Skip to content

Commit a0ed607

Browse files
Merge pull request #304400 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-19 17:00 UTC
2 parents 2acf5d6 + 89f9e16 commit a0ed607

322 files changed

Lines changed: 2139 additions & 1913 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6429,6 +6429,31 @@
64296429
"redirect_url": "/azure/managed-grafana/how-to-service-accounts",
64306430
"redirect_document_id": false
64316431
},
6432+
{
6433+
"source_path_from_root": "/articles/service-connector/quickstart-cli-spring-cloud-connection.md",
6434+
"redirect_url": "/azure/service-connector/quickstart-portal-spring-cloud-connection",
6435+
"redirect_document_id": false
6436+
},
6437+
{
6438+
"source_path_from_root": "/articles/service-connector/quickstart-cli-app-service-connection.md",
6439+
"redirect_url": "/azure/service-connector/quickstart-portal-app-service-connection",
6440+
"redirect_document_id": false
6441+
},
6442+
{
6443+
"source_path_from_root": "/articles/service-connector/quickstart-cli-aks-connection.md",
6444+
"redirect_url": "/azure/service-connector/quickstart-portal-aks-connection",
6445+
"redirect_document_id": false
6446+
},
6447+
{
6448+
"source_path_from_root": "/articles/service-connector/quickstart-cli-container-apps.md",
6449+
"redirect_url": "/azure/service-connector/quickstart-portal-container-apps",
6450+
"redirect_document_id": false
6451+
},
6452+
{
6453+
"source_path_from_root": "/articles/service-connector/quickstart-cli-functions-connection.md",
6454+
"redirect_url": "/azure/service-connector/quickstart-portal-functions-connection",
6455+
"redirect_document_id": false
6456+
},
64326457
{
64336458
"source_path_from_root": "/articles/load-balancer/move-across-regions-external-load-balancer-portal.md",
64346459
"redirect_url": "/azure/load-balancer/move-across-regions-azure-load-balancer",

articles/app-service/configure-language-java-data-sources.md

Lines changed: 19 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -201,47 +201,46 @@ You can't directly modify a Tomcat installation for server-wide configuration be
201201

202202
#### Add a startup file
203203

204-
Create a file named `startup.cmd` `%HOME%\site\wwwroot` directory. This file runs automatically before the Tomcat server starts. The file should have the following content:
204+
Create a file named `startup.cmd` in the `%HOME%\site\wwwroot` directory. This file runs automatically before the Tomcat server starts. The file should have the following content:
205205

206206
```dos
207-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -File %HOME%\site\configure.ps1
207+
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -File %HOME%\site\configure.ps1 > %HOME%\site\configure.log
208208
```
209209

210210
#### Add the PowerShell configuration script
211211

212-
Next, add the configuration script called *configure.ps1* to the *%HOME%_\site* directory with the following code:
212+
Next, add the configuration script called `configure.ps1` to the `%HOME%\site` directory with the following code:
213213

214214
```powershell
215215
# Locations of xml and xsl files
216-
$target_xml="$Env:LOCAL_EXPANDED\tomcat\conf\server.xml"
217-
$target_xsl="$Env:HOME\site\server.xsl"
216+
$source_xml = "$Env:AZURE_TOMCAT90_HOME\conf\server.xml"
217+
$target_xml = "$Env:LOCAL_EXPANDED\tomcat\conf\server.xml"
218+
$target_xsl = "$Env:HOME\site\server.xsl"
219+
$marker_file = "$Env:HOME\site\config_done_marker"
218220
219221
# Define the transform function
220222
# Useful if transforming multiple files
221-
function TransformXML{
223+
function TransformXML {
222224
param ($xml, $xsl, $output)
223225
224-
if (-not $xml -or -not $xsl -or -not $output)
225-
{
226+
if (-not $xml -or -not $xsl -or -not $output) {
226227
return 0
227228
}
228229
229-
Try
230-
{
230+
Try {
231231
$xslt_settings = New-Object System.Xml.Xsl.XsltSettings;
232232
$XmlUrlResolver = New-Object System.Xml.XmlUrlResolver;
233233
$xslt_settings.EnableScript = 1;
234234
235235
$xslt = New-Object System.Xml.Xsl.XslCompiledTransform;
236-
$xslt.Load($xsl,$xslt_settings,$XmlUrlResolver);
236+
$xslt.Load($xsl, $xslt_settings, $XmlUrlResolver);
237237
$xslt.Transform($xml, $output);
238238
}
239239
240-
Catch
241-
{
240+
Catch {
242241
$ErrorMessage = $_.Exception.Message
243242
$FailedItem = $_.Exception.ItemName
244-
echo 'Error'$ErrorMessage':'$FailedItem':' $_.Exception;
243+
Write-Error 'Error'$ErrorMessage':'$FailedItem':' $_.Exception;
245244
return 0
246245
}
247246
return 1
@@ -250,29 +249,27 @@ function TransformXML{
250249
# Start here
251250
252251
# Check for marker file indicating that config has already been done
253-
if(Test-Path "$Env:LOCAL_EXPANDED\tomcat\config_done_marker"){
252+
if (Test-Path "$marker_file") {
254253
return 0
255254
}
256255
257256
# Delete previous Tomcat directory if it exists
258257
# In case previous config isn't completed or a new config should be forcefully installed
259-
if(Test-Path "$Env:LOCAL_EXPANDED\tomcat"){
260-
Remove-Item "$Env:LOCAL_EXPANDED\tomcat" Recurse
258+
if (Test-Path "$Env:LOCAL_EXPANDED\tomcat") {
259+
Remove-Item -Path "$Env:LOCAL_EXPANDED\tomcat" -Recurse -Force
261260
}
262261
263-
md -Path "$Env:LOCAL_EXPANDED\tomcat"
264-
265262
# Copy Tomcat to local
266263
# Using the environment variable $AZURE_TOMCAT90_HOME uses the 'default' version of Tomcat
267264
New-Item "$Env:LOCAL_EXPANDED\tomcat" -ItemType Directory
268265
Copy-Item -Path "$Env:AZURE_TOMCAT90_HOME\*" "$Env:LOCAL_EXPANDED\tomcat" -Recurse
269266
270267
# Perform the required customization of Tomcat
271-
$success = TransformXML -xml $target_xml -xsl $target_xsl -output $target_xml
268+
$success = TransformXML -xml $source_xml -xsl $target_xsl -output $target_xml
272269
273270
# Mark that the operation was a success if successful
274-
if($success){
275-
New-Item -Path "$Env:LOCAL_EXPANDED\tomcat\config_done_marker" -ItemType File
271+
if ($success) {
272+
New-Item -Path "$marker_file" -ItemType File
276273
}
277274
```
278275

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: application-gateway
66
author: mbender-ms
77
ms.service: azure-application-gateway
88
ms.topic: how-to
9-
ms.date: 8/11/2025
9+
ms.date: 8/19/2025
1010
ms.author: mbender
1111
#Customer intent: As an administrator, I want to evaluate Azure Private Application Gateway
1212
# Customer intent: "As a cloud administrator, I want to configure a Private Application Gateway with enhanced network controls, so that I can improve security and restrict data egress while managing inbound and outbound traffic effectively."
@@ -35,7 +35,7 @@ Each of these features can be configured independently. For example, a public IP
3535

3636
## Onboard to the feature
3737

38-
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are generally available and supported in production. To join enable the feature, you must opt in to the experience using the Azure portal, PowerShell, CLI, or REST API.
38+
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are generally available and supported in production. To use the features, you must opt in to the experience using the Azure portal, PowerShell, CLI, or REST API.
3939

4040
When enrolled, all new Application Gateways provision with the ability to define any combination of the NSG, Route Table, or private IP configuration features. If you wish to opt out from the new functionality, you can do so by [unregistering from the feature](#unregister-the-feature).
4141

articles/azure-netapp-files/manage-file-access-logs.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: references_regions
1111
# Customer intent: As a storage administrator, I want to enable file access logs on Azure NetApp Files volumes so that I can monitor file access operations and troubleshoot access issues effectively.
1212
---
1313

14-
# Manage file access logs in Azure NetApp Files (preview)
14+
# Manage file access logs in Azure NetApp Files
1515

1616
File access logs provide file access logging for individual volumes, capturing file system operations on selected volumes. The logs capture [standard file operation](#recognized-events). File access logs provide insights beyond the platform logging captured in the [Azure Activity Log](/azure/azure-monitor/essentials/activity-log).
1717

@@ -75,10 +75,10 @@ The events capture in file access logs depend on the protocol of your volume.
7575
* Set attribute
7676
* Unlink
7777
* Write
78-
78+
<!--
7979
## Register the feature
8080
81-
The file access logs feature is currently in preview. If you're using this feature for the first time, you need to register the feature first.
81+
If you're using file access logs for the first time, you need to register the feature.
8282
8383
1. Register the feature:
8484
@@ -96,7 +96,7 @@ The file access logs feature is currently in preview. If you're using this featu
9696
```
9797
9898
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
99-
99+
-->
100100
## Supported regions
101101

102102
Availability for file access log is limited to the following regions:

articles/azure-netapp-files/whats-new.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,21 @@ ms.custom:
88
- linux-related-content
99
- build-2025
1010
ms.topic: overview
11-
ms.date: 08/14/2025
11+
ms.date: 08/18/2025
1212
ms.author: anfdocs
1313
# Customer intent: As a cloud administrator, I want to learn about the latest enhancements in Azure NetApp Files, so that I can effectively utilize new features for improved data security, resilience, and operational efficiency in my organization's cloud storage solutions.
1414
---
1515

1616
# What's new in Azure NetApp Files
1717

1818
Azure NetApp Files is updated regularly. This article provides a summary about the latest new features and enhancements.
19-
19+
2020
## August 2025
2121

22+
* [File access logs](manage-file-access-logs.md) is now generally available (GA)
23+
24+
File access logs provide enterprise-grade visibility into file-level operations across SMB3, NFSv4.1, and dual-protocol volumes. This capability enhances security, reliability, and operational insight by capturing detailed access activity—including user identity, operation type, and timestamps. Organizations can use file access logs to monitor access patterns, detect unauthorized activity, support compliance investigations, and optimize data usage. By integrating this feature, you strengthen your security posture and align with the Well-Architected Framework's best practices for operational excellence.
25+
2226
* [Flexible service level](manage-cool-access.md?tabs=flexible#register-the-feature) now supports storage with cool access (Preview)
2327

2428
Azure NetApp Files now supports cool access for the Flexible service level, enabling you to further optimize performance and cost by automatically tiering infrequently accessed data to lower-cost Azure storage accounts. This enhancement builds on the Flexible service level's ability to decouple storage capacity and throughput, allowing precise resource alignment for diverse workloads while maintaining configured throughput levels—even with cool access enabled. These features help organizations reduce total cost of ownership without compromising performance. You must be registered for the [Flexible service level](azure-netapp-files-set-up-capacity-pool.md) before enrolling in [the preview for the Flexible service level with cool access](manage-cool-access.md#register-the-feature).

articles/azure-resource-manager/bicep/deploy-cloud-shell.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,21 @@ title: Deploy Bicep files with Cloud Shell
33
description: Use Azure Resource Manager and Azure Cloud Shell to deploy resources to Azure. The resources are defined in a Bicep file.
44
ms.topic: how-to
55
ms.custom: devx-track-bicep, devx-track-arm-template
6-
ms.date: 04/28/2025
6+
ms.date: 08/15/2025
77
---
88

99
# Deploy Bicep files from Azure Cloud Shell
1010

11-
You can use [Azure Cloud Shell](../../cloud-shell/overview.md) to deploy a Bicep file. Currently you can only deploy a local Bicep file from the Cloud Shell.
11+
You can use [Azure Cloud Shell](../../cloud-shell/overview.md) to deploy a Bicep file. Currently you can only deploy a local Bicep file from the Cloud Shell.
1212

1313
You can deploy to any scope. This article shows deploying to a resource group.
1414

15+
In this article, you'll learn how to:
16+
17+
- Upload a Bicep file to Cloud Shell
18+
- Deploy the file using Azure CLI or PowerShell
19+
- Verify your deployment was successful
20+
1521
## Deploy local Bicep file
1622

1723
To deploy a local Bicep file, you must first upload your Bicep file to your Cloud Shell session.
@@ -26,7 +32,7 @@ To deploy a local Bicep file, you must first upload your Bicep file to your Clou
2632
:::image type="content" source="./media/deploy-cloud-shell/bicep-cloud-shell-upload.png" alt-text="Upload file":::
2733

2834
1. Select the Bicep file you want to upload, and then select **Open**.
29-
1. To deploy the Bicep file, use the following commands:
35+
1. To deploy the Bicep file, use the following commands. These commands create a resource group and deploy your Bicep template to it:
3036

3137
### [Azure CLI](#tab/azure-cli)
3238

@@ -53,5 +59,8 @@ To deploy a local Bicep file, you must first upload your Bicep file to your Clou
5359

5460
## Next steps
5561

56-
- For more information about deployment commands, see [Deploy resources with Bicep and Azure CLI](deploy-cli.md) and [Deploy resources with Bicep and Azure PowerShell](deploy-powershell.md).
57-
- To preview changes before deploying a Bicep file, see [Bicep deployment what-if operation](./deploy-what-if.md).
62+
Now that you've learned to deploy Bicep files from Cloud Shell, explore these related topics:
63+
64+
- **Learn advanced deployment techniques**: [Deploy resources with Bicep and Azure CLI](deploy-cli.md) and [Deploy resources with Bicep and Azure PowerShell](deploy-powershell.md)
65+
- **Preview changes before deployment**: [Bicep deployment what-if operation](./deploy-what-if.md)
66+
- **Troubleshoot deployment issues**: Review common deployment errors and solutions

articles/azure-resource-manager/bicep/deploy-to-tenant.md

Lines changed: 28 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,41 +10,44 @@ ms.date: 02/10/2025
1010

1111
As your organization matures, you may need to define and assign [policies](../../governance/policy/overview.md) or [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md) across your Microsoft Entra tenant. With tenant level templates, you can declaratively apply policies and assign roles at a global level.
1212

13-
### Training resources
13+
**What you'll learn:**
1414

15-
If you would rather learn about deployment scopes through step-by-step guidance, see [Deploy resources to subscriptions, management groups, and tenants by using Bicep](/training/modules/deploy-resources-scopes-bicep/).
15+
- How to deploy resources at the tenant scope
16+
- Required permissions and setup steps
17+
- Deployment commands for tenant-level resources
18+
- Examples for creating management groups and role assignments
1619

1720
## Supported resources
1821

1922
Not all resource types can be deployed to the tenant level. This section lists which resource types are supported.
2023

2124
For Azure role-based access control (Azure RBAC), use:
2225

23-
* [roleAssignments](/azure/templates/microsoft.authorization/roleassignments)
26+
- [roleAssignments](/azure/templates/microsoft.authorization/roleassignments)
2427

2528
For nested templates that deploy to management groups, subscriptions, or resource groups, use:
2629

27-
* [deployments](/azure/templates/microsoft.resources/deployments)
30+
- [deployments](/azure/templates/microsoft.resources/deployments)
2831

2932
For creating management groups, use:
3033

31-
* [managementGroups](/azure/templates/microsoft.management/managementgroups)
34+
- [managementGroups](/azure/templates/microsoft.management/managementgroups)
3235

3336
For creating subscriptions, use:
3437

35-
* [aliases](/azure/templates/microsoft.subscription/aliases)
38+
- [aliases](/azure/templates/microsoft.subscription/aliases)
3639

3740
For managing costs, use:
3841

39-
* [billingProfiles](/azure/templates/microsoft.billing/billingaccounts/billingprofiles)
40-
* [billingRoleAssignments](/azure/templates/microsoft.billing/billingaccounts/billingroleassignments)
41-
* [instructions](/azure/templates/microsoft.billing/billingaccounts/billingprofiles/instructions)
42-
* [invoiceSections](/azure/templates/microsoft.billing/billingaccounts/billingprofiles/invoicesections)
43-
* [policies](/azure/templates/microsoft.billing/billingaccounts/billingprofiles/policies)
42+
- [billingProfiles](/azure/templates/microsoft.billing/billingaccounts/billingprofiles)
43+
- [billingRoleAssignments](/azure/templates/microsoft.billing/billingaccounts/billingroleassignments)
44+
- [instructions](/azure/templates/microsoft.billing/billingaccounts/billingprofiles/instructions)
45+
- [invoiceSections](/azure/templates/microsoft.billing/billingaccounts/billingprofiles/invoicesections)
46+
- [policies](/azure/templates/microsoft.billing/billingaccounts/billingprofiles/policies)
4447

4548
For configuring the portal, use:
4649

47-
* [tenantConfigurations](/azure/templates/microsoft.portal/tenantconfigurations)
50+
- [tenantConfigurations](/azure/templates/microsoft.portal/tenantconfigurations)
4851

4952
Built-in policy definitions are tenant-level resources, but you can't deploy custom policy definitions at the tenant. For an example of assigning a built-in policy definition to a resource, see [tenantResourceId example](./bicep-functions-resource.md#tenantresourceid).
5053

@@ -106,9 +109,9 @@ New-AzTenantDeployment `
106109

107110
For more detailed information about deployment commands and options for deploying ARM templates, see:
108111

109-
* [Deploy resources with ARM templates and Azure CLI](deploy-cli.md)
110-
* [Deploy resources with ARM templates and Azure PowerShell](deploy-powershell.md)
111-
* [Deploy ARM templates from Cloud Shell](deploy-cloud-shell.md)
112+
- [Deploy resources with ARM templates and Azure CLI](deploy-cli.md)
113+
- [Deploy resources with ARM templates and Azure PowerShell](deploy-powershell.md)
114+
- [Deploy ARM templates from Cloud Shell](deploy-cloud-shell.md)
112115

113116
## Deployment location and name
114117

@@ -128,10 +131,10 @@ To deploy resources at multiple scopes within a single deployment, use [modules]
128131

129132
You can deploy a resource from within a tenant scope Bicep file at the following scopes:
130133

131-
* [The tenant](#scope-to-tenant)
132-
* [The management group](#scope-to-management-group)
133-
* [The subscription](#scope-to-subscription)
134-
* [The resource group](#scope-to-resource-group)
134+
- [The tenant](#scope-to-tenant)
135+
- [The management group](#scope-to-management-group)
136+
- [The subscription](#scope-to-subscription)
137+
- [The resource group](#scope-to-resource-group)
135138

136139
### Scope to tenant
137140

@@ -237,8 +240,10 @@ resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = {
237240

238241
## Next steps
239242

240-
To learn about other scopes, see:
243+
Now that you understand tenant deployments, explore these related deployment scopes:
241244

242-
* [Resource group deployments](deploy-to-resource-group.md)
243-
* [Subscription deployments](deploy-to-subscription.md)
244-
* [Management group deployments](deploy-to-management-group.md)
245+
- **[Resource group deployments](deploy-to-resource-group.md)** - Deploy resources to a specific resource group
246+
- **[Subscription deployments](deploy-to-subscription.md)** - Deploy resources at the subscription level
247+
- **[Management group deployments](deploy-to-management-group.md)** - Deploy resources to management groups
248+
249+
For hands-on practice, try the training module: [Deploy resources to subscriptions, management groups, and tenants by using Bicep](/training/modules/deploy-resources-scopes-bicep/).

0 commit comments

Comments
 (0)