Skip to content

Commit f8ddd00

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 46bddda + 3144c1b commit f8ddd00

File tree

63 files changed

+1231
-868
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+1231
-868
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3749,6 +3749,21 @@
37493749
"source_path_from_root": "/articles/virtual-network/tutorial-connect-virtual-networks-cli.md",
37503750
"redirect_url": "/azure/virtual-network/tutorial-connect-virtual-networks",
37513751
"redirect_document_id": false
3752+
},
3753+
{
3754+
"source_path_from_root": "/articles/virtual-network/ip-services/public-ip-upgrade-portal.md",
3755+
"redirect_url": "/azure/virtual-network/ip-services/public-ip-upgrade",
3756+
"redirect_document_id": false
3757+
},
3758+
{
3759+
"source_path_from_root": "/articles/virtual-network/ip-services/public-ip-upgrade-cli.md",
3760+
"redirect_url": "/azure/virtual-network/ip-services/public-ip-upgrade",
3761+
"redirect_document_id": false
3762+
},
3763+
{
3764+
"source_path_from_root": "/articles/virtual-network/ip-services/public-ip-upgrade-powershell.md",
3765+
"redirect_url": "/azure/virtual-network/ip-services/public-ip-upgrade",
3766+
"redirect_document_id": false
37523767
}
37533768
]
37543769
}

articles/app-service/environment/app-service-app-service-environment-network-architecture-overview.md

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -61,27 +61,10 @@ If the endpoint being called is **inside** of the virtual network topology, the
6161

6262
However, since an App Service Environment is always located within a subnet, you're guaranteed that the internal IP address of a compute resource running an app will always lie within the CIDR range of the subnet. As a result, when fine-grained ACLs or network security groups are used to secure access to other endpoints within the virtual network, the subnet range containing the App Service Environment needs to be granted access.
6363

64-
The following diagram shows these concepts in more detail:
65-
66-
![Outbound Network Addresses][OutboundNetworkAddresses]
67-
68-
In the above diagram:
69-
70-
* Since the public VIP of the App Service Environment is 192.23.1.2, that is the outbound IP address used when making calls to "Internet" endpoints.
71-
* The CIDR range of the containing subnet for the App Service Environment is 10.0.1.0/26. Other endpoints within the same virtual network infrastructure will see calls from apps as originating from somewhere within this address range.
72-
7364
## Calls Between App Service Environments
7465

7566
A more complex scenario can occur if you deploy multiple App Service Environments in the same virtual network, and make outbound calls from one App Service Environment to another App Service Environment. These types of cross App Service Environment calls will also be treated as "Internet" calls.
7667

77-
The following diagram shows an example of a layered architecture with apps on one App Service Environment (for example "Front door" web apps) calling apps on a second App Service Environment (for example internal back-end API apps not intended to be accessible from the Internet).
78-
79-
![Calls Between App Service Environments][CallsBetweenAppServiceEnvironments]
80-
81-
In the example above the App Service Environment "ASE One" has an outbound IP address of 192.23.1.2. If an app running on this App Service Environment makes an outbound call to an app running on a second App Service Environment ("ASE Two") located in the same virtual network, the outbound call will be treated as an "Internet" call. As a result the network traffic arriving on the second App Service Environment will show as originating from 192.23.1.2 (that is, not the subnet address range of the first App Service Environment).
82-
83-
Even though calls between different App Service Environments are treated as "Internet" calls, when both App Service Environments are located in the same Azure region the network traffic will remain on the regional Azure network and won't physically flow over the public Internet. As a result you can use a network security group on the subnet of the second App Service Environment to only allow inbound calls from the first App Service Environment (whose outbound IP address is 192.23.1.2), thus ensuring secure communication between the App Service Environments.
84-
8568
## Additional Links and Information
8669

8770
Details on inbound ports used by App Service Environments and using network security groups to control inbound traffic is available [here][controllinginboundtraffic].
@@ -96,5 +79,3 @@ Details on using user-defined routes to grant outbound Internet access to App Se
9679
<!-- IMAGES -->
9780
[GeneralNetworkFlows]: ./media/app-service-app-service-environment-network-architecture-overview/NetworkOverview-1.png
9881
[OutboundIPAddress]: ./media/app-service-app-service-environment-network-architecture-overview/OutboundIPAddress-1.png
99-
[OutboundNetworkAddresses]: ./media/app-service-app-service-environment-network-architecture-overview/OutboundNetworkAddresses-1.png
100-
[CallsBetweenAppServiceEnvironments]: ./media/app-service-app-service-environment-network-architecture-overview/CallsBetweenEnvironments-1.png

articles/app-service/environment/network-info.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -219,8 +219,6 @@ To create the same routes manually, follow these steps:
219219

220220
5. After you create the new route table, go to the subnet. Select your route table from the list in the portal. After you save the change, you should then see the NSGs and routes noted with your subnet.
221221

222-
![Screenshot that shows NSGs and routes.][7]
223-
224222
## Service endpoints
225223

226224
Service endpoints enable you to restrict access to multi-tenant services to a set of Azure virtual networks and subnets. For more information, see [Virtual Network service endpoints][serviceendpoints].
@@ -235,7 +233,6 @@ When service endpoints are enabled on a subnet with an instance of Azure SQL, al
235233
[1]: ./media/network_considerations_with_an_app_service_environment/networkase-overflow.png
236234
[2]: ./media/network_considerations_with_an_app_service_environment/networkase-overflow2.png
237235
[6]: ./media/network_considerations_with_an_app_service_environment/networkase-udr.png
238-
[7]: ./media/network_considerations_with_an_app_service_environment/networkase-subnet.png
239236
[8]: ./media/network_considerations_with_an_app_service_environment/serviceendpoint.png
240237

241238
<!--Links-->

articles/application-gateway/rewrite-http-headers-url.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,8 @@ You can use rewrite conditions to evaluate the content of HTTP(S) requests and r
5757

5858
An action can have the following value types or their combinations:
5959
* Text.
60-
* Request header's value - To use a captured request header value, specify the syntax as `{http_req_headerName}`.
61-
* Response header's value - To use a captured response header value from the preceding Condition, specify the syntax as `{http_resp_headerName}`. You can use `{capt_header_value_matcher}` when the value is captured from Action Set's "Set-Cookie" response header. Know more about [capture under Action set](#syntax-for-capturing).
60+
* Request header's value - To use a captured Request header's value, specify the syntax as `{http_req_headerName}`.
61+
* Response header's value - To use a captured Response header's value from the preceding Condition, specify the syntax as `{http_resp_headerName}`. The Rewrite Action block also supports the "Header Value Matcher" field for Set-Cookie header. This optional field lets you match as well as capture the value of a specific header when multiple Set-Cookie headers with the same name exist. To manipulate that specific cookie's captured value, you can then use `{capt_header_value_matcher}`. Know more about [capture under Action set](#syntax-for-capturing).
6262
* Server variable - To use a server variable, specify the syntax as `{var_serverVariable}`. [List of supported Server variables](#server-variables).
6363

6464
> [!Note]
28.2 KB
Loading

articles/backup/backup-blobs-storage-account-cli.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Back up Azure Blobs using Azure CLI
33
description: Learn how to back up Azure Blobs using Azure CLI.
44
ms.topic: how-to
55
ms.custom: devx-track-azurecli
6-
ms.date: 07/24/2024
6+
ms.date: 11/26/2024
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
99
---
@@ -241,6 +241,16 @@ Once all the relevant permissions are set, configure the backup by running the f
241241
> [!IMPORTANT]
242242
> Once a storage account is configured for blobs backup, a few capabilities such as change feed and delete lock are affected. [Learn more](blob-backup-configure-manage.md#effects-on-backed-up-storage-accounts).
243243
244+
## Update a backup instance
245+
246+
After you have configured the backup, you can change the associated policy with a backup instance. For vaulted backups, you can also change the containers selected for backup.
247+
248+
To update the backup instance, run the following command:
249+
250+
1. Validate if the backup instance is ready for configuring backup by using the [az dataprotection backup-instance validate-for-backup](/cli/azure/dataprotection/backup-instance?view=azure-cli-latest&preserve-view=true#az-dataprotection-backup-instance-validate-for-backup) command . The command fails if the backup instance isn't ready.
251+
1. Change the Backup policy used for backing up the Azure Blobs by using the [az dataprotection backup-instance update](/cli/azure/dataprotection/backup-instance?view=azure-cli-latest&preserve-view=true#az-dataprotection-backup-instance-update-policy). Specify the relevant backup item and the new backup policy.
252+
253+
244254
## Next steps
245255
246256
[Restore Azure Blobs using Azure CLI](restore-blobs-storage-account-cli.md)

articles/backup/backup-blobs-storage-account-ps.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Back up Azure blobs within a storage account using Azure PowerShell
33
description: Learn how to back up all Azure blobs within a storage account using Azure PowerShell.
44
ms.topic: how-to
55
ms.custom: devx-track-azurepowershell
6-
ms.date: 07/24/2024
6+
ms.date: 11/27/2024
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
99
---
@@ -144,6 +144,19 @@ blobrg-PSTestSA-3df6ac08-9496-4839-8fb5-8b78e594f166 Microsoft.DataProtection/ba
144144

145145
---
146146

147+
## Update a backup instance
148+
149+
After you have configured the backup, you can change the associated policy with a backup instance. For vaulted backups, you can also change the containers selected for backup.
150+
151+
To update the backup instance, run the following cmdlets:
152+
153+
1. Validate if the backup instance is ready for configuring backup using the [Test-AzDataProtectionBackupInstanceReadiness](/powershell/module/az.dataprotection/test-azdataprotectionbackupinstancereadiness?view=azps-13.0.0&preserve-view=true) command. The command fails if the backup instance is not ready.
154+
155+
You can also use this command to check if the backup vault has all the necessary permissions to configure backup.
156+
157+
1. Change the policy used for backing up the Azure Blobs by using the [Update-AzDataProtectionBackupInstance](/powershell/module/az.dataprotection/update-azdataprotectionbackupinstance?view=azps-13.0.0&preserve-view=true). Specify the relevant backup item and the new backup policy.
158+
159+
147160
## Next steps
148161

149162
[Restore Azure blobs using Azure PowerShell](restore-blobs-storage-account-ps.md)

0 commit comments

Comments
 (0)