Skip to content

Commit 3c2a8b4

Browse files
Merge pull request #310220 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-07 18:00 UTC
2 parents c949149 + 5fb6e45 commit 3c2a8b4

19 files changed

Lines changed: 132 additions & 102 deletions

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6574,6 +6574,11 @@
65746574
"source_path": "articles/oracle/oracle-db/exadata-vm-clusters.md",
65756575
"redirect_url": "/azure/oracle/oracle-db/database-overview",
65766576
"redirect_document_id": false
6577+
},
6578+
{
6579+
"source_path": "articles/reliability/reliability-health-insights.md",
6580+
"redirect_url": "/azure/azure-health-insights/reliability-health-insights",
6581+
"redirect_document_id": false
65776582
}
65786583

65796584
]

articles/api-management/inject-vnet-v2.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ If you want to enable *public* inbound access to an API Management instance in t
5454
* Minimum: /27 (32 addresses)
5555
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
5656

57-
### Examples
57+
#### Examples
5858

5959
The following table shows subnet sizing examples for API Management virtual network injection, illustrating how different CIDR blocks affect the number of scale-out units possible:
6060

@@ -64,18 +64,19 @@ The following table shows subnet sizing examples for API Management virtual netw
6464
| /26 | 64 | 5 | 2 | 1 | 56 | 28 | 29 |
6565
| /25 | 128 | 5 | 2 | 1 | 120 | 30* | 30* |
6666

67+
<sup>*</sup> Premium v2 limit
6768

68-
### Key Points
69+
#### Key points
6970

7071
- **Minimum subnet size**: /27 (provides 24 usable IP addresses for API Management)
7172
- **Azure reserved IPs**: 5 addresses per subnet (first and last for protocol conformance, plus 3 for Azure services)
7273
- **Scale-out requirement**: Each scale-out unit requires 2 IP addresses
7374
- **Internal load balancer**: Only required when API Management is deployed in internal virtual network mode
74-
- **Premium V2 limit**: * Currently supports up to 30 units maximum.
75+
- **Premium V2 limit**: Currently supports up to 30 units maximum.
7576

7677
> [!IMPORTANT]
77-
> API Management is a member of Azure Integration Services and is typically deployed as a pivotal service in enterprise architectures. It is prudent to err on the higher side of available IPs for the API Management subnet as changing it later can have far-reaching impact.
78-
> The private IP addresses of internal load balancer and API Management units are assigned dynamically. Therefore, it is impossible to anticipate the private IP of the API Management instance prior to its deployment. Additionally, changing to a different subnet and then returning might cause a change in the private IP address.
78+
> - API Management is a member of Azure Integration Services and is typically deployed as a pivotal service in enterprise architectures. It is prudent to err on the higher side of available IPs for the API Management subnet as changing it later can have far-reaching impact.
79+
> - The private IP addresses of internal load balancer and API Management units are assigned dynamically. Therefore, it is impossible to anticipate the private IP of the API Management instance prior to its deployment. Additionally, changing to a different subnet and then returning might cause a change in the private IP address.
7980
8081
### Network security group
8182

articles/application-gateway/application-gateway-diagnostics.md

Lines changed: 44 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: application-gateway
77
author: mbender-ms
88
ms.service: azure-application-gateway
99
ms.topic: concept-article
10-
ms.date: 06/16/2025
10+
ms.date: 01/05/2026
1111
ms.author: mbender
1212
ms.custom:
1313
- ai-gen-docs-bap
@@ -35,6 +35,47 @@ You can use different types of logs in Azure to manage and troubleshoot applicat
3535
> [!NOTE]
3636
> Logs are available only for resources deployed in the Azure Resource Manager deployment model. You can't use logs for resources in the classic deployment model. For a better understanding of the two models, see the [Understanding Resource Manager deployment and classic deployment](../azure-resource-manager/management/deployment-models.md) article.
3737
38+
## Storage locations for diagnostic logs
39+
Azure Monitor provides multiple options for storing resource logs depending on your analysis, retention, and integration requirements. When configuring diagnostic settings, you can choose one or more destinations for log collection.
40+
41+
**Log Analytics workspace (recommended)**
42+
A Log Analytics workspace is the recommended destination for collecting and analyzing Application Gateway resource logs. It enables:
43+
44+
- Use of predefined queries and visualizations
45+
- Creation of alerts based on specific log conditions
46+
- Integration with Azure Monitor features and insights
47+
In Log Analytics, the table used for storing diagnostic logs depends on the collection type configured in the diagnostic setting.
48+
49+
**Collection types in Log Analytics**
50+
51+
**Azure Diagnostics (legacy):** When you select Azure Diagnostics, all logs are written to the shared AzureDiagnostics table.Because this table is shared across many resource types, each service writes its own custom fields. When the number of custom fields exceeds 500, additional fields are stored under the AdditionalFields dynamic property as key/value pairs. This can lead to reduced discoverability and more complex queries.
52+
53+
**Resource-specific (recommended):** When you select Resource-specific, logs are written into dedicated tables for each category.
54+
Resource-specific mode provides:
55+
56+
- Simplified querying with predictable schemas
57+
- Improved discoverability of fields and table structures
58+
- Better performance due to lower ingestion latency and faster query execution
59+
- Granular RBAC by assigning access at the table level
60+
61+
For Application Gateway, resource-specific mode creates the following tables:
62+
63+
- [AGWAccessLogs](/azure/azure-monitor/reference/tables/agwaccesslogs.md)
64+
- [AGWPerformanceLogs](/azure/azure-monitor/reference/tables/agwperformancelogs.md)
65+
- [AGWFirewallLogs](/azure/azure-monitor/reference/tables/agwfirewalllogs.md)
66+
67+
**Selecting the collection type in Log analytics**
68+
69+
Azure services are transitioning to resource-specific mode. As part of this migration, a toggle is available in the diagnostic settings to choose either:
70+
71+
- Resource-specific (default)
72+
- Azure Diagnostics
73+
74+
The toggle determines whether logs for the selected categories are routed to dedicated tables or to the AzureDiagnostics table. When switching to resource-specific mode, only newly selected categories use the dedicated tables; existing streams continue unchanged until reconfigured.
75+
76+
Selecting resource-specific mode provides enhanced flexibility through workspace transformations, allowing you to preprocess data before ingestion.For guidance on configuring workspace transformations, see: [Tutorial: Add a workspace transformation to Azure Monitor Logs by using the Azure portal](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal.md)
77+
78+
3879
## Examples of optimizing access logs using Workspace Transformations
3980

4081
**Example 1: Selective Projection of Columns**: Imagine you have application gateway access logs with 20 columns, but you're interested in analyzing data from only six specific columns. By using workspace transformation, you can project these six columns into your workspace, effectively excluding the other 14 columns. Even though the original data from those excluded columns won't be stored, empty placeholders for them still appear in the Logs blade. This approach optimizes storage and ensures that only relevant data is retained for analysis.
@@ -58,7 +99,7 @@ Other storage locations:
5899
- **Azure Event Hubs**: Event hubs are a great option for integrating with other security information and event management (SIEM) tools to get alerts on your resources.
59100
- **Azure Monitor partner integrations**.
60101

61-
Learn more about the Azure Monitor's [diagnostic settings destinations](/azure/azure-monitor/essentials/diagnostic-settings?WT.mc_id=Portal-Microsoft_Azure_Monitoring&tabs=portal#destinations) .
102+
Learn more about the Azure Monitor's [diagnostic settings destinations](/azure/azure-monitor/essentials/diagnostic-settings.md) .
62103

63104
## Enable logging through PowerShell
64105

@@ -116,4 +157,4 @@ You can also connect to your storage account and retrieve the JSON log entries f
116157
117158
- Visualize counter and event logs by using [Azure Monitor logs](/previous-versions/azure/azure-monitor/insights/azure-networking-analytics).
118159
- [Visualize your Azure activity log with Power BI](https://powerbi.microsoft.com/blog/monitor-azure-audit-logs-with-power-bi/) blog post.
119-
- [View and analyze Azure activity logs in Power BI and more](https://azure.microsoft.com/blog/analyze-azure-audit-logs-in-powerbi-more/) blog post.
160+
- [View and analyze Azure activity logs in Power BI and more](https://azure.microsoft.com/blog/analyze-azure-audit-logs-in-powerbi-more/) blog post.

articles/azure-health-insights/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ items:
2323
- name: How to configure the containers
2424
href: configure-containers.md
2525
- name: Reliability in Azure Health Insights
26-
href: ../reliability/reliability-health-insights.md?toc=/azure/health-insights/toc.json
26+
href: reliability-health-insights.md
2727
- name: Responsible use of AI
2828
expanded: true
2929
items:

articles/reliability/reliability-health-insights.md renamed to articles/azure-health-insights/reliability-health-insights.md

File renamed without changes.

articles/azure-resource-manager/bicep/bicep-functions-deployment.md

Lines changed: 15 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Bicep functions - deployment
33
description: Describes the functions to use in a Bicep file to retrieve deployment information.
44
ms.topic: reference
55
ms.custom: devx-track-bicep
6-
ms.date: 12/22/2025
6+
ms.date: 01/06/2026
77
---
88

99
# Deployment functions for Bicep
@@ -61,59 +61,13 @@ For more information about Azure identities, see [What is an Azure Active Direct
6161

6262
`deployment()`
6363

64-
Returns information about the current deployment operation.
64+
Returns information about the current deployment operation.
6565

6666
Namespace: [az](bicep-functions.md#namespaces-for-functions).
6767

6868
### Return value
6969

70-
This function returns the object that is passed during deployment. The properties in the returned object differ based on whether you are:
71-
72-
- deploying a local Bicep file.
73-
- deploying to a resource group or deploying to one of the other scopes ([Azure subscription](deploy-to-subscription.md), [management group](deploy-to-management-group.md), or [tenant](deploy-to-tenant.md)).
74-
75-
When deploying a local Bicep file to a resource group, the function returns the following format:
76-
77-
```json
78-
{
79-
"name": "",
80-
"properties": {
81-
"template": {
82-
"$schema": "",
83-
"contentVersion": "",
84-
"parameters": {},
85-
"variables": {},
86-
"resources": [],
87-
"outputs": {}
88-
},
89-
"templateHash": "",
90-
"parameters": {},
91-
"mode": "",
92-
"provisioningState": ""
93-
}
94-
}
95-
```
96-
97-
When you deploy to an Azure subscription, management group, or tenant, the return object includes a `location` property. The `location` property isn't included when deploying a local Bicep file. The format is:
98-
99-
```json
100-
{
101-
"name": "",
102-
"location": "",
103-
"properties": {
104-
"template": {
105-
"$schema": "",
106-
"contentVersion": "",
107-
"resources": [],
108-
"outputs": {}
109-
},
110-
"templateHash": "",
111-
"parameters": {},
112-
"mode": "",
113-
"provisioningState": ""
114-
}
115-
}
116-
```
70+
Bicep files are sometimes compiled to [languageVersion 2.0](../templates/syntax.md#languageversion-20) ARM templates. Therefore, Bicep type checking considers the `deployment()` function to return only the subset of properties as would be returned in a languageVersion 2.0 ARM template. For more information, see [deployment() function for languageVersion 2.0](../templates/template-functions-deployment.md#deployment ).
11771

11872
### Example
11973

@@ -127,23 +81,23 @@ The preceding example returns the following object:
12781

12882
```json
12983
{
130-
"name": "deployment",
84+
"name": "deploymentOutput",
85+
"location": "",
13186
"properties": {
13287
"template": {
133-
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
13488
"contentVersion": "1.0.0.0",
135-
"resources": [],
136-
"outputs": {
137-
"deploymentOutput": {
138-
"type": "Object",
139-
"value": "[deployment()]"
89+
"metadata": {
90+
"_EXPERIMENTAL_WARNING": "This template uses ARM features that are experimental. Experimental features should be enabled for testing purposes only, as there are no guarantees about the quality or stability of these features. Do not enable these settings for any production usage, or your production environment may be subject to breaking.",
91+
"_EXPERIMENTAL_FEATURES_ENABLED": [
92+
"Asserts"
93+
],
94+
"_generator": {
95+
"name": "bicep",
96+
"version": "0.39.26.7824",
97+
"templateHash": "10348958332696598785"
14098
}
14199
}
142-
},
143-
"templateHash": "13135986259522608210",
144-
"parameters": {},
145-
"mode": "Incremental",
146-
"provisioningState": "Accepted"
100+
}
147101
}
148102
}
149103
```

articles/azure-resource-manager/templates/template-functions-deployment.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Template functions - deployment
33
description: Describes the functions to use in an Azure Resource Manager template (ARM template) to retrieve deployment information.
44
ms.topic: reference
55
ms.custom: devx-track-arm-template
6-
ms.date: 08/05/2025
6+
ms.date: 01/06/2026
77
---
88

99
# Deployment functions for ARM templates
@@ -81,9 +81,9 @@ In Bicep, use the [`deployment`](../bicep/bicep-functions-deployment.md#deployme
8181

8282
This function returns the object that's passed during deployment. The properties in the returned object differ based on if you're:
8383

84-
- Deploying a template or a template spec.
85-
- Deploying a template that's a local file or deploying a template that's a remote file accessed through a URI.
86-
- Deploying to a resource group or deploying to one of the other scopes ([Azure subscription](deploy-to-subscription.md), [management groups](deploy-to-management-group.md), or [tenants](deploy-to-tenant.md)).
84+
* Deploying a template or a template spec.
85+
* Deploying a template that's a local file or deploying a template that's a remote file accessed through a URI.
86+
* Deploying to a resource group or deploying to one of the other scopes ([Azure subscription](deploy-to-subscription.md), [management groups](deploy-to-management-group.md), or [tenants](deploy-to-tenant.md)).
8787

8888
When deploying a local template to a resource group, the function returns the following format:
8989

@@ -188,7 +188,8 @@ When deploying a [languageVersion 2.0](./syntax.md#languageversion-20) template,
188188
"location": "",
189189
"properties": {
190190
"template": {
191-
"contentVersion": ""
191+
"contentVersion": "",
192+
"metadata": {}
192193
},
193194
"templateLink": {
194195
"id": "",
@@ -198,6 +199,8 @@ When deploying a [languageVersion 2.0](./syntax.md#languageversion-20) template,
198199
}
199200
```
200201

202+
The `location` property is included only for deployments at the [subscription](./deploy-to-subscription.md), [management group](./deploy-to-management-group.md), or [tenant](./deploy-to-tenant.md) scope. The `templateLink` property is included only when the user provides a linked template rather than an inline template.
203+
201204
### Remarks
202205

203206
You can use `deployment()` to link to another template based on the URI of the parent template:

articles/backup/azure-kubernetes-service-cluster-restore-using-powershell.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Restore Azure Kubernetes Service (AKS) via PowerShell using Azure Backup
33
description: This article explains how to restore backed-up Azure Kubernetes Service (AKS) using Azure PowerShell.
44
ms.topic: how-to
55
ms.service: azure-backup
6-
ms.date: 01/30/2025
6+
ms.date: 01/07/2026
77
ms.custom:
88
- devx-track-azurepowershell
99
- ignite-2023
@@ -34,7 +34,7 @@ Before you restore an AKS cluster, ensure that you meet the following prerequisi
3434

3535
For more information on the limitations and supported scenarios, see the [support matrix](azure-kubernetes-service-cluster-backup-support-matrix.md).
3636

37-
## Initialize Variables for Resource Commands
37+
## Initialize Variables for Resource Commands for AKS cluster restore
3838

3939
Here, provide the necessary details for each resource to be used in your commands.
4040

@@ -113,7 +113,7 @@ To prepare the restore request, run the following cmdlets:
113113
$aksRestoreRequest = Initialize-AzDataProtectionRestoreRequest -DatasourceType AzureKubernetesService -SourceDataStore OperationalStore -RestoreLocation $restoreLocation -RestoreType AlternateLocation -TargetResourceId $targetAKSClusterId -RecoveryPoint $rp[0].Property.RecoveryPointId -RestoreConfiguration $aksRestoreCriteria -BackupInstance $AllInstances[2]
114114
```
115115
116-
## Trigger the restore
116+
## Trigger the restore for AKS cluster
117117
118118
To trigger the restore operation, run the following cmdlets:
119119
@@ -136,7 +136,7 @@ To trigger the restore operation, run the following cmdlets:
136136
$restoreJob = Start-AzDataProtectionBackupInstanceRestore -SubscriptionId $vaultSubId -ResourceGroupName $vaultRgName -VaultName $vaultName -BackupInstanceName $AllInstances[2].BackupInstanceName -Parameter $aksRestoreRequest
137137
```
138138
139-
## Track the restore job
139+
## Track the restore job for AKS cluster
140140
141141
Track all the jobs using the `Get-AzDataProtectionJob` cmdlet. You can list all jobs and fetch a particular job detail. Alternatively, use Az.ResourceGraph to track jobs across all Backup vaults.
142142

articles/container-apps/sessions-code-interpreter.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ If you're not using an LLM framework integration, you can interact with the sess
184184

185185
## Execute code in a session
186186

187-
To execute code in a session, send a `POST` request to the `code/execute` endpoint with the code to run in the request body.
187+
To execute code in a session, send a `POST` request to the `code/execute` endpoint with the code to run in the request body. Each code execution is limited to a maximum runtime of 220 seconds.
188188

189189
The following example prints `Hello, world!` in Python.
190190

articles/reliability/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ items:
1010
href: overview-reliability-guidance.md
1111
- name: AI and machine learning
1212
items:
13-
- name: Azure AI Health Insights
14-
href: reliability-health-insights.md
1513
- name: Azure AI Search
1614
href: reliability-ai-search.md
1715
- name: Azure Bot Service

0 commit comments

Comments
 (0)