Skip to content

Commit c3727f3

Browse files
Merge pull request #309341 from MicrosoftDocs/main
Auto Publish – main to live - 2025-12-11 06:00 UTC
2 parents 2bc935f + 1f5eeca commit c3727f3

15 files changed

Lines changed: 782 additions & 47 deletions

articles/azure-netapp-files/configure-cache-volumes.md

Lines changed: 49 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -125,22 +125,34 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
125125
126126
## Create a cache volume
127127
128-
1. Initiate the cache volume creation using the PUT caches API call.
128+
1. Initiate the cache volume creation using the PUT caches API call. For information about cache operations, see [API documentation](/rest/api/netapp/caches?view=rest-netapp-2025-09-01-preview&preserve-view=true).
129129
130-
2. Monitor if the cache state is available for cluster peering with a GET request.
130+
```
131+
PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
132+
```
133+
2. Monitor if the cache state is available for cluster peering with a GET request.
131134
132-
When the `cacheState = ClusterPeeringOfferSent`, execute the POST `listPeeringPassphrases` call to obtain the command and passphrase necessary to complete the cluster peering.
133-
134-
Example `listPeeringPassphrases` output:
135+
```
136+
GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
137+
```
135138
136-
```
137-
{
138-
"clusterPeeringCommand": "cluster peer create -ipspace <IP-SPACE-NAME> -encryption-protocol-proposed tls-psk -peer-addrs 1.1.1.1,1.1.1.2,1.1.1.3,1.1.1.4,1.1.1.5,1.1.1.6",
139-
"cachePeeringPassphraseExample": "AUniquePassphrase",
140-
"vserverPeeringCommand": "vserver peer accept -vserver vserver1 -peer-vserver cache_volume_svm"
141-
}
142-
```
139+
When the `cacheState = ClusterPeeringOfferSent`, execute the POST `listPeeringPassphrases` call to obtain the command and passphrase necessary to complete the cluster peering.
143140
141+
Example listPeeringPassprhases:
142+
143+
```
144+
POST https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}/listPeeringPassphrases?api-version=2025-09-01-preview
145+
```
146+
Example Response:
147+
148+
```
149+
{
150+
"clusterPeeringCommand": "cluster peer create -ipspace <IP-SPACE-NAME> -encryption-protocol-proposed tls-psk -peer-addrs 1.1.1.1,1.1.1.2,1.1.1.3,1.1.1.4,1.1.1.5,1.1.1.6",
151+
"cachePeeringPassphraseExample": "AUniquePassphrase",
152+
"vserverPeeringCommand": "vserver peer accept -vserver vserver1 -peer-vserver cache_volume_svm"
153+
}
154+
```
155+
144156
Execute the `clusterPeeringCommand` on the ONTAP system that contains the external origin volume and when prompted, enter the clusterPeeringPassphrase.
145157
146158
> [!NOTE]
@@ -157,6 +169,9 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
157169
158170
3. Monitor if the cache state is available for storage VM peering using a GET request.
159171
172+
```
173+
GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
174+
```
160175
When the `cacheState = VserverPeeringOfferSent`, go to the ONTAP system that contains the external origin volume and execute the `vserver peer show` command until an entry appears where the remote storage VM displays the `<value of the -peer-vserver in the vserverPeeringCommand>`. The peer state shows "pending."
161176
162177
Execute the `vserverPeeringCommand` on the ONTAP system that contains the external origin volume. The peer state should transition to "peered."
@@ -176,6 +191,9 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
176191
# [NFS](#tab/NFS)
177192
178193
```
194+
PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
195+
196+
Body:
179197
{
180198
"location": "westus",
181199
"zones": [
@@ -223,6 +241,9 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
223241
# [SMB](#tab/SMB)
224242
225243
```
244+
PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
245+
246+
Body:
226247
{
227248
"zones": [
228249
"2"
@@ -252,6 +273,9 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
252273
# [Dual-protocol](#tab/DualProtocol)
253274
254275
```
276+
PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
277+
278+
Body:
255279
{
256280
"zones": ["2"],
257281
"location": "southcentralus",
@@ -299,6 +323,9 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
299323
# [LDAP](#tab/LDAP)
300324
301325
```
326+
PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
327+
328+
Body:
302329
{
303330
"location": "westus",
304331
"zones": [
@@ -351,15 +378,24 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
351378
Example patch request body to update a cache volume:
352379
353380
```
381+
PATCH
382+
https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
383+
384+
Example Body:
354385
{
355386
"properties": {
356387
"writeBack": "Disabled"
357388
}
358-
}
389+
}
359390
```
360391
361392
## Delete a cache volume
362393
363394
You can delete a cache volume if it's no longer required using a DELETE API call.
364395
396+
```
397+
DELETE
398+
https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}/capacityPools/{poolName}/caches/{cacheName}?api-version=2025-09-01-preview
399+
```
400+
365401
If the cache volume has `writeBack` enabled, issue a PATCH call to disable `writeBack` then issue the DELETE request.

articles/backup/sap-hana-backup-support-matrix.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: SAP HANA Backup support matrix
33
description: In this article, learn about the supported scenarios and limitations when you use Azure Backup to back up SAP HANA databases on Azure VMs.
44
ms.topic: reference
5-
ms.date: 12/09/2025
5+
ms.date: 12/11/2025
66
ms.custom: references_regions
77
ms.service: azure-backup
88
author: AbhishekMallick-MS
@@ -36,7 +36,7 @@ Azure Backup supports the backup of SAP HANA databases to Azure. This article su
3636
| **Restore types** | Refer to the SAP HANA Note [1642148](https://launchpad.support.sap.com/#/notes/1642148) to learn about the supported restore types | |
3737
| **Cross Subscription Restore** | Supported via the Azure portal and Azure CLI. [Learn more](sap-hana-database-restore.md#cross-subscription-restore). | |
3838
| **Number of full backups per day** | One scheduled backup. <br><br> Three on-demand backups. <br><br> We recommend not to trigger more than three backups per day. However, to allow user retries in case of failed attempts, hard limit for on-demand backups is set to nine attempts. |
39-
| **HANA deployments** | HANA System Replication (HSR) | |
39+
| **HANA deployments** | HANA System Replication (HSR) <br><br> HANA Scale-out system i.e one HANA system distributed across multiple nodes(PREVIEW)| |
4040
| **Special configurations** | | SAP HANA + Dynamic Tiering <br> Cloning through LaMa |
4141
| **Compression** | You can enable HANA Native compression via the Backup policy. [See the SAP HANA document](https://help.sap.com/docs/SAP_HANA_PLATFORM/6b94445c94ae495c83a19646e7c3fd56/86943e9f8d5343c59577755edff8296b.html). | |
4242
| **Multi-streaming backup** | You can increase your streaming backup throughput from *420 MBps* to *1.5 GBps*. [Learn more](#support-for-multistreaming-data-backups). | |
@@ -88,6 +88,9 @@ The following table lists the required parameters for adding/removing SAP HANA i
8888
| **Add an instance** | `--sid` | SAP HANA database instance that you want to protect. <br><br> By default, the first instance is selected. | `./msawb-plugin-config-com-sap-hana.sh --add --sid HXE` <br><br> Or <br><br> `./msawb-plugin-config-com-sap-hana.sh --sid HXE` <br><br> (Default mode is `add` for the script.) <br><br> After you add instances, registration needs to be done on recovery services vault. If a new instance is added later, re-registration is required.|
8989
| **Remove an instance** | `--sid` | SAP HANA database instance that you want to remove protection. <br><br> **SID** is a mandate parameter for remove. | `./msawb-plugin-config-com-sap-hana.sh --remove --sid HXE` |
9090

91+
## Support for HANA Scale-out (PREVIEW)
92+
Backup for HANA systems distributed across multiple nodes i.e. HANA Scale-out is now available in PREVIEW. Reach out to [email protected] to gain access to the preview experience.
93+
9194
## Next steps
9295

9396
- Back up SAP HANA databases on Azure VMs using [Azure portal](backup-azure-sap-hana-database.md) and [Azure CLI](tutorial-sap-hana-backup-cli.md).

articles/expressroute/cross-connections-api-development.md

Lines changed: 158 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -389,6 +389,164 @@ Once you receive the ExpressRoute service key from the target customer, follow t
389389
"status": "Succeeded"
390390
}
391391
```
392+
### To validate the advertised public prefixes (Public Preview)
393+
6. **(Optional) GET expressRouteCrossConnection to verify Microsoft Peering advertised prefixes** If you allow customers to advertise your public IP addresses over Microsoft Peering, you can obtain the Validation ID required to authorize their prefix usage.
394+
395+
> [!NOTE]
396+
> When customer advertises public prefixes over BGP, Microsoft verifies the authority to announce them by validating a signed digital certificate against RIR or IRR records. The prefixes may be owned by the customer, or leased from your organization. See the [authorization requirements](expressroute-howto-routing-portal-resource-manager.md) for more details
397+
398+
```
399+
GET /subscriptions/<ProviderManagementSubscription>/resourceGroups/CrossConnection-EUAPTest/providers/Microsoft.Network/expressRouteCrossConnections/bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f/peerings/MicrosoftPeering?api-version=2024-05-01 HTTP/1.1
400+
Host: management.azure.com
401+
Authorization: Bearer eyJ0eXAiOiJKV...
402+
User-Agent: ARMClient/1.2.0.0
403+
Accept: application/json
404+
x-ms-request-id: d17924c4-f977-4c82-b933-d66c5fa334dd
405+
406+
407+
---------- Response (3317 ms) ------------
408+
409+
HTTP/1.1 200 OK
410+
Pragma: no-cache
411+
Retry-After: 10
412+
x-ms-request-id: eeee4efe-ff5f-aa6a-bb7b-cccccc8c8c8c
413+
Azure-AsyncOperation: https://management.azure.com/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Network/locations/eastus2euap/operations/eeee4efe-ff5f-aa6a-bb7b-cccccc8c8c8c?api-version=2018-02-01
414+
Strict-Transport-Security: max-age=31536000; includeSubDomains
415+
Cache-Control: no-cache
416+
Server: Microsoft-HTTPAPI/2.0; Microsoft-HTTPAPI/2.0
417+
x-ms-ratelimit-remaining-subscription-writes: 1199
418+
x-ms-correlation-request-id: 8e26bc5d-f1cd-4305-a373-860aaf7bb694
419+
x-ms-routing-request-id: WESTUS:20180501T213857Z:8e26bc5d-f1cd-4305-a373-860aaf7bb694
420+
X-Content-Type-Options: nosniff
421+
Date: Tue, 01 May 2018 21:38:56 GMT
422+
423+
{
424+
"name": "MicrosoftPeering",
425+
"id": "/subscriptions/<ProviderManagementSubscription>/resourceGroups/CrossConnection-EUAPTest/providers/Microsoft.Network/expressRouteCrossConnections/bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f/peerings/MicrosoftPeering",
426+
"properties": {
427+
"provisioningState": "Succeeded",
428+
"peeringType": "MicrosoftPeering",
429+
"azureASN": 0,
430+
"peerASN": 900,
431+
"primaryPeerAddressPrefix": "203.0.113.0/30",
432+
"secondaryPeerAddressPrefix": "203.0.113.4/30",
433+
"state": "Disabled",
434+
"vlanId": 300,
435+
"lastModifiedBy": "",
436+
"microsoftPeeringConfig": {
437+
"advertisedPublicPrefixes": [
438+
"203.0.113.128/25"
439+
],
440+
   "advertisedPublicPrefixInfo": [
441+
{
442+
"prefix": "203.0.113.128/25",
443+
"validationId": "Azure-SKEY|bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f|203.0.113.128/25|ASN-45",
444+
"signature": "",
445+
"validationState": "ValidationNeeded"
446+
}
447+
]
448+
"advertisedPublicPrefixesState": "NotConfigured",
449+
"customerASN": 45,
450+
"legacyMode": 0,
451+
"routingRegistryName": "ARIN"
452+
}
453+
}
454+
}
455+
456+
C:\Users\Admin\Documents\Expressroute\Partner APIs\ARMClient-master\ARMClient-master>armclient get https://management.azure.com/subscriptions/<ProviderManagementSubscription>/providers/Microsoft.Network/locations/eastus2euap/operations/eeee4efe-ff5f-aa6a-bb7b-cccccc8c8c8c?api-version=2018-02-01
457+
{
458+
"status": "Succeeded"
459+
}
460+
```
461+
7. **(Optional) PUT expressRouteCrossConnection to validate Microsoft Peering advertised prefixes** If you allow customers to advertise your public IP addresses over Microsoft Peering, you can configure the signature to automatically validate the advertised prefixes.
462+
463+
```
464+
PUT /subscriptions/<ProviderManagementSubscription>/resourceGroups/CrossConnection-EUAPTest/providers/Microsoft.Network/expressRouteCrossConnections/bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f/peerings/MicrosoftPeering?api-version=2018-02-01 HTTP/1.1
465+
Host: management.azure.com
466+
Authorization: Bearer eyJ0eXAiOiJKV...
467+
User-Agent: ARMClient/1.2.0.0
468+
Accept: application/json
469+
x-ms-request-id: af4527eb-7b68-4a50-b953-c0606524d8f3
470+
471+
{
472+
"name": "MicrosoftPeering",
473+
"properties": {
474+
"peeringType": "MicrosoftPeering",
475+
"peerASN": 900,
476+
"primaryPeerAddressPrefix": "203.0.113.0/30",
477+
"secondaryPeerAddressPrefix": "203.0.113.4/30",
478+
"vlanId": 300
479+
"microsoftPeeringConfig": {
480+
"advertisedPublicPrefixes": [
481+
"203.0.113.128/25"
482+
],
483+
   "advertisedPublicPrefixInfo": [
484+
{
485+
"prefix": "203.0.113.128/25",
486+
"validationId": "Azure-SKEY|bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f|203.0.113.128/25|ASN-45",
487+
"signature": "jC6pMjA1INbvQp9YouUhY2pfD1Xuzs5wGuyKBt6ay39+2EHZGwTV65fP0wETKnpUwYVmxzjIYkVLYmZvLlwhFbLZ4trn1no4n9aHD0HYqV3Uqi9F6gg7qOjfQTbTQQ14X8IJRmwke57eYSaZAYRz4Nz9sP54Ah8qnHJNh0BlKCDrOoDNtr7Vo/VDBkOLTD4t/ANCjoBofZSlzrN5LHFDCd+3IqAWkfqII3VhhtvXsYGQtjG3v1ylhMVC9+rEQjZM2ywku6v4zDzlIVAQZvHUVyvODok5czjEI7XOzvVTZixqj+HUX723yR6cE6SOzBV8gXOrfE1iu+c+oB01juFE2Q==",
488+
}
489+
]
490+
"customerASN": 45,
491+
"routingRegistryName": "ARIN"
492+
}
493+
}
494+
}
495+
496+
---------- Response (3317 ms) ------------
497+
498+
HTTP/1.1 200 OK
499+
Pragma: no-cache
500+
Retry-After: 10
501+
x-ms-request-id: eeee4efe-ff5f-aa6a-bb7b-cccccc8c8c8c
502+
Azure-AsyncOperation: https://management.azure.com/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Network/locations/eastus2euap/operations/eeee4efe-ff5f-aa6a-bb7b-cccccc8c8c8c?api-version=2018-02-01
503+
Strict-Transport-Security: max-age=31536000; includeSubDomains
504+
Cache-Control: no-cache
505+
Server: Microsoft-HTTPAPI/2.0; Microsoft-HTTPAPI/2.0
506+
x-ms-ratelimit-remaining-subscription-writes: 1199
507+
x-ms-correlation-request-id: 8e26bc5d-f1cd-4305-a373-860aaf7bb694
508+
x-ms-routing-request-id: WESTUS:20180501T213857Z:8e26bc5d-f1cd-4305-a373-860aaf7bb694
509+
X-Content-Type-Options: nosniff
510+
Date: Tue, 01 May 2018 21:38:56 GMT
511+
512+
{
513+
"name": "MicrosoftPeering",
514+
"id": "/subscriptions/<ProviderManagementSubscription>/resourceGroups/CrossConnection-EUAPTest/providers/Microsoft.Network/expressRouteCrossConnections/bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f/peerings/MicrosoftPeering",
515+
"properties": {
516+
"provisioningState": "Succeeded",
517+
"peeringType": "MicrosoftPeering",
518+
"azureASN": 0,
519+
"peerASN": 900,
520+
"primaryPeerAddressPrefix": "203.0.113.0/30",
521+
"secondaryPeerAddressPrefix": "203.0.113.4/30",
522+
"state": "Disabled",
523+
"vlanId": 300,
524+
"lastModifiedBy": "",
525+
"microsoftPeeringConfig": {
526+
"advertisedPublicPrefixes": [
527+
"203.0.113.128/25"
528+
],
529+
   "advertisedPublicPrefixInfo": [
530+
{
531+
"prefix": "203.0.113.128/25",
532+
"validationId": "Azure-SKEY|bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f|203.0.113.128/25|ASN-45",
533+
"signature": "jC6pMjA1INbvQp9YouUhY2pfD1Xuzs5wGuyKBt6ay39+2EHZGwTV65fP0wETKnpUwYVmxzjIYkVLYmZvLlwhFbLZ4trn1no4n9aHD0HYqV3Uqi9F6gg7qOjfQTbTQQ14X8IJRmwke57eYSaZAYRz4Nz9sP54Ah8qnHJNh0BlKCDrOoDNtr7Vo/VDBkOLTD4t/ANCjoBofZSlzrN5LHFDCd+3IqAWkfqII3VhhtvXsYGQtjG3v1ylhMVC9+rEQjZM2ywku6v4zDzlIVAQZvHUVyvODok5czjEI7XOzvVTZixqj+HUX723yR6cE6SOzBV8gXOrfE1iu+c+oB01juFE2Q==",
534+
"validationState": "Configured"
535+
}
536+
]
537+
"advertisedPublicPrefixesState": "NotConfigured",
538+
"customerASN": 45,
539+
"legacyMode": 0,
540+
"routingRegistryName": "ARIN"
541+
}
542+
}
543+
}
544+
545+
C:\Users\Admin\Documents\Expressroute\Partner APIs\ARMClient-master\ARMClient-master>armclient get https://management.azure.com/subscriptions/<ProviderManagementSubscription>/providers/Microsoft.Network/locations/eastus2euap/operations/eeee4efe-ff5f-aa6a-bb7b-cccccc8c8c8c?api-version=2018-02-01
546+
{
547+
"status": "Succeeded"
548+
}
549+
```
392550
## REST API
393551

394552
See [ExpressRoute CrossConnections REST API](/rest/api/expressroute/expressroutecrossconnections) for REST API documentation.

articles/logic-apps/connectors/sap.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1080,9 +1080,13 @@ Based on whether you have a Consumption workflow in multitenant Azure Logic Apps
10801080

10811081
## Enable SAP client library (NCo) logging and tracing (built-in connector only)
10821082

1083-
When you have to investigate any problems with this component, you can set up custom text file-based NCo tracing, which SAP or Microsoft support might request from you. However, even without enabling NCo tracing, you can find the log (.log) files at the following location: `C:\home\site\wwwroot`.
1083+
When you have to investigate any problems with this component, you can set up custom text file-based NCo tracing, which SAP or Microsoft support might request from you. By default, the tracing capability is disabled because tracing might negatively affect performance and quickly consume the application host's storage space.
10841084

1085-
By default, the tracing capability is disabled because tracing might negatively affect performance and quickly consume the application host's storage space. To enable tracing at the application level, add the following settings:
1085+
> [!NOTE]
1086+
>
1087+
> Error logging is enabled even without enabling NCo tracing. To find the error log (.log) files, go to the following default location: `C:\home\site\wwwroot`. If the app setting named **SAP_RFC_TRACE_DIRECTORY** specifies a different location, the error logs are stored there instead.
1088+
1089+
To enable tracing at the application level, add the following settings:
10861090

10871091
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
10881092

articles/sap/business-process-solutions/deploy-workload-item.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,10 +69,10 @@ To deploy Business process solutions, you need:
6969

7070
### Create Microsoft Fabric workspace
7171

72-
Before proceeding with either manual or automated deployment of Enterprise Insights you need to create a Microsoft Fabric workspace. Follow the steps below to set up your workspace:
72+
Before proceeding with deployment of Business Process Solutions you need to create a Microsoft Fabric workspace. Use the following steps to set up your workspace:
7373

7474
1. Open Microsoft Fabric: [Power BI](https://app.powerbi.com/).
75-
2. From the left menu choose **Workspaces** and choose **New workspace**.
75+
2. From the left menu, choose **Workspaces** and choose **New workspace**.
7676
:::image type="content" source="./media/deploy-workload-item/new-workspace.jpg" alt-text="Screenshot showing how to create a new Microsoft Fabric workspace." lightbox="./media/deploy-workload-item/new-workspace.jpg":::
7777
3. Provide the Name of the workspace. Open the Advanced settings and choose **Large Semantic Model Storage Format**. Confirm by clicking **Apply**.
7878
:::image type="content" source="./media/deploy-workload-item/workspace-details.jpg" alt-text="Screenshot showing the new workspace details configuration." lightbox="./media/deploy-workload-item/workspace-details.jpg":::

0 commit comments

Comments
 (0)