

articles/iot-operations/connect-to-cloud/howto-configure-adlsv2-endpoint.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: patricka
66
ms.service: azure-iot-operations
77
ms.subservice: azure-data-flows
88
ms.topic: how-to
9-
ms.date: 11/07/2024
9+
ms.date: 04/01/2025
1010
ai-usage: ai-assisted
1111

1212
#CustomerIntent: As an operator, I want to understand how to configure data flow endpoints for Azure Data Lake Storage Gen2 in Azure IoT Operations so that I can send data to Azure Data Lake Storage Gen2.
@@ -16,32 +16,32 @@ ai-usage: ai-assisted
1616

1717
[!INCLUDE [kubernetes-management-preview-note](../includes/kubernetes-management-preview-note.md)]
1818

19-
To send data to Azure Data Lake Storage Gen2 in Azure IoT Operations, you can configure a data flow endpoint. This configuration allows you to specify the destination endpoint, authentication method, table, and other settings.
19+
Send data to Azure Data Lake Storage Gen2 in Azure IoT Operations by configuring a data flow endpoint. This configuration allows you to specify the destination endpoint, authentication method, table, and other settings.
2020

2121
## Prerequisites
2222

23-
- An instance of [Azure IoT Operations](../deploy-iot-ops/howto-deploy-iot-operations.md)
24-
- An [Azure Data Lake Storage Gen2 account](../../storage/blobs/create-data-lake-storage-account.md)
25-
- A pre-created storage container in the storage account
23+
- An instance of [Azure IoT Operations](../deploy-iot-ops/howto-deploy-iot-operations.md).
24+
- An [Azure Data Lake Storage Gen2 account](../../storage/blobs/create-data-lake-storage-account.md).
25+
- A storage container that is already created in the storage account.
2626

2727
## Assign permission to managed identity
2828

29-
To configure a data flow endpoint for Azure Data Lake Storage Gen2, we recommend using either a user-assigned or system-assigned managed identity. This approach is secure and eliminates the need for managing credentials manually.
29+
To configure a data flow endpoint for Azure Data Lake Storage Gen2, use either a user-assigned or system-assigned managed identity. This approach is secure and removes the need to manage credentials manually.
3030

3131
After the Azure Data Lake Storage Gen2 is created, you need to assign a role to the Azure IoT Operations managed identity that grants permission to write to the storage account.
3232

33-
If using system-assigned managed identity, in Azure portal, go to your Azure IoT Operations instance and select **Overview**. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*. Your system-assigned managed identity can be found using the same name of the Azure IoT Operations Arc extension.
33+
If you're using a system-assigned managed identity, in the Azure portal, go to your Azure IoT Operations instance and select **Overview**. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*. Your system-assigned managed identity can be found using the same name of the Azure IoT Operations Arc extension.
3434

3535
Then, go to the Azure Storage account > **Access control (IAM)** > **Add role assignment**.
3636

37-
1. On the **Role** tab select an appropriate role like `Storage Blob Data Contributor`. This gives the managed identity the necessary permissions to write to the Azure Storage blob containers. To learn more, see [Authorize access to blobs using Microsoft Entra ID](../../storage/blobs/authorize-access-azure-active-directory.md).
37+
1. On the **Role** tab, select an appropriate role, such as `Storage Blob Data Contributor`. This gives the managed identity the necessary permissions to write to the Azure Storage blob containers. To learn more, see [Authorize access to blobs using Microsoft Entra ID](../../storage/blobs/authorize-access-azure-active-directory.md).
3838
1. On the **Members** tab:
39-
1. If using system-assigned managed identity, for **Assign access to**, select **User, group, or service principal** option, then select **+ Select members** and search for the name of the Azure IoT Operations Arc extension.
40-
1. If using user-assigned managed identity, for **Assign access to**, select **Managed identity** option, then select **+ Select members** and search for your [user-assigned managed identity set up for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections).
39+
1. If you're using a system-assigned managed identity, for **Assign access to**, select **User, group, or service principal**, then select **+ Select members** and search for the name of the Azure IoT Operations Arc extension.
40+
1. If you're using a user-assigned managed identity, for **Assign access to**, select **Managed identity**, then select **+ Select members** and search for your [user-assigned managed identity set up for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections).
4141

4242
## Create data flow endpoint for Azure Data Lake Storage Gen2
4343

44-
# [Portal](#tab/portal)
44+
# [Operations experience](#tab/portal)
4545

4646
1. In the IoT Operations portal, select the **Data flow endpoints** tab.
4747
1. Under **Create new data flow endpoint**, select **Azure Data Lake Storage (2nd generation)** > **New**.
@@ -57,6 +57,7 @@ Then, go to the Azure Storage account > **Access control (IAM)** > **Add role as
5757
| Authentication method | The method used for authentication. We recommend that you choose [*System assigned managed identity*](#system-assigned-managed-identity) or [*User assigned managed identity*](#user-assigned-managed-identity). |
5858
| Client ID | The client ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
5959
| Tenant ID | The tenant ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
60+
| Synced secret name | The reference name for the secret in the data flow endpoint settings and Kubernetes cluster. Required if using *Access token*. |
6061
| Access token secret name | The name of the Kubernetes secret containing the SAS token. Required if using *Access token*. |
6162

6263
1. Select **Apply** to provision the endpoint.
@@ -136,7 +137,7 @@ Follow the steps in the [access token](#access-token) section to get a SAS token
136137

137138
Then, create the *DataflowEndpoint* resource and specify the access token authentication method. Here, replace `<SAS_SECRET_NAME>` with name of the secret containing the SAS token and other placeholder values.
138139

139-
# [Portal](#tab/portal)
140+
# [Operations experience](#tab/portal)
140141

141142
See the [access token](#access-token) section for steps to create a secret in the operations experience web UI.
142143

@@ -228,7 +229,7 @@ Before you configure the data flow endpoint, assign a role to the Azure IoT Oper
228229

229230
Then, configure the data flow endpoint with system-assigned managed identity settings.
230231

231-
# [Portal](#tab/portal)
232+
# [Operations experience](#tab/portal)
232233

233234
In the operations experience data flow endpoint settings page, select the **Basic** tab then choose **Authentication method** > **System assigned managed identity**.
234235

@@ -258,7 +259,7 @@ dataLakeStorageSettings:
258259
259260
If you need to override the system-assigned managed identity audience, you can specify the `audience` setting.
260261

261-
# [Portal](#tab/portal)
262+
# [Operations experience](#tab/portal)
262263

263264
In most cases, you don't need to specify a service audience. Not specifying an audience creates a managed identity with the default audience scoped to your storage account.
264265

@@ -299,7 +300,7 @@ Before you configure the data flow endpoint, assign a role to the user-assigned
299300

300301
Then, configure the data flow endpoint with user-assigned managed identity settings.
301302

302-
# [Portal](#tab/portal)
303+
# [Operations experience](#tab/portal)
303304

304305
In the operations experience data flow endpoint settings page, select the **Basic** tab then choose **Authentication method** > **User assigned managed identity**.
305306

@@ -352,7 +353,7 @@ Get a [SAS token](../../storage/common/storage-sas-overview.md) for an Azure Dat
352353

353354
To enhance security and follow the principle of least privilege, you can generate a SAS token for a specific container. To prevent authentication errors, ensure that the container specified in the SAS token matches the data flow destination setting in the configuration.
354355

355-
# [Portal](#tab/portal)
356+
# [Operations experience](#tab/portal)
356357

357358
> [!IMPORTANT]
358359
> To use the operations experience web UI to manage secrets, Azure IoT Operations must first be enabled with secure settings by configuring an Azure Key Vault and enabling workload identities. To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
@@ -419,7 +420,7 @@ Use the `batching` settings to configure the maximum number of messages and the
419420

420421
For example, to configure the maximum number of messages to 1000 and the maximum latency to 100 seconds, use the following settings:
421422

422-
# [Portal](#tab/portal)
423+
# [Operations experience](#tab/portal)
423424

424425
In the operations experience, select the **Advanced** tab for the data flow endpoint.
425426

0 commit comments

Comments
 (0)