Skip to content

Commit 6e8b6eb

Browse files
authored
Merge pull request #314518 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents fd888ea + c0def70 commit 6e8b6eb

5 files changed

Lines changed: 53 additions & 3 deletions

File tree

articles/dns/dns-private-resolver-get-started-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Azure DNS Private Resolver enables you to query Azure DNS private zones from an
2424
## In this article:
2525

2626
- Two VNets are created: **myvnet** and **myvnet2**.
27-
- An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at **10.10.0.4**.
27+
- An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at **10.0.0.4**.
2828
- A DNS forwarding ruleset is created for the private resolver.
2929
- The DNS forwarding ruleset is linked to the second VNet.
3030
- Example rules are added to the DNS forwarding ruleset.

articles/oracle/oracle-db/oracle-database-regions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The list below mentions the Azure and corresponding OCI regions with the regiona
5252
| Germany West Central |Germany Central (Frankfurt) |||||||| Dual |
5353
| Italy North | Italy North (Milan) |||||||| Dual |
5454
| North Europe | Ireland (Dublin) |||||||| Dual |
55-
| Spain Central | Spain Central (Madrid) ||||| | | | Dual |
55+
| Spain Central | Spain Central (Madrid) ||||| | | | Dual |
5656
| Sweden Central | Sweden Central (Stockholm) |||||||| Dual |
5757
| Switzerland North | Switzerland North (Zurich) ||||| | || Dual |
5858
| UAE Central | UAE Central (Abu Dhabi) ||||| | || Single |
@@ -71,7 +71,7 @@ The list below mentions the Azure and corresponding OCI regions with the regiona
7171
| Central US | US Midwest (Chicago) |||||||| Dual |
7272
| East US | US East (Ashburn) |||||||| Dual|
7373
| East US 2 | US East (Ashburn) |||||||| Dual |
74-
| North Central US | US Midwest (Chicago) ||||| | | | Single |
74+
| North Central US | US Midwest (Chicago) ||||| | | | Single |
7575
| South Central US | US South (Dallas)||||| | || Dual |
7676
| West US | US West (San Jose) |||||||| Single |
7777
| West US 2 | US West (Quincy) |||||||| Dual |

articles/service-bus-messaging/message-sessions.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,13 @@ The definition of delivery count per message in the context of sessions varies s
6969
| Session is accepted, the messages within the session aren't completed (even if they're locked), and the session is closed | No |
7070
| Session is accepted, messages are completed, and then the session is explicitly closed | N/A (It's the standard flow. Here, messages are removed from the session) |
7171

72+
## Maximum delivery count in sessions
73+
74+
When a message in a session is abandoned (for example, due to a processing failure), it becomes available again for the receiver until the [`MaxDeliveryCount`](service-bus-dead-letter-queues.md#maximum-delivery-count) for the queue or subscription is exceeded. The default value is 10. Once exceeded, the message is moved to the [dead-letter queue (DLQ)](service-bus-dead-letter-queues.md), and the receiver continues receiving subsequent messages from the session.
75+
76+
> [!IMPORTANT]
77+
> If a dead-lettered message is later moved back to the original queue for reprocessing, the original ordering relative to other session messages is lost because the resubmitted message receives a new enqueue time and sequence number.
78+
7279
## Request-response pattern
7380
The [request-reply pattern](https://www.enterpriseintegrationpatterns.com/patterns/messaging/RequestReply.html) is a well-established integration pattern that enables the sender application to send a request and provides a way for the receiver to correctly send a response back to the sender application. This pattern typically needs a short-lived queue or topic for the application to send responses to. In this scenario, sessions provide a simple alternative solution with comparable semantics.
7481

articles/virtual-network/virtual-network-manage-subnet.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,14 @@ To do tasks on subnets, your account must be assigned to the [Network contributo
7474
| Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action | Enable a service endpoint for a subnet. |
7575
| Microsoft.Network/virtualNetworks/subnets/virtualMachines/read | Get the virtual machines in a subnet. |
7676

77+
> [!NOTE]
78+
> If attempts to add, change, or delete a subnet in your virtual network fail, ensure there are no connections to other resources that may block the action:
79+
> - Gateway connections
80+
> - Gateways
81+
> - IPs
82+
> - Virtual network peerings
83+
> - App Service Environment (ASE)
84+
7785
## Add a subnet
7886

7987
# [Portal](#tab/azure-portal)

articles/virtual-network/virtual-network-routing-appliance-overview.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,37 @@ Key characteristics:
3737
- You host a routing appliance in a dedicated subnet named `VirtualNetworkApplianceSubnet`.
3838
- A routing appliance forwards traffic in the data path.
3939

40+
## Common routing patterns (hub and spoke)
41+
42+
Most deployments use a virtual network routing appliance in a hub virtual network to provide scalable spoke-to-spoke (east-west) transit. Common patterns include:
43+
44+
### Pattern 1: Route Azure private address space to the appliance
45+
46+
Use UDRs on spoke subnets to route your Azure private address space (for example, RFC1918) to the routing appliance, while routing internet egress and on-premises prefixes to other next hops as appropriate.
47+
48+
This pattern is useful when:
49+
- You want the routing appliance to carry east-west traffic, but not become the default next hop for all traffic.
50+
- You already have an established egress design (for example, Azure Firewall or NAT Gateway) that you don’t want to change.
51+
52+
### Pattern 2: Default-route spokes to the appliance (simplified spoke UDRs)
53+
54+
Use a 0.0.0.0/0 UDR on spoke subnets with the routing appliance as the next hop, and then route on-premises and internet traffic from the hub according to your architecture.
55+
56+
This pattern is useful when:
57+
- You want “cookie cutter” spoke route tables (simpler to operate at scale).
58+
- You want to avoid maintaining many per-prefix UDR entries in spokes.
59+
60+
> [!IMPORTANT]
61+
> Review the limitations section carefully before using a default route to the appliance, especially for Azure Private Link / Private Endpoint traffic.
62+
63+
### Pattern 3: RFC1918-to-appliance, default-to-egress
64+
65+
Use RFC1918 routes to the routing appliance to handle spoke-to-spoke and private transit, and send 0.0.0.0/0 to your chosen egress solution.
66+
67+
This pattern is useful when:
68+
- You want predictable east-west routing via the appliance.
69+
- You want to keep internet egress flows pinned to your egress solution and reduce the risk of asymmetric routing through a firewall.
70+
4071
## Benefits
4172

4273
### High throughput and maximum connections
@@ -96,6 +127,10 @@ The preview is free. We'll provide advance notice before billing is enabled.
96127

97128
## Registration
98129

130+
> [!NOTE]
131+
> Bandwidth and scaling behavior in preview are subject to change. If you need to change the configured bandwidth after deployment, you will need to redeploy the resource.
132+
133+
## How to request support and provide feedback
99134
After you submit your Azure Feature Exposure Control (AFEC) registration for `Microsoft.network/AllowVirtualNetworkAppliance`, finish the preview [sign-up form](https://forms.office.com/r/kqEKRr5mpB).
100135

101136
## Support

0 commit comments

Comments
 (0)