Skip to content

Commit 9667246

Browse files
Merge pull request #313614 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-24 17:00 UTC
2 parents c6e916f + 185a6ae commit 9667246

16 files changed

Lines changed: 197 additions & 118 deletions

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,12 +26,12 @@ ms.custom: sfi-image-nochange
2626

2727
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2828

29-
You can configure Azure Active Directory B2C (Azure AD B2C) so that a user who is signed in with a local account can change their password without using email verification to prove their identity.
29+
You can configure Azure Active Directory B2C (Azure AD B2C) to allow users who are signed in with a local account to change their password without using email verification to prove their identity.
3030

3131
The password change flow involves the following steps:
3232

3333
1. The user signs in to their local account. If the session is still active, Azure AD B2C authorizes the user and skips to the next step.
34-
1. In **Old password**, the user verifies their old password. In **New password**, they create and confirm their new password.
34+
1. In **Old password**, the user verifies their current password. In **New password**, they create and confirm their new password.
3535

3636
![Screenshot that shows two numbered dialogs for making a password change.](./media/add-password-change-policy/password-change-flow.png)
3737

articles/active-directory-b2c/add-profile-editing-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ If you haven't already done so, [register a web application in Azure Active Dire
4444

4545
## Create a profile editing user flow
4646

47-
If you want to enable users to edit their profile in your application, you use a profile editing user flow.
47+
To enable users to edit their profile in your application, use a profile editing user flow.
4848

4949
1. In the menu of the Azure AD B2C tenant overview page, select **User flows**, and then select **New user flow**.
5050
1. On the **Create a user flow** page, select the **Profile editing** user flow.

articles/azure-netapp-files/azure-netapp-files-resource-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The following table describes resource limits for the Flexible, Standard, Premiu
2424
| Resource | Default limit | Adjustable via support request |
2525
|----------------|---------------------|--------------------------------------|
2626
| [Regional capacity quota per subscription](regional-capacity-quota.md) | 25 TiB | Yes |
27-
| Number of NetApp accounts per Azure region per subscription | 10 | Yes |
27+
| Number of NetApp accounts per Azure region per subscription | 100 | Yes |
2828
| Number of capacity pools per NetApp account | 25 | Yes |
2929
| Number of volumes per subscription | 500 | Yes |
3030
| Number of volumes per capacity pool | 500 | Yes |

articles/iot-operations/reference/observability-metrics-opcua-broker.md

Lines changed: 80 additions & 42 deletions
Large diffs are not rendered by default.

articles/migrate/tutorial-discover-vmware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Refer [this article](prepare-azure-accounts.md) to prepare Azure accounts.
5454
> Ensure the Azure user account has the required Azure Migrate built-in roles to create projects, register appliances, and access discovery results. To understand the minimum role requirements, see [Azure Migrate built‑in roles](prepare-azure-accounts.md).
5555
5656
## Prepare VMware
57-
You can skip this step if you are discovering VMs from your Azure VMware Solution environment. You should be able to use your AVS cloudadmin account to discover and assess servers.
57+
You can skip this step if you are discovering VMs from your Azure VMware Solution environment. You should be able to use your [AVS cloudadmin account](/azure/azure-vmware/architecture-identity#vcenter-server-access-and-identity) to discover and assess servers.
5858

5959
On your on-premises vCenter Server, check that your account has [permissions](migrate-support-matrix-vmware-migration.md#vmware-vsphere-requirements-agentless) to create a VM by using a VMware Open Virtualization Appliance (OVA) virtual machine (VM) installation file. You must have these [permissions](migrate-support-matrix-vmware-migration.md#vmware-vsphere-requirements-agentless) when you deploy the Azure Migrate appliance as a VMware VM by using an OVA file.
6060

articles/migrate/tutorial-migrate-vmware-agent.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: vmware-scenario-422, MVC, engagement-fy25
1414

1515
# Migrate VMware vSphere VMs to Azure (agent-based)
1616

17-
This article shows you how to migrate on-premises VMware vSphere VMs to Azure, using the [Migration and modernization](migrate-services-overview.md) tool, with agent-based migration. You can also migrate VMware vSphere VMs using agentless migration (Recommended). [Compare](server-migrate-overview.md) the methods.
17+
This article shows you how to migrate on-premises VMware vSphere or Azure VMware Solution VMs to Azure, using the [Migration and modernization](migrate-services-overview.md) tool, with agent-based migration. You can also migrate VMware vSphere VMs using agentless migration (Recommended). [Compare](server-migrate-overview.md) the methods.
1818

1919
In this tutorial, you learn how to:
2020
> [!div class="checklist"]
@@ -76,7 +76,7 @@ If you are following the least privilege principle, assign the **Application Dev
7676
7777
### Set up an Azure network
7878

79-
[Set up an Azure network](/azure/virtual-network/manage-virtual-network). On-premises machines are replicated to Azure Managed Disks. When you fail over to Azure for migration, Azure VMs are created from these managed disks, and joined to the Azure network you set up.
79+
[Set up an Azure network](/azure/virtual-network/manage-virtual-network). Source (on-premises or Azure VMware Solution) machines are replicated to Azure Managed Disks. When you fail over to Azure for migration, Azure VMs are created from these managed disks, and joined to the Azure network you set up.
8080

8181

8282
## Prepare for migration
@@ -128,7 +128,7 @@ Make sure VMware vSphere VMs comply with requirements for migration to Azure.
128128

129129
1. [Verify](migrate-support-matrix-vmware-migration.md#vmware-vsphere-requirements-agent-based) VMware vSphere VM requirements.
130130
2. [Verify](migrate-support-matrix-vmware-migration.md#vm-requirements-agent-based) VM requirements for migration.
131-
3. Verify Azure settings. On-premises VMs you replicate to Azure must comply with [Azure VM requirements](migrate-support-matrix-vmware-migration.md#azure-vm-requirements).
131+
3. Verify Azure settings. Source VMs (on-premises or Azure VMware Solution VMs) you replicate to Azure must comply with [Azure VM requirements](migrate-support-matrix-vmware-migration.md#azure-vm-requirements).
132132
4. There are some changes needed on VMs before you migrate them to Azure.
133133
- It's important to make these changes before you begin migration. If you migrate the VM before you make the change, the VM might not boot up in Azure.
134134
- Review [Windows](prepare-for-migration.md#windows-machines) and [Linux](prepare-for-migration.md#linux-machines) changes you need to make.
@@ -308,15 +308,15 @@ The new simplified process follows a streamlined flow that begins with discovery
308308

309309
Replication occurs as follows:
310310
- When the Start Replication job finishes successfully, the machines begin their initial replication to Azure.
311-
- After initial replication finishes, delta replication begins. Incremental changes to on-premises disks are periodically replicated to the replica disks in Azure.
311+
- After initial replication finishes, delta replication begins. Incremental changes to source disks (on-premises or AVS disks) are periodically replicated to the replica disks in Azure.
312312

313313

314314
## Run a test migration
315315

316316

317317
When delta replication begins, you can run a test migration for the VMs, before running a full migration to Azure. We highly recommend that you do this at least once for each machine, before you migrate it.
318318

319-
- Running a test migration checks that migration will work as expected, without impacting the on-premises machines, which remain operational, and continue replicating.
319+
- Running a test migration checks that migration will work as expected, without impacting the source machines (on-premises or AVS machines), which remain operational, and continue replicating.
320320
- Test migration simulates the migration by creating an Azure VM using replicated data (usually migrating to a non-production VNet in your Azure subscription).
321321
- You can use the replicated test Azure VM to validate the migration, perform app testing, and address any issues before full migration.
322322

@@ -339,36 +339,36 @@ Do a test migration as follows:
339339
340340
## Migrate VMs
341341

342-
After you've verified that the test migration works as expected, you can migrate the on-premises machines.
342+
After you've verified that the test migration works as expected, you can migrate the source machine (on-premises or AVS).
343343

344344
1. In the Azure Migrate project > **Servers, databases and web apps** > **Migration and modernization**, select **Replicating servers**.
345345
2. In **Replicating machines**, right-click the VM > **Migrate**.
346346
3. In **Migrate** > **Shut down virtual machines and perform a planned migration with no data loss**, select **Yes** > **OK**.
347-
- By default Azure Migrate shuts down the on-premises VM to ensure minimum data loss.
347+
- By default Azure Migrate shuts down the source VM (on-premises or AVS) to ensure minimum data loss.
348348
- If you don't want to shut down the VM, select **No**
349349
4. A migration job starts for the VM. Track the job in Azure notifications.
350350
5. After the job finishes, you can view and manage the VM from the **Virtual Machines** page.
351351

352352
## Complete the migration
353353

354354
1. After the migration is done, right-click the VM > **Stop replication**. This does the following:
355-
- Stops replication for the on-premises machine.
355+
- Stops replication for the source machine (on-premises or AVS).
356356
- Removes the machine from the **Replicating servers** count in the Migration and modernization tool.
357357
- Cleans up replication state information for the VM.
358358
1. Verify and [troubleshoot any Windows activation issues on the Azure VM.](/troubleshoot/azure/virtual-machines/troubleshoot-activation-problems)
359359
1. Perform any post-migration app tweaks, such as host names, updating database connection strings, and web server configurations.
360360
1. Perform final application and migration acceptance testing on the migrated application now running in Azure.
361361
1. Cut over traffic to the migrated Azure VM instance.
362-
1. Remove the on-premises VMs from your local VM inventory.
363-
1. Remove the on-premises VMs from local backups.
362+
1. Remove the source (on-premises or AVS) VMs from your local VM inventory.
363+
1. Remove the source (on-premises or AVS) VMs from local backups.
364364
1. Update any internal documentation to show the new location and IP address of the Azure VMs.
365365

366366
## Post-migration best practices
367367

368-
- On-premises
368+
- On-premises or on Azure VMware Solution
369369
- Move app traffic over to the app running on the migrated Azure VM instance.
370-
- Remove the on-premises VMs from your local VM inventory.
371-
- Remove the on-premises VMs from local backups.
370+
- Remove the source VMs (on-premises or AVS) from your local VM inventory.
371+
- Remove the source VMs (on-premises or AVS) from local backups.
372372
- Update any internal documentation to show the new location and IP address of the Azure VMs.
373373
- Tweak Azure VM settings after migration:
374374
- The [Azure VM agent](/azure/virtual-machines/extensions/agent-windows) manages VM interaction with the Azure Fabric Controller. It's required for some Azure services, such as Azure Backup, Site Recovery, and Azure Security. When migrating VMware VMs with agent-based migration, the Mobility Service installer installs Azure VM agent on Windows machines. On Linux VMs, we recommend that you install the agent after migration.

articles/network-watcher/vnet-flow-logs-filtering.md

Lines changed: 36 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-network-watcher
88
ms.topic: how-to
9-
ms.date: 12/26/2025
9+
ms.date: 03/24/2026
1010
---
1111

1212
# Filter virtual network flow logs (preview)
@@ -93,10 +93,33 @@ Set-AzNetworkWatcherFlowLog -Enabled $true -Name 'myVNetFlowLog' -NetworkWatcher
9393
-EnableTrafficAnalytics -TrafficAnalyticsWorkspaceId $workspace.ResourceId `
9494
-EnableRetention $true -RetentionPolicyDays 15
9595
```
96+
## Filtering based on RecordTypes
9697

97-
## Update RecordTypes filtering condition
98+
You can filter virtual network flow logs based on the state of a network flow. Flow state represents the lifecycle stage of a connection as observed by Network Watcher, such as when a flow begins, continues, ends, or is denied.
9899

99-
You can enable RecordTypes filtering during flow log creation by choosing which flow record formats to collect in order to tailor logging output without generating unnecessary data.
100+
Use the RecordTypes parameter to specify which flow states you want to record. The parameter accepts one or more comma‑separated values.
101+
102+
### Supported RecordType Values
103+
104+
| Value | Description |
105+
|-------|-------------|
106+
| B | Begin: when a flow is created. No statistics are provided. |
107+
| C | Continuing: an ongoing flow. Statistics are provided at five-minute intervals. |
108+
| E | End: when a flow is terminated. Statistics are provided. |
109+
| D | Deny: when a flow is denied. |
110+
111+
### Example scenarios using RecordTypes
112+
113+
| Scenario | RecordTypes value |
114+
|----------|-------------------|
115+
| Capture only denied traffic | "D" |
116+
| Capture flow creation and termination events | "B,E" |
117+
| Capture only active traffic statistics | "C" |
118+
| Capture full flow lifecycle | "B,C,E" |
119+
120+
## Manage RecordTypes filtering condition
121+
122+
You can enable RecordTypes filtering during flow log creation by choosing which flow record formats to collect in order to tailor logging output without generating unnecessary data. You can also update RecordTypes filterning condition for an existing flow log.
100123

101124
```azurepowershell-interactive
102125
# Enable RecordTypes filtering while creating flowlog
@@ -110,37 +133,37 @@ New-AzNetworkWatcherFlowLog `
110133
```
111134

112135
```azurepowershell-interactive
113-
# Update RecordTypes filtering condition on existing flow log
114-
Set-AzNetworkWatcherFlowLog `
115-
-Enabled $true -Name <FlowLog Name> `
136+
# Enable RecordTypes and EnabledFilteringCriteria filtering while creating flow log
137+
New-AzNetworkWatcherFlowLog `
138+
-Enabled $true -Name <FlowLog Name> `
116139
-NetworkWatcherName <Network Watcher Name> `
117140
-ResourceGroupName <Resource Group Name> `
118141
-StorageId <Storage Account ID> `
119142
-TargetResourceId <Target Resource/VNet ID> `
143+
-EnabledFilteringCriteria "<Filtering Criteria Expression>" `
120144
-RecordTypes "<Record Types>"
121145
```
122146

123147
```azurepowershell-interactive
124-
# Remove RecordTypes filtering condition from existing flow log
148+
# Update RecordTypes filtering condition on existing flow log
125149
Set-AzNetworkWatcherFlowLog `
126150
-Enabled $true -Name <FlowLog Name> `
127151
-NetworkWatcherName <Network Watcher Name> `
128152
-ResourceGroupName <Resource Group Name> `
129153
-StorageId <Storage Account ID> `
130154
-TargetResourceId <Target Resource/VNet ID> `
131-
-RecordTypes ""
155+
-RecordTypes "<Record Types>"
132156
```
133157

134158
```azurepowershell-interactive
135-
# Enable RecordTypes and EnabledFilteringCriteria filtering while creating flow log
136-
New-AzNetworkWatcherFlowLog `
137-
-Enabled $true -Name <FlowLog Name> `
159+
# Remove RecordTypes filtering condition from existing flow log
160+
Set-AzNetworkWatcherFlowLog `
161+
-Enabled $true -Name <FlowLog Name> `
138162
-NetworkWatcherName <Network Watcher Name> `
139163
-ResourceGroupName <Resource Group Name> `
140164
-StorageId <Storage Account ID> `
141165
-TargetResourceId <Target Resource/VNet ID> `
142-
-EnabledFilteringCriteria "<Filtering Criteria Expression>" `
143-
-RecordTypes "<Record Types>"
166+
-RecordTypes ""
144167
```
145168

146169
## Related content

articles/service-connector/how-to-use-service-connector-in-aks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ Refer to [extension creation errors](/troubleshoot/azure/azure-kubernetes/extens
269269

270270
This error is caused by connectivity problems that occur between the cluster and the firewall in addition to egress blocking problems.
271271
To resolve this problem, see [Outbound network and FQDN rules for Azure Kubernetes Service (AKS) clusters](/azure/aks/outbound-rules-control-egress),
272-
and add the FQDN required to pull Service Connector Helm chart: `scaksextension.azurecr.io`
272+
and add the FQDN required to pull Service Connector Helm chart: `mcr.microsoft.com`
273273

274274
**Error messages:**
275275

articles/storage/blobs/storage-blob-change-feed.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -650,7 +650,7 @@ The following example shows a change event record in JSON format that uses event
650650

651651
```
652652

653-
<a id="conditions"></a>
653+
- <a id="conditions"></a>If event publishing remains blocked for over six months due to customer configuration errors (such as `KeyVaultNotFound` or authentication failures), the events are automatically deleted and garbage‑collected.
654654

655655
## Conditions and known issues
656656

articles/storage/file-sync/file-sync-monitoring.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -98,14 +98,14 @@ The following metric charts are viewable in the Storage Sync Service portal:
9898
| Agent Version Expiration Information | Number of days until the agent version expires | Storage Sync Service - Metrics |
9999
| Bytes synced | Size of data transferred (upload and download) | Sync Group - Status, Server endpoint - Sync status, Storage Sync Service - Metrics |
100100
| Cache data size by last access time | Size of data by last access time | Server Endpoint - Cloud Tiering Status, Storage Sync Service - Metrics |
101-
| Cloud tiering cache hit rate | Percentage of bytes that have been served from the cache vs. recalled from the cloud | Sync Group - Status, Server Endpoint - Cloud Tiering Status, Storage Sync Service - Metrics |
101+
| Cloud tiering cache hit rate | Percentage of bytes that have been served from the cache vs. recalled from the cloud. This metric is generated only when there is active I/O (such as file reads or recalls) on the server endpoint. | Sync Group - Status, Server Endpoint - Cloud Tiering Status, Storage Sync Service - Metrics |
102102
| Cloud tiering low disk space mode | Status of disk space on server | Storage Sync Service - Metrics |
103-
| Cloud tiering recall success rate | Success status of cloud tiering recall | Storage Sync Service - Metrics |
103+
| Cloud tiering recall success rate | Success status of cloud tiering recall. This metric is generated only when there is active I/O (such as file reads or recalls) on the server endpoint. | Storage Sync Service - Metrics |
104104
| Cloud tiering size of data tiered | Size of data tiered | Storage Sync Service - Metrics |
105105
| Cloud tiering size of data tiered by last maintenance job | Size of data tiered during last maintenance job. | Storage Sync Service - Metrics |
106106
| Cloud tiering recall size | Size of data recalled | Sync Group – Status, Registered Servers, Storage Sync Service - Metrics |
107-
| Cloud tiering recall size by application | Size of data recalled by application | Server Endpoint - Cloud Tiering Status, Storage Sync Service - Metrics |
108-
| Cloud tiering recall throughput | Throughput of data recalled | Storage Sync Service - Metrics |
107+
| Cloud tiering recall size by application | Size of data recalled by application. This metric is generated only when there is active I/O (such as file reads or recalls) on the server endpoint. | Server Endpoint - Cloud Tiering Status, Storage Sync Service - Metrics |
108+
| Cloud tiering recall throughput | Throughput of data recalled. This metric is generated only when there is active I/O (such as file reads or recalls) on the server endpoint. | Storage Sync Service - Metrics |
109109
| Egress Breakdown | Egress breakdown by user recalls of tiered files, background recalls, and sync downloads | Server Endpoint - Cloud Tiering Status |
110110
| Files synced | Count of files transferred (upload and download) | Sync Group - Status, Server endpoint - Sync status, Storage Sync Service - Metrics |
111111
| Files not syncing | Count of files that are failing to sync | Sync Group - Status, Server endpoint - Sync status, Storage Sync Service - Metrics |

0 commit comments

Comments
 (0)