Skip to content

Commit 803f18c

Browse files
Merge pull request #313382 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-19 06:00 UTC
2 parents 07fc3f3 + 531f5e3 commit 803f18c

14 files changed

Lines changed: 207 additions & 112 deletions

articles/app-service/tutorial-nodejs-mongodb-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ ms.custom:
2525

2626
# Tutorial: Deploy a Node.js + MongoDB web app to Azure
2727

28-
This tutorial shows how to create a secure Node.js app in [Azure App Service](overview.md) that's connected to an [Azure Cosmos DB for MongoDB](/azure/cosmos-db/mongodb/mongodb-introduction) database. Azure App Service provides a highly scalable, self-patching web hosting service using the Linux operating system. When you're finished, you have an Express.js app running on Azure App Service on Linux.
28+
This tutorial shows how to create a secure Node.js app in [Azure App Service](overview.md) that's connected to an [Azure DocumentDB](https://learn.microsoft.com/azure/documentdb/) database. Azure App Service provides a highly scalable, self-patching web hosting service using the Linux operating system. When you're finished, you have an Express.js app running on Azure App Service on Linux.
2929

3030
:::image type="content" source="./media/tutorial-nodejs-mongodb-app/azure-portal-browse-app-2.png" alt-text="Screenshot of Node.js application storing data in Cosmos DB.":::
3131

@@ -125,7 +125,7 @@ Having issues? Check the [Troubleshooting section](#troubleshooting).
125125

126126
## Create App Service and Azure Cosmos DB
127127

128-
In this step, you create the Azure resources. The steps used in this tutorial create a set of secure-by-default resources that include App Service and Azure Cosmos DB for MongoDB. For the creation process, you specify:
128+
In this step, you create the Azure resources. The steps used in this tutorial create a set of secure-by-default resources that include App Service and Azure DocumentDB. For the creation process, you specify:
129129

130130
- The **Name** for the web app. It's part of the DNS name for your app.
131131
- The **Region** to run the app physically in the world. It's also part of the DNS name for your app.
@@ -171,7 +171,7 @@ Sign in to the [Azure portal](https://portal.azure.com/) and follow these steps
171171
- **Virtual network** → Integrated with the App Service app and isolates back-end network traffic.
172172
- **Private endpoint** → Access endpoint for the database resource in the virtual network.
173173
- **Network interface** → Represents a private IP address for the private endpoint.
174-
- **Azure Cosmos DB for MongoDB** → Accessible only from behind the private endpoint. A database and a user are created for you on the server.
174+
- **Azure DocumentDB** → Accessible only from behind the private endpoint. A database and a user are created for you on the server.
175175
- **Private DNS zone** → Enables DNS resolution of the Azure Cosmos DB server in the virtual network.
176176

177177
:::column-end:::
110 KB
Loading

articles/application-gateway/migrate-v1-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -385,8 +385,8 @@ For the legacy cloning script, version 1.0.11 is the new version of the migratio
385385
### Public IP retention script
386386
387387
After you successfully migrate the configuration and thoroughly test your new V2 gateway, this step focuses on redirecting live traffic.
388-
389-
We provide an Azure PowerShell script that *retains the public IP address from V1*. Here are important considerations for the script:
388+
> [!NOTE]
389+
> The IP migration script does not support public IP address resources that have name beginning with a numeric character.
390390
391391
- The script reserves the Basic public IP from V1, converts it to Standard, and attaches it to the V2 gateway. This action effectively redirects all incoming traffic to the V2 gateway.
392392
- This IP swap operation typically results in a brief *downtime of approximately one to five minutes*. Plan accordingly.

articles/application-gateway/tutorial-ingress-controller-add-on-new.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,27 @@ Deploying a new AKS cluster with the AGIC add-on enabled without specifying an e
5757
az aks create -n myCluster -g myResourceGroup --network-plugin azure --enable-managed-identity -a ingress-appgw --appgw-name myApplicationGateway --appgw-subnet-cidr "10.225.0.0/16" --generate-ssh-keys
5858
```
5959

60+
## Enable the add-on for the existing AKS cluster
61+
62+
You already have an existing AKS cluster and will enable the AGIC add-on. The add-on can be enabled either through the Azure portal or by using the Azure CLI.
63+
64+
# [Azure Portal](#tab/azure-portal)
65+
66+
In this page in the screenshot, you can create it simply by selecting the checkbox. If you want to specify a subnet prefix, select *Create new* and configure it manually.
67+
68+
:::image type="content" source="media/tutorial-ingress-controller-add-on-new/tutorial-ingress-controller-add-on-new.png" alt-text="Screenshot of enabling AGIC addon by Portal." lightbox="media/tutorial-ingress-controller-add-on-new/tutorial-ingress-controller-add-on-new.png":::
69+
70+
# [Azure CLI](#tab/azure-cli)
71+
72+
You can give the name of the application gateway as well as subnet CIDR by the command.
73+
appgw-subnet-cidr should be in the address prefixes in your virtual network. Please change *10.0.250.0/24* to your preferred application gateway subnet CIDR. This must always be within the address space range of your virtual network.
74+
75+
```azurecli
76+
$ az aks enable-addons --resource-group ${RG_NAME} --name ${CLUSTER_NAME} --addons ingress-appgw --appgw-subnet-cidr "10.0.250.0/24"
77+
```
78+
79+
In most cases, enabling the add-on automatically assigns the required permissions. However, depending on the environment, the permissions may not be granted automatically. In such cases, you should verify the permissions and assign them manually if necessary.
80+
6081
> [!NOTE]
6182
> Please ensure the identity used by AGIC has the proper permissions. A list of permissions needed by the identity can be found here: [Configure Infrastructure - Permissions](configuration-infrastructure.md#permissions). If a custom role is not defined with the required permissions, you may use the _Network Contributor_ role.
6283

articles/azure-functions/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -270,7 +270,7 @@
270270
href: /security/benchmark/azure/baselines/functions-security-baseline?toc=/azure/azure-functions/toc.json&bc=/azure/azure-functions/breadcrumb/toc.json
271271
- name: Reliability
272272
items:
273-
- name: Availability zones and disaster recovery
273+
- name: Reliability in Azure Functions
274274
displayName: availability zones, high-availability, zone redundancy, disaster recovery
275275
href: /azure/reliability/reliability-functions?toc=/azure/azure-functions/toc.json&bc=/azure/azure-functions/breadcrumb/toc.json
276276
- name: Zone redundancy

articles/confidential-computing/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,8 @@
6767
href: migrate-nested-confidential-vms.md
6868
- name: Virtual Machine Metablob Disk
6969
href: virtual-machine-metablob-disk.md
70+
- name: How to disable Virtual Machine Metablob Disk
71+
href: disable-confidential-vm-metadata-blob.md
7072
- name: Quickly create confidential VMs
7173
items:
7274
- name: Create a Confidential VM through the Azure portal
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
---
2+
title: Disable VMMD blob creation for Confidential VMs
3+
description: Instructions for opting out of the Virtual Machine Metablob Disk (VMMD).
4+
author: linuxelf001
5+
ms.topic: include
6+
ms.service: azure-virtual-machines
7+
ms.date: 03/11/2026
8+
ms.author: raginjup
9+
ms.reviewer: raginjup
10+
ms.custom: include file
11+
---
12+
13+
# Disable VMMD blob creation for Confidential VMs
14+
15+
This article outlines the background and the steps required to opt out of the newly introduced Virtual Machine Metadata (VMMD) blob feature in the Microsoft Azure Confidential VMs.
16+
17+
Microsoft Azure Confidential VMs (CVMs) recently adopted a **3blob** architecture comprising disk, VM Guest State (VMGS), and Virtual Machine Metadata (VMMD) blobs. This architecture update moves key information from the VMGS blob to a new VMMD blob to provide seamless support for various online key rotation scenarios.
18+
19+
Automation built for the previous architecture involving export, import, and upload scenarios may fail for certain workflows. If your workflows include a breaking scenario, you can deploy confidential VMs with legacy format by registering the `DisableConfidentialVMMetadataBlob` preview feature.
20+
21+
## Prerequisites
22+
23+
Before beginning, check to make sure that you have the following:
24+
25+
* An Azure account with an active subscription. [Create an account for free.](https://azure.microsoft.com/free)
26+
* A confidential VM with managed disks.
27+
28+
## Required Access
29+
30+
To list, register, or unregister preview features in your Azure subscription, you need access to the `Microsoft.Features/*` actions. This permission is granted through the [Contributor](../role-based-access-control/built-in-roles/privileged.md#contributor) and [Owner](../role-based-access-control/built-in-roles/privileged.md#owner) built-in roles. You can also specify the required access through a [custom role](../role-based-access-control/custom-roles.md).
31+
32+
> [!NOTE]
33+
> The portal only shows a preview feature when the service that owns the feature explicitly opts in. The opt-out enablement would have to set on customer subscriptions and then the customers can continue to use **2blob** CVMs. <br><br> AFEC Name: Microsoft.Compute/DisableConfidentialVMMetadataBlob <br> Preview feature name: DisableConfidentialVMMetadataBlob <br><br> [Learn More…](../azure-resource-manager/management/preview-features.md)
34+
35+
## How to Opt Out of VMMD Blob creation
36+
37+
To opt out of the **3blob** architecture and disable the VMMD creation, follow these steps to register the `DisableConfidentialVMMetadataBlob` feature through the Azure portal:
38+
39+
1. Sign in to the Azure portal.
40+
41+
2. Search for `Subscriptions` in the top search bar and click on the link.
42+
![Screenshot of Subscriptions in the search bar.](media/search-subscriptions.png)
43+
44+
3. On the `Subscriptions` page, select the name of the subscription you wish to configure.
45+
46+
4. In the left menu, under `Settings`, select `Preview features`.
47+
![Screenshot of Preview features under settings.](media/access-preview-features.png)
48+
49+
5. In the filter box of the `Preview features` screen, enter `DisableConfidentialVMMetadataBlob` and select the feature from the list.
50+
![Screenshot of DisableConfidentialVMMetadataBlob preview feature.](media/disable-confidential-vm-feature.png)
51+
52+
6. Select Register.
53+
![Screenshot of registering preview feature.](media/register-confidential-vm-feature.png)
54+
55+
The status changes to `Registered` once the process completes.
56+
57+
## Features Disabled After Opting Out
58+
59+
Using the legacy **2blob** architecture prevents access to the following services and capabilities designed for the new **3blob** format used in the latest Confidential VMs.
60+
61+
* **Backup and Restore**<br>
62+
The Azure Backup service doesn't support 2 blob confidential VMs configured with the opt-out feature.
63+
64+
* **Key Rotation**<br>
65+
Online key rotation depends on the VMMD blob and therefore is only available for **3blob** resources. Confidential VMs using the **2blob** format can't rotate keys while online. Automated key rotation may also fail if the resource is online.
66+
67+
68+
## Next Steps
69+
70+
* [Deploy a confidential VM from Azure](/azure/confidential-computing/quick-create-confidential-vm-portal)
71+
* [Azure confidential computing documentation](/azure/confidential-computing/)
72+
73+
## Related Articles
74+
75+
* [Azure managed disks overview](/azure/virtual-machines/managed-disks-overview)
76+
* [Managed disk migration guide](/azure/virtual-machines/linux/convert-unmanaged-to-managed-disks)

articles/expressroute/expressroute-howto-macsec.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Every ExpressRoute Direct instance consists of two physical ports. You can activ
149149
150150
MACsec is now enabled on the ExpressRoute Direct ports on Microsoft side. If you didn't configure it on your edge devices, you can proceed to configure them with the same MACsec secrets and cipher.
151151
152-
1. (Optional) To activate the ports that are in Administrative Down state, run the following commands:
152+
1. (Required for on-premises Cisco devices) Enable Secure Channel Identifier (SCI) on the ExpressRoute Direct ports. This setting is required when your on-premises device is a Cisco router connecting to the Azure Juniper MSEE. Without SCI enabled, traffic fails between both sides.
153153
154154
```azurepowershell-interactive
155155
$erDirect = Get-AzExpressRoutePort -ResourceGroupName "your_resource_group" -Name "your_direct_port_name"
@@ -159,6 +159,9 @@ Every ExpressRoute Direct instance consists of two physical ports. You can activ
159159
```
160160
161161
SCI is now enabled on the ExpressRoute Direct ports.
162+
163+
> [!IMPORTANT]
164+
> MACsec on ExpressRoute Direct is only supported on Juniper MSEE devices. If your ExpressRoute Direct resource is on a Cisco MSEE, you need to recreate the ExpressRoute Direct resource to land on a Juniper device. To verify your MSEE device type, check the ExpressRoute Direct resource in the Azure portal.
162165
163166
### How to disable MACsec
164167

articles/logic-apps/logic-apps-handle-large-messages.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to handle large messages in workflows with chunking and w
44
services: logic-apps
55
ms.suite: integration
66
ms.topic: how-to
7-
ms.date: 09/16/2025
7+
ms.date: 03/15/2026
88
#Customer intent: As an integration developer who works with Azure Logic Apps, I need to understand when and how to use chunking to support large messages.
99
---
1010

@@ -100,6 +100,13 @@ To reference the data, in the chunking action, use the expression `body('Compose
100100
"type": "ApiConnection"
101101
},
102102
```
103+
> [!NOTE]
104+
>
105+
> When an action has chunking enabled, the action's outputs contain only the `body` property. Other output properties such as `statusCode` and `headers` are unavailable.
106+
>
107+
> If you use tracked properties that reference unavailable properties, for example, `@action()['outputs']['statusCode']` or `@action()['outputs']['headers']`, the action fails with the error message, `TrackedPropertiesEvaluationFailed`. This error happens even when the underlying operation, such as a file download, successfully completes.
108+
>
109+
> To avoid this error, remove any references to unavailable properties from tracked properties in actions that use chunking to process large messages.
103110
104111
<a name="set-up-chunking"></a>
105112

articles/migrate/migrate-support-matrix-hyper-v.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,8 @@ Stack | VMware, Hyper-V, and physical servers. | VMware, Hyper-V, and physical s
296296
Windows servers | Windows Server 2008 R2 and later are supported. | Not supported.
297297
Linux servers | Not supported | Servers that meet the [requirements](/azure/migrate/migrate-support-matrix-hyper-v?view=migrate#hyper-v-host-requirements)
298298
Web server versions | IIS 7.5 and later | Tomcat 8 or later
299-
Required privileges | The least privileged user should be a part of the two user groups 1. Remote Management Users 2. IIS_IUSRS. The users must have read permissions to the following locations: C:\Windows\system32\inetsrv\config, C:\Windows\system32\inetsrv\config\applicationHost.config and C:\Windows\system32\inetsrv\config\redirection.config. | **Read (r)** and **Execute (x)** permissions recursively on all CATALINA_HOME directories.
299+
Protocol | WinRM port 5986 (HTTPS) by default, if HTTPS prerequisites aren't configured on the target servers, communication falls back to WinRM port 5985 (HTTP) | SSH port 22 (TCP)
300+
Required privileges | The least privileged user should be a part of the two user groups 1. Remote Management Users 2. IIS_IUSRS. The users must have read permissions to the following locations: C:\Windows\system32\inetsrv\config, C:\Windows\system32\inetsrv\config\applicationHost.config and C:\Windows\system32\inetsrv\config\redirection.config. Add the user to 'log on as batch job' using secpol.msc and ensure user is not part of 'deny log on as batch job'. | **Read (r)** and **Execute (x)** permissions recursively on all CATALINA_HOME directories.
300301

301302
> [!NOTE]
302303
> Data is always encrypted at rest and during transit.

0 commit comments

Comments
 (0)