You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-language-java-data-sources.md
+19-22Lines changed: 19 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,47 +201,46 @@ You can't directly modify a Tomcat installation for server-wide configuration be
201
201
202
202
#### Add a startup file
203
203
204
-
Create a file named `startup.cmd` `%HOME%\site\wwwroot` directory. This file runs automatically before the Tomcat server starts. The file should have the following content:
204
+
Create a file named `startup.cmd` in the `%HOME%\site\wwwroot` directory. This file runs automatically before the Tomcat server starts. The file should have the following content:
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-private-deployment.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: application-gateway
6
6
author: mbender-ms
7
7
ms.service: azure-application-gateway
8
8
ms.topic: how-to
9
-
ms.date: 8/11/2025
9
+
ms.date: 8/19/2025
10
10
ms.author: mbender
11
11
#Customer intent: As an administrator, I want to evaluate Azure Private Application Gateway
12
12
# Customer intent: "As a cloud administrator, I want to configure a Private Application Gateway with enhanced network controls, so that I can improve security and restrict data egress while managing inbound and outbound traffic effectively."
@@ -35,7 +35,7 @@ Each of these features can be configured independently. For example, a public IP
35
35
36
36
## Onboard to the feature
37
37
38
-
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are generally available and supported in production. To join enable the feature, you must opt in to the experience using the Azure portal, PowerShell, CLI, or REST API.
38
+
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are generally available and supported in production. To use the features, you must opt in to the experience using the Azure portal, PowerShell, CLI, or REST API.
39
39
40
40
When enrolled, all new Application Gateways provision with the ability to define any combination of the NSG, Route Table, or private IP configuration features. If you wish to opt out from the new functionality, you can do so by [unregistering from the feature](#unregister-the-feature).
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/manage-file-access-logs.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.custom: references_regions
11
11
# Customer intent: As a storage administrator, I want to enable file access logs on Azure NetApp Files volumes so that I can monitor file access operations and troubleshoot access issues effectively.
12
12
---
13
13
14
-
# Manage file access logs in Azure NetApp Files (preview)
14
+
# Manage file access logs in Azure NetApp Files
15
15
16
16
File access logs provide file access logging for individual volumes, capturing file system operations on selected volumes. The logs capture [standard file operation](#recognized-events). File access logs provide insights beyond the platform logging captured in the [Azure Activity Log](/azure/azure-monitor/essentials/activity-log).
17
17
@@ -75,10 +75,10 @@ The events capture in file access logs depend on the protocol of your volume.
75
75
* Set attribute
76
76
* Unlink
77
77
* Write
78
-
78
+
<!--
79
79
## Register the feature
80
80
81
-
The file access logs feature is currently in preview. If you're using this feature for the first time, you need to register the feature first.
81
+
If you're using file access logs for the first time, you need to register the feature.
82
82
83
83
1. Register the feature:
84
84
@@ -96,7 +96,7 @@ The file access logs feature is currently in preview. If you're using this featu
96
96
```
97
97
98
98
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
99
-
99
+
-->
100
100
## Supported regions
101
101
102
102
Availability for file access log is limited to the following regions:
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/whats-new.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,17 +8,21 @@ ms.custom:
8
8
- linux-related-content
9
9
- build-2025
10
10
ms.topic: overview
11
-
ms.date: 08/14/2025
11
+
ms.date: 08/18/2025
12
12
ms.author: anfdocs
13
13
# Customer intent: As a cloud administrator, I want to learn about the latest enhancements in Azure NetApp Files, so that I can effectively utilize new features for improved data security, resilience, and operational efficiency in my organization's cloud storage solutions.
14
14
---
15
15
16
16
# What's new in Azure NetApp Files
17
17
18
18
Azure NetApp Files is updated regularly. This article provides a summary about the latest new features and enhancements.
19
-
19
+
20
20
## August 2025
21
21
22
+
*[File access logs](manage-file-access-logs.md) is now generally available (GA)
23
+
24
+
File access logs provide enterprise-grade visibility into file-level operations across SMB3, NFSv4.1, and dual-protocol volumes. This capability enhances security, reliability, and operational insight by capturing detailed access activity—including user identity, operation type, and timestamps. Organizations can use file access logs to monitor access patterns, detect unauthorized activity, support compliance investigations, and optimize data usage. By integrating this feature, you strengthen your security posture and align with the Well-Architected Framework's best practices for operational excellence.
25
+
22
26
*[Flexible service level](manage-cool-access.md?tabs=flexible#register-the-feature) now supports storage with cool access (Preview)
23
27
24
28
Azure NetApp Files now supports cool access for the Flexible service level, enabling you to further optimize performance and cost by automatically tiering infrequently accessed data to lower-cost Azure storage accounts. This enhancement builds on the Flexible service level's ability to decouple storage capacity and throughput, allowing precise resource alignment for diverse workloads while maintaining configured throughput levels—even with cool access enabled. These features help organizations reduce total cost of ownership without compromising performance. You must be registered for the [Flexible service level](azure-netapp-files-set-up-capacity-pool.md) before enrolling in [the preview for the Flexible service level with cool access](manage-cool-access.md#register-the-feature).
You can use [Azure Cloud Shell](../../cloud-shell/overview.md) to deploy a Bicep file. Currently you can only deploy a local Bicep file from the Cloud Shell.
11
+
You can use [Azure Cloud Shell](../../cloud-shell/overview.md) to deploy a Bicep file. Currently you can only deploy a local Bicep file from the Cloud Shell.
12
12
13
13
You can deploy to any scope. This article shows deploying to a resource group.
14
14
15
+
In this article, you'll learn how to:
16
+
17
+
- Upload a Bicep file to Cloud Shell
18
+
- Deploy the file using Azure CLI or PowerShell
19
+
- Verify your deployment was successful
20
+
15
21
## Deploy local Bicep file
16
22
17
23
To deploy a local Bicep file, you must first upload your Bicep file to your Cloud Shell session.
@@ -26,7 +32,7 @@ To deploy a local Bicep file, you must first upload your Bicep file to your Clou
1. Select the Bicep file you want to upload, and then select **Open**.
29
-
1. To deploy the Bicep file, use the following commands:
35
+
1. To deploy the Bicep file, use the following commands. These commands create a resource group and deploy your Bicep template to it:
30
36
31
37
### [Azure CLI](#tab/azure-cli)
32
38
@@ -53,5 +59,8 @@ To deploy a local Bicep file, you must first upload your Bicep file to your Clou
53
59
54
60
## Next steps
55
61
56
-
- For more information about deployment commands, see [Deploy resources with Bicep and Azure CLI](deploy-cli.md) and [Deploy resources with Bicep and Azure PowerShell](deploy-powershell.md).
57
-
- To preview changes before deploying a Bicep file, see [Bicep deployment what-if operation](./deploy-what-if.md).
62
+
Now that you've learned to deploy Bicep files from Cloud Shell, explore these related topics:
63
+
64
+
-**Learn advanced deployment techniques**: [Deploy resources with Bicep and Azure CLI](deploy-cli.md) and [Deploy resources with Bicep and Azure PowerShell](deploy-powershell.md)
65
+
-**Preview changes before deployment**: [Bicep deployment what-if operation](./deploy-what-if.md)
66
+
-**Troubleshoot deployment issues**: Review common deployment errors and solutions
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/bicep/deploy-to-tenant.md
+28-23Lines changed: 28 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,41 +10,44 @@ ms.date: 02/10/2025
10
10
11
11
As your organization matures, you may need to define and assign [policies](../../governance/policy/overview.md) or [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md) across your Microsoft Entra tenant. With tenant level templates, you can declaratively apply policies and assign roles at a global level.
12
12
13
-
### Training resources
13
+
**What you'll learn:**
14
14
15
-
If you would rather learn about deployment scopes through step-by-step guidance, see [Deploy resources to subscriptions, management groups, and tenants by using Bicep](/training/modules/deploy-resources-scopes-bicep/).
15
+
- How to deploy resources at the tenant scope
16
+
- Required permissions and setup steps
17
+
- Deployment commands for tenant-level resources
18
+
- Examples for creating management groups and role assignments
16
19
17
20
## Supported resources
18
21
19
22
Not all resource types can be deployed to the tenant level. This section lists which resource types are supported.
20
23
21
24
For Azure role-based access control (Azure RBAC), use:
Built-in policy definitions are tenant-level resources, but you can't deploy custom policy definitions at the tenant. For an example of assigning a built-in policy definition to a resource, see [tenantResourceId example](./bicep-functions-resource.md#tenantresourceid).
50
53
@@ -106,9 +109,9 @@ New-AzTenantDeployment `
106
109
107
110
For more detailed information about deployment commands and options for deploying ARM templates, see:
108
111
109
-
*[Deploy resources with ARM templates and Azure CLI](deploy-cli.md)
110
-
*[Deploy resources with ARM templates and Azure PowerShell](deploy-powershell.md)
111
-
*[Deploy ARM templates from Cloud Shell](deploy-cloud-shell.md)
112
+
-[Deploy resources with ARM templates and Azure CLI](deploy-cli.md)
113
+
-[Deploy resources with ARM templates and Azure PowerShell](deploy-powershell.md)
114
+
-[Deploy ARM templates from Cloud Shell](deploy-cloud-shell.md)
112
115
113
116
## Deployment location and name
114
117
@@ -128,10 +131,10 @@ To deploy resources at multiple scopes within a single deployment, use [modules]
128
131
129
132
You can deploy a resource from within a tenant scope Bicep file at the following scopes:
*[Management group deployments](deploy-to-management-group.md)
245
+
-**[Resource group deployments](deploy-to-resource-group.md)** - Deploy resources to a specific resource group
246
+
-**[Subscription deployments](deploy-to-subscription.md)** - Deploy resources at the subscription level
247
+
-**[Management group deployments](deploy-to-management-group.md)** - Deploy resources to management groups
248
+
249
+
For hands-on practice, try the training module: [Deploy resources to subscriptions, management groups, and tenants by using Bicep](/training/modules/deploy-resources-scopes-bicep/).
0 commit comments