Skip to content

Commit 354a302

Browse files
authored
Merge pull request #112487 from MicrosoftDocs/master
4/23 AM Publish
2 parents 086d7c0 + f931e93 commit 354a302

File tree

52 files changed

+489
-119
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+489
-119
lines changed

articles/active-directory-domain-services/secure-remote-vm-access.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@ The RD environment deployment contains a number of steps. The existing RD deploy
5757

5858
1. Sign in to VMs created for the RD environment with an account that's part of the *Azure AD DC Administrators* group, such as *contosoadmin*.
5959
1. To create and configure RDS, use the existing [Remote Desktop environment deployment guide][deploy-remote-desktop]. Distribute the RD server components across your Azure VMs as desired.
60+
* Specific to Azure AD DS - when you configure RD licensing, set it to **Per Device** mode, not **Per User** as noted in the deployment guide.
6061
1. If you want to provide access using a web browser, [set up the Remote Desktop web client for your users][rd-web-client].
6162

6263
With RD deployed into the Azure AD DS managed domain, you can manage and use the service as you would with an on-premises AD DS domain.

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -95,11 +95,11 @@ Configure the _fraud alert_ feature so that your users can report fraudulent att
9595
### View fraud reports
9696

9797
1. Sign in to the [Azure portal](https://portal.azure.com).
98-
2. Select **Azure Active Directory** > **Sign-ins**. The fraud report is now part of the standard Azure AD Sign-ins report.
99-
98+
2. Select **Azure Active Directory** > **Sign-ins** > **Authentication Details**. The fraud report is now part of the standard Azure AD Sign-ins report and it will show in the **"Result Detail"** as MFA denied, Fraud Code Entered.
99+
100100
## Notifications
101101

102-
Configure email addresses here for users who will receive fraud alert emails.
102+
Configure email addresses here for users who will receive fraud alert emails in **Azure Active Directory** > **Security** > **Multi-Factor Authentication** > **Notifications**.
103103

104104
![Notification fraud alert email sample](./media/howto-mfa-mfasettings/multi-factor-authentication-fraud-alert-email.png)
105105

articles/aks/faq.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,25 @@ AKS supports the following [admission controllers][admission-controllers]:
9393

9494
Currently, you can't modify the list of admission controllers in AKS.
9595

96+
## Can I use admission controller webhooks on AKS?
97+
98+
Yes, you may use admission controller webhooks on AKS. It is recommended you exclude internal AKS namespaces which are marked with the **control-plane label.** For example, by adding the below to the webhook configuration:
99+
100+
```
101+
namespaceSelector:
102+
matchExpressions:
103+
- key: control-plane
104+
operator: DoesNotExist
105+
```
106+
107+
## Can admission controller webhooks impact kube-system and internal AKS namespaces?
108+
109+
To protect the stability of the system and prevent custom admission controllers from impacting internal services in the kube-system, namespace AKS has an **Admissions Enforcer**, which automatically excludes kube-system and AKS internal namespaces. This service ensures the custom admission controllers don't affect the services running in kube-system.
110+
111+
If you have a critical use case for having something deployed on kube-system (not recommended) which you require to be covered by your custom admission webhook, you may add the below label or annotation so that Admissions Enforcer ignores it.
112+
113+
Label: ```"admissions.enforcer/disabled": "true"``` or Annotation: ```"admissions.enforcer/disabled": true```
114+
96115
## Is Azure Key Vault integrated with AKS?
97116

98117
AKS isn't currently natively integrated with Azure Key Vault. However, the [Azure Key Vault FlexVolume for Kubernetes project][keyvault-flexvolume] enables direct integration from Kubernetes pods to Key Vault secrets.

articles/automation/automation-solution-vm-management.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,17 @@ ms.topic: conceptual
1010

1111
The **Start/stop VMs during off-hours** solution starts or stops your Azure virtual machines. It starts or stops machines on user-defined schedules, provides insights through Azure Monitor logs, and sends optional emails by using [action groups](../azure-monitor/platform/action-groups.md). The solution supports both Azure Resource Manager and classic VMs for most scenarios.
1212

13-
This solution provides a decentralized low-cost automation option for users who want to optimize their VM costs. With this solution, you can:
13+
This solution uses [Start-AzureRmVM](https://docs.microsoft.com/powershell/module/azurerm.compute/start-azurermvm?view=azurermps-6.13.0) cmdlet to start VMs. It uses [Stop-AzureRmVM](https://docs.microsoft.com/powershell/module/AzureRM.Compute/Stop-AzureRmVM?view=azurermps-6.13.0) for stopping VMs.
14+
15+
> [!NOTE]
16+
> The **Start/stop VMs during off-hours** solution has been updated to support the newest versions of the Azure modules that are available.
17+
18+
The solution provides a decentralized low-cost automation option for users who want to optimize their VM costs. With this solution, you can:
1419

1520
- [Schedule VMs to start and stop](automation-solution-vm-management-config.md#schedule).
1621
- Schedule VMs to start and stop in ascending order by [using Azure Tags](automation-solution-vm-management-config.md#tags) (not supported for classic VMs).
1722
- Autostop VMs based on [low CPU usage](automation-solution-vm-management-config.md#cpuutil).
1823

19-
> [!NOTE]
20-
> The **Start/stop VMs during off-hours** solution has been updated to support the newest versions of the Azure modules that are available.
21-
2224
The following are limitations with the current solution:
2325

2426
- It manages VMs in any region, but can only be used in the same subscription as your Azure Automation account.

articles/azure-monitor/app/ip-addresses.md

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Server firewall exceptions required by Application Insights
44
ms.topic: conceptual
55
author: lgayhardt
66
ms.author: lagayhar
7-
ms.date: 12/19/2019
7+
ms.date: 04/23/2020
88

99
---
1010

@@ -176,19 +176,12 @@ East US
176176
177177
```
178178

179-
## Application Insights API
180-
| Purpose | URI | IP | Ports |
181-
| --- | --- | --- | --- |
182-
| API |api.applicationinsights.io<br/>api1.applicationinsights.io<br/>api2.applicationinsights.io<br/>api3.applicationinsights.io<br/>api4.applicationinsights.io<br/>api5.applicationinsights.io |23.96.58.253<br/>13.78.151.158<br/>40.74.59.40<br/>40.70.42.246<br/>40.117.198.0<br/>137.116.226.91<br/>52.163.88.44<br/>52.189.210.240<br/>13.77.201.34<br/>13.78.149.206<br/>52.232.28.146<br/>52.175.241.170<br/>20.36.36.66<br/>52.147.29.101<br/>40.115.155.252<br/>20.188.34.152<br/>52.141.32.103 |80,443 |
183-
| API docs |dev.applicationinsights.io<br/>dev.applicationinsights.microsoft.com<br/>dev.aisvc.visualstudio.com<br/>www.applicationinsights.io<br/>www.applicationinsights.microsoft.com<br/>www.aisvc.visualstudio.com |23.96.58.253<br/>13.78.151.158<br/>40.74.59.40<br/>40.70.42.246<br/>40.117.198.0<br/>137.116.226.91<br/>52.163.88.44<br/>52.189.210.240<br/>13.77.201.34<br/>13.78.149.206<br/>52.232.28.146<br/>52.175.241.170<br/>20.36.36.66<br/>52.147.29.101<br/>40.115.155.252<br/>20.188.34.152<br/>52.141.32.103 |80,443 |
184-
| Azure Pipeline annotations extension |aigs1.aisvc.visualstudio.com |dynamic|443 |
179+
## Application Insights & Log Analytics APIs
185180

186-
## Log Analytics API
187-
188-
| Purpose | URI | IP | Ports |
181+
| Purpose | URI | IP | Ports |
189182
| --- | --- | --- | --- |
190-
| API |api.loganalytics.io<br/>*.api.loganalytics.io |23.96.58.253<br/>13.78.151.158<br/>40.74.59.40<br/>40.70.42.246<br/>40.117.198.0<br/>137.116.226.91<br/>52.163.88.44<br/>52.189.210.240<br/>13.77.201.34<br/>13.78.149.206<br/>52.232.28.146<br/>52.175.241.170<br/>20.36.36.66<br/>52.147.29.101<br/>40.115.155.252<br/>20.188.34.152<br/>52.141.32.103 |80,443 |
191-
| API docs |dev.loganalytics.io<br/>docs.loganalytics.io<br/>www.loganalytics.io |23.96.58.253<br/>13.78.151.158<br/>40.74.59.40<br/>40.70.42.246<br/>40.117.198.0<br/>137.116.226.91<br/>52.163.88.44<br/>52.189.210.240<br/>13.77.201.34<br/>13.78.149.206<br/>52.232.28.146<br/>52.175.241.170<br/>20.36.36.66<br/>52.147.29.101<br/>40.115.155.252<br/>20.188.34.152<br/>52.141.32.103 |80,443 |
183+
| API |`api.applicationinsights.io`<br/>`api1.applicationinsights.io`<br/>`api2.applicationinsights.io`<br/>`api3.applicationinsights.io`<br/>`api4.applicationinsights.io`<br/>`api5.applicationinsights.io`<br/>`dev.applicationinsights.io`<br/>`dev.applicationinsights.microsoft.com`<br/>`dev.aisvc.visualstudio.com`<br/>`www.applicationinsights.io`<br/>`www.applicationinsights.microsoft.com`<br/>`www.aisvc.visualstudio.com`<br/>`api.loganalytics.io`<br/>`*.api.loganalytics.io`<br/>`dev.loganalytics.io`<br>`docs.loganalytics.io`<br/>`www.loganalytics.io` |20.37.52.188 <br/> 20.37.53.231 <br/> 20.36.47.130 <br/> 20.40.124.0 <br/> 20.43.99.158 <br/> 20.43.98.234 <br/> 13.70.127.61 <br/> 40.81.58.225 <br/> 20.40.160.120 <br/> 23.101.225.155 <br/> 52.139.8.32 <br/> 13.88.230.43 <br/> 52.230.224.237 <br/> 52.242.230.209 <br/> 52.173.249.138 <br/> 52.229.218.221 <br/> 52.229.225.6 <br/> 23.100.94.221 <br/> 52.188.179.229 <br/> 52.226.151.250 <br/> 52.150.36.187 <br/> 40.121.135.131 <br/> 20.44.73.196 <br/> 20.41.49.208 <br/> 40.70.23.205 <br/> 20.40.137.91 <br/> 20.40.140.212 <br/> 40.89.189.61 <br/> 52.155.118.97 <br/> 52.156.40.142 <br/> 23.102.66.132 <br/> 52.231.111.52 <br/> 52.231.108.46 <br/> 52.231.64.72 <br/> 52.162.87.50 <br/> 23.100.228.32 <br/> 40.127.144.141 <br/> 52.155.162.238 <br/> 137.116.226.81 <br/> 52.185.215.171 <br/> 40.119.4.128 <br/> 52.171.56.178 <br/> 20.43.152.45 <br/> 20.44.192.217 <br/> 13.67.77.233 <br/> 51.104.255.249 <br/> 51.104.252.13 <br/> 51.143.165.22 <br/> 13.78.151.158 <br/> 51.105.248.23 <br/> 40.74.36.208 <br/> 40.74.59.40 <br/> 13.93.233.49 <br/> 52.247.202.90 |80,443 |
184+
| Azure Pipeline annotations extension |aigs1.aisvc.visualstudio.com |dynamic|443 |
192185

193186
## Application Insights Analytics
194187

articles/azure-signalr/signalr-concept-internals.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,9 @@ ms.author: zhshang
99
---
1010
# Azure SignalR Service internals
1111

12-
Azure SignalR Service is built on top of ASP.NET Core SignalR framework. It also supports ASP.NET SignalR as a preview feature.
12+
Azure SignalR Service is built on top of ASP.NET Core SignalR framework. It also supports ASP.NET SignalR by reimplementing ASP.NET SignalR's data protocol on top of the ASP.NET Core framework.
1313

14-
> To support ASP.NET SignalR, Azure SignalR Service reimplements ASP.NET SignalR's data protocol on top of the ASP.NET Core framework
15-
16-
You can easily migrate a local ASP.NET Core SignalR application to work with SignalR Service, with a few lines of code change.
14+
You can easily migrate a local ASP.NET Core SignalR application or ASP.NET SignalR application to work with SignalR Service, with a few lines of code change.
1715

1816
The diagram below describes the typical architecture when you use the SignalR Service with your application server.
1917

@@ -83,4 +81,4 @@ At this point, the application server receives an event with information from th
8381
SignalR service transmits data from the client to the pairing application server. And data from the application server will be sent to the mapped clients.
8482
8583
As you can see, the Azure SignalR Service is essentially a logical transport layer between application server and clients. All persistent connections are offloaded to SignalR Service.
86-
Application server only needs to handle the business logic in hub class, without worrying about client connections.
84+
Application server only needs to handle the business logic in hub class, without worrying about client connections.

articles/backup/azure-file-share-backup-overview.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,12 +42,7 @@ Azure file share backup is a native, cloud based backup solution that protects y
4242

4343
## Backup costs
4444

45-
Azure File share backup is a snapshot-based solution and storage charges incurred for snapshots are billed along with Azure Files Usage as per the pricing details mentioned [here](https://azure.microsoft.com/pricing/details/storage/files/).
46-
47-
However, the protected instance fee for leveraging the backup solution is according to the pricing model described under the [Backup For Azure Files](https://azure.microsoft.com/pricing/details/backup/) section. Currently, the actual price has been updated only for West Central US. For other regions, exact prices will be updated soon with some regional variations, but using the same pricing model.
48-
49-
>[!NOTE]
50-
>There is now no "Protected Instance fee" and you will be charged only for snapshots according to the pricing mentioned [here](https://azure.microsoft.com/pricing/details/storage/files/).
45+
Currently you will be charged only for snapshots, since Azure file share backup is a snapshot-based solution. Storage charges incurred for snapshots are billed along with Azure Files Usage according to the pricing details mentioned [here](https://azure.microsoft.com/pricing/details/storage/files/).
5146

5247
## Next steps
5348

articles/backup/backup-azure-files-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Yes. Refer to the detailed documentation [here](backup-azure-afs-automation.md).
6969

7070
### Can I access the snapshots taken by Azure Backups and mount them?
7171

72-
All snapshots taken by Azure Backup can be accessed by viewing snapshots in the portal, PowerShell, or CLI. To learn more about Azure Files share snapshots, see [Overview of share snapshots for Azure Files (preview)](../storage/files/storage-snapshots-files.md).
72+
All snapshots taken by Azure Backup can be accessed by viewing snapshots in the portal, PowerShell, or CLI. To learn more about Azure Files share snapshots, see [Overview of share snapshots for Azure Files](../storage/files/storage-snapshots-files.md).
7373

7474
### What is the maximum retention I can configure for backups?
7575

Loading
Loading
Loading

articles/cognitive-services/Speech-Service/index-voice-assistants.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,10 @@ landingContent:
3030
url: faq-voice-assistants.md
3131
- text: Voice assistants pricing
3232
url: https://azure.microsoft.com/pricing/details/cognitive-services/speech-services
33+
- linkListType: get-started
34+
links:
35+
- text: Build and deploy a sample Voice Assistant to your Azure subscription (GitHub)
36+
url: https://github.com/Azure-Samples/Cognitive-Services-Voice-Assistant
3337
- title: Develop with Custom Commands
3438
linkLists:
3539
- linkListType: quickstart

articles/data-factory/create-shared-self-hosted-integration-runtime-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Grant permission to the data factory that needs to access the self-hosted integr
170170
```powershell
171171
New-AzRoleAssignment `
172172
-ObjectId $factory.Identity.PrincipalId ` #MSI of the Data Factory with which it needs to be shared
173-
-RoleDefinitionId 'b24988ac-6180-42a0-ab88-20f7382dd24c' ` #This is the Contributor role
173+
-RoleDefinitionName 'Contributor' `
174174
-Scope $SharedIR.Id
175175
```
176176

@@ -197,7 +197,7 @@ To revoke the access of a data factory from the shared integration runtime, run
197197
```powershell
198198
Remove-AzRoleAssignment `
199199
-ObjectId $factory.Identity.PrincipalId `
200-
-RoleDefinitionId 'b24988ac-6180-42a0-ab88-20f7382dd24c' `
200+
-RoleDefinitionName 'Contributor' `
201201
-Scope $SharedIR.Id
202202
```
203203

articles/event-grid/secure-webhook-delivery.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -99,10 +99,10 @@ else
9999
100100
New-AzureADServiceAppRoleAssignment -Id $myApp.AppRoles[0].Id -ResourceId $myServicePrincipal.ObjectId -ObjectId $eventGridSP.ObjectId -PrincipalId $eventGridSP.ObjectId
101101
102-
Write-Host "My Azure AD Tenant Id" + $myTenantId
103-
Write-Host "My Azure AD Application Id" + $myAzureADApplicationObjectId
104-
Write-Host "My Azure AD Application ($myApp.ObjectId): " + $myApp.ObjectId
105-
Write-Host "My Azure AD Application's Roles"
102+
Write-Host "My Azure AD Tenant Id: $myTenantId"
103+
Write-Host "My Azure AD Application Id: $($myApp.AppId)"
104+
Write-Host "My Azure AD Application ObjectId: $($myApp.ObjectId)"
105+
Write-Host "My Azure AD Application's Roles: "
106106
Write-Host $myApp.AppRoles
107107
```
108108

articles/event-hubs/private-link-service.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,26 @@ A private endpoint is a network interface that connects you privately and secure
1717

1818
For more information, see [What is Azure Private Link?](../private-link/private-link-overview.md)
1919

20-
> [!NOTE]
20+
> [!IMPORTANT]
2121
> This feature is supported only with the **dedicated** tier. For more information about the dedicated tier, see [Overview of Event Hubs Dedicated](event-hubs-dedicated-overview.md).
2222
>
2323
> This feature is currently in **preview**.
2424
25+
>[!WARNING]
26+
> Enabling private endpoints can prevent other Azure services from interacting with Event Hubs.
27+
>
28+
> Trusted Microsoft services are not supported when Virtual Networks are implemented.
29+
>
30+
> Common Azure scenarios that don't work with Virtual Networks (note that the list is **NOT** exhaustive) -
31+
> - Azure Monitor (diagnostic setting)
32+
> - Azure Stream Analytics
33+
> - Integration with Azure Event Grid
34+
> - Azure IoT Hub Routes
35+
> - Azure IoT Device Explorer
36+
>
37+
> The following Microsoft services are required to be on a virtual network
38+
> - Azure Web Apps
39+
> - Azure Functions
2540
2641
## Add a private endpoint using Azure portal
2742

articles/firewall/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: firewall
66
services: firewall
77
ms.topic: overview
88
ms.custom: mvc
9-
ms.date: 04/08/2020
9+
ms.date: 04/23/2020
1010
ms.author: victorh
1111
Customer intent: As an administrator, I want to evaluate Azure Firewall so I can determine if I want to use it.
1212
---
@@ -106,7 +106,7 @@ Network filtering rules for non-TCP/UDP protocols (for example ICMP) don't work
106106
|Moving a firewall to a different resource group or subscription isn't supported|Moving a firewall to a different resource group or subscription isn't supported.|Supporting this functionality is on our road map. To move a firewall to a different resource group or subscription, you must delete the current instance and recreate it in the new resource group or subscription.|
107107
|Threat intelligence alerts may get masked|Network rules with destination 80/443 for outbound filtering masks threat intelligence alerts when configured to alert only mode.|Create outbound filtering for 80/443 using application rules. Or, change the threat intelligence mode to **Alert and Deny**.|
108108
|Azure Firewall uses Azure DNS only for name resolution|Azure Firewall resolves FQDNs using Azure DNS only. A custom DNS server isn't supported. There's no impact on DNS resolution on other subnets.|We're working to relax this limitation.|
109-
|Azure Firewall SNAT/DNAT doesn't work for private IP destinations|Azure Firewall SNAT/DNAT support is limited to Internet egress/ingress. SNAT/DNAT doesn't currently work for private IP destinations. For example, spoke to spoke.|This is a current limitation.|
109+
|Azure Firewall DNAT doesn't work for private IP destinations|Azure Firewall DNAT support is limited to Internet egress/ingress. DNAT doesn't currently work for private IP destinations. For example, spoke to spoke.|This is a current limitation.|
110110
|Can't remove first public IP configuration|Each Azure Firewall public IP address is assigned to an *IP configuration*. The first IP configuration is assigned during the firewall deployment, and typically also contains a reference to the firewall subnet (unless configured explicitly differently via a template deployment). You can't delete this IP configuration because it would de-allocate the firewall. You can still change or remove the public IP address associated with this IP configuration if the firewall has at least one other public IP address available to use.|This is by design.|
111111
|Availability zones can only be configured during deployment.|Availability zones can only be configured during deployment. You can't configure Availability Zones after a firewall has been deployed.|This is by design.|
112112
|SNAT on inbound connections|In addition to DNAT, connections via the firewall public IP address (inbound) are SNATed to one of the firewall private IPs. This requirement today (also for Active/Active NVAs) to ensure symmetric routing.|To preserve the original source for HTTP/S, consider using [XFF](https://en.wikipedia.org/wiki/X-Forwarded-For) headers. For example, use a service such as [Azure Front Door](../frontdoor/front-door-http-headers-protocol.md#front-door-to-backend) or [Azure Application Gateway](../application-gateway/rewrite-http-headers.md) in front of the firewall. You can also add WAF as part of Azure Front Door and chain to the firewall.

0 commit comments

Comments
 (0)