Skip to content

Commit 6251957

Browse files
Merge pull request #314878 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-17 17:00 UTC
2 parents 530859b + 57dc623 commit 6251957

8 files changed

Lines changed: 76 additions & 15 deletions

File tree

articles/app-service/reference-app-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The following table shows environment variable prefixes that App Service uses fo
8787
| `SERVICEBUSCONNSTR_` | Connection string to an instance of Azure Service Bus. |
8888
| `EVENTHUBCONNSTR_` | Connection string to an event hub in Azure Event Hubs. |
8989
| `DOCDBCONNSTR_` | Connection string to a database in Azure Cosmos DB. |
90-
| `REDISCACHECONNSTR_` | Connection string to a cache in Azure Cache for Redis. |
90+
| `REDISCACHECONNSTR_` | Connection string to a Redis cache. |
9191
| `FILESHARESTORAGE_` | Connection string to a custom file share. |
9292

9393
## Deployment

articles/cost-management-billing/manage/mca-request-billing-ownership.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -202,8 +202,7 @@ You can request billing ownership of products for the following subscription typ
202202
- [Microsoft Azure Plan](https://azure.microsoft.com/offers/ms-azr-0017g/)²
203203
- [Microsoft Azure Sponsored Offer](https://azure.microsoft.com/offers/ms-azr-0036p/)¹
204204
- [Microsoft Enterprise Agreement](https://azure.microsoft.com/pricing/enterprise-agreement/)
205-
- Subscription, reservation, and savings plan transfers are supported for direct EA customers. A direct enterprise agreement is one that's signed between Microsoft and an enterprise agreement customer.
206-
- Only subscription transfers are supported for indirect EA customers. Reservation and savings plan transfers aren't supported. An indirect EA agreement is one where a customer signs an agreement with a Microsoft partner.
205+
- Subscription, reservation, and savings plan transfers are supported for EA customers. For more details, see [Azure product transfer hub](subscription-transfer.md).
207206
- [Microsoft Customer Agreement](https://azure.microsoft.com/pricing/purchase-options/microsoft-customer-agreement/)
208207
- [Microsoft Cloud Partner Program](https://azure.microsoft.com/offers/ms-azr-0025p/)¹
209208
- [MSDN Platforms](https://azure.microsoft.com/offers/ms-azr-0062p/)¹

articles/cost-management-billing/manage/subscription-transfer.md

Lines changed: 7 additions & 7 deletions
Large diffs are not rendered by default.

articles/iot-operations/troubleshoot/known-issues.md

Lines changed: 62 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dominicbetts
55
ms.author: dobett
66
ms.topic: troubleshooting-known-issue
77
ms.custom: sfi-ropc-nochange
8-
ms.date: 11/21/2025
8+
ms.date: 04/17/2026
99
---
1010

1111
# Known issues for Azure IoT Operations
@@ -14,6 +14,67 @@ This article lists the current known issues you might encounter when using Azure
1414

1515
For general troubleshooting guidance, see [Troubleshoot Azure IoT Operations](troubleshoot.md).
1616

17+
## Deployment and upgrade issues
18+
19+
This section lists current known issues with deploying and upgrading Azure IoT Operations.
20+
21+
### Upgrade to Azure IoT Operations 2603 can silently fail
22+
23+
---
24+
25+
Log signature: N/A
26+
27+
---
28+
29+
When you run `az iot ops upgrade` to upgrade to Azure IoT Operations 2603, the upgrade can silently fail to reach the cluster. You then observe the following symptoms:
30+
 
31+
- `provisioningState: Failed` on the Azure IoT Operations extension.
32+
- All on-cluster workloads remain healthy (no upgrade activity occurs).
33+
- `az iot ops upgrade` might report nothing to upgrade on subsequent attempts.
34+
35+
#### Root cause
36+
 
37+
During the upgrade, if a dependent system extension, such as `microsoft.extensiondiagnostics` experiences a transient Helm timeout, Azure Resource Manager marks it as **Failed**. Even if the extension eventually succeeds on-cluster, the cloud-side state remains **Failed**. This blocks the dependency chain — Azure Resource Manager never delivers the updated Azure IoT Operations or secret-store extension config to the cluster's config agent.
38+
 
39+
Symptoms include:
40+
 
41+
- Config agent PostStatus returns `400: "Configuration spec has been modified"`
42+
- `getPendingConfigs` returns empty results
43+
- Extension manager never receives Helm upgrade instructions
44+
45+
#### Workaround
46+
 
47+
The workaround is to force Azure Resource Manager to re-submit the extension specs by running a no-op update on both the Azure IoT Operations and secret-store extensions, then retrying the upgrade:
48+
 
49+
```azurecli
50+
az k8s-extension update --name <aio-extension-name> \
51+
--cluster-name <cluster-name> \
52+
--resource-group <resource-group> \
53+
--cluster-type connectedClusters \
54+
--configuration-settings AgentOperationTimeoutInMinutes=120
55+
56+
az k8s-extension update --name azure-secret-store \
57+
--cluster-name <cluster-name> \
58+
--resource-group <resource-group> \
59+
--cluster-type connectedClusters \
60+
--configuration-settings AgentOperationTimeoutInMinutes=120
61+
62+
az iot ops upgrade
63+
```
64+
65+
To identify the Azure IoT Operations extension name, which includes a random suffix (for example, `azure-iot-operations-cym7h`), find your specific extension name by running:
66+
67+
```azurecli
68+
az k8s-extension list \
69+
--cluster-name <cluster-name> \
70+
--resource-group <resource-group> \
71+
--cluster-type connectedClusters \
72+
--query "[?extensionType=='microsoft.iotoperations'].name" -o tsv
73+
```
74+
75+
> [!IMPORTANT]
76+
> After the upgrade completes, reset `AgentOperationTimeoutInMinutes` back to a lower value like five minutes to avoid long wait times on future operations if something else fails.
77+
1778
## Azure Device Registry issues
1879

1980
This section lists current known issues for the Azure Device Registry.

articles/static-web-apps/apis-functions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: jikunchen
1111

1212
# API support in Azure Static Web Apps with Azure Functions
1313

14-
Front end web applications often callback end APIs for data and services. By default, Azure Static Web Apps provides built-in serverless API endpoints via [Azure Functions](apis-functions.md).
14+
Front end web applications often call back-end APIs for data and services. By default, Azure Static Web Apps provides built-in serverless API endpoints via [Azure Functions](apis-functions.md).
1515

1616
Azure Functions APIs in Static Web Apps are available in two possible configurations depending on the [hosting plan](plans.md#features):
1717

articles/storage/files/encryption-in-transit-for-nfs-shares.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The [AZNFS](https://github.com/Azure/AZNFS-mount) utility package simplifies enc
3737
>
3838
> - Ubuntu (18.04 LTS, 20.04 LTS, 22.04 LTS, 24.04 LTS)
3939
> - Centos7, Centos8
40-
> - RedHat7, RedHat8, RedHat9
40+
> - RedHat7, RedHat8, RedHat9, RedHat10
4141
> - Rocky8, Rocky9
4242
> - SUSE (SLES 15)
4343
> - Oracle Linux

articles/virtual-wan/how-to-routing-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ Before enabling routing intent, consider the following:
173173
* Enabling routing intent affects the advertisement of prefixes to on-premises. See [prefix advertisements](#prefixadvertisments) for more information.
174174
* You can open a support case to enable connectivity across ExpressRoute circuits via a Firewall appliance in the hub. Enabling this connectivity pattern modifies the prefixes advertised to ExpressRoute circuits. See [About ExpressRoute](#expressroute) for more information.
175175
* Routing intent is the only mechanism in Virtual WAN to enable inter-hub traffic inspection via security appliances deployed in the hub. Inter-hub traffic inspection also requires routing intent to be enabled on all hubs to ensure traffic is routed symmetrically between security appliances deployed in Virtual WAN hubs.
176-
* Routing intent sends Virtual Network and on-premises traffic to the next hop resource specified in the routing policy. Virtual WAN programs the underlying Azure platform to route your on-premises and Virtual Network traffic in accordance with the configured routing policy and doesn't process the traffic through the Virtual Hub router. Because packets routed via routing intent aren't processed by the router, you don't need to allocate additional [routing infrastructure units](hub-settings.md#capacity) for data-plane packet forwarding on hubs configured with routing intent. However, you might need to allocate additional routing infrastructure units based on the number of Virtual Machines in Virtual Networks connected to the Virtual WAN Hub.
176+
* Routing intent sends Virtual Network and on-premises traffic to the next hop resource specified in the routing policy. Virtual WAN programs the underlying Azure platform to route your on-premises and Virtual Network traffic in accordance with the configured routing policy and doesn't process the traffic through the Virtual Hub router. This also means Virtual Hub router data processing isn't charged for traffic routed via routing intent. As a result, you don't need to allocate additional [routing infrastructure units](hub-settings.md#capacity) for data-plane packet forwarding on hubs configured with routing intent. However, you might need to allocate additional routing infrastructure units based on the number of Virtual Machines in Virtual Networks connected to the Virtual WAN Hub.
177177
* Routing intent allows you to configure different next-hop resources for private and internet routing policies. For example, you can set the next hop for private routing policies to Azure Firewall in the hub and the next hop for internet routing policy to an NVA or SaaS solution in the hub. Because SaaS solutions and Firewall NVAs are deployed in the same subnet in the Virtual WAN hub, deploying SaaS solutions with a Firewall NVA in the same hub can impact the horizontal scalability of the SaaS solutions as there are less IP addresses available for horizontal scale-out. Additionally, you can have at most one SaaS solution deployed in each Virtual WAN hub.
178178
### <a name="prereq"></a> Prerequisites
179179

includes/storage-blob-scale-targets.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: normesta
33
ms.service: azure-storage
44
ms.topic: include
5-
ms.date: 12/10/2025
5+
ms.date: 04/17/2026
66
ms.author: normesta
77
---
88

@@ -16,6 +16,7 @@ ms.author: normesta
1616
| Maximum size of an append blob | 50,000 x 4 MiB (approximately 195 GiB) |
1717
| Maximum size of a page blob | 8 TiB<sup>2</sup> |
1818
| Maximum number of stored access policies per blob container | 5 |
19+
| Target request rate for a single block blob | Up to 3,000 requests per second |
1920
| Target request rate for a single page blob | Up to 500 requests per second |
2021
| Target throughput for a single page blob | Up to 60 MiB per second<sup>2</sup> |
2122
| Target throughput for a single block blob | Up to storage account ingress/egress limits<sup>1</sup> |

0 commit comments

Comments
 (0)