Skip to content

Commit ec5a35a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into llmf
2 parents 007a2c6 + 530d2b1 commit ec5a35a

96 files changed

Lines changed: 620 additions & 2951 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/api-management/api-management-gateways-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-api-management
88
ms.custom:
99
- build-2024
1010
ms.topic: concept-article
11-
ms.date: 02/11/2026
11+
ms.date: 02/17/2026
1212
ms.author: danlep
1313
---
1414

@@ -110,7 +110,7 @@ The following tables compare features available in the following API Management
110110
| [Pass-through GraphQL](graphql-apis-overview.md) | ✔️ | ✔️ |✔️ | ✔️ | ✔️ |
111111
| [Synthetic GraphQL](graphql-apis-overview.md)| ✔️ | ✔️ | ✔️<sup>1</sup> | ✔️<sup>1</sup> ||
112112
| [Pass-through WebSocket](websocket-api.md) | ✔️ | ✔️ || ✔️ | ✔️ |
113-
| [Pass-through gRPC](grpc-api.md) | ||| ✔️ ||
113+
| [Pass-through gRPC](grpc-api.md) | ✔️ ||| ✔️ ||
114114
| [OData](import-api-from-odata.md) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
115115
| [Azure OpenAI in Microsoft Foundry models and LLMs](azure-ai-foundry-api.md) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
116116
| [Pass-through MCP server](expose-existing-mcp-server.md) | ✔️ | ✔️ || ✔️ ||

articles/api-management/grpc-api.md

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: how-to
9-
ms.date: 10/06/2025
9+
ms.date: 02/18/2026
1010
ms.author: danlep
1111
ms.custom:
1212
- devx-track-arm-template
@@ -17,7 +17,7 @@ ms.custom:
1717
---
1818
# Import a gRPC API
1919

20-
[!INCLUDE [api-management-availability-premium-dev](../../includes/api-management-availability-premium-dev.md)]
20+
[!INCLUDE [api-management-availability-premium-dev-standard-basic](../../includes/api-management-availability-premium-dev-standard-basic.md)]
2121

2222
This article shows how to import a gRPC service definition as an API in API Management. You can then manage the API in API Management, secure access and apply other policies, and pass gRPC API requests through the gateway to the gRPC backend.
2323

@@ -30,21 +30,21 @@ To add a gRPC API to API Management, you need to:
3030
API Management supports pass-through with the following types of gRPC service methods: unary, server streaming, client streaming, and bidirectional streaming. To learn more about gRPC, see [Introduction to gRPC](https://grpc.io/docs/what-is-grpc/introduction/).
3131

3232
> [!NOTE]
33-
> * Currently, gRPC APIs are only supported in the self-hosted gateway, not the managed gateway for your API Management instance.
33+
> * gRPC APIs are supported in the [self-hosted gateway](self-hosted-gateway-overview.md) and in the managed gateway for classic tier instances created starting January 2026 (preview). Contact support to enable gRPC API support in classic tier instances created before this date. gRPC APIs currently aren't supported in the v2 tiers.
3434
> * Currently, testing gRPC APIs isn't supported in the test console of the Azure portal or in the API Management developer portal.
35-
> * Import is limited to a single protobuf (*.proto*) file.
35+
> * Import is limited to a single protobuf (*.proto*) file.
3636
3737
## Prerequisites
3838

3939
* An API Management instance. If you don't already have one, complete the following quickstart: [Create an Azure API Management instance](get-started-create-service-instance.md).
4040

41-
* A gateway resource provisioned in your instance. If you don't already have one, see [Provision a self-hosted gateway in Azure API Management](api-management-howto-provision-self-hosted-gateway.md).
42-
4341
* A gRPC protobuf (*.proto*) file available locally, and gRPC service that's accessible over HTTPS.
4442

43+
* HTTP/2 protocol support enabled for client traffic. For more information, see [Manage protocols and ciphers in Azure API Management](api-management-howto-manage-protocols-ciphers.md).
44+
4545
## Add a gRPC API
4646

47-
1. In the [Azure portal](https://portal.azure.com), navigate to your API Management instance.
47+
1. In the [Azure portal](https://portal.azure.com), go to your API Management instance.
4848

4949
1. Under **APIs** in the sidebar menu, select **APIs**.
5050

@@ -54,7 +54,7 @@ API Management supports pass-through with the following types of gRPC service me
5454

5555
1. In the **Create a gRPC API window**, select **Full**.
5656

57-
1. For a gRPC API, you must specify the following settings:
57+
1. For a gRPC API, specify the following settings:
5858

5959
1. Enter a display name.
6060

@@ -64,18 +64,15 @@ API Management supports pass-through with the following types of gRPC service me
6464

6565
1. For **Gateways**, select the gateway resource that you want to use to expose the API.
6666

67-
> [!IMPORTANT]
68-
> In public preview, you can only select a self-hosted gateway. The **Managed** gateway isn't supported.
69-
70-
1. Enter any remaining settings to configure your API. These settings are explained in the [Import and publish your first API](import-and-publish.md#import-and-publish-a-backend-api) tutorial.
67+
1. Enter any remaining settings to configure your API. The [Import and publish your first API](import-and-publish.md#import-and-publish-a-backend-api) tutorial explains these settings.
7168

7269
1. Select **Create**.
7370

74-
The API is added to the **APIs** list. You can view update your settings by going to the **Settings** tab of the API.
71+
The portal adds the API to the **APIs** list. You can view and update your settings by going to the **Settings** tab of the API.
7572

76-
## Call gRPC services with .NET
73+
## Call gRPC services by using .NET
7774

78-
For information about calling gRPC services with .NET, see the following articles:
75+
For information about calling gRPC services by using .NET, see the following articles:
7976

8077
* [Tutorial: Create a gRPC client and server in ASP.NET Core](/aspnet/core/tutorials/grpc/grpc-start)
8178
* [Troubleshoot gRPC on .NET](/aspnet/core/grpc/troubleshoot#calling-grpc-services-hosted-in-a-sub-directory)

articles/api-management/migrate-amazon-api-gateway-to-api-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ As part of the assessment, consider whether to retain or replace existing servic
142142
- *OpenAPI specifications* exported from an Amazon API Gateway REST API contain details specific to the frontend implementation in Amazon API Gateway, not the backend service. You need to remove AWS-specific tags and configure details in the specification (such as the backend service URL) before import to Azure API Management or during the migration process.
143143
- *Kubernetes microservices* backends, such as gRPC APIs, are handled differently:
144144
- Amazon API Gateway connects to the application load balancer in VPC, which in turn provides ingress to AWS EKS.
145-
- Azure API Management supports gRPC APIs on Kubernetes clusters accessed only through the self-hosted gateway.
145+
- Azure API Management typically supports gRPC and other microservice APIs on Kubernetes clusters through the self-hosted gateway.
146146
- Use of gRPC prevents the use of Application Gateway as a WAF.
147147

148148
### Compare API configurations

articles/application-gateway/configure-application-gateway-with-private-frontend-ip.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: application-gateway
66
author: mbender-ms
77
ms.service: azure-application-gateway
88
ms.topic: how-to
9-
ms.date: 08/09/2024
9+
ms.date: 02/26/2026
1010
ms.author: mbender
1111
ms.custom: sfi-image-nochange
1212
# Customer intent: "As a network administrator, I want to configure an internal load balancer with a private frontend IP for my application gateway, so that I can manage and optimize traffic for internal applications without exposing them to the Internet."
@@ -106,14 +106,19 @@ To do this:
106106
- Select **Windows Server 2019 Datacenter** for **Image**.
107107
- Type a valid **Username**.
108108
- Type a valid **Password**.
109+
- For **Public inbound ports**, select **None**.
109110
1. Accept the remaining defaults and select **Next: Disks**.
110111
1. Accept the defaults and select **Next : Networking**.
111112
1. Ensure that **myVNet** is selected for the virtual network and the subnet is **myBackendSubnet**.
113+
1. For **Public IP**, select **None**.
112114
1. Accept the remaining defaults, and select **Next : Management**.
113115
1. Select **Disable** to disable boot diagnostics.
114116
1. Select **Review + create**.
115117
1. Review the settings on the summary page, and then select **Create**. It may take several minutes to create the VM. Wait until the deployment finishes successfully before moving on to the next section.
116118

119+
> [!NOTE]
120+
> The default rules of the network security group block all inbound access from the internet, including RDP. To connect to the virtual machine, use Azure Bastion. For more information, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
121+
117122
### Install IIS
118123

119124
1. Open the Cloud Shell and ensure that it's set to **PowerShell**.

articles/application-gateway/create-multiple-sites-portal.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: application-gateway
66
author: mbender-ms
77
ms.service: azure-application-gateway
88
ms.topic: tutorial
9-
ms.date: 06/13/2023
9+
ms.date: 02/26/2026
1010
ms.author: mbender
1111
ms.custom: sfi-image-nochange
1212
#Customer intent: As an IT administrator, I want to use the Azure portal to set up an application gateway so I can host multiple sites.
@@ -170,13 +170,17 @@ To add backend targets, you'll:
170170
- **Region**: Select the same region that you used before.
171171
- **Username**: Enter a name for the administrator user name.
172172
- **Password**: Enter a password for the administrator.
173-
1. Accept the other defaults and then select **Next: Disks**.
173+
- **Public inbound ports**: Select **None**.
174+
1. Accept the other defaults and then select **Next: Disks**.
174175
2. Accept the **Disks** tab defaults and then select **Next: Networking**.
175-
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.<br>Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
176+
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Set **Public IP** to **None**. Accept the other defaults and then select **Next: Management**.<br>Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
176177
4. On the **Management** tab, set **Boot diagnostics** to **Disable**. Accept the other defaults and then select **Review + create**.
177178
5. On the **Review + create** tab, review the settings, correct any validation errors, and then select **Create**.
178179
6. Wait for the virtual machine creation to complete before continuing.
179180

181+
> [!NOTE]
182+
> The default rules of the network security group block all inbound access from the internet, including RDP. To connect to the virtual machine, use Azure Bastion. For more information, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
183+
180184
### Install IIS for testing
181185

182186
In this example, you install IIS on the virtual machines only to verify Azure created the application gateway successfully.

articles/application-gateway/create-ssl-portal.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: mbender-ms
66
ms.service: azure-application-gateway
77
ms.topic: tutorial
8-
ms.date: 06/30/2022
8+
ms.date: 02/26/2026
99
ms.author: mbender
1010
ms.custom: sfi-image-nochange
1111
#Customer intent: As an IT administrator, I want to use the Azure portal to configure Application Gateway with TLS termination so I can secure my application traffic.
@@ -197,9 +197,14 @@ To do this, you'll:
197197
- **Virtual machine name**: Enter *myVM* for the name of the virtual machine.
198198
- **Username**: Enter a name for the administrator user name.
199199
- **Password**: Enter a password for the administrator account.
200+
- **Public inbound ports**: Select **None**.
201+
202+
> [!NOTE]
203+
> The default rules of the network security group block all inbound access from the internet, including RDP. To connect to the virtual machine, use Azure Bastion. For more information, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
204+
200205
1. Accept the other defaults and then select **Next: Disks**.
201206
2. Accept the **Disks** tab defaults and then select **Next: Networking**.
202-
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
207+
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. For **Public IP**, select **None**. Accept the other defaults and then select **Next: Management**.
203208

204209
Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
205210
1. On the **Management** tab, set **Boot diagnostics** to **Disable**. Accept the other defaults and then select **Review + create**.
@@ -228,7 +233,7 @@ In this example, you install IIS on the virtual machines only to verify Azure cr
228233
-Location <location>
229234
```
230235

231-
3. Create a second virtual machine and install IIS by using the steps that you previously completed. Use *myVM2* for the virtual machine name and for the **VMName** setting of the **Set-AzVMExtension** cmdlet.
236+
3. Create a second virtual machine and install IIS by using the steps that you previously completed. Use *myVM2* for the virtual machine name and for the **VMName** setting of the **Set-AzVMExtension** cmdlet. Set **Public inbound ports** to **None** and **Public IP** to **None** as you did for *myVM*.
232237

233238
### Add backend servers to backend pool
234239

articles/application-gateway/deploy-basic-portal.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to deploy Application Gateway Basic.
55
services: application-gateway
66
author: mbender-ms
77
ms.topic: how-to
8-
ms.date: 05/06/2024
8+
ms.date: 02/26/2026
99
ms.author: mbender
1010
ms.service: azure-application-gateway
1111
ms.custom:
@@ -173,9 +173,13 @@ To do this:
173173
- **Username**: Type a name for the administrator user name.
174174
- **Password**: Type a password.
175175
- **Public inbound ports**: None.
176+
177+
> [!NOTE]
178+
> The default rules of the network security group block all inbound access from the internet, including RDP. To connect to the virtual machine, use Azure Bastion. For more information, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
179+
176180
4. Accept the other defaults and then select **Next: Disks**.
177181
5. Accept the **Disks** tab defaults and then select **Next: Networking**.
178-
6. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.<br>Application Gateway can communicate with instances outside of the virtual network that it's in, but you need to ensure there's IP connectivity.
182+
6. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Verify that **Public IP** is set to **None**. Accept the other defaults and then select **Next: Management**.<br>Application Gateway can communicate with instances outside of the virtual network that it's in, but you need to ensure there's IP connectivity.
179183
7. Select **Next: Monitoring** and set **Boot diagnostics** to **Disable**. Accept the other defaults and then select **Review + create**.
180184
8. On the **Review + create** tab, review the settings, correct any validation errors, and then select **Create**.
181185
9. Wait for the virtual machine creation to complete before continuing.

articles/application-gateway/tutorial-protect-application-gateway-ddos.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to set up an application gateway and protect it with Azur
55
services: application-gateway
66
author: duongau
77
ms.author: duau
8-
ms.date: 09/20/2023
8+
ms.date: 02/26/2026
99
ms.topic: quickstart
1010
ms.service: azure-application-gateway
1111
ms.custom: sfi-image-nochange
@@ -199,9 +199,13 @@ To do this, you'll:
199199
- **Username**: Type a name for the administrator user name.
200200
- **Password**: Type a password.
201201
- **Public inbound ports**: None.
202+
203+
> [!NOTE]
204+
> The default rules of the network security group block all inbound access from the internet, including RDP. To connect to the virtual machine, use Azure Bastion. For more information, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
205+
202206
4. Accept the other defaults and then select **Next: Disks**.
203207
5. Accept the **Disks** tab defaults and then select **Next: Networking**.
204-
6. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.<br>Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
208+
6. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Set **Public IP** to **None**. Accept the other defaults and then select **Next: Management**.<br>Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
205209
7. On the **Management** tab, set **Boot diagnostics** to **Disable**. Accept the other defaults and then select **Review + create**.
206210
8. On the **Review + create** tab, review the settings, correct any validation errors, and then select **Create**.
207211
9. Wait for the virtual machine creation to complete before continuing.

articles/azure-resource-manager/management/async-operations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
---
1+
---
22
title: Status of asynchronous operations
33
description: Describes how to track asynchronous operations in Azure. It shows the values you use to get the status of a long-running operation.
44
ms.topic: article
5-
ms.date: 01/22/2025
5+
ms.date: 02/27/2026
66
---
77

88
# Track asynchronous Azure operations

articles/azure-resource-manager/management/authenticate-multi-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
---
1+
---
22
title: Authenticate across tenants
33
description: Describes how Azure Resource Manager handles authentication requests across tenants.
44
ms.topic: article
55
ms.custom: devx-track-arm-template
6-
ms.date: 01/22/2025
6+
ms.date: 02/27/2026
77
---
88

99
# Authenticate requests across tenants

0 commit comments

Comments
 (0)