Skip to content

Commit 9b9fb7f

Browse files
Merge pull request #307173 from MicrosoftDocs/main
Auto Publish – main to live - 2025-10-21 17:00 UTC
2 parents f6950f6 + cde4e9d commit 9b9fb7f

15 files changed

Lines changed: 50 additions & 22 deletions

File tree

articles/azure-functions/functions-bindings-mcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ To connect to the MCP server exposed by your function app, you need to provide a
9393

9494
<sup>1</sup> Newer protocol versions deprecated the Server-Sent Events transport. Unless your client specifically requires it, you should use the Streamable HTTP transport instead.
9595

96-
When hosted in Azure, the endpoints exposed by the extension also require the [system key](./function-keys-how-to.md) named `mcp_extension`. If it isn't provided in the `x-functions-key` HTTP header, your client receives a `401 Unauthorized` response. You can retrieve the key using any of the methods described in [Get your function access keys](./function-keys-how-to.md#get-your-function-access-keys). The following example shows how to get the key with the Azure CLI:
96+
When hosted in Azure, the endpoints exposed by the extension also require the [system key](./function-keys-how-to.md) named `mcp_extension`. If it isn't provided in the `x-functions-key` HTTP header or in the `code` query string parameter, your client receives a `401 Unauthorized` response. You can retrieve the key using any of the methods described in [Get your function access keys](./function-keys-how-to.md#get-your-function-access-keys). The following example shows how to get the key with the Azure CLI:
9797

9898
```azurecli
9999
az functionapp keys list --resource-group <RESOURCE_GROUP> --name <APP_NAME> --query systemKeys.mcp_extension --output tsv

articles/azure-maps/power-bi-visual-conversion.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,22 @@ ms.subservice: power-bi-visual
1414

1515
The Azure Maps visual is now Generally Available, providing a streamlined and intuitive experience for working with your data.
1616

17+
> [!IMPORTANT]
18+
> The **Bing Maps** visual is scheduled for deprecation, although the timeline hasn't yet been determined. Any Bing Maps visuals that are already included in your reports remain available.
19+
>
20+
> To ensure a smooth transition, upgrade to Azure Maps unless one of the following applies:
21+
>
22+
> * You have team members who need to access the report in China, Korea, or within government cloud environments.
23+
> * You're physically located in China or Korea, regardless of your home tenant's location.
24+
> * You're part of a government cloud, irrespective of your home tenant's location.
25+
>
26+
> We're actively working to expand Azure Maps support to currently unsupported regions. **If you and all report users are located within a supported region, we encourage you to begin using Azure Maps now**. This article provides guidance on how to transition to Azure Maps. For a list of supported regions, see [Azure Maps service geographic scope](geographic-scope.md).
27+
1728
## How to convert your existing Map and Filled map visuals
1829

1930
A conversion function is available in Power BI desktop to convert any existing Map and Filled map visuals to the new Azure Maps visual.
2031

21-
When opening a report with Map and Filled map visuals, you'll see the following dialog giving you the option to upgrade to the new Azure Maps visual:
32+
When opening a report with Map and Filled map visuals, you see the following dialog giving you the option to upgrade to the new Azure Maps visual:
2233

2334
:::image type="content" source="media/power-bi-visual/introducing-azure-map-visual.png" alt-text="Screenshot showing the option to upgrade maps to the Azure Maps visual.":::
2435

articles/communication-services/resources/troubleshooting/voice-video-calling/general-troubleshooting-strategies/includes/server-code-subcode.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ ms.subservice: calling
3131
| 10004 | 487 | Call was canceled on timeout, no callee endpoint accepted on time. Ensure that user saw the notification and try to initiate that call again. | ExpectedError | |
3232
| 10024 | 487 | Call ended successfully as it was declined by all callee endpoint. | Success | - Try to place the call again. |
3333
| 301005 | 410 | Participant was removed from the call by the Azure Communication Services infrastructure due to loss of media connectivity with Azure Communication Services infrastructure, this usually happens if participant leaves the call abruptly or looses network connectivity. If participant wants to continue the call, it should reconnect. | UnexpectedClientError | - Ensure that you're using the latest SDK in a supported environment.<br> |
34-
| 510403 | 403 | Call ended, as it has been marked as a spam and got blocked. | ExpectedError | - Ensure that your Communication Services token is valid and not expired.<br> - Ensure to pass in AlternateId in the call options.<br> |
34+
| 510403 | 403 | Call blocked:<br/> - No matching voice route found for the dialed number.<br/> - Alternate ID not supplied for the call.<br/> - Phone number not allowed by user's Session Border Controller (SBC).<br/> - Previously marked as spam and now blocked. | ExpectedError | For more information about Alternate ID, see [Manage calls](../../../../../how-tos/calling-sdk/manage-calls.md#place-a-call).<br/> - Confirm that you have a valid Voice Route for the dialed number.<br/> - Make sure that you specified a valid Alternate ID. It must be a phone number that belongs to the Resource you're using.<br/> - Verify that you own the Resource you're using to make a call.<br/> - For direct routing calls, verify why your Session Border Controller disallowed the call.<br/> - Ensure that your Communication Services token is valid and not expired. |
3535
| 540487 | 487 | Call ended successfully as caller canceled the call. | Success | |
3636
| 560000 | 0 | Call ended successfully by remote PSTN participant. | Success |Possible causes:<br> - User ended the call.<br> - Call was ended by media agent.<br> |
3737
| 560486 | 486 | Call ended because remote PSTN participant was busy. The number called was already in a call or having technical issues. | Success | - For Direct Routing calls, check your Session Border Control logs and settings and timeouts configuration.<br> Possible causes: <br> - The number called was already in a call or having technical issues.<br> |

articles/communication-services/resources/troubleshooting/voice-video-calling/includes/codes/call-end.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ There are different explanations for why a call ended. Here are the meanings of
7171
| 301004 | 410 | Participant was removed from the call by the Azure Communication Services infrastructure due to inability to establish media connectivity with Azure Communication Services infrastructure during call setup. Check user's network configuration, including local network, firewalls, VPNs configuration and try again. | UnexpectedClientError | Ensure that user's network is configured correctly, follow 'Network Recommendations' public documentation. |
7272
| 301005 | 410 | Participant removed from the call by the Azure Communication Services infrastructure due to loss of media connectivity with the same infrastructure. This usually happens if participant leaves the call abruptly or loses network connectivity. If the participant wants to continue the call, they can reconnect. | UnexpectedClientError | Ensure that you're using the latest SDK in a supported environment. |
7373
| 540000 | 0 | Call ended successfully by local PSTN caller. | Success | |
74-
| 510403 | 403 | Call ended, previously marked as a spam and now blocked. | ExpectedError | - Ensure that your Communication Services token is valid and not expired. <br /> - Ensure to pass in `AlternateId` in the call options. |
74+
| 510403 | 403 | Call blocked:<br/> - No matching voice route found for the dialed number.<br/> - Alternate ID not supplied for the call.<br/> - Phone number not allowed by users Session Border Controller (SBC).<br/> - Previously markes as spam and now blocked. | ExpectedError | For more information about Alternate ID, see [Manage calls](../../../../../how-tos/calling-sdk/manage-calls.md#place-a-call).<br/> - Confirm that you have a valid Voice Route for the dialed number.<br/> - Make sure that you specified a valid Alternate ID. It must be a phone number that belongs to the Resource you're using.<br/> - Verify that you own the Resource you're using to make a call.<br/> - For direct routing calls, verify why your Session Border Controller disallowed the call.<br/> - Ensure that your Communication Services token is valid and not expired. |
7575
| 540487 | 487 | Call ended successfully as caller canceled the call. | Success | |
7676
| 560000 | 0 | Call ended successfully by remote PSTN participant. | Success |Possible causes: <br /> - User ended the call. <br /> - Call ended by media agent. |
7777
| 560486 | 486 | Call ended because remote PSTN participant was busy. The number called was already in a call or having technical issues. | Success | - For Direct Routing calls, check your Session Border Control logs and settings and timeouts configuration. Possible causes: The number called was already in a call or having technical issues. |

articles/communication-services/resources/troubleshooting/voice-video-calling/includes/codes/pstn.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Response `ParticipantEndReason` with value 4xx means that the call didn't connec
4040

4141
| SubCode | Code | Message | Result Categories | Advice |
4242
|--- |--- |--- |--- |--- |
43-
| 510403 | 403 | Call blocked:<br/> - Alternate ID not supplied for the call.<br/> - Phone number not allowed by users Session Border Controller (SBC). | | - For more information about Alternate ID, see [Manage calls](../../../../../how-tos/calling-sdk/manage-calls.md#place-a-call).<br/> - Make sure that you specified a valid Alternate ID. It must be a phone number that belongs to the Resource you're using.<br/> - Verify that you own the Resource you're using to make a call.<br/> - For direct routing calls, verify why your Session Border Controller disallowed the call. |
43+
| 510403 | 403 | Call blocked:<br/> - No matching voice route found for the dialed number.<br/> - Alternate ID not supplied for the call.<br/> - Phone number not allowed by user's Session Border Controller (SBC).<br/> - Previously marked as spam and now blocked. | | For more information about Alternate ID, see [Manage calls](../../../../../how-tos/calling-sdk/manage-calls.md#place-a-call).<br/> - Confirm that you have a valid Voice Route for the dialed number.<br/> - Make sure that you specified a valid Alternate ID. It must be a phone number that belongs to the Resource you're using.<br/> - Verify that you own the Resource you're using to make a call.<br/> - For direct routing calls, verify why your Session Border Controller disallowed the call.<br/> - Ensure that your Communication Services token is valid and not expired. |
4444
| 560403 | 403 | - Call forbidden.<br/> - Call canceled.<br/> - Call rejected. | | Make sure that you called a valid phone number in the correct format. For more information about supported number formats, see <https://en.wikipedia.org/wiki/E.164>. |
4545
| 511532 | 403 | Resource SIP trunk configuration not found. | | Check your direct routing setup in the [Azure portal](https://portal.azure.com). For more information, see [Direct routing provisioning](../../../../../concepts/telephony/direct-routing-provisioning.md). |
4646
| 560404 | 404 | - Phone number not found.<br/> - Phone number not assigned to any target.<br/> - Phone number not allowed by Session Border Controller. | | - Make sure the phone number belongs to the Resource you're using and that you own the Resource.<br/> - Verify that the number you're calling exists, and is assigned to valid target. |

articles/deployment-environments/how-to-configure-extensibility-model-custom-image.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -504,6 +504,10 @@ In this configuration, ADE uses the Managed Identity for the PET, whether system
504504
> [!Tip]
505505
> This role assignment has to be made for every project environment type. It can be automated through the Azure CLI.
506506
507+
> [!Tip]
508+
> If your ACR uses Microsoft Entra attribute-based access control (ABAC) for repository permissions, you may need to make additional role assignments like `Container Registry Repository Reader` to the PET identity. For more information, see [Microsoft Entra ABAC for repository permissions](/azure/container-registry/container-registry-rbac-abac-repository-permissions).
509+
510+
507511
When you're ready to push your image to your registry, run the following command:
508512
509513
```docker
@@ -545,4 +549,4 @@ To learn more about how to create environment definitions that use the ADE conta
545549
- [ADE CLI variables reference](reference-deployment-environment-variables.md)
546550
::: zone pivot="pulumi"
547551
- [Pulumi's azure-deployment-environments repository](https://github.com/pulumi/azure-deployment-environments)
548-
::: zone-end
552+
::: zone-end

articles/expressroute/expressroute-about-virtual-network-gateways.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ When Auto-Assigned Public IP is enabled, the ExpressRoute gateway's Overview pag
9292

9393
**How it works:**
9494

95-
When you create an ExpressRoute gateway, Microsoft automatically provisions and manages the public IP address in a secure, backend subscription. This IP is encapsulated within the gateway resource, enabling Microsoft to enforce policies such as data rate limits and enhance auditability.
95+
When you create an ExpressRoute gateway, Microsoft automatically provisions and manages the public IP address in a secure, backend subscription. This IP is encapsulated within the gateway resource, enabling Microsoft to enforce policies such as data rate limits and enhance auditability. Previously it was possible to create the public IP resource as a zonal resource which ensured that all instances of the gateway in that zone shared the same public IP address. New behavior is that the gateway is always zone redundant.
9696

9797
**Availability:**
9898

articles/expressroute/expressroute-howto-add-gateway-portal-resource-manager.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,7 @@ The steps for this tutorial use the values in the following configuration refere
8080
| Minimum Scale Units | This option is only available when you select the **ErGwScale (Preview)** SKU. Enter the minimum number of scale units you want to use. For more information, see [ExpressRoute Gateway Scale Units](scalable-gateway.md). |
8181
| Maximum Scale Units | This option is only available when you select the **ErGwScale (Preview)** SKU. Enter the maximum number of scale units you want to use. For more information, see [ExpressRoute Gateway Scale Units](scalable-gateway.md). |
8282
| Virtual network | Select *vnet-1*. |
83-
| **Public IP address** | |
84-
| Assignment | By default, all ExpressRoute Gateways will have an [Auto-Assigned Public IP](expressroute-about-virtual-network-gateways.md#auto-assigned-public-ip). |
83+
| **Public IP address** | ExpressRoute Gateways now have an [Auto-Assigned Public IP](expressroute-about-virtual-network-gateways.md#auto-assigned-public-ip). This Public IP address is automatically assigned to the gateway during its creation, which means zonal gateways can no longer be created. |
8584

8685
> [!IMPORTANT]
8786
> If you plan to use IPv6-based private peering over ExpressRoute, please make sure to create your gateway with a Public IP address of type Standard, Static using the [PowerShell instructions](./expressroute-howto-add-gateway-resource-manager.md#add-a-gateway).

articles/expressroute/expressroute-howto-add-gateway-resource-manager.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,6 @@ The steps for this task use a VNet based on the values in the following configur
4141
| Gateway IP Name | *GWIP* |
4242
| Gateway IP configuration Name | *gwipconf* |
4343
| Type | *ExpressRoute* |
44-
| Gateway Public IP Name | *gwpip* |
45-
4644
## Add a gateway
4745

4846
> [!IMPORTANT]
@@ -106,7 +104,8 @@ The steps for this task use a VNet based on the values in the following configur
106104

107105
> [!NOTE]
108106
> Basic SKU public IP isn't supported with new ExpressRoute virtual network gateway.
109-
> Creating a public IP is no longer required, Microsoft will create and manage your public IP.
107+
> Creating a public IP is no longer required, [Microsoft will create and manage your public IP](expressroute-about-virtual-network-gateways.md#auto-assigned-public-ip). This means all ExpressRoute virtual network gateways are created as zone-redundant.
108+
110109

111110
1. Create the configuration for your gateway. The gateway configuration defines the subnet to use. In this step, you're specifying the configuration that will be used when you create the gateway. Use the following sample to create your gateway configuration.
112111

articles/iot-operations/connect-to-cloud/howto-configure-local-storage-endpoint.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -158,17 +158,17 @@ The only supported serialization format is Parquet.
158158

159159
## Use Azure Container Storage enabled by Azure Arc (ACSA)
160160

161-
You can use the local storage data flow endpoint together with [Azure Container Storage enabled by Azure Arc](/azure/azure-arc/container-storage/cloud-ingest-edge-volume-configuration) to store data locally or send data to a cloud destination.
161+
You can use the local storage data flow endpoint together with [Azure Container Storage enabled by Azure Arc](/azure/azure-arc/container-storage/howto-configure-cloud-ingest-subvolumes) to store data locally or send data to a cloud destination.
162162

163163
### Local shared volume
164164

165-
To write to a local shared volume, first create a PersistentVolumeClaim (PVC) according to the instructions from [Local Shared Edge Volumes](/azure/azure-arc/container-storage/local-shared-edge-volumes).
165+
To write to a local shared volume, first create a PersistentVolumeClaim (PVC) according to the instructions from [Local Shared Edge Volumes](/azure/azure-arc/container-storage/tutorial-create-local-shared-volume).
166166

167167
Then, when configuring your local storage data flow endpoint, input the PVC name under `persistentVolumeClaimRef`.
168168

169169
### Cloud ingest
170170

171-
To write your data to the cloud, follow the instructions in [Cloud Ingest Edge Volumes configuration](/azure/azure-arc/container-storage/cloud-ingest-edge-volume-configuration) to create a PVC and attach a subvolume for your desired cloud destination.
171+
To write your data to the cloud, follow the instructions in [Cloud Ingest Edge Volumes configuration](/azure/azure-arc/container-storage/howto-configure-cloud-ingest-subvolumes) to create a PVC and attach a subvolume for your desired cloud destination.
172172

173173
> [!IMPORTANT]
174174
> Don't forget to create the subvolume after creating the PVC, or else the data flow fails to start and the logs show a "read-only file system" error.

0 commit comments

Comments
 (0)