You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cyclecloud/release-notes.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,13 +2,13 @@
2
2
title: Current Release Notes - Azure CycleCloud 8.8.x
3
3
description: Read the product release notes for the current Azure CycleCloud release. This article covers releases 8.8.x, 8.7.x, 8.6.x, 8.5.x, 8.4.x, 8.2.x and 8.1.x.
4
4
author: adriankjohnson
5
-
ms.date: 02/06/2026
5
+
ms.date: 03/17/2026
6
6
ms.author: adjohnso
7
7
---
8
8
9
9
# Azure CycleCloud 8.x
10
10
11
-
The current version is 8.8.2.
11
+
The current version is 8.8.3.
12
12
13
13
## Azure CycleCloud 8.x release highlights
14
14
@@ -33,6 +33,7 @@ The following table lists the release notes for the individual 8.x releases:
33
33
34
34
| CycleCloud Release Notes Version | Release date |
Copy file name to clipboardExpand all lines: articles/energy-data-services/concepts-reference-data-values.md
+12-1Lines changed: 12 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: marielherz
5
5
ms.author: marielherzog
6
6
ms.service: azure-data-manager-energy
7
7
ms.topic: overview
8
-
ms.date: 12/18/2025
8
+
ms.date: 02/16/2026
9
9
ms.custom: template-concept
10
10
---
11
11
@@ -67,6 +67,17 @@ Azure Data Manager for Energy updates Reference Data Values (RDVs) by automatica
67
67
|**OPEN**| Customer‑extended or modified entries are preserved; new OSDU® baseline entries are added without overwriting user changes. | Balances shared semantics with user‑driven extensibility. |
68
68
|**LOCAL**| Behaviors follow the instance’s provisioning choice; custom values remain unchanged, and new OSDU® suggestions are added only if LOCAL was enabled. | Protects business‑specific meaning and avoids unintended modification. |
69
69
70
+
### Expired Legal Tags and RDV Upgrades
71
+
72
+
During automated RDV upgrades, Azure Data Manager for Energy validates the legal tags associated with existing reference data records before applying updates. If a data partition contains records with expired legal tags, the following behavior applies:
73
+
74
+
-**Existing RDVs with expired legal tags are skipped** — The upgrade process skips updates for records whose legal tags have expired, rather than failing the entire upgrade for the data partition. These records remain at their current version until the legal tag issue is resolved.
75
+
-**New RDVs are still added** — New reference data values introduced in the latest OSDU® milestone are added successfully, as they receive new legal tags and aren't affected by pre-existing expired tags.
76
+
-**No data loss occurs** — Skipped records aren't deleted or modified. Once you renew or replace the expired legal tags, the records are eligible for upgrade in the next milestone cycle.
77
+
78
+
> [!NOTE]
79
+
> To ensure all reference data values are upgraded during milestone updates, verify that no legal tags in your data partitions are expired. You can identify expired legal tag validation failures in the **storage service logs** for your Azure Data Manager for Energy instance.
80
+
70
81
For information on the current milestone supported by and available OSDU® services in Azure Data Manager for Energy, refer [OSDU® services available in Azure Data Manager for Energy](osdu-services-on-adme.md).
Copy file name to clipboardExpand all lines: articles/firewall/protect-azure-virtual-desktop.md
+14-12Lines changed: 14 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: duongau
5
5
ms.service: azure-firewall
6
6
services: firewall
7
7
ms.topic: how-to
8
-
ms.date: 02/05/2026
8
+
ms.date: 03/26/2026
9
9
ms.author: duau
10
10
# Customer intent: As an IT administrator, I want to configure Azure Firewall for Azure Virtual Desktop, so that I can securely manage outbound access and enhance the protection of my virtual desktop environment.
11
11
---
@@ -16,7 +16,7 @@ Azure Virtual Desktop is a cloud virtual desktop infrastructure (VDI) service th
16
16
17
17
:::image type="content" source="media/protect-windows-virtual-desktop/windows-virtual-desktop-architecture-diagram.png" alt-text="A diagram showing the architecture of Azure Firewall with Azure Virtual Desktop." lightbox="media/protect-windows-virtual-desktop/windows-virtual-desktop-architecture-diagram.png":::
18
18
19
-
Follow the guidelines in this article to provide extra protection for your Azure Virtual Desktop host pool using Azure Firewall.
19
+
Follow the guidelines in this article to provide extra protection for your Azure Virtual Desktop host pool by using Azure Firewall.
20
20
21
21
## Prerequisites
22
22
@@ -27,25 +27,27 @@ Follow the guidelines in this article to provide extra protection for your Azure
27
27
To learn more about Azure Virtual Desktop terminology, see [Azure Virtual Desktop terminology](/azure/virtual-desktop/terminology).
28
28
29
29
> [!WARNING]
30
-
> Azure Virtual Desktop disconnections may occur during Azure Firewall scale-ins if all traffic is routed to the Azure Firewall using a default route. We recommend having direct access to the gateway and broker for Azure Virtual Desktop to avoid these disconnections. To resolve this issue, add a route to the route table applied to the Azure Virtual Desktop subnet with the *destination type* set to **Service tag**, the *destination service* set to **WindowsVirtualDesktop**, and the *next hop* set to **Internet**.
30
+
> Azure Virtual Desktop disconnections can occur during Azure Firewall scale-ins if you route all traffic to the Azure Firewall by using a default route. To avoid these disconnections, make sure you have direct access to the gateway and broker for Azure Virtual Desktop. Use one of the following options based on your deployment:
31
+
> -**Hub-and-spoke**: Add a route to the route table applied to the Azure Virtual Desktop subnet with the *destination type* set to **Service tag**, the *destination service* set to **WindowsVirtualDesktop**, and the *next hop* set to **Internet**.
32
+
> -**Azure Virtual WAN**: Add a route to the route table applied to the subnet (spoke virtual network) that hosts the Azure Virtual Desktop workloads with the *destination type* set to **Service tag**, the *destination service* set to **WindowsVirtualDesktop**, and the *next hop* set to **Internet**.
31
33
32
34
## Host pool outbound access to Azure Virtual Desktop
33
35
34
-
The Azure virtual machines you create for Azure Virtual Desktop must have access to several Fully Qualified Domain Names (FQDNs) to function properly. Azure Firewall uses the Azure Virtual Desktop FQDN tag `WindowsVirtualDesktop` to simplify this configuration. You need to create an Azure Firewall Policy and create Rule Collections for Network Rules and Applications Rules. Give the Rule Collection a priority and an *allow* or *deny* action.
36
+
The Azure virtual machines you create for Azure Virtual Desktop must have access to several fully qualified domain names (FQDNs) to function properly. Azure Firewall uses the Azure Virtual Desktop FQDN tag `WindowsVirtualDesktop` to simplify this configuration. You need to create an Azure Firewall Policy and create rule collections for network rules and application rules. Give the rule collection a priority and an *allow* or *deny* action.
35
37
36
-
You need to create rules for each of the required FQDNs and endpoints. The list is available at [Required FQDNs and endpoints for Azure Virtual Desktop](/azure/virtual-desktop/required-fqdn-endpoint). In order to identify a specific host pool as *Source*, you can create an [IP Group](../firewall/ip-groups.md) with each session host to represent it.
38
+
You need to create rules for each of the required FQDNs and endpoints. The list is available at [Required FQDNs and endpoints for Azure Virtual Desktop](/azure/virtual-desktop/required-fqdn-endpoint). To identify a specific host pool as *Source*, you can create an [IP Group](../firewall/ip-groups.md) with each session host to represent it.
37
39
38
40
> [!IMPORTANT]
39
-
> We recommend that you don't use TLS inspection with Azure Virtual Desktop. For more information, see the [proxy server guidelines](/azure/virtual-desktop/proxy-server-support#dont-use-ssl-termination-on-the-proxy-server).
41
+
> Don't use TLS inspection with Azure Virtual Desktop. For more information, see the [proxy server guidelines](/azure/virtual-desktop/proxy-server-support#dont-use-ssl-termination-on-the-proxy-server).
40
42
41
-
## Azure Firewall Policy Sample
43
+
## Azure Firewall Policy sample
42
44
43
-
All the mandatory and optional rules mentioned previously can be easily deployed in a single Azure Firewall Policy using the template published at [https://github.com/Azure/RDS-Templates/tree/master/AzureFirewallPolicyForAVD](https://github.com/Azure/RDS-Templates/tree/master/AzureFirewallPolicyForAVD).
44
-
Before deploying into production, we recommended reviewing all the network and application rules defined, ensure alignment with Azure Virtual Desktop official documentation and security requirements.
45
+
You can deploy all the mandatory and optional rules mentioned previously in a single Azure Firewall Policy by using the template published at [AzureFirewallPolicyForAVD](https://github.com/Azure/RDS-Templates/tree/master/AzureFirewallPolicyForAVD).
46
+
Before deploying into production, review all the network and application rules defined to ensure alignment with Azure Virtual Desktop official documentation and security requirements.
45
47
46
-
## Host pool outbound access to the Internet
48
+
## Host pool outbound access to the internet
47
49
48
-
Depending on your organization needs, you might want to enable secure outbound internet access for your end users. If the list of allowed destinations is well-defined (for example, for [Microsoft 365 access](/microsoft-365/enterprise/microsoft-365-ip-web-service)), you can use Azure Firewall application and network rules to configure the required access. This routes end-user traffic directly to the internet for best performance. If you need to allow network connectivity for Windows 365 or Intune, see [Network requirements for Windows 365](/windows-365/enterprise/requirements-network#allow-network-connectivity) and [Network endpoints for Intune](/mem/intune/fundamentals/intune-endpoints).
50
+
Depending on your organization's needs, you might want to enable secure outbound internet access for your end users. If the list of allowed destinations is well-defined (for example, for [Microsoft 365 access](/microsoft-365/enterprise/microsoft-365-ip-web-service)), use Azure Firewall application and network rules to configure the required access. This configuration routes end-user traffic directly to the internet for best performance. If you need to allow network connectivity for Windows 365 or Intune, see [Network requirements for Windows 365](/windows-365/enterprise/requirements-network#allow-network-connectivity) and [Network endpoints for Intune](/mem/intune/fundamentals/intune-endpoints).
49
51
50
52
If you want to filter outbound user internet traffic by using an existing on-premises secure web gateway, you can configure web browsers or other applications running on the Azure Virtual Desktop host pool with an explicit proxy configuration. For example, see [How to use Microsoft Edge command-line options to configure proxy settings](/deployedge/edge-learnmore-cmdline-options-proxy-settings). These proxy settings only influence your end-user internet access, allowing the Azure Virtual Desktop platform outbound traffic directly via Azure Firewall.
51
53
@@ -55,4 +57,4 @@ Admins can allow or deny user access to different website categories. Add a rule
55
57
56
58
## Next step
57
59
58
-
-Learn more about Azure Virtual Desktop:[What is Azure Virtual Desktop?](/azure/virtual-desktop/overview)
60
+
-To learn more about Azure Virtual Desktop, see[What is Azure Virtual Desktop?](/azure/virtual-desktop/overview)
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-component-retirements-and-action-required.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,7 @@ HDInsight bundles open-source components and HDInsight platform into a package t
44
44
|-|-|-|-|
45
45
|[Basic and Standard A-series VMs Retirement](https://azure.microsoft.com/updates/basic-and-standard-aseries-vms-on-hdinsight-will-retire-on-31-august-2024/)|August 31, 2024 |[Av1-series retirement - Azure Virtual Machines](/azure/virtual-machines/sizes/migration-guides/av1-series-retirement)|Y|
46
46
|[Azure Monitor experience (preview)](https://azure.microsoft.com/updates/v2/hdinsight-azure-monitor-experience-retirement/)| February 01, 2025 |[Azure Monitor Agent (AMA) migration guide for Azure HDInsight clusters](./azure-monitor-agent.md)|Y|
47
+
| Dv2-series VM unavailability in Azure HDInsight | March 31, 2026 | Migrate existing HDInsight clusters to newer VM series such as [Eadsv5-series](/azure/virtual-machines/eav5-eadsv5-series) or [Easv4-series](/azure/virtual-machines/easv4-series). |Y|
47
48
|[Enterprise Security Package](https://azure.microsoft.com/updates?id=497263)| July 31, 2026 | Migrate to alternative Azure offerings such as Microsoft Fabric |N/A|
Copy file name to clipboardExpand all lines: articles/iot/tutorial-iot-industrial-solution-architecture.md
+5-29Lines changed: 5 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,37 +107,20 @@ Select the **Deploy** button to deploy all required resources to your Azure subs
107
107
The deployment process prompts you to provide a password for the virtual machine (VM) that hosts the production line simulation and the Edge infrastructure. The password should include three of: a lowercase character, an uppercase character, a number, and a special character. The password length must be between 12 and 72 characters.
108
108
109
109
> [!NOTE]
110
-
> To reduce cost, the deployment creates a single Windows 11 Enterprise VM for both the production line simulation and the Edge infrastructure. In a production scenario, the production line simulation isn't required, and for the base OS you should use Windows IoT Enterprise Long Term Servicing Channel.
111
-
112
-
When the deployment completes, use RDP to connect to the deployed Windows VM. You can download the RDP file from the **Connect** options on the page for your VM in the Azure portal. Sign in using the credentials you provided during the deployment, open a Windows command prompt, and use the following command to install the Windows Subsystem for Linux (WSL):
113
-
114
-
```cmd
115
-
wsl --install
116
-
```
117
-
118
-
When the command finishes, reboot your VM and sign in again. A command prompt finishes the WSL installation and you're prompted to enter a new username and password for WSL. Then, in WSL, use the following command to install K3S, a lightweight Kubernetes runtime:
119
-
120
-
```bash
121
-
curl -sfL https://get.k3s.io | sh
122
-
```
123
-
124
-
Your VM is now ready to run the production line simulation.
110
+
> To reduce cost, the deployment creates a single Linux VM for both the production line simulation and the edge infrastructure. In a production scenario, the production line simulation isn't required, and for the base OS you should use Azure Local.
125
111
126
112
## Run the production line simulation
127
113
128
-
In the VM, open a Windows command prompt, enter *wsl*, and press **Enter**. Navigate to the `/mnt/c/ManufacturingOntologies-main/Tools/FactorySimulation` directory and run the **StartSimulation** shell script:
114
+
Use SSH to connect to the deployed VM using the credentials you provided during the deployment (you may need to enable Just-in-time access in the Azure portal first). Navigate to the `/opt/ManufacturingOntologies-main/Tools/FactorySimulation` directory and run the **StartSimulation** shell script:
`<Your Event Hubs connection string>` is your Event Hubs namespace connection string. To learn more, see [Get an Event Hubs connection string](/azure/event-hubs/event-hubs-get-connection-string). A connection string looks like: `Endpoint=sb://ontologies.servicebus.windows.net/;SharedAccessKeyName=RootManageSharedAccessKey;SharedAccessKey=abcdefgh=`
135
121
136
-
> [!NOTE]
137
-
> If the external IP address for a Kubernetes service shows as `<pending>`, use the following command to assign the external IP address of the `traefik` service: `sudo kubectl patch service <theService> -n <the service's namespace> -p '{"spec": {"type": "LoadBalancer", "externalIPs":["<the traefik external IP address>"]}}'`.
138
-
139
122
> [!TIP]
140
-
> To prevent WSL and K3s from automatically shutting down, keep your WSL command prompt open.
123
+
> If the external IP address for some Kubernetes services shows as `<pending>`, use the following command to assign the external IP address of the `traefik` service: `sudo kubectl patch service <theService> -n <the service's namespace> -p '{"spec": {"type": "LoadBalancer", "externalIPs":["<the traefik external IP address>"]}}'`.
141
124
142
125
## UA Cloud Library
143
126
@@ -198,16 +181,9 @@ edges
198
181
199
182
## Optionally deploy Azure IoT Operations on the edge
200
183
201
-
By default, the production line simulation sends data directly to the **data** hub endpoint in your Event Hubs namespace.
202
-
203
-
To manage this process, you can use Azure IoT Operations on the edge instead. Azure IoT Operations is a unified data plane for the edge. It includes a set of modular, scalable, and highly available data services that run on Azure Arc-enabled edge Kubernetes clusters.
204
-
205
-
Before you deploy Azure IoT Operations, confirm that you started the production line simulation. Then, follow these steps in [Azure IoT Operations deployment details](/azure/iot-operations/deploy-iot-ops/overview-deploy).
206
-
207
-
> [!TIP]
208
-
> You can use VM and K3S instance you deployed previously in this tutorial to deploy and run Azure IoT Operations.
184
+
You can use Azure IoT Operations on the edge. Azure IoT Operations is a unified data plane for the edge. It includes a set of modular, scalable, and highly available data services that run on Azure Arc-enabled edge Kubernetes clusters.
209
185
210
-
### Configure your Azure IoT Operations deployment
186
+
Follow these steps in [Azure IoT Operations deployment details](/azure/iot-operations/deploy-iot-ops/overview-deploy).
211
187
212
188
You can configure your Azure IoT Operations deployment by using the [operations experience](https://iotoperations.azure.com/) web UI. Add the asset endpoints, assets, and data flows to process the data from the production line simulation and route it to the **data** hub in your Event Hubs namespace.
0 commit comments