Skip to content

Commit 9dffb30

Browse files
authored
Merge pull request #309005 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 7923168 + 3006c64 commit 9dffb30

3 files changed

Lines changed: 4 additions & 6 deletions

File tree

articles/expressroute/metro.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The following diagram allows for a comparison between the standard ExpressRoute
5252
| Madrid Metro | Equinix MD2<br>Digital Realty MAD1 | 1 | Spain Central | &check; | Colt<br>Equinix<br>Megaport<sup>1</sup> |
5353
| Milan Metro | Irideos Milan<br>Data4Italy Milan | 1 | Italy North | &check; | Equinix<br>Megaport<sup>1</sup> |
5454
| Singapore Metro | Global Switch Tai Seng<br>Equinix SG1 | 2 | Southeast Asia | &check; | Colt<br>Equinix<br>Megaport |
55-
| Taipei Metro | Chief Telecom<br>Chunghwa Telecom Co. Ltd | 2 | Taiwan North | &check; | |
55+
| Taipei Metro | Chief Telecom<br>Chunghwa Telecom Co. Ltd | 2 | Taiwan North | &check; | Chunghwa Telecom |
5656
| Zurich Metro | Digital Realty ZUR2<br>Equinix ZH5 | 1 | Switzerland North | &check; | Colt<br>Digital Realty |
5757
| Washington DC Metro | Equinix DC6<br>CoreSite VA3 | 1 | East US<br/>East US 2 | &check; | Equinix<sup>1</sup><br>Megaport<sup>1</sup> |
5858

articles/firewall/secured-hub-customer-public-ip.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,7 @@ ms.author: duau
1515

1616
Azure Firewall in Virtual WAN secured hubs now supports the use of customer-provided public IP addresses. This capability enables organizations to bring their own public IP addresses when deploying Azure Firewall in a secured Virtual WAN hub, providing greater flexibility and control over network infrastructure.
1717

18-
With this feature, instead of relying on Azure-managed public IP addresses, you can specify your own public IP addresses that are already allocated in your Azure subscription. This is valuable for organizations that need to maintain consistent IP addresses for compliance, security policies, or integration with third-party systems.
19-
20-
This capability is available only for new deployments of secured hub Azure Firewalls. For existing secured Virtual WAN hubs with Azure Firewall already deployed, you must delete the hub firewall and redeploy it during scheduled maintenance hours to take advantage of customer-provided public IP addresses.
18+
With this feature, instead of relying on Azure-managed public IP addresses, you can specify your own public IP addresses that are already allocated in your Azure subscription. This is particularly valuable for organizations that require consistent IP addresses for compliance, security policies, or integration with third-party systems.
2119

2220
You can configure this feature using either the Azure portal or Azure PowerShell.
2321

@@ -57,7 +55,7 @@ Before you can use customer-provided public IP addresses with secured hub Azure
5755
- **IP prefix (recommended)**: For better management, allocate your public IP addresses from a public IP address prefix pool.ided public IP address support in secured hubs
5856
description: Learn how to use customer-provided public IP addresses with Azure Firewall in secured Virtual WAN hubs for enhanced control and DDoS protection.
5957

60-
The capability is available to new as well as existing deployments of secured hub Firewalls.
58+
The capability is available for both new and existing deployments of secured hub Firewalls.
6159

6260
## Configure a new Secure Hub Azure Firewall with customer tenant public IP
6361

articles/operator-service-manager/helm-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -229,7 +229,7 @@ To ensure consistent and predictable deployments, we recommend the following for
229229
* Using latest can cause unexpected behavior because the actual image behind latest can change without notice.
230230
* In a cluster registry setup, if the tag value changes but the tag name stays the same, the cluster registry will not re-download the updated image.
231231
* This can lead to running outdated or inconsistent images.
232-
* Instead, alway Use immutable tags like `:1.4.2`
232+
* Instead, always use immutable tags like `:1.4.2`
233233
* Ensure every build produces a unique tag, do not overwrite existing tags.
234234

235235
These practices help prevent deployment issues and improve traceability, rollback safety, and security compliance.

0 commit comments

Comments
 (0)