Skip to content

Commit f93260b

Browse files
authored
Merge pull request #193917 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 85dc90d + 39eafdf commit f93260b

17 files changed

+75
-54
lines changed

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ Allow access to the following URLs:
127127
| `*.msappproxy.net` <br> `*.servicebus.windows.net` | 443/HTTPS | Communication between the connector and the Application Proxy cloud service |
128128
| `crl3.digicert.com` <br> `crl4.digicert.com` <br> `ocsp.digicert.com` <br> `crl.microsoft.com` <br> `oneocsp.microsoft.com` <br> `ocsp.msocsp.com`<br> | 80/HTTP | The connector uses these URLs to verify certificates. |
129129
| `login.windows.net` <br> `secure.aadcdn.microsoftonline-p.com` <br> `*.microsoftonline.com` <br> `*.microsoftonline-p.com` <br> `*.msauth.net` <br> `*.msauthimages.net` <br> `*.msecnd.net` <br> `*.msftauth.net` <br> `*.msftauthimages.net` <br> `*.phonefactor.net` <br> `enterpriseregistration.windows.net` <br> `management.azure.com` <br> `policykeyservice.dc.ad.msft.net` <br> `ctldl.windowsupdate.com` <br> `www.microsoft.com/pkiops` | 443/HTTPS | The connector uses these URLs during the registration process. |
130-
| `ctldl.windowsupdate.com` | 80/HTTP | The connector uses this URL during the registration process. |
130+
| `ctldl.windowsupdate.com` <br> `www.microsoft.com/pkiops` | 80/HTTP | The connector uses this URL during the registration process. |
131131
132132
You can allow connections to `*.msappproxy.net`, `*.servicebus.windows.net`, and other URLs above if your firewall or proxy lets you configure access rules based on domain suffixes. If not, you need to allow access to the [Azure IP ranges and Service Tags - Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519). The IP ranges are updated each week.
133133

articles/active-directory/app-proxy/application-proxy-configure-connectors-with-proxy-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ Allow access to the following URLs:
113113
| &ast;.msappproxy.net<br>&ast;.servicebus.windows.net | 443/HTTPS | Communication between the connector and the Application Proxy cloud service |
114114
| crl3.digicert.com<br>crl4.digicert.com<br>ocsp.digicert.com<br>crl.microsoft.com<br>oneocsp.microsoft.com<br>ocsp.msocsp.com<br> | 80/HTTP | The connector uses these URLs to verify certificates. |
115115
| login.windows.net<br>secure.aadcdn.microsoftonline-p.com<br>&ast;.microsoftonline.com<br>&ast;.microsoftonline-p.com<br>&ast;.msauth.net<br>&ast;.msauthimages.net<br>&ast;.msecnd.net<br>&ast;.msftauth.net<br>&ast;.msftauthimages.net<br>&ast;.phonefactor.net<br>enterpriseregistration.windows.net<br>management.azure.com<br>policykeyservice.dc.ad.msft.net<br>ctldl.windowsupdate.com | 443/HTTPS | The connector uses these URLs during the registration process. |
116-
| ctldl.windowsupdate.com | 80/HTTP | The connector uses this URL during the registration process. |
116+
| ctldl.windowsupdate.com<br>www.microsoft.com/pkiops | 80/HTTP | The connector uses this URL during the registration process. |
117117

118118
If your firewall or proxy allows you to configure DNS allow lists, you can allow connections to \*.msappproxy.net and \*.servicebus.windows.net.
119119

articles/azure-video-analyzer/video-analyzer-for-media-docs/upload-index-videos.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -175,17 +175,19 @@ public async Task Sample()
175175
client.DefaultRequestHeaders.Remove("Ocp-Apim-Subscription-Key");
176176

177177
// Upload a video
178-
var content = new MultipartFormDataContent();
178+
MultipartFormDataContent content = null;
179179
Console.WriteLine("Uploading...");
180+
180181
// Get the video from URL
181182
var videoUrl = "VIDEO_URL"; // Replace with the video URL
182183
183184
// As an alternative to specifying video URL, you can upload a file.
184185
// Remove the videoUrl parameter from the query parameters below and add the following lines:
185-
//FileStream video =File.OpenRead(Globals.VIDEOFILE_PATH);
186-
//byte[] buffer =new byte[video.Length];
186+
//content = new MultipartFormDataContent();
187+
//FileStream video = File.OpenRead(@"c:\videos\democratic3.mp4");
188+
//byte[] buffer = new byte[video.Length];
187189
//video.Read(buffer, 0, buffer.Length);
188-
//content.Add(new ByteArrayContent(buffer));
190+
//content.Add(new ByteArrayContent(buffer), "MyVideo", "MyVideo");
189191
190192
queryParams = CreateQueryString(
191193
new Dictionary<string, string>()
@@ -398,16 +400,16 @@ namespace VideoIndexerArm
398400
var client = new HttpClient(handler);
399401

400402
// Upload a video
401-
var content = new MultipartFormDataContent();
403+
MultipartFormDataContent content = null;
402404
Console.WriteLine("Uploading...");
403-
// Get the video from URL
404405

405406
// As an alternative to specifying video URL, you can upload a file.
406407
// Remove the videoUrl parameter from the query parameters below and add the following lines:
407-
// FileStream video =File.OpenRead(Globals.VIDEOFILE_PATH);
408-
// byte[] buffer =new byte[video.Length];
409-
// video.Read(buffer, 0, buffer.Length);
410-
// content.Add(new ByteArrayContent(buffer));
408+
//content = new MultipartFormDataContent();
409+
//FileStream video = File.OpenRead(@"c:\videos\democratic3.mp4");
410+
//byte[] buffer = new byte[video.Length];
411+
//video.Read(buffer, 0, buffer.Length);
412+
//content.Add(new ByteArrayContent(buffer), "MyVideo", "MyVideo");
411413
412414
var queryParams = CreateQueryString(
413415
new Dictionary<string, string>()

articles/azure-vmware/concepts-api-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The external deployment diagram shows the entire process and the actors involved
2323

2424
The traffic flow goes through the API Management instance, which abstracts the backend services, plugged into the Hub virtual network. The ExpressRoute Gateway routes the traffic to the ExpressRoute Global Reach channel and reaches an NSX Load Balancer distributing the incoming traffic to the different backend service instances.
2525

26-
API Management has an Azure Public API, and activating Azure DDOS Protection Service is recommended.
26+
API Management has an Azure Public API, and activating Azure DDoS Protection Service is recommended.
2727

2828
:::image type="content" source="media/api-management/api-management-external-deployment.png" alt-text="Diagram showing an external API Management deployment for Azure VMware Solution" border="false":::
2929

articles/azure-vmware/concepts-identity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ ms.date: 07/29/2021
77

88
# Azure VMware Solution identity concepts
99

10-
Azure VMware Solution private clouds are provisioned with a vCenter Server and NSX-T Manager. You'll use vCenter to manage virtual machine (VM) workloads and NSX-T Manager to manage and extend the private cloud. The CloudAdmin role is used for vCenter and restricted administrator rights for NSX-T Manager.
10+
Azure VMware Solution private clouds are provisioned with a vCenter Server and NSX-T Manager. You'll use vCenter to manage virtual machine (VM) workloads and NSX-T Manager to manage and extend the private cloud. The CloudAdmin role is used for vCenter Server and restricted administrator rights for NSX-T Manager.
1111

12-
## vCenter access and identity
12+
## vCenter Server access and identity
1313

1414
[!INCLUDE [vcenter-access-identity-description](includes/vcenter-access-identity-description.md)]
1515

1616
> [!IMPORTANT]
17-
> Azure VMware Solution offers custom roles on vCenter but currently doesn't offer them on the Azure VMware Solution portal. For more information, see the [Create custom roles on vCenter](#create-custom-roles-on-vcenter) section later in this article.
17+
> Azure VMware Solution offers custom roles on vCenter Server but currently doesn't offer them on the Azure VMware Solution portal. For more information, see the [Create custom roles on vCenter Server](#create-custom-roles-on-vcenter-server) section later in this article.
1818
1919
### View the vCenter privileges
2020

@@ -28,7 +28,7 @@ You can view the privileges granted to the Azure VMware Solution CloudAdmin role
2828

2929
:::image type="content" source="media/concepts/role-based-access-control-cloudadmin-privileges.png" alt-text="Screenshot showing the roles and privileges for CloudAdmin in the vSphere Client.":::
3030

31-
The CloudAdmin role in Azure VMware Solution has the following privileges on vCenter. For more information, see the [VMware product documentation](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-ED56F3C4-77D0-49E3-88B6-B99B8B437B62.html).
31+
The CloudAdmin role in Azure VMware Solution has the following privileges on vCenter Server. For more information, see the [VMware product documentation](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-ED56F3C4-77D0-49E3-88B6-B99B8B437B62.html).
3232

3333
| Privilege | Description |
3434
| --------- | ----------- |
@@ -51,7 +51,7 @@ The CloudAdmin role in Azure VMware Solution has the following privileges on vCe
5151
| **vService** | Create dependency<br />Destroy dependency<br />Reconfigure dependency configuration<br />Update dependency |
5252
| **vSphere tagging** | Assign and unassign vSphere tag<br />Create vSphere tag<br />Create vSphere tag category<br />Delete vSphere tag<br />Delete vSphere tag category<br />Edit vSphere tag<br />Edit vSphere tag category<br />Modify UsedBy field for category<br />Modify UsedBy field for tag |
5353

54-
### Create custom roles on vCenter
54+
### Create custom roles on vCenter Server
5555

5656
Azure VMware Solution supports the use of custom roles with equal or lesser privileges than the CloudAdmin role.
5757

@@ -60,7 +60,7 @@ You'll use the CloudAdmin role to create, modify, or delete custom roles with pr
6060
To prevent creating roles that can't be assigned or deleted, clone the CloudAdmin role as the basis for creating new custom roles.
6161

6262
#### Create a custom role
63-
1. Sign in to vCenter with cloudadmin\@vsphere.local or a user with the CloudAdmin role.
63+
1. Sign in to vCenter Server with cloudadmin\@vsphere.local or a user with the CloudAdmin role.
6464

6565
1. Navigate to the **Roles** configuration section and select **Menu** > **Administration** > **Access Control** > **Roles**.
6666

articles/azure-vmware/concepts-network-design-considerations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ If you’re using BGP AS-Path Prepend to dedicate a circuit from Azure towards o
2626
## Management VMs and default routes from on-premises
2727

2828
> [!IMPORTANT]
29-
> Azure Vmware Solution Management VMs don't honor a default route from On-Premises.
29+
> Azure VMware Solution Management VMs don't honor a default route from On-Premises.
3030
31-
If you’re routing back to your on-premises networks using only a default route advertised towards Azure, the vCenter and NSX manager VMs won't honor that route.
31+
If you’re routing back to your on-premises networks using only a default route advertised towards Azure, the vCenter Server and NSX Manager VMs won't honor that route.
3232

3333
**Solution**
3434

35-
To reach vCenter and NSX manager, more specific routes from on-prem need to be provided to allow traffic to have a return path route to those networks.
35+
To reach vCenter Server and NSX Manager, more specific routes from on-prem need to be provided to allow traffic to have a return path route to those networks.
3636

3737
## Next steps
3838

articles/azure-vmware/concepts-networking.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article covers the key concepts that establish networking and interconnecti
2020
## Azure VMware Solution private cloud use cases
2121

2222
The use cases for Azure VMware Solution private clouds include:
23-
- New VMware VM workloads in the cloud
23+
- New VMware vSphere VM workloads in the cloud
2424
- VM workload bursting to the cloud (on-premises to Azure VMware Solution only)
2525
- VM workload migration to the cloud (on-premises to Azure VMware Solution only)
2626
- Disaster recovery (Azure VMware Solution to Azure VMware Solution or on-premises to Azure VMware Solution)
@@ -35,7 +35,7 @@ You can interconnect your Azure virtual network with the Azure VMware Solution p
3535

3636
The diagram below shows the basic network interconnectivity established at the time of a private cloud deployment. It shows the logical networking between a virtual network in Azure and a private cloud. This connectivity is established via a backend ExpressRoute that is part of the Azure VMware Solution service. The interconnectivity fulfills the following primary use cases:
3737

38-
- Inbound access to vCenter server and NSX-T manager that is accessible from VMs in your Azure subscription.
38+
- Inbound access to vCenter Server and NSX-T Manager that is accessible from VMs in your Azure subscription.
3939
- Outbound access from VMs on the private cloud to Azure services.
4040
- Inbound access of workloads running in the private cloud.
4141

@@ -48,7 +48,7 @@ In the fully interconnected scenario, you can access the Azure VMware Solution f
4848

4949
The diagram below shows the on-premises to private cloud interconnectivity, which enables the following use cases:
5050

51-
- Hot/Cold vCenter vMotion between on-premises and Azure VMware Solution.
51+
- Hot/Cold vSphere vMotion between on-premises and Azure VMware Solution.
5252
- On-Premises to Azure VMware Solution private cloud management access.
5353

5454
:::image type="content" source="media/concepts/adjacency-overview-drawing-double.png" alt-text="Diagram showing the virtual network and on-premises to private cloud interconnectivity." border="false":::

articles/azure-vmware/concepts-run-command.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.date: 09/17/2021
88

99
# Run command in Azure VMware Solution
1010

11-
In Azure VMware Solution, vCenter has a built-in local user called *cloudadmin* assigned to the CloudAdmin role. The CloudAdmin role has vCenter [privileges](concepts-identity.md#view-the-vcenter-privileges) that differ from other VMware cloud solutions and on-premises deployments. The Run command feature lets you perform operations that would normally require elevated privileges through a collection of PowerShell cmdlets.
11+
In Azure VMware Solution, vCenter Server has a built-in local user called *cloudadmin* assigned to the CloudAdmin role. The CloudAdmin role has vCenter Server [privileges](concepts-identity.md#view-the-vcenter-privileges) that differ from other VMware cloud solutions and on-premises deployments. The Run command feature lets you perform operations that would normally require elevated privileges through a collection of PowerShell cmdlets.
1212

1313
Azure VMware Solution supports the following operations:
1414

@@ -97,6 +97,6 @@ Now that you've learned about the Run command concepts, you can use the Run comm
9797

9898
- [Configure storage policy](configure-storage-policy.md) - Each VM deployed to a vSAN datastore is assigned a vSAN storage policy. You can assign a vSAN storage policy in an initial deployment of a VM or when you do other VM operations, such as cloning or migrating.
9999

100-
- [Configure external identity source for vCenter (Run command)](configure-identity-source-vcenter.md) - Configure Active Directory over LDAP or LDAPS for vCenter, which enables the use of an external identity source as an Active Directory. Then, you can add groups from the external identity source to the CloudAdmin role.
100+
- [Configure external identity source for vCenter (Run command)](configure-identity-source-vcenter.md) - Configure Active Directory over LDAP or LDAPS for vCenter Server, which enables the use of an external identity source as an Active Directory. Then, you can add groups from the external identity source to the CloudAdmin role.
101101

102-
- [Deploy disaster recovery using JetStream](deploy-disaster-recovery-using-jetstream.md) - Store data directly to a recovery cluster in vSAN. The data gets captured through I/O filters that run within vSphere. The underlying data store can be VMFS, VSAN, vVol, or any HCI platform.
102+
- [Deploy disaster recovery using JetStream](deploy-disaster-recovery-using-jetstream.md) - Store data directly to a recovery cluster in vSAN. The data gets captured through I/O filters that run within vSphere. The underlying data store can be VMFS, VSAN, vVol, or any HCI platform.

articles/azure-vmware/concepts-security-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following are network-related security recommendations for Azure VMware Solu
2929

3030
| **Recommendation** | **Comments** |
3131
| :-- | :-- |
32-
| Only allow trusted networks | Only allow access to your environments over ExpressRoute or other secured networks. Avoid exposing your management services like vCenter, for example, on the internet. |
32+
| Only allow trusted networks | Only allow access to your environments over ExpressRoute or other secured networks. Avoid exposing your management services like vCenter Server, for example, on the internet. |
3333
| Use Azure Firewall Premium | If you must expose management services on the internet, use [Azure Firewall Premium](../firewall/premium-migrate.md) with both IDPS Alert and Deny mode along with TLS inspection for proactive threat detection. |
3434
| Deploy and configure Network Security Groups on VNET | Ensure any VNET deployed has [Network Security Groups](../virtual-network/network-security-groups-overview.md) configured to control ingress and egress to your environment. |
3535
| Review and implement recommendations within the Azure security baseline for Azure VMware Solution | [Azure security baseline for Azure VMware Solution](/security/benchmark/azure/baselines/vmware-solution-security-baseline/) |

0 commit comments

Comments
 (0)