Skip to content

Commit 8295ff3

Browse files
Merge pull request #314775 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-15 17:00 UTC
2 parents ebcc954 + 5e9ce60 commit 8295ff3

7 files changed

Lines changed: 64 additions & 62 deletions

File tree

articles/expressroute/gateway-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ For detailed troubleshooting errors and best practices, see [Troubleshooting Gat
9696

9797
### How do I add a second prefix to the GatewaySubnet?
9898

99-
Adding multiple prefixes to the GatewaySubnet is currently in Public Preview and supported only via PowerShell. When you add an additional prefix, both prefixes will be used by the migrated gateway, so don't delete the old prefix. For instructions, see [Create multiple prefixes for a subnet](../virtual-network/how-to-multiple-prefixes-subnet.md).
99+
Adding multiple prefixes to the GatewaySubnet is available currently via command line (PowerShell, CLI) or Azure Resource Manager Templates. When you add an additional prefix, both prefixes will be used by the migrated gateway, so don't delete the old prefix. For instructions, see [Create multiple prefixes for a subnet](../virtual-network/how-to-multiple-prefixes-subnet.md).
100100

101101
### How do I monitor the health of the new gateway?
102102

articles/firewall/firewall-faq.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -359,6 +359,10 @@ sections:
359359
TCP ping is a unique use case where if there's no allowed rule, the Firewall itself responds to the client's TCP ping request even though the TCP ping doesn't reach the target IP address/FQDN. In this case, the event isn't logged. If there's a network rule that allows access to the target IP address/FQDN, then the ping request reaches the target server and its response is relayed back to the client. This event is logged in the Network rules log.
360360
361361
362+
- question: Why do TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but aren't observed in the Azure Firewall logs?
363+
answer: |
364+
Azure Firewall acts as a passive listener for ports 80, 443, and 1433. Azure Firewall doesn't log TCP SYN packets on these ports unless there's application traffic. The HTTP GET request and TLS client hello are logged in Azure Firewall.
365+
362366
- question: Are there limits for the number of IP addresses supported by IP Groups?
363367
answer: |
364368
Yes. For more information, see [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-firewall-limits)

articles/governance/policy/concepts/policy-for-kubernetes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -616,11 +616,11 @@ Patch CVE-2026-25679, CVE-2026-27142, CVE-2026-27139, and CVE-2026-32280.
616616
Security improvements.
617617
- Released: May 2026
618618
- Kubernetes: 1.36+
619-
- Gatekeeper: 3.22.0
619+
- Gatekeeper: 3.22.1
620620

621-
##### Gatekeeper 3.22.0
622-
Gatekeeper Release: https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.22.0
623-
Changes: https://github.com/open-policy-agent/gatekeeper/compare/v3.20.1...v3.22.0
621+
##### Gatekeeper 3.22.1
622+
Gatekeeper Release: https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.22.1
623+
Changes: https://github.com/open-policy-agent/gatekeeper/compare/v3.20.1...v3.22.1
624624

625625
#### 1.15.5
626626
Security improvements.

articles/nat-gateway/nat-overview.md

Lines changed: 42 additions & 52 deletions
Large diffs are not rendered by default.

articles/network-watcher/traffic-analytics-rule-impact-analyzer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
1111

1212
# Analyze security rules using Rule Impact Analyzer in Traffic Analytics (preview)
1313

14-
In this article, you learn how to use the rule impact analyzer feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin rule, and simulate the impact of your rule changes before deploying them.
14+
In this article, you learn how to use the rule impact analyzer feature with network groups in the traffic analytics blade of Network Watcher. You can use the Azure portal to create a security admin configuration, add a security admin rule, and simulate the impact of your rule changes before deploying them.
1515

1616
The rules impact analyzer enables you to preview the impact of security admin rules and network security group (NSG) rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that connectivity requirements are met without disrupting live traffic. By understanding the impact of your proposed rules changes, you can confidently plan changes, maintain compliance, and reduce the risk of misconfiguration across your virtual networks.
1717

articles/sentinel/datalake/gql-reference-for-sentinel-custom-graph.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -96,16 +96,18 @@ Path patterns describe multi-hop relationships in your graph:
9696
```gql
9797
(a)-[e1]->;(b)-[e2]->(c) -- 2-hop path
9898
(a)-[e]->;{2,4}(b) -- 2 to 4 hops
99-
(a)-[e]->{1,}(b) -- 1 or more hops
99+
(a)-[e]->{1,}(b) -- 1 to maximum of 8 hops
100100
(a)-[:knows|likes]->;{1,3}(b) -- 1-3 hops via knows/likes
101101
p=()-[:works_at]->() -- Binding a path variable
102102
```
103103

104104
**Variable-length paths:**
105105

106106
- `{2,4}`: Exactly 2 to 4 hops
107-
- `{1,}`: 1 or more hops (unbounded)
108-
- `{,3}`: Up to 3 hops
107+
- `{1,}`: 1 or more hops (unbounded). Unbounded path queries are limited to 8 hops.
108+
109+
- `{,5}`: Up to 5 hops
110+
109111
- `{5}`: Exactly 5 hops
110112

111113
### Path variables

articles/sentinel/datalake/sentinel-graph-provider-reference.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -883,7 +883,7 @@ Node builder after data source is set: configuration methods available.
883883
NodeBuilderSourceSet(alias: str, graph_builder: GraphSpecBuilder, source_step: DataInputETLStep)
884884
```
885885

886-
**Note:** Created internally by NodeBuilderInitial source methods.
886+
**Note:** Created internally by NodeBuilderInitial source methods.
887887

888888
#### Methods
889889

@@ -979,6 +979,8 @@ Configure columns with required key and display designation.
979979
- Time filter column is automatically added if specified
980980
- Property types are auto-inferred from source schema
981981

982+
- See **Restrictions**
983+
982984
**Example:**
983985
```python
984986
builder.add_node("user").from_table("Users") \
@@ -2483,6 +2485,10 @@ builder.add_node("user") \
24832485
.add_edge("follows")
24842486
```
24852487

2488+
### Restrictions
2489+
2490+
Builder support methods - add_node() and add_edge() does not allow use of underscores ('_') when naming nodes, edges or properties in a custom graph. Graph building operations will fail surfacing an invalid request error.
2491+
24862492
### Union Schemas
24872493

24882494
Multiple edges with the same alias are automatically union'ed with merged properties:

0 commit comments

Comments
 (0)