Skip to content

Commit d47bd3d

Browse files
Merge pull request #312644 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-05 12:00 UTC
2 parents 8765cba + f7f5627 commit d47bd3d

8 files changed

Lines changed: 103 additions & 11 deletions

articles/azure-app-configuration/monitor-app-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,12 @@ For more information about App Configuration metrics, see [supported metrics for
4949
Azure App Configuration logs include activity logs and resource logs.
5050

5151
### Activity logs
52-
[Activity logs](/azure/azure-monitor/reference/tables/azureactivity) provide insight into subscription-level events and show management plane activities (create, update, delete operations on your App Configuration resource). However, they don't capture data plane operations like key-value reads and writes. You can view them in the **Activity log** blade. Alternatively, follow the steps in [Log collection](#log-collection) to route them to Log Analytics workspace for more complex querying scenarios.
52+
[Activity logs](/azure/azure-monitor/reference/tables/azureactivity) provide insight into subscription-level events and show all control plane CRUD operations for your App Configuration resource. However, they don't capture data plane operations like key-value reads and writes. You can view activity logs in the **Activity log** blade. Alternatively, follow the steps in [Log collection](#log-collection) to route them to a Log Analytics workspace for more complex querying scenarios.
5353

5454
### Resource logs
5555
App Configuration provides two types of resource logs.
56-
- **Audit logs**: Capture write operations (create, update, delete) on your data plane resources, such as key-values. Audit logs don't include data plane read operations but include management plane operations. Entries are unaggregated. Query them in the **AACAudit** table. For more information, refer to [AACAudit](/azure/azure-monitor/reference/tables/AACAudit).
57-
- **HTTP request logs**: Capture both read and write operations on your data plane resources, such as key-values. Operations are aggregated for better performance and to reduce log volume. Aggregation is based on HTTP method and status code. Each log entry may represent multiple similar operations within a certain time window. Query them in the **AACHttpRequest** table. For more information, refer to [AACHttpRequest](/azure/azure-monitor/reference/tables/AACHttpRequest).
56+
- **Audit logs**: Capture data plane write operations (create, update, and delete), such as key-values modifications, and all control plane CRUD operations. Audit logs don't include data plane read operations. Unlike HTTP request logs, entries of audit logs are not aggregated. Query them in the **AACAudit** table. For more information, refer to [AACAudit](/azure/azure-monitor/reference/tables/AACAudit).
57+
- **HTTP request logs**: Capture both read and write operations on your data plane resources, such as key-values. Entries of HTTP request logs are aggregated for better performance and to reduce log volume. Aggregation is based on HTTP method and status code. Each log entry may represent multiple requests within a certain time window. Refer to the HitCount field for the number of requests whose logs are aggregated. Query them in the **AACHttpRequest** table. For more information, refer to [AACHttpRequest](/azure/azure-monitor/reference/tables/AACHttpRequest).
5858

5959
#### Log collection
6060
Metrics and the activity log are collected and stored automatically, and can be routed to other locations by using a diagnostic setting.

articles/azure-functions/functions-app-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -973,7 +973,7 @@ In the [Flex Consumption plan](./flex-consumption-plan.md), these site propertie
973973
| `WEBSITE_VNET_ROUTE_ALL` |Not used for networking in Flex Consumption|
974974
| `properties.alwaysOn` |Not valid|
975975
| `properties.containerSize` |Renamed as `instanceMemoryMB`|
976-
| `properties.dnsConfiguration` | Custom DNS servers configured in the Azure Virtual Network are automatically used|
976+
| 'properties.dnsConfiguration.dnsServers'| DNS is inherited from the integrated virtual network in a Flex Consumption plan. |
977977
| `properties.ftpsState` | FTPS not supported |
978978
| `properties.isReserved` |Not valid|
979979
| `properties.IsXenon` |Not valid|

articles/migrate/set-discovery-scope.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,11 @@ This article describes how to limit the scope of discovery for servers in VMware
1818

1919
When you set up the appliance, it connects to vCenter Server and starts discovery. Before you connect the appliance to vCenter Server, you can limit discovery to vCenter Server datacenters, clusters, a folder of clusters, hosts, a folder of hosts, or individual servers. To set the scope, you assign permissions on the account that the appliance uses to access the vCenter Server.
2020

21+
Watch the following video to learn how to discover on-premises servers running in a VMware environment as part of your migration to Azure.
22+
23+
24+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=edbc7f22-2ba1-44cd-a534-465dfd426a14]
25+
2126
## Before you start
2227

2328
If you haven't set up a vCenter Server user account that Azure Migrate uses for discovery, do that now for [assessment](tutorial-discover-vmware.md#prepare-vmware) or [agentless migration](migrate-support-matrix-vmware-migration.md#agentless-migration).

articles/storage/blobs/network-file-system-protocol-known-issues.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,9 @@ This article describes limitations and known issues of Network File System (NFS)
2424

2525
- NFS 3.0 support can't be disabled in a storage account after you enable it.
2626

27-
- Geo-redundant storage (GRS), Geo-zone-redundant storage (GZRS), and Read-access geo-redundant storage (RA-GRS) redundancy options aren't supported when you create an NFS 3.0 storage account.
27+
- Geo-Redundant Storage (GRS) is supported only for unplanned failover scenarios and isn't supported for planned failover.
28+
29+
- Geo-zone-redundant storage (GZRS) and Read-access geo-redundant storage (RA-GRS) redundancy options aren't supported when you create an NFS 3.0 storage account.
2830

2931
- Access control lists (ACLs) can't be used to authorize an NFS 3.0 request. In fact, if the ACL or a blob or directory contains an entry for a named user or group, that file becomes inaccessible on the client for nonroot users. You have to remove these entries to restore access to nonroot users on the client. For information about how to remove an ACL entry for named users and groups, see [How to set ACLs](data-lake-storage-access-control.md#how-to-set-acls).
3032

articles/storage/blobs/object-replication-configure.md

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -319,6 +319,84 @@ N/A
319319

320320
---
321321

322+
## Configure blob index tags replication (preview)
323+
324+
Object replication now supports copying index tags from source blobs to destination blobs. You can configure this capability as part of a new or existing replication rule.
325+
326+
> [!IMPORTANT]
327+
> Tag replication is currently in PREVIEW.
328+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
329+
330+
### Prerequisites
331+
332+
The source storage account must be registered for the EnableObjectReplicationTags preview feature before tag replication can be enabled. Register the preview feature in the Azure portal by following the steps in the [Azure Resource Manager preview features](/azure/azure-resource-manager/management/preview-features?tabs=azure-portal) documentation.
333+
334+
### Enable Tags replication
335+
336+
Tags replication can be enabled on both new and existing object replication policies. Any change to a source blob or it's index tags will trigger replication of tags.
337+
338+
#### [Azure portal](#tab/portal)
339+
340+
Enable tags replication from the Object Replication blade when creating a rule or update existing rules using the Tags replication column.
341+
342+
To configure replicating blob index tags when creating a new rule, follow these steps:
343+
344+
1. Navigate to the source storage account in the Azure portal.
345+
1. Under **Data management**, select **Object replication**.
346+
1. Select **Create replication rules**.
347+
1. Select **Enable tags replication** and finally select **Save and apply** to configure replicating blob index tags.
348+
349+
To configure replicating blob index tags for exsiting rules, follow these steps:
350+
351+
1. Navigate to **Your accounts tab** in **Object replication** page
352+
1. Select **Enable** option under Tags replication column in **Objects copied from this account** table and select **OK**.
353+
1. Status of Tags replication column against a rule now shows **Enabled**.
354+
355+
To disable replicating blob index tags for exsiting rules, follow these steps:
356+
357+
1. Navigate to **Your accounts tab** in **Object replication** page
358+
2. Select an exsiting rule and select **Edit rules** from the '…' menu
359+
3. Unselect **Enable tags replication** option and finally select **Save and apply** to disable replicating blob index tags.
360+
361+
#### [PowerShell](#tab/powershell)
362+
363+
N/A.
364+
365+
#### [Azure CLI](#tab/azure-cli)
366+
367+
N/A.
368+
369+
#### [REST API](#tab/rest-api)
370+
371+
Users can use existing REST APIs: [Object Replication Policies - Create Or Update - REST API](/rest/api/storagerp/object-replication-policies/create-or-update) to configure policies for replicating tags set on the Blobs.
372+
373+
Add the following line ``` “tagsReplication”: { “enabled”: true }``` when creating or updating the replication
374+
rules on the source account.
375+
376+
Tags replication is supported on API version 2022-05-01 and above. You can add the new tagsReplication field to the replication policy.
377+
378+
Sample:
379+
380+
``` json
381+
{
382+
"sourceAccount": "<source-account-name>",
383+
"destinationAccount": "<destination-account-name>",
384+
"tagsReplication":
385+
{
386+
"enabled": true
387+
},
388+
"rules":
389+
[
390+
{
391+
"ruleId": "<rule-id>",
392+
"sourceContainer": "<source-container-name>",
393+
"destinationContainer": "<destination-container-name>"
394+
}
395+
]
396+
}
397+
```
398+
---
399+
322400
## Configure replication metrics
323401

324402
### Enable replication metrics

articles/storage/blobs/object-replication-overview.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,9 +76,13 @@ When a blob in the source account is deleted, the current version of the blob be
7676

7777
Object replication doesn't support blob snapshots. Any snapshots on a blob in the source account aren't replicated to the destination account.
7878

79-
## Blob index tags
79+
### Blob index tags
8080

81-
Object replication doesn't copy the source blob's index tags to the destination blob.
81+
Object replication now supports copying index tags from source blobs to destination blobs. You can configure this capability as part of a new or existing replication rule. For more information, see [Configure object replication](object-replication-configure.md#configure-blob-index-tags-replication-preview).
82+
83+
> [!IMPORTANT]
84+
> Tag replication is currently in PREVIEW.
85+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
8286
8387
### Blob tiering
8488

articles/storage/blobs/storage-feature-support-in-storage-accounts.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The following table describes whether a feature is supported in a standard gener
4646
| [Microsoft Entra security](authorize-access-azure-active-directory.md) | &#x2705; | &#x2705; | &#x2705;<sup>1</sup> | &#x2705;<sup>1</sup> |
4747
| [Azure DNS Zone endpoints (preview)](../common/storage-account-overview.md?toc=/azure/storage/blobs/toc.json#storage-account-endpoints) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |
4848
| [Blob inventory](blob-inventory.md) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |
49-
| [Blob index tags](storage-manage-find-blobs.md) | &#x2705; | &nbsp;&#x2B24; | &nbsp;&#x2B24; | &nbsp;&#x2B24; |
49+
| [Blob index tags](storage-manage-find-blobs.md) | &#x2705; | &#x1F7E6; | &#x1F7E6; | &#x1F7E6; |
5050
| [Blob snapshots](snapshots-overview.md) | &#x2705; | &#x1F7E6; | &#x1F7E6; | &#x1F7E6; |
5151
| [Blob Storage APIs](reference.md) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |
5252
| [Blob Storage Azure CLI commands](storage-quickstart-blobs-cli.md) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |
@@ -57,7 +57,7 @@ The following table describes whether a feature is supported in a standard gener
5757
| [Change feed](storage-blob-change-feed.md) | &#x2705; | &nbsp;&#x2B24; | &nbsp;&#x2B24; | &nbsp;&#x2B24; |
5858
| [Custom domains](storage-custom-domain-name.md) | &#x2705; | &#x1F7E6; | &#x1F7E6; | &#x1F7E6; |
5959
| [Customer-managed planned failover](../common/storage-disaster-recovery-guidance.md#customer-managed-planned-failover) | &#x2705; | &#x2705; | &nbsp;&#x2B24; | &#x2705; |
60-
| [Customer-managed (unplanned) failover](../common/storage-disaster-recovery-guidance.md#customer-managed-unplanned-failover) | &#x2705; | &#x2705; | &nbsp;&#x2B24; | &#x2705; |
60+
| [Customer-managed (unplanned) failover](../common/storage-disaster-recovery-guidance.md#customer-managed-unplanned-failover) | &#x2705; | &#x2705; | &#x1F7E6; | &#x2705; |
6161
| [Customer-managed keys with key vault in the same tenant](../common/customer-managed-keys-overview.md?toc=/azure/storage/blobs/toc.json) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |
6262
| [Customer-managed keys with key vault in a different tenant (cross-tenant)](../common/customer-managed-keys-overview.md?toc=/azure/storage/blobs/toc.json) | &#x2705; | &#x2705; | &nbsp;&#x2B24; | &nbsp;&#x2B24; |
6363
| [Customer-provided keys](encryption-customer-provided-keys.md) | &#x2705; | &nbsp;&#x2B24; | &nbsp;&#x2B24; | &nbsp;&#x2B24; |
@@ -97,7 +97,7 @@ The following table describes whether a feature is supported in a premium block
9797
| [Microsoft Entra security](authorize-access-azure-active-directory.md) | &#x2705; | &#x2705; | &#x2705;<sup>1</sup> | &#x2705;<sup>1</sup> |
9898
| [Azure DNS Zone endpoints (preview)](../common/storage-account-overview.md?toc=/azure/storage/blobs/toc.json#storage-account-endpoints) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |
9999
| [Blob inventory](blob-inventory.md) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |
100-
| [Blob index tags](storage-manage-find-blobs.md) | &#x2705; | &nbsp;&#x2B24; | &nbsp;&#x2B24; | &nbsp;&#x2B24; |
100+
| [Blob index tags](storage-manage-find-blobs.md) | &#x2705; | &#x1F7E6; | &#x1F7E6; | &#x1F7E6; |
101101
| [Blob snapshots](snapshots-overview.md) | &#x2705; | &#x1F7E6; | &#x1F7E6; | &#x1F7E6; |
102102
| [Blob Storage APIs](reference.md) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |
103103
| [Blob Storage Azure CLI commands](storage-quickstart-blobs-cli.md) | &#x2705; | &#x2705; | &#x2705; | &#x2705; |

articles/storage/blobs/storage-manage-find-blobs.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -327,11 +327,14 @@ You're charged for the monthly average number of index tags within a storage acc
327327

328328
[!INCLUDE [Blob Storage feature support in Azure Storage accounts](../../../includes/azure-storage-feature-support.md)]
329329

330+
> [!NOTE]
331+
> Blob Tags without indexing is available in Preview for hierarchical namespace (HNS) enabled storage accounts. To try this feature, users must register for “Blob Tags for Hierarchical Namespace” under the Preview features section of their subscription. Currently, Blob Tags on HNS enabled accounts are not integrated with blob storage features like Lifecycle Management.
332+
330333
## Conditions and known issues
331334

332335
This section describes known issues and conditions.
333336

334-
- Only general-purpose v2 accounts and premium block blob accounts are supported. Premium page blob, legacy blob, and accounts with a hierarchical namespace enabled aren't supported. General-purpose v1 accounts won't be supported.
337+
- Only general-purpose v2 accounts and premium block blob accounts are supported. Premium page blob, legacy blob aren't supported. General-purpose v1 accounts won't be supported.
335338

336339
- Uploading page blobs with index tags doesn't persist the tags. Set the tags after uploading a page blob.
337340

0 commit comments

Comments
 (0)