Skip to content

Commit c62531b

Browse files
author
gitName
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into 0925
2 parents c9a492d + 1c0b3aa commit c62531b

45 files changed

Lines changed: 1057 additions & 326 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/api-management/enable-availability-zone-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ When you create a new API Management instance in the **Premium** tier in a regio
3737
- **Manual:** API Management provides manual availability zone support when you explicitly specify which availability zones to use.
3838

3939
> [!IMPORTANT]
40-
> To ensure the reliability of your API Management instance, we recommend that you use the automatic availability zone support. To achieve maximum zone redundancy, we recommend that you deploy a minimum of three units in each region where you deploy your API Management instances. For more information, see [Reliability in API Management](../reliability/reliability-api-management.md).
40+
> To ensure the reliability of your API Management instance, we recommend that you use the automatic availability zone support. To achieve maximum zone redundancy, we recommend that you deploy a minimum of two units in each region where you deploy API Management to ensure that an availability zone outage doesn't affect your instance. For more information, see [Reliability in API Management](../reliability/reliability-api-management.md).
4141
4242
## Manual availability zone support
4343

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This article shows you how to configure authentication for Azure App Service or
2323

2424
Before your application can sign in users, you need to register it in a workforce tenant or an external tenant. If you're making your app available to employee or business guests, register your app in a workforce tenant. If your app is for consumers and business customers, register it in an external tenant.
2525

26-
1. Sign in to the [Azure portal] and go to your app.
26+
1. Sign in to the [Azure portal] and go to your App Service app or Functions app.
2727

2828
1. On your app's left menu, select **Settings** > **Authentication**, and then select **Add identity provider**.
2929

articles/app-service/overview-vnet-integration.md

Lines changed: 32 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate your app with an Azure virtual network
33
description: Integrate your app in Azure App Service with Azure virtual networks.
44
author: seligj95
55
ms.topic: conceptual
6-
ms.date: 08/11/2025
6+
ms.date: 09/03/2025
77
ms.update-cycle: 1095-days
88
ms.author: jordanselig
99
ms.custom:
@@ -110,7 +110,7 @@ You must have at least the following Role-based access control permissions on th
110110
|-|-|
111111
| Microsoft.Network/virtualNetworks/read | Read the virtual network definition |
112112
| Microsoft.Network/virtualNetworks/subnets/read | Read a virtual network subnet definition |
113-
| Microsoft.Network/virtualNetworks/subnets/write | Delegate the subnet. Only required when the subnet has not been delegated or has not already been used for virtual network integration |
113+
| Microsoft.Network/virtualNetworks/subnets/write | Delegate the subnet. Only required when the subnet hasn't been delegated or hasn't already been used for virtual network integration |
114114
| Microsoft.Network/virtualNetworks/subnets/join/action | Joins a virtual network |
115115

116116
If the virtual network is in a different subscription than the app, you must ensure that the subscription with the virtual network is registered for the `Microsoft.Web` resource provider. You can explicitly register the provider [by following this documentation](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider), but it also automatically registers when creating the first web app in a subscription.
@@ -131,7 +131,7 @@ Application routing applies to traffic that is sent from your app after it start
131131
Learn [how to configure application routing](./configure-vnet-integration-routing.md#configure-application-routing).
132132

133133
> [!NOTE]
134-
> Outbound SMTP connectivity (port 25) is supported for App Service when the SMTP traffic is routed through the virtual network integration. The supportability is determined by a setting on the subscription where the virtual network is deployed. For virtual networks/subnets created before 1. August 2022 you need to initiate a temporary configuration change to the virtual network/subnet for the setting to be synchronized from the subscription. An example could be to add a temporary subnet, associate/dissociate an NSG temporarily or configure a service endpoint temporarily. For more information, see [Troubleshoot outbound SMTP connectivity problems in Azure](../virtual-network/troubleshoot-outbound-smtp-connectivity.md).
134+
> Outbound SMTP connectivity (port 25) is supported for App Service when the SMTP traffic is routed through the virtual network integration. The supportability is determined by a setting on the subscription where the virtual network is deployed. For virtual networks/subnets created before 1. August 2022 you need to initiate a temporary configuration change to the virtual network/subnet for the setting to be synchronized from the subscription. An example could be to add a temporary subnet, associate/dissociate an NSG temporarily, or configure a service endpoint temporarily. For more information, see [Troubleshoot outbound SMTP connectivity problems in Azure](../virtual-network/troubleshoot-outbound-smtp-connectivity.md).
135135
136136
### Configuration routing
137137

@@ -181,7 +181,7 @@ Specifically for [Linux continuous deployment](https://github.com/microsoft/Oryx
181181

182182
#### Health checks
183183

184-
Azure uses UDP port 30,000 to do network health checks. If you block this traffic, it will not directly impact your app, but it will be more difficult for Azure support to detect and troubleshoot network related issues.
184+
Azure uses UDP port 30,000 to do network health checks. If you block this traffic, it doesn't directly affect your app, but it's more difficult for Azure support to detect and troubleshoot network related issues.
185185

186186
#### Private ports
187187

@@ -221,7 +221,7 @@ There are some limitations with using virtual network integration:
221221
* You can't have more than two virtual network integrations per App Service plan. Multiple apps in the same App Service plan can use the same virtual network integration.
222222
* You can't change the subscription of an app or a plan while there's an app that's using virtual network integration.
223223
* App Service Logs to private storage accounts is currently not supported. We recommend using Diagnostics Logging and allowing Trusted Services for the storage account.
224-
* Connectivity to public Azure Storage accounts might fail for VNet-integrated apps when VNet Route All is enabled and the app does not use service endpoints, private endpoints, or User-Defined Routes (UDRs). Traffic is expected to route via the default route (Internet). This scenario is common when the storage account is in a different region than the virtual network.
224+
* Connectivity to global Azure Storage accounts might fail for VNet-integrated apps when virtual network Route All is enabled and the app doesn't use service endpoints, private endpoints, or User-Defined Routes (UDRs). Traffic is expected to route via the default route (Internet). This scenario is common when the storage account is in a different region than the virtual network.
225225
* To restore or ensure connectivity, enable service endpoints for the storage account, configure private endpoints, or move the storage account to the same region as the virtual network.
226226

227227
## Access on-premises resources
@@ -241,7 +241,7 @@ In the app view of your virtual network integration instance, you can disconnect
241241
The private IP assigned to the instance is exposed via the environment variable WEBSITE_PRIVATE_IP. Kudu console UI also shows the list of environment variables available to the web app. This IP is assigned from the address range of the integrated subnet. This IP is used by the web app to connect to the resources through the Azure virtual network.
242242

243243
> [!NOTE]
244-
> The value of WEBSITE_PRIVATE_IP is bound to change. However, it will be an IP within the address range of the integration subnet, so you'll need to allow access from the entire address range.
244+
> The value of WEBSITE_PRIVATE_IP is bound to change. However, it's an IP within the address range of the integration subnet, so you need to allow access from the entire address range.
245245
>
246246
247247
## Pricing details
@@ -254,13 +254,35 @@ The feature is easy to set up, but that doesn't mean your experience is problem
254254

255255
> [!NOTE]
256256
> * Virtual network integration isn't supported for Docker Compose scenarios in App Service.
257-
> * Access restrictions does not apply to traffic coming through a private endpoint.
257+
> * Access restrictions don't apply to traffic coming through a private endpoint.
258258
259-
### Deleting the App Service plan or app before disconnecting the network integration
259+
### Cleaning up orphaned Service Association Links (SAL)
260260

261-
If you deleted the app or the App Service plan without disconnecting the virtual network integration first, you aren't able to do any update/delete operations on the virtual network or subnet that was used for the integration with the deleted resource. A subnet delegation 'Microsoft.Web/serverFarms' remains assigned to your subnet and prevents the update and delete operations.
261+
When an App Service is integrated with a virtual network, a Service Association Link (SAL) is created. If the App Service is deleted without properly disconnecting the virtual network, the SAL might remain orphaned, preventing subnet deletion or updates.
262+
263+
#### Method 1: Purging orphaned Service Association Links (SAL)
264+
265+
First, try to delete the orphan SAL using the following Azure CLI command. Replace the placeholders for `SUBSCRIPTION-ID`, `LOCATION`, and `SUBNET-RESOURCE-ID`. The location in the URI must match the location of the virtual network/subnet. You must have at a minimum the permissions associated with the [Network Contributor](../role-based-access-control/built-in-roles/networking.md#network-contributor) role on the subnet to execute this command.
266+
267+
```bash
268+
az rest --method POST \
269+
--uri "/subscriptions/<SUBSCRIPTION-ID>/providers/Microsoft.Web/locations/<LOCATION>/purgeUnusedVirtualNetworkIntegration?api-version=2024-04-01" \
270+
--body "{'subnetResourceId': '<SUBNET-RESOURCE-ID>'}"
271+
```
272+
273+
Successful execution of this command gives the following response:
274+
275+
```bash
276+
{
277+
"message": "Purged unused virtual network integration.",
278+
"swiftVirtualNetwork": null
279+
}
280+
```
281+
282+
#### Method 2: Re-creating and disconnecting the integration (if Method 1 fails)
283+
284+
If the purge command doesn't resolve the issue and you still can't perform update/delete operations on the virtual network or subnet, a subnet delegation 'Microsoft.Web/serverFarms' might remain assigned to your subnet. In this case, you need to re-create the virtual network integration and then disconnect it:
262285

263-
In order to do update/delete the subnet or virtual network again, you need to re-create the virtual network integration, and then disconnect it:
264286
1. Re-create the App Service plan and app (it's mandatory to use the exact same web app name as before).
265287
1. Navigate to **Networking** on the app in Azure portal and configure the virtual network integration.
266288
1. After the virtual network integration is configured, select the 'Disconnect' button.

articles/application-gateway/application-gateway-tls-version-retirement.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: jaesoni
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
8-
ms.date: 07/31/2025
8+
ms.date: 09/04/2025
99
ms.author: mbender
1010
ms.custom:
1111
- build-2025
@@ -113,14 +113,16 @@ Once support for TLS versions 1.0 and 1.1 is discontinued, clients may encounter
113113
A default TLS policy for Application Gateway is a packaged set of supported TLS versions and cipher suites. This allows customers to begin using secured traffic by only configuring HTTPS or TLS listeners and backend settings, without any extra configuration for TLS version or ciphers. Application Gateway uses one of its predefined policies as the default.
114114

115115
### How will the default TLS policies be impacted after legacy TLS versions 1.0 and 1.1 retirement?
116-
Until September 2025, V2 SKUs utilize two [default TLS policies](application-gateway-ssl-policy-overview.md#default-tls-policy) based on the API version specified during resource deployment. Deployments using API version **2023-02-01 or later** apply `AppGwSslPolicy20220101` by default, while earlier API versions use `AppGwSslPolicy20150501`. With the deprecation of TLS 1.0 and 1.1, the older `AppGwSslPolicy20150501` policy, will be discontinued. So, `AppGwSslPolicy20220101` will become the default policy for all V2 gateways.
116+
Until September 2025, V2 SKUs utilize two [default TLS policies](application-gateway-ssl-policy-overview.md#default-tls-policy) based on the API version specified during resource deployment. Deployments using API version **2023-02-01 or later** apply `AppGwSslPolicy20220101` by default, while earlier API versions use `AppGwSslPolicy20150501`.
117+
118+
With the deprecation of TLS 1.0 and 1.1, the older `AppGwSslPolicy20150501` policy, will be discontinued. So, `AppGwSslPolicy20220101` will become the default policy for all V2 gateways. Once this change in default policy is implemented, a subsequent PUT operation will complete the configuration update.
117119

118120
The default policy for the V1 SKU will remain unchanged since `AppGwSslPolicy20220101` won't be introduced for this retiring SKU.
119121

120122
> [!NOTE]
121-
> A default TLS policy is applied only when the "Default" option is selected in the Portal or when no TLS policy is specified within the resource configuration by means such as REST, PowerShell, or AzCLI.
123+
> * A default TLS policy is applied only when the "Default" option is selected in the Portal or when no TLS policy is specified within the resource configuration by means such as REST, PowerShell, or AzCLI. Accordingly, using a default policy in configuration isn't same as explicitly selecting `AppGwSslPolicy20150501` policy, even if `AppGwSslPolicy20150501` is the default policy for your API version.
122124
>
123-
> Accordingly, using a default policy in configuration isn't same as explicitly selecting `AppGwSslPolicy20150501` policy, even if `AppGwSslPolicy20150501` is the default policy for your API version.
125+
> * The changes will be applied gradually across all Azure regions.
124126
125127
### Which TLS policies in Application Gateway are getting deprecated?
126128
The predefined policies `AppGwSslPolicy20150501` and `AppGwSslPolicy20170401` that support TLS versions 1.0 and 1.1 will be removed from the Azure Resource Manager configuration. Similarly, the Custom policy will stop supporting TLS versions 1.0 and 1.1 along with their associated cipher suites. This applies to both V1 and V2 SKUs.
@@ -134,7 +136,7 @@ If you have chosen any deprecating TLS policy in the configuration of your gatew
134136
A nonfunctional TLS configuration, such a SSLProfile not linked to any listener, won't have any impact on the control plane of the gateway.
135137

136138
### How is the release for this change planned?
137-
Given the scale of our fleet, after 30 August 2025, the deprecation of TLS versions will be implemented separately for the Data and Control Planes (in that order). Any region-specific details won't be available; therefore, we strongly advise you to take all necessary actions before this retirement date.
139+
Given the scale of our fleet, after 30 August 2025, the deprecation of TLS versions will be implemented separately for the Control and Data planes. Any region-specific details won't be available; therefore, we strongly advise you to take all necessary actions at the earliest.
138140

139141
### Is there any potential impact if I haven’t selected any TLS policy and my gateway uses only HTTP/TCP configurations?
140142
If your gateway doesn't use any TLS configuration—either through SSLPolicy, SSLProfile, HTTPS, or TLS Listeners—there will be no impact after August 2025.

articles/azure-maps/migrate-help-using-copilot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The second tip for using GitHub Copilot is to provide detailed, step-by-step ins
9090
<blockquote>
9191
Write an HTML program using Azure Maps Web SDK v3 to make a geocode request for the coordinates of '1 Microsoft Way, Redmond, WA' and then place a marker at that location.
9292

93-
Step 1. Utilize the Geocode API endpoint: <https://atlas.microsoft.com/geocode?api-version=2023-06-01&subscription-key=${subscriptionKey}&query=${query}>. An example response is provided for reference.
93+
Step 1. Utilize the Geocode API endpoint: `<https://atlas.microsoft.com/geocode?api-version=2023-06-01&subscription-key=${subscriptionKey}&query=${query}>`. An example response is provided for reference.
9494

9595
{"type":"FeatureCollection","features":[{"type":"Feature","properties":{"address":{"countryRegion":{"name":"United States"},"adminDistricts":[{"shortName":"WA"},{"shortName":"King County"}],"formattedAddress":"15127 NE 24th St, Redmond, WA 98052","locality":"Redmond","postalCode":"98052","addressLine":"15127 NE 24th St"},"type":"Address","confidence":"High","matchCodes":["Good"],"geocodePoints":[{"geometry":{"type":"Point","coordinates":[-122.138681,47.630358]},"calculationMethod":"Rooftop","usageTypes":["Display"]},{"geometry":{"type":"Point","coordinates":[-122.1386787,47.6302179]},"calculationMethod":"Rooftop","usageTypes":["Route"]}]},"geometry":{"type":"Point","coordinates":[-122.138681,47.630358]},"bbox":[-122.14632282407,47.626495282429325,-122.13103917593001,47.63422071757068]}]}
9696

@@ -208,7 +208,7 @@ Step 6. Create and add a SymbolLayer to the map.
208208

209209
Step 7. Create and add a LineLayer to the map.
210210

211-
Step 8. Utilize the Route POST API: <https://atlas.microsoft.com/route/directions?api-version=2025-01-01&subscription-key=${subscriptionKey}> to find the route between the start and end points. Add the GeoJSON response to the DataSource and adjust the map's camera based on the bounding box of the response.
211+
Step 8. Utilize the Route POST API: `https://atlas.microsoft.com/route/directions?api-version=2025-01-01&subscription-key=${subscriptionKey}` to find the route between the start and end points. Add the GeoJSON response to the DataSource and adjust the map's camera based on the bounding box of the response.
212212

213213
Example request body:
214214

articles/azure-netapp-files/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,8 @@
7979
href: azure-netapp-files-network-topologies.md
8080
- name: Resource limits for Azure NetApp Files
8181
href: azure-netapp-files-resource-limits.md
82+
- name: Migrating data into Azure NetApp Files
83+
href: migrate-data.md
8284
- name: Understand large volumes
8385
href: large-volumes.md
8486
- name: Requirements and considerations for large volumes
@@ -327,6 +329,8 @@
327329
items:
328330
- name: Create a dual-protocol volume
329331
href: create-volumes-dual-protocol.md
332+
- name: Migrate volumes to Azure NetApp Files
333+
href: migrate-volumes.md
330334
- name: Manage volume access and encryption
331335
items:
332336
- name: Configure export policy for NFS or dual protocol

articles/azure-netapp-files/application-volume-group-concept.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Volume placement within the application volume group enables administrators to e
5656

5757
#### Data locality and latency optimization
5858

59-
Volume placement within the application volume group allows you to optimize data locality and minimize latency for applications with stringent performance requirements. By deploying volumes closer to compute resources, administrators can reduce data access latency and improve application responsiveness particularly for latency-sensitive workloads such as database applications.
59+
Optimizing data locality and minimizing latency for applications with stringent performance requirements can be achieved through volume placement using application volume group. By deploying volumes using application volume group rather than individually, you can significantly reduce data access latency and enhance application responsiveness. This approach is particularly beneficial for latency-sensitive workloads, such as database applications.
6060

6161
#### Cost optimization
6262

@@ -119,4 +119,4 @@ Application volume group is a pivotal concept in modern data management, providi
119119
* [Understand Azure NetApp Files application volume group for SAP HANA](application-volume-group-introduction.md)
120120
* [Requirements and considerations for application volume group for SAP HANA](application-volume-group-considerations.md)
121121
* [Understand application volume group for Oracle](application-volume-group-oracle-introduction.md)
122-
* [Requirements and considerations for application volume group for Oracle](application-volume-group-oracle-considerations.md)
122+
* [Requirements and considerations for application volume group for Oracle](application-volume-group-oracle-considerations.md)

0 commit comments

Comments
 (0)