Service | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
api-management | Quickstart Terraform | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/api-management/quickstart-terraform.md | In this article, you learn how to: [!INCLUDE [terraform-apply-plan.md](~/azure-dev-docs-pr/articles/terraform/includes/terraform-apply-plan.md)] +> [!NOTE] +> It can take 30 to 40 minutes to create and activate an API Management service. + ## Verify the results #### [Azure CLI](#tab/azure-cli) |
automation | Automation Tutorial Installed Software | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/automation/automation-tutorial-installed-software.md | Title: Discover what software is installed on your VMs with Azure Automation | M description: This article describes the software installed on VMs across your environment. keywords: inventory, automation, change tracking Previously updated : 04/11/2018 Last updated : 10/24/2024 |
automation | Enable From Automation Account | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/automation/change-tracking/enable-from-automation-account.md | Title: Enable Azure Automation Change Tracking and Inventory from Automation acc description: This article tells how to enable Change Tracking and Inventory from an Automation account. Previously updated : 09/09/2024 Last updated : 10/24/2024 # Enable Change Tracking and Inventory from an Automation account -> [!Important] -> Change Tracking and Inventory using Log Analytics agent has retired on **31 August 2024** and we recommend that you use Azure Monitoring Agent as the new supporting agent. Follow the guidelines for [migration from Change Tracking and inventory using Log Analytics to Change Tracking and inventory using Azure Monitoring Agent version](guidance-migration-log-analytics-monitoring-agent.md). This article describes how you can use your Automation account to enable [Change Tracking and Inventory](overview.md) for VMs in your environment. To enable Azure VMs at scale, you must enable an existing VM using Change Tracking and Inventory. |
automation | Enable From Portal | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/automation/change-tracking/enable-from-portal.md | Title: Enable Azure Automation Change Tracking and Inventory from the Azure port description: This article tells how to enable the Change Tracking and Inventory feature from the Azure portal. Previously updated : 09/09/2024 Last updated : 10/24/2024 # Enable Change Tracking and Inventory from Azure portal -> [!Important] -> Change Tracking and Inventory using Log Analytics agent has retired on **31 August 2024** and we recommend that you use Azure Monitoring Agent as the new supporting agent. Follow the guidelines for [migration from Change Tracking and inventory using Log Analytics to Change Tracking and inventory using Azure Monitoring Agent version](guidance-migration-log-analytics-monitoring-agent.md). This article describes how you can enable [Change Tracking and Inventory](overview.md) for one or more Azure VMs in the Azure portal. To enable Azure VMs at scale, you must enable an existing VM using Change Tracking and Inventory. |
automation | Enable From Runbook | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/automation/change-tracking/enable-from-runbook.md | description: This article tells how to enable Change Tracking and Inventory from Previously updated : 09/09/2024 Last updated : 10/24/2024 # Enable Change Tracking and Inventory from a runbook -> [!Important] -> Change Tracking and Inventory using Log Analytics agent has retired on **31 August 2024** and we recommend that you use Azure Monitoring Agent as the new supporting agent. Follow the guidelines for [migration from Change Tracking and inventory using Log Analytics to Change Tracking and inventory using Azure Monitoring Agent version](guidance-migration-log-analytics-monitoring-agent.md). This article describes how you can use a runbook to enable [Change Tracking and Inventory](overview.md) for VMs in your environment. To enable Azure VMs at scale, you must enable an existing VM using Change Tracking and Inventory. |
automation | Enable From Vm | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/automation/change-tracking/enable-from-vm.md | Title: Enable Azure Automation Change Tracking and Inventory from an Azure VM description: This article tells how to enable Change Tracking and Inventory from an Azure VM. Previously updated : 09/09/2024 Last updated : 10/24/2024 # Enable Change Tracking and Inventory from an Azure VM + This article describes how you can use an Azure VM to enable [Change Tracking and Inventory](overview.md) on other machines. To enable Azure VMs at scale, you must enable an existing VM using Change Tracking and Inventory. > [!NOTE] |
azure-app-configuration | Enable Dynamic Configuration Dotnet | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/enable-dynamic-configuration-dotnet.md | Title: '.NET Framework Tutorial: dynamic configuration in Azure App Configuration' + Title: '.NET Framework: dynamic configuration in App Configuration' description: In this tutorial, you learn how to dynamically update the configuration data for .NET Framework apps using Azure App Configuration. |
azure-app-configuration | Enable Dynamic Configuration Java Spring App | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/enable-dynamic-configuration-java-spring-app.md | Title: Use dynamic configuration in a Spring Boot app -description: Learn how to dynamically update configuration data for Spring Boot apps +description: Learn how to dynamically update configuration data for Spring Boot apps using Azure App Configuration. ms.devlang: java Previously updated : 04/11/2023 Last updated : 03/07/2024 #Customer intent: As a Java Spring developer, I want to dynamically update my app to use the latest configuration data in App Configuration. Both libraries support manual triggering to check for refreshed configuration va Refresh allows you to update your configuration values without having to restart your application, though it causes all beans in the `@RefreshScope` to be recreated. It checks for any changes to configured triggers, including metadata. By default, the minimum amount of time between checks for changes, refresh interval, is set to 30 seconds. -`spring-cloud-azure-appconfiguration-config-web`'s automated refresh is triggered based on activity, specifically Spring Web's `ServletRequestHandledEvent`. If a `ServletRequestHandledEvent` is not triggered, `spring-cloud-azure-appconfiguration-config-web`'s automated refresh does not trigger a refresh even if the cache expiration time has expired. +`spring-cloud-azure-appconfiguration-config-web`'s automated refresh is triggered based on activity, specifically Spring Web's `ServletRequestHandledEvent`. If a `ServletRequestHandledEvent` isn't triggered, `spring-cloud-azure-appconfiguration-config-web`'s automated refresh doesn't trigger a refresh even if the cache expiration time has expired. ## Use manual refresh To use manual refresh, start with a Spring Boot app that uses App Configuration, such as the app you create by following the [Spring Boot quickstart for App Configuration](quickstart-java-spring-app.md). -App Configuration exposes `AppConfigurationRefresh`, which can be used to check if the cache is expired and if it is expired a refresh is triggered. +App Configuration exposes `AppConfigurationRefresh`, which can be used to check if the cache is expired. If it's expired, a refresh is triggered. -1. Update HelloController to use `AppConfigurationRefresh`. +1. To use `AppConfigurationRefresh`, update HelloController. ```java import com.azure.spring.cloud.config.AppConfigurationRefresh; App Configuration exposes `AppConfigurationRefresh`, which can be used to check `AppConfigurationRefresh`'s `refreshConfigurations()` returns a `Mono` that is true if a refresh has been triggered, and false if not. False means either the cache expiration time hasn't expired, there was no change, or another thread is currently checking for a refresh. -1. Update `bootstrap.properties` to enable refresh +1. Update `bootstrap.properties` to enable refresh: ```properties spring.cloud.azure.appconfiguration.stores[0].monitoring.enabled=true App Configuration exposes `AppConfigurationRefresh`, which can be used to check mvn spring-boot:run ``` -1. Open a browser window, and go to the URL: `http://localhost:8080`. You will see the message associated with your key. +1. Open a browser window, and go to the URL: `http://localhost:8080`. You see the message associated with your key. You can also use *curl* to test your application, for example: App Configuration exposes `AppConfigurationRefresh`, which can be used to check 1. Refresh the browser page twice to see the new message displayed. The first time triggers the refresh, the second loads the changes. > [!NOTE]-> The library only checks for changes on the after the refresh interval has passed, if the period hasn't passed then no change will be seen, you will have to wait for the period to pass then trigger the refresh check. +> The library only checks for changes on the after the refresh interval has passed. If the period hasn't passed then no change is displayed. Wait for the period to pass, then trigger the refresh check. ## Use automated refresh Then, open the *pom.xml* file in a text editor and add a `<dependency>` for `spr mvn spring-boot:run ``` -1. Open a browser window, and go to the URL: `http://localhost:8080`. You will see the message associated with your key. +1. Open a browser window, and go to the URL: `http://localhost:8080`. You now see the message associated with your key. You can also use *curl* to test your application, for example: Then, open the *pom.xml* file in a text editor and add a `<dependency>` for `spr 1. Refresh the browser page twice to see the new message displayed. The first time triggers the refresh, the second loads the changes, as the first request returns using the original scope. > [!NOTE]-> The library only checks for changes on after the refresh interval has passed. If the refresh interval hasn't passed then it will not check for changes, you will have to wait for the interval to pass then trigger the refresh check. +> The library only checks for changes on after the refresh interval has passed. If the refresh interval hasn't passed, then it doesn't check for changes. Wait for the interval to pass, then trigger the refresh check. ## Next steps |
azure-app-configuration | Enable Dynamic Configuration Java Spring Push Refresh | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/enable-dynamic-configuration-java-spring-push-refresh.md | Title: "Tutorial: Use dynamic configuration using push refresh in a single instance Java Spring app" + Title: "Use dynamic configuration using push refresh - Java Spring" description: In this tutorial, you learn how to dynamically update the configuration data for a Java Spring app using push refresh Event Grid Web Hooks require validation on creation. You can validate by followi ## Set up an event subscription -1. Open the App Configuration resource in the Azure portal, then click on `+ Event Subscription` in the `Events` pane. +1. Open the App Configuration resource in the Azure portal, then select `+ Event Subscription` in the `Events` pane. :::image type="content" source="./media/events-pane.png" alt-text="The events pane has an option to create new Subscriptions." ::: Event Grid Web Hooks require validation on creation. You can validate by followi 1. The endpoint is the URI of the application + "/actuator/appconfiguration-refresh?{your-token-name}={your-token-secret}". For example `https://my-azure-webapp.azurewebsites.net/actuator/appconfiguration-refresh?myToken=myTokenSecret` -1. Click on `Create` to create the event subscription. When `Create` is selected a registration request for the Web Hook will be sent to your application. This is received by the Azure App Configuration client library, verified, and returns a valid response. +1. Select `Create` to create the event subscription. When `Create` is selected a registration request for the Web Hook will be sent to your application. This is received by the Azure App Configuration client library, verified, and returns a valid response. -1. Click on `Event Subscriptions` in the `Events` pane to validate that the subscription was created successfully. +1. Select `Event Subscriptions` in the `Events` pane to validate that the subscription was created successfully. :::image type="content" source="./media/event-subscription-view-webhook.png" alt-text="Web Hook shows up in a table on the bottom of the page." ::: |
azure-app-configuration | Howto Convert To The New Spring Boot | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/howto-convert-to-the-new-spring-boot.md | ms.devlang: java Previously updated : 09/27/2023 Last updated : 01/13/2024 # Convert to the new App Configuration library for Spring Boot This article provides a reference on the changes and the actions needed to migra ## Group and artifact IDs changed -All of the group and artifact IDs in the Azure libraries for Spring Boot have been updated to match a new format. The new package names are: +All of the group and artifact IDs in the Azure libraries for Spring Boot are updated to match a new format. The new package names are: ### [Spring Boot 3](#tab/spring-boot-3) public class ConfigurationClientCustomizerImpl implements ConfigurationClientCus ## Possible conflicts with Spring Cloud Azure global properties -[Spring Cloud Azure common configuration properties](/azure/developer/java/spring-framework/configuration) enable you to customize your connections to Azure services. The new App Configuration library will pick up any global or App Configuration setting that's configured with Spring Cloud Azure common configuration properties. Your connection to App Configuration will change if the configurations are set for another Spring Cloud Azure library. +[Spring Cloud Azure common configuration properties](/azure/developer/java/spring-framework/configuration) enable you to customize your connections to Azure services. The new App Configuration library picks up any global or App Configuration setting that's configured with Spring Cloud Azure common configuration properties. Your connection to App Configuration changes if the configurations are set for another Spring Cloud Azure library. You can override this behavior by using `ConfigurationClientCustomizer`/`SecretClientCustomizer` to modify the clients. |
azure-app-configuration | Howto Leverage Json Content Type | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/howto-leverage-json-content-type.md | |
azure-app-configuration | Quickstart Feature Flag Spring Boot | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/quickstart-feature-flag-spring-boot.md | |
azure-app-configuration | Quickstart Javascript Provider | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/quickstart-javascript-provider.md | |
azure-app-configuration | Quickstart Python | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/quickstart-python.md | Title: Using Azure App Configuration in Python apps with the Azure SDK for Python | Microsoft Learn + Title: Using Azure App Configuration in Python apps with the Azure SDK for Python description: This document shows examples of how to use the Azure SDK for Python to access your data in Azure App Configuration. |
azure-app-configuration | Use Feature Flags Spring Boot | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-app-configuration/use-feature-flags-spring-boot.md | |
azure-cache-for-redis | Cache Overview Vector Similarity | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-cache-for-redis/cache-overview-vector-similarity.md | Vector similarity search can be used in multiple applications. Some common use-c - **Document Retrieval**. Use the deeper semantic understanding of text provided by LLMs to provide a richer document search experience where traditional keyword-based search falls short. [Document Retrieval Example](https://github.com/RedisVentures/redis-arXiv-search) - **Product Recommendation**. Find similar products or services to recommend based on past user activities, like search history or previous purchases. [Product Recommendation Example](https://github.com/RedisVentures/LLM-Recommender) - **Visual Search**. Search for products that look similar to a picture taken by a user or a picture of another product. [Visual Search Example](https://github.com/RedisVentures/redis-product-search)-- **Semantic Caching**. Reduce the cost and latency of LLMs by caching LLM completions. LLM queries are compared using vector similarity. If a new query is similar enough to a previously cached query, the cached query is returned. [Semantic Caching example using LangChain](https://python.langchain.com/docs/integrations/llms/llm_caching#redis-cache)+- **Semantic Caching**. Reduce the cost and latency of LLMs by caching LLM completions. LLM queries are compared using vector similarity. If a new query is similar enough to a previously cached query, the cached query is returned. [Semantic Caching example using LangChain](https://python.langchain.com/docs/integrations/llm_caching/#redis-cache) - **LLM Conversation Memory**. Persist conversation history with an LLM as embeddings in a vector database. Your application can use vector search to pull relevant history or "memories" into the response from the LLM. [LLM Conversation Memory example](https://github.com/continuum-llms/chatgpt-memory) ## Why choose Azure Cache for Redis for storing and searching vectors? |
azure-cache-for-redis | Cache Overview | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-cache-for-redis/cache-overview.md | Consider the following options when choosing an Azure Cache for Redis tier: - **High availability**: Azure Cache for Redis provides multiple [high availability](cache-high-availability.md) options. It guarantees that a Standard, Premium, or Enterprise cache is available according to our [SLA](https://azure.microsoft.com/support/legal/sla/cache/v1_0/). The SLA only covers connectivity to the cache endpoints. The SLA doesn't cover protection from data loss. We recommend using the Redis data persistence feature in the Premium and Enterprise tiers to increase resiliency against data loss. - **Data persistence**: The Premium and Enterprise tiers allow you to persist the cache data to an Azure Storage account and a Managed Disk respectively. Underlying infrastructure issues might result in potential data loss. We recommend using the Redis data persistence feature in these tiers to increase resiliency against data loss. Azure Cache for Redis offers both RDB and AOF (preview) options. Data persistence can be enabled through Azure portal and CLI. For the Premium tier, see [How to configure persistence for a Premium Azure Cache for Redis](cache-how-to-premium-persistence.md). - **Network isolation**: Azure Private Link and Virtual Network (VNet) deployments provide enhanced security and traffic isolation for your Azure Cache for Redis. VNet allows you to further restrict access through network access control policies. For more information, see [Azure Cache for Redis with Azure Private Link](cache-private-link.md) and [How to configure Virtual Network support for a Premium Azure Cache for Redis](cache-how-to-premium-vnet.md).-- **Redis Modules**: Enterprise tiers support [RediSearch](https://redis.io/docs/latest/operate/oss_and_stack/stack-with-enterprise/search/), [RedisBloom](https://redis.io/docs/latest/operate/oss_and_stack/stack-with-enterprise/bloom/), [RedisTimeSeries](https://docs.redis.com/latest/modules/redistimeseries/), and [RedisJSON](https://redis.io/docs/latest/operate/oss_and_stack/stack-with-enterprise/json/). These modules add new data types and functionality to Redis.+- **Redis Modules**: Enterprise tiers support [RediSearch](https://redis.io/docs/latest/operate/oss_and_stack/stack-with-enterprise/search/), [RedisBloom](https://redis.io/docs/latest/operate/oss_and_stack/stack-with-enterprise/bloom/), [RedisTimeSeries](https://redis.io/docs/latest/develop/data-types/timeseries/), and [RedisJSON](https://redis.io/docs/latest/operate/oss_and_stack/stack-with-enterprise/json/). These modules add new data types and functionality to Redis. You can scale your cache from the Basic tier up to Premium after it is created. Scaling down to a lower tier isn't supported currently. For step-by-step scaling instructions, see [How to Scale Azure Cache for Redis](cache-how-to-scale.md) and [How to scale - Basic, Standard, and Premium tiers](cache-how-to-scale.md#how-to-scalebasic-standard-and-premium-tiers). |
azure-netapp-files | Configure Network Features | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-netapp-files/configure-network-features.md | You can edit the network features option of existing volumes from *Basic* to *St >[!IMPORTANT] >It's not recommended that you use the edit network features option with Terraform-managed volumes due to risks. You must follow separate instructions if you use Terraform-managed volumes. For more information see, [Update Terraform-managed Azure NetApp Files volume from Basic to Standard](#update-terraform-managed-azure-netapp-files-volume-from-basic-to-standard). ->[!IMPORTANT] -> You should only use the edit network features option for an [application volume group for SAP HANA](application-volume-group-introduction.md) if you have enrolled in the [extension one preview](application-volume-group-introduction.md#extension-1-features), which adds support for Standard network features. ++### Considerations when editing networking features ++* You should only use the edit network features option for an [application volume group for SAP HANA](application-volume-group-introduction.md) if you have enrolled in the [extension one preview](application-volume-group-introduction.md#extension-1-features), which adds support for Standard network features. +* If you enabled both the `ANFStdToBasicNetworkFeaturesRevert` and `ANFBasicToStdNetworkFeaturesUpgrade` AFECs and are using 1 or 2-TiB capacity pools, see [Resize a capacity pool or a volume](azure-netapp-files-resize-capacity-pools-or-volumes.md) for information about sizing your capacity pools. +* <a name="no-downtime"></a> Azure NetApp Files supports a non-disruptive upgrade to Standard network features and a revert to Basic network features. This operation is expected to take at least 25 minutes. You can't create a regular or data protection volume or application volume group while the edit network feature operation is underway. This feature is currently in **preview** in the Australia East, Central India, North Central US, and Switzerland North regions. In all other regions, updating network features can cause a network disruption on the volumes for up to 5 minutes. > [!NOTE] > You need to submit a waitlist request for accessing the feature through the **[Azure NetApp Files standard networking features (edit volumes) Request Form](https://aka.ms/anfeditnetworkfeaturespreview)**. The feature can take approximately one week to be enabled after you submit the waitlist request. You can check the status of feature registration by using the following command: You can edit the network features option of existing volumes from *Basic* to *St > ``` > [!NOTE]-> You can also revert the option from *Standard* back to *Basic* network features. However, before performing the revert operation, you need to submit a waitlist request through the **[Azure NetApp Files standard networking features (edit volumes) Request Form](https://aka.ms/anfeditnetworkfeatures)**. The revert capability can take approximately one week to be enabled after you submit the waitlist request. You can check the status of the registration by using the following command: +> You can also revert the option from *Standard* back to *Basic* network features. Before performing the revert operation, you must submit a waitlist request through the **[Azure NetApp Files standard networking features (edit volumes) Request Form](https://aka.ms/anfeditnetworkfeatures)**. The revert capability can take approximately one week to be enabled after you submit the waitlist request. You can check the status of the registration by using the following command: > > ```azurepowershell-interactive > Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFStdToBasicNetworkFeaturesRevert You can edit the network features option of existing volumes from *Basic* to *St > > If you revert, considerations apply and require careful planning. See [Guidelines for Azure NetApp Files network planning](azure-netapp-files-network-topologies.md#constraints) for constraints and supported network topologies about Standard and Basic network features. -> [!IMPORTANT] -> Updating the network features option might cause a network disruption on the volumes for up to 5 minutes. -->[!NOTE] ->If you have enabled both the `ANFStdToBasicNetworkFeaturesRevert` and `ANFBasicToStdNetworkFeaturesUpgrade` AFECs are using 1 or 2-TiB capacity pools, see [Resize a capacity pool or a volume](azure-netapp-files-resize-capacity-pools-or-volumes.md) for information about sizing your capacity pools. +### Edit network features 1. Navigate to the volume for which you want to change the network features option. 1. Select **Change network features**. |
azure-netapp-files | Whats New | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-netapp-files/whats-new.md | + +## October 2024 ++* [Edit network features enhancement: no downtime](configure-network-features.md#no-downtime) (Preview) ++ Azure NetApp Files now supports the ability to edit network features (that is, upgrade from Basic to Standard network features) with no downtime for Azure NetApp Files volumes. Standard Network Features provide you with an enhanced virtual networking experience for a seamless and consistent experience along with security posture for Azure NetApp Files. ++ This feature is currently in preview in the Australia East, Central India, North Central US, and Switzerland North regions. ## September 2024 |
azure-resource-manager | Installation Troubleshoot | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-resource-manager/bicep/installation-troubleshoot.md | Last updated 03/20/2024 This article describes how to resolve potential errors in your Bicep installation. -## .NET runtime error --When installing the Bicep extension for Visual Studio Code, you may run into the following error messages: --```error -Failed to install .NET runtime v5.0 -``` --```error -Failed to download .NET 5.0.x ....... Error! -``` --> [!WARNING] -> This is a last resort solution that may cause problems when updating versions. --To solve the problem, you can manually install .NET from the [.NET website](https://aka.ms/dotnet-core-download), and then configure Visual Studio Code to reuse an existing installation of .NET with the following settings: --**Windows** --```json -"dotnetAcquisitionExtension.existingDotnetPath": [ - { - "extensionId": "ms-azuretools.vscode-bicep", - "path": "C:\\Program Files\\dotnet\\dotnet.exe" - } -] --``` --**macOS** --If you need an **x64** installation, use: --```json -"dotnetAcquisitionExtension.existingDotnetPath": [ - { - "extensionId": "ms-azuretools.vscode-bicep", - "path": "/usr/local/share/dotnet/x64/dotnet" - } -] -``` --For other **macOS** installations, use: --```json -"dotnetAcquisitionExtension.existingDotnetPath": [ - { - "extensionId": "ms-azuretools.vscode-bicep", - "path": "/usr/local/share/dotnet/dotnet" - } -] -``` --See [User and Workspace Settings](https://code.visualstudio.com/docs/getstarted/settings) for configuring Visual Studio Code settings. - ## Visual Studio Code error If you see the following error message popup in Visual Studio Code: From VS Code, open the **Output** view in the pane at the bottom of the screen, :::image type="content" source="./media/installation-troubleshoot/visual-studio-code-output-pane-bicep.png" alt-text="Visual Studio Code output pane"::: -If you see the following output in the pane, and you're using Bicep CLI **version 0.4.1124** or later, check whether you have added the `dotnetAcquisitionExtension.existingDotnetPath` configuration option to VS Code. See [.NET runtime error](#net-runtime-error). If this configuration option is present, remove it and restart VS Code. +If you see the following output in the pane, check whether you have added the `dotnetAcquisitionExtension.existingDotnetPath` setting to VS Code. If this setting is present, remove it and restart VS Code. See [User and Workspace Settings](https://code.visualstudio.com/docs/getstarted/settings) for configuring Visual Studio Code settings. ```error It was not possible to find any compatible framework version. |
azure-resource-manager | Azure Services Resource Providers | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-resource-manager/management/azure-services-resource-providers.md | The resource providers for AI and machine learning services are: | Microsoft.BotService | [Azure Bot Service](/azure/bot-service/) | | Microsoft.CognitiveServices | [Cognitive Services](/azure/ai-services/) | | Microsoft.EnterpriseKnowledgeGraph | Enterprise Knowledge Graph |-| Microsoft.MachineLearning | [Machine Learning Studio](/azure/machine-learning/classic/) | | Microsoft.MachineLearningServices | [Azure Machine Learning](/azure/machine-learning/) | | Microsoft.Search | [Azure AI Search](/azure/search/) | |
azure-resource-manager | Create Visual Studio Deployment Project | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-resource-manager/templates/create-visual-studio-deployment-project.md | Title: Create & deploy Visual Studio resource group projects description: Use Visual Studio to create an Azure resource group project and deploy the resources to Azure. Previously updated : 03/20/2024 Last updated : 10/24/2024 # Creating and deploying Azure resource groups through Visual Studio Last updated 03/20/2024 > The Azure Resource Group project is now in extended support, meaning we will continue to support existing features and capabilities but won't prioritize adding new features. > [!NOTE]-> For the best and most secure experience, we strongly recommend updating your Visual Studio installation to the [latest Long-Term Support (LTS) version](/visualstudio/install/update-visual-studio?view=vs-2022). Upgrading will improve both the reliability and overall performance of your Visual Studio environment. +> For the best and most secure experience, we strongly recommend updating your Visual Studio installation to the [latest Long-Term Support (LTS) version](/visualstudio/install/update-visual-studio). Upgrading will improve both the reliability and overall performance of your Visual Studio environment. If you choose not to upgrade, you may encounter the issues documented in [Issues when creating and deploying Azure resource groups through Visual Studio](https://learn.microsoft.com/troubleshoot/developer/visualstudio/ide/troubleshoot-create-deploy-resource-group). With Visual Studio, you can create a project that deploys your infrastructure and code to Azure. For example, you can deploy the web host, website, and code for the website. Visual Studio provides many different starter templates for deploying common scenarios. In this article, you deploy a web app. This article shows how to use [Visual Studio 2019 or later with the Azure develo In this section, you create an Azure Resource Group project with a **Web app** template. 1. In Visual Studio, choose **File**>**New**>**Project**.-1. Select the **Azure Resource Group** project template and **Next**. +1. Search **resource group**, and then select the **Azure Resource Group (extended support)** project template and **Next**. - :::image type="content" source="./media/create-visual-studio-deployment-project/create-project.png" alt-text="Screenshot of Create a new project window highlighting Azure Resource Group and Next button."::: + :::image type="content" source="./media/create-visual-studio-deployment-project/add-app.png" alt-text="Screenshot of Create a new project window highlighting Azure Resource Group and Next button."::: 1. Give your project a name. The other default settings are probably fine, but review them to make they work for your environment. When done, select **Create**. You can customize a deployment project by modifying the Resource Manager templat :::image type="content" source="./media/create-visual-studio-deployment-project/navigate-json.png" alt-text="Screenshot of the Visual Studio editor with a selected element in the JSON Outline window."::: -1. You can add a resource by either selecting the **Add Resource** button at the top of the JSON Outline window, or by right-clicking **resources** and selecting **Add New Resource**. +1. You can add a resource by right-clicking **resources** and selecting **Add New Resource**. :::image type="content" source="./media/create-visual-studio-deployment-project/add-resource.png" alt-text="Screenshot of the JSON Outline window highlighting the Add New Resource option."::: You can customize a deployment project by modifying the Resource Manager templat } ``` -1. Navigate to the **HostingPlan** resource, and add a value for the **properties** with some properties. -- ```json - "properties": { - "name": "[parameters('hostingPlanName')]", - "numberOfWorkers": 1 - } - ``` -- You also need to define the `hostingPlanName` parameter: -- ```json - "hostingPlanName": { - "type": "string", - "metadata": { - "description": "Hosting paln name." - } - } - ``` --1. Open the **WebSite.parameters.json** file. You use the parameters file to pass in values during deployment that customize the resource being deployed. Give the hosting plan a name, and save the file. -- ```json - { - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#", - "contentVersion": "1.0.0.0", - "parameters": { - "hostingPlanName": { - "value": "demoHostPlan" - } - } - } - ``` - ## Deploy project to Azure You're now ready to deploy your project to a resource group. At this point, you've deployed the infrastructure for your app, but there's no a 1. Add an **ASP.NET Core Web Application**. - :::image type="content" source="./media/create-visual-studio-deployment-project/add-app.png" alt-text="Screenshot of the New Project window with ASP.NET Core Web Application selected."::: + :::image type="content" source="./media/create-visual-studio-deployment-project/arm-vs-create-aspnet-core-web-app.png" alt-text="Screenshot of the New Project window with ASP.NET Core Web Application selected."::: 1. Give your web app a name, and select **Create**. At this point, you've deployed the infrastructure for your app, but there's no a Save your template. -1. There are some new parameters in your template. They were added in the previous step. You don't need to provide values for **_artifactsLocation** or **_artifactsLocationSasToken** because those values are automatically generated. However, you have to set the folder and file name to the path that contains the deployment package. The names of these parameters end with **PackageFolder** and **PackageFileName**. The first part of the name is the name of the Web Deploy resource you added. In this article, they're named **ExampleAppPackageFolder** and **ExampleAppPackageFileName**. +1. There are some new parameters added in the previous step. ++ :::image type="content" source="./media/create-visual-studio-deployment-project/new-parameters.png" alt-text="Screenshot of the new parameters."::: + You don't need to provide values for **_artifactsLocation** or **_artifactsLocationSasToken** because those values are automatically generated. However, you have to set the folder and file name to the path that contains the deployment package. The names of these parameters end with **PackageFolder** and **PackageFileName**. The first part of the name is the name of the Web Deploy resource you added. In this article, they're named **ExampleAppPackageFolder** and **ExampleAppPackageFileName**. + Open **Website.parameters.json** and set those parameters to the values you saw in the reference properties. Set **ExampleAppPackageFolder** to the name of the folder. Set **ExampleAppPackageFileName** to the name of the zip file. ```json At this point, you've deployed the infrastructure for your app, but there's no a "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#", "contentVersion": "1.0.0.0", "parameters": {- "hostingPlanName": { - "value": "demoHostPlan" - }, "ExampleAppPackageFolder": { "value": "ExampleApp" }, |
azure-resource-manager | Update Visual Studio Deployment Script | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-resource-manager/templates/update-visual-studio-deployment-script.md | Title: Update Visual Studio's template deployment script to use Az PowerShell description: Update the Visual Studio template deployment script from AzureRM to Az PowerShell Previously updated : 10/18/2024 Last updated : 10/24/2024 # Update Visual Studio template deployment script to use Az PowerShell module Last updated 10/18/2024 > The Azure Resource Group project is now in extended support, meaning we will continue to support existing features and capabilities but won't prioritize adding new features. > [!NOTE]-> For the best and most secure experience, we strongly recommend updating your Visual Studio installation to the [latest Long-Term Support (LTS) version](/visualstudio/install/update-visual-studio?view=vs-2022). Upgrading will improve both the reliability and overall performance of your Visual Studio environment. +> For the best and most secure experience, we strongly recommend updating your Visual Studio installation to the [latest Long-Term Support (LTS) version](/visualstudio/install/update-visual-studio). Upgrading will improve both the reliability and overall performance of your Visual Studio environment. If you choose not to upgrade, you may encounter the issues documented in [Issues when creating and deploying Azure resource groups through Visual Studio](https://learn.microsoft.com/troubleshoot/developer/visualstudio/ide/troubleshoot-create-deploy-resource-group). Visual Studio 16.4 supports using the Az PowerShell module in the template deployment script. However, Visual Studio doesn't automatically install that module. To use the Az module, you need to take four steps: |
azure-vmware | Vmware Cloud Foundations License Portability | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/azure-vmware/vmware-cloud-foundations-license-portability.md | Title: Use VMware Cloud Foundations (VCF) license portability on Azure VMware Solution- + Title: Use Portable VMware Cloud Foundations (VCF) on Azure VMware Solution -description: Bring your own VMware Cloud Foundations (VCF) License on Azure VMware Solution +description: Bring your own portable VMware Cloud Foundations (VCF) on Azure VMware Solution Last updated 9/30/2024 -# Use VMware Cloud Foundations (VCF) license portability on Azure VMware Solution +# Use Portable VMware Cloud Foundations (VCF) on Azure VMware Solution -This article discusses how to modernize your VMware workloads by bringing your VMware Cloud Foundations (VCF) entitlements to Azure VMware Solutions and take advantage of incredible cost savings as you modernize your VMware workloads. With Azure VMware Solution, you access both the physical infrastructure and the licensing entitlements for the entire VMware software-defined datacenter (SDDC) stack, including vSphere, ESXi, NSX networking, NSX Firewall, and HCX. With the new VCF license portability option, you can apply your on-premises VCF entitlements, purchased from Broadcom, directly to the Azure VMware Solution infrastructure. This flexibility means you can seamlessly integrate your VMware assets into a fully managed, state-of-the-art Azure environment, maximizing efficiency and cutting costs. Upgrade with confidence and experience the power and flexibility of Azure VMware Solution today! +This article discusses how to modernize your VMware workloads by bringing your portable VMware Cloud Foundations (VCF) to Azure VMware Solutions and take advantage of incredible cost savings as you modernize your VMware workloads. With Azure VMware Solution, you access both the physical infrastructure and the licensing entitlements for the entire VMware software-defined datacenter (SDDC) stack, including vSphere, ESXi, NSX networking, NSX Firewall, and HCX. With the new VCF subscription portability option, you can apply your on-premises VCF entitlements, purchased from Broadcom, directly to the Azure VMware Solution infrastructure. This flexibility means you can seamlessly integrate your VMware assets into a fully managed, state-of-the-art Azure environment, maximizing efficiency and cutting costs. Upgrade with confidence and experience the power and flexibility of Azure VMware Solution today! ## What's changing? -Private Cloud on the VCF license portability offering, must have prepurchase Firewall add-on from Broadcom along with the VCF subscription to use the vDefend Firewall on Azure VMware Solution. Prior to using the vDefend Firewall software on Azure VMware Solution ensure you register your Firewall add-on with Microsoft. For detailed instructions on how to register your VCF license, see "Register your VCF license with Azure VMware Solution" later in this article. +Private Cloud on the portable VCF offering, must have prepurchase Firewall add-on from Broadcom along with the VCF subscription to use the vDefend Firewall on Azure VMware Solution. Prior to using the vDefend Firewall software on Azure VMware Solution ensure you register your Firewall add-on with Microsoft. For detailed instructions on how to register your portable VCF, see "Register your portable VCF with Azure VMware Solution" later in this article. >[!IMPORTANT] >->VCF portable licenses are applied at the host level and must cover all the physical cores on a host. For example, if each host in Azure VMware Solution has 36 cores and you intend to have a Private Cloud with 3 nodes, the VCF portable license must cover 108 (3*36) cores. ->In the current version, if you want to use your own license on an Azure subscription for the Azure VMware Solution workloads, all the nodes (cores) in that subscription including multiple Private Clouds need to be purchased through Broadcom and covered under your Broadcom VCF license portability contract. At the moment, you're required to bring VCF license entitlements that cover cores for all the nodes deployed within your Azure Subscription. +> Your portable VCF is applied at the host level and must cover all the physical cores on a host. For example, if each host in Azure VMware Solution has 36 cores and you intend to have a Private Cloud with 3 nodes, the portable VCF must cover 108 (3*36) cores. +>In the current version, if you want to use your own portable VCF on your Azure subscription for the Azure VMware Solution workloads, all the nodes (cores) in that subscription including multiple Private Clouds need to be purchased through Broadcom and covered under your Broadcom portable VCF contract. At the moment, you're required to bring portable VCF entitlements that cover cores for all the nodes deployed within your Azure subscription. -## Purchasing VCF license portability offering on Azure VMware Solution +## Purchasing VCF subscription portability offering on Azure VMware Solution -We offer three flexible commitments and pricing options for using your own VCF license on Azure VMware Solution. You can choose from pay-as-you-go, 1-year Reserved Instance (RI), and 3-year RI options. +We offer three flexible commitments and pricing options for using your portable VCF on Azure VMware Solution. You can choose from pay-as-you-go, 1-year Reserved Instance (RI), and 3-year RI options. **NOTE:** 3-year RI option is discontinued for AV36 node type. -To take advantage of the Reserved Instance (RI) pricing for the VCF license portability offering, purchase an RI under the Product Name- VCF BYOL. For example, if your private cloud uses AV36P nodes, you must [purchase the Reserved Instance](/azure/azure-vmware/reserved-instance?toc=%2Fazure%2Fcost-management-billing%2Freservations%2Ftoc.json#buy-a-reservation) for the Product Name- AV36P VCF BYOL. To use the pay-as-you-go pricing for the VCF license portability offering, you only need to register your VCF license. +To take advantage of the Reserved Instance (RI) pricing for the portable VCF offering on Azure VMware Solution, purchase an RI under the Product Name- VCF BYOL. For example, if your private cloud uses AV36P nodes, you must [purchase the Reserved Instance](/azure/azure-vmware/reserved-instance?toc=%2Fazure%2Fcost-management-billing%2Freservations%2Ftoc.json#buy-a-reservation) for the Product Name- AV36P VCF BYOL. To use the pay-as-you-go pricing for the portable VCF offering, you only need to register your VCF subscription. +>[!IMPORTANT] +> If you are converting your existing Azure VMware Solution private cloud to leverage the portable VCF pricing, you must ensure to exchange the existing Reserve Instance (RI) on your subscription to VCF BYOL RI. Unless you have RI under \<node-type\>-VCF BYOL, you will be charged the VCF BYOL pay-as-you-go pricing. + -## Request host quota with VCF license portability +## Request host quota with VCF subscription portability Existing: :::image type="content" source="media/vmware-cloud-foundations-license-portability/quota-request-old.png" alt-text="Screenshot of quota request description for existing Azure VMware Solution." border="true"::: -To request quota for VCF license portability offering, provide the following additional information in the **Description** of the support ticket: +To request quota for portable VCF offering, provide the following additional information in the **Description** of the support ticket: - Region Name - Number of hosts - Host SKU type -- Add the following statement as is, by replacing "N" with the "Number of VCF BYOL cores" you purchased from Broadcom for license portability to Azure VMware Solutions: -**"I acknowledge that I have procured portable VCF license from Broadcom for "N" cores to use with Azure VMware Solutions."** +- Add the following statement as is, by replacing "N" with the "Number of VCF BYOL cores" you purchased from Broadcom for VCF portability to Azure VMware Solutions: +**"I acknowledge that I have procured portable VCF subscription from Broadcom for "N" cores to use with Azure VMware Solutions."** - Any other details, including Availability Zone requirements for integrating with other Azure services; for example, Azure NetApp Files, Azure Blob Storage >[!NOTE] >->VCF portable license is applied at the host level and must cover all the physical cores on a host. ->Hence, quota will be approved only for the maximum number of nodes which the VCF portable license covers. For example, if you have purchased 1000 cores for portability and requesting for AV36P, you can get a maximum of 27 nodes quota approved for your subscription. +>Portable VCF is applied at the host level and must cover all the physical cores on a host. +>Hence, quota will be approved only for the maximum number of nodes which the portable VCF covers. For example, if you have purchased 1000 cores for portability and requesting for AV36P, you can get a maximum of 27 nodes quota approved for your subscription. > >That is, 36 physical CPU cores per AV36P node. 27 nodes = 27\*36 = 972 cores. 28 nodes = 28\*36 = 1008 cores. If you have purchased 1000 cores for portability, you can only use up to 27 AV36P nodes under your portable VCF. -## Register your VCF license with Azure VMware Solution +## Register your portable VCF with Azure VMware Solution -To get your quota request approved, you must first register the VCF portable license details with Microsoft. Quota will be approved only after the entitlements are provided. Expect to receive a response in 1 to 2 business days. +To get your quota request approved, you must first register the portable VCF details with Microsoft. Quota will be approved only after the entitlements are provided. Expect to receive a response in 1 to 2 business days. -### How to register the VCF license keys +### How to register the VCF subscription keys -- Email your VCF license entitlements (and VMware vDefender Firewall license entitlements if to enable vDefender Firewall on Azure VMware Solution) to the following email address: registeravsvcfbyol@microsoft.com. +- Email your portable VCF entitlements (and VMware vDefender Firewall license entitlements if to enable vDefender Firewall on Azure VMware Solution) to the following email address: registeravsvcfbyol@microsoft.com. - VCF entitlement sample: >[!NOTE] >->The "Qty" represents the number of cores eligible for VCF license portability. Your quota request should not surpass the number of nodes equivalent to your entitled cores from Broadcom. If your quota request exceeds the approved cores, the quota request will be granted only for the number of nodes that are fully covered by the entitled cores. +>The "Qty" represents the number of cores eligible for VCF portability. Your quota request should not surpass the number of nodes equivalent to your entitled cores from Broadcom. If your quota request exceeds the approved cores, the quota request will be granted only for the number of nodes that are fully covered by the entitled cores. - VCF with VMware vDefend entitlement sample: :::image type="content" source="media/vmware-cloud-foundations-license-portability/vcf-vdefend-entitlements.png" alt-text="Screenshot of VCF with Vmware vDefend entitlement sample format." border="false"::: Sample Email to register portable VCF entitlements: The VMware vDefend Firewall add-on CPU cores required on Azure VMware Solution depend on the planned feature usage: - For NSX Distributed Firewall: same core count as VCF core count. The VMware vDefend Firewall add-on CPU cores required on Azure VMware Solution d >[!NOTE] > -> The VCF license entitlements submitted to Microsoft will be securely retained for our reporting purpose. You can request the permanent deletion of this data from Microsoft's systems at any time. Once the automated validation process is in place, your data will be automatically deleted from all Microsoft systems, which may take up to 120 days. Additionally, all your VCF entitlement data will be permanently deleted within 120 days any time you migrate to an Azure VMware Solution-owned VCF solution. +> The portable VCF entitlements submitted to Microsoft will be securely retained for our reporting purpose. You can request the permanent deletion of this data from Microsoft's systems at any time. Once the automated validation process is in place, your data will be automatically deleted from all Microsoft systems, which may take up to 120 days. Additionally, all your VCF entitlement data will be permanently deleted within 120 days any time you migrate to an Azure VMware Solution-owned VCF solution. ## Creating/scaling a Private Cloud -You can create your Azure VMware Solution Private Cloud the same way as today regardless of your licensing method, that is, whether you bring your own VCF portable license or use the Azure VMware Solution-owned VCF license. [Learn more](/azure/azure-vmware/plan-private-cloud-deployment). Your decision of licensing is a cost optimization choice and doesn't affect your deployment workflow. +You can create your Azure VMware Solution private cloud the same way as today regardless of your licensing method, that is, whether you bring your own portable VCF or use the Azure VMware Solution-owned VCF subscription. [Learn more](/azure/azure-vmware/plan-private-cloud-deployment). Your decision of licensing is a cost optimization choice and doesn't affect your deployment workflow. For example, you want to deploy 10 nodes of AV36P node type. **Scenario 1:**-"I want to purchase my VCF subscription from Broadcom and use the license portability offering on Azure VMware Solution." +"I want to purchase my VCF subscription from Broadcom and use the portable VCF offering on Azure VMware Solution." -1. Create quota request for AV36P nodes. Declare your own VCF portable license intent and the number of cores you're entitled for portability. +1. Create quota request for AV36P nodes. Declare your own VCF portable subscription intent and the number of cores you're entitled for portability. 2. Register your VCF entitlements via email to Microsoft. -3. Optional- to use the Reserved Instance pricing purchase AV36P VCF BYOL Reserved Instance. You can skip this step to use the pay-as-you-go pricing for the VCF license portability. +3. Optional- to use the Reserved Instance pricing purchase AV36P VCF BYOL Reserved Instance. You can skip this step to use the pay-as-you-go pricing for the portable VCF. 4. Create your Private Cloud with AV36P nodes. **Scenario 2:**-"I want to let Azure VMware Solution manage my license for all my Azure VMware Solution private cloud." +"I want to let Azure VMware Solution manage my VCF subscription for all my Azure VMware Solution private cloud." 1. Create quota request for AV36P node type. 2. Optional- Purchase AV36P Reserved Instance. For example, you want to deploy 10 nodes of AV36P node type. ## Moving between the two VCF licensing methods -If you're currently managing your own VCF licensing for Azure VMware Solution and wish to transition to Azure VMware Solution-owned licensing, you can easily make the switch without any changes to your Private Cloud. +If you're currently managing your own VCF subscription for Azure VMware Solution and wish to transition to Azure VMware Solution-owned VCF subscription, you can easily make the switch without any changes to your private cloud. ++If you're an existing Azure VMware Solution customer and wish to transition to the portable VCF (VCF BYOL) offering, you can also easily make the switch without any changes to your private cloud deployments by registering your portable VCF entitlements with Microsoft. **Steps:** 1. Create a support request to inform us of your intent to convert.-2. Exchange RI- If you have any active RI with VCF BYOL, exchange them for non-VCF BYOL RI. For instance, you can [exchange your AV36P VCF BYOL RI for an AV36P](/azure/cost-management-billing/reservations/exchange-and-refund-azure-reservations). +2. Exchange RI- If you have any active RI with VCF BYOL, exchange them for non-VCF BYOL RI. For instance, you can [exchange your AV36P VCF BYOL RI for an AV36P or vice versa](/azure/cost-management-billing/reservations/exchange-and-refund-azure-reservations). ++**NOTE:** If you have RIs for your current deployments, ensure to exchange RI for the right Product Name to continue to get the discounted RI pricing. Without this step, you will incur the pay-as-you-go cost. -If you're an existing Azure VMware Solution customer using Azure VMware Solution-owned licensing deployments and wish to transition to the license portability (VCF BYOL) offering, you can also easily make the switch without any changes to your Private Cloud deployments by registering your VCF entitlements with Microsoft. >[!NOTE] >->You need to purchase the VCF entitlements from Broadcom for all cores that match your current Azure VMware Solution deployment. For instance, if your Azure subscription has a Private Cloud with 100 AV36P nodes, you must purchase VCF subscription for atleast 3600 cores from Broadcom to convert to VCF BYOL offering. +>You need to purchase the portable VCF entitlements from Broadcom for all cores that match your current Azure VMware Solution deployment. For instance, if your Azure subscription has a private cloud with 100 AV36P nodes, you must purchase portable VCF for atleast 3600 cores from Broadcom to convert to VCF BYOL offering. ++## "Onboarding to portable VCF on Azure VMware Solution" Checklist ++**Scenario 1:** +"I am converting existing AVS private cloud to VCF BYOL." ++1. Get your portable VCF subscription from Broadcom. +2. If you have an RI purchased, exchange the RI to the corresponding VCF BYOL RI. +3. Register your portable VCF with Azure VMware Solution. ++**Scenario 2:** +"I am creating a new AVS private cloud with VCF BYOL." ++1. Get your portable VCF subscription from Broadcom. +2. [Request host quota](/azure/azure-vmware/request-host-quota-azure-vmware-solution) for Azure VMware Solution. +3. If you intend to leverage the RI pricing, purchase the RI under the "VCF BYOL" product name. ++**NOTE:** If you register your portable VCF without this step, you will be charged BYOL pay-as-you-go pricing by default for your usage. To leverage the RI pricing, ensure the RI purchase under the right region, host count, and product name (VCF BYOL in this case). |
backup | Backup Support Matrix Iaas | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/backup/backup-support-matrix-iaas.md | Title: Support matrix for Azure VM backups description: Get a summary of support settings and limitations for backing up Azure VMs by using the Azure Backup service. Previously updated : 10/17/2024 Last updated : 10/24/2024 Shared storage| Backing up VMs by using Cluster Shared Volumes (CSV) or Scale-Ou <a name="ultra-disk-backup">Ultra disks</a> | Supported with [Enhanced policy](backup-azure-vms-enhanced-policy.md).[Learn about the disk considerations for Azure VM](/azure/virtual-machines/disks-types#ultra-disk-limitations). <br><br> - Configuration of Ultra disk protection is supported via Recovery Services vault and via virtual machine blade. <br><br> - File-level restore is currently not supported for machines using Ultra disks. <br><br> - GRS vaults and Cross-Region Restore are currently supported in the following regions for machines using Ultra Disks: Southeast Asia, East Asia, North Europe, West Europe, East US, West US, and West US 3. <a name="premium-ssd-v2-backup">Premium SSD v2</a> | Supported with [Enhanced policy](backup-azure-vms-enhanced-policy.md). [Learn about the disk considerations for Azure VM](/azure/virtual-machines/disks-types#regional-availability). <br><br> - Configuration of Premium SSD v2 disk protection is supported via Recovery Services vault and via virtual machine blade. <br><br> - File-level restore is currently not supported for machines using Premium SSD v2 disks. <br><br> - GRS vaults and Cross-Region Restore are currently supported in the following regions for machines using Premium SSDv2 Disks: Southeast Asia, East Asia, North Europe, West Europe, East US, West US, and West US 3. [Temporary disks](/azure/virtual-machines/managed-disks-overview#temporary-disk) | Azure Backup doesn't back up temporary disks.-NVMe/[ephemeral disks](/azure/virtual-machines/ephemeral-os-disks) | Not supported. +NVMe/[ephemeral disks](/azure/virtual-machines/ephemeral-os-disks) | Supported. [Resilient File System (ReFS)](/windows-server/storage/refs/refs-overview) restore | Supported. Volume Shadow Copy Service (VSS) supports app-consistent backups on ReFS. Dynamic disk with spanned or striped volumes | Supported, unless you enable the selective disk feature on an Azure VM. VMs with encryption at host | Supported |
bastion | Whats New | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/bastion/whats-new.md | + + Title: What's new in Azure Bastion? +description: Learn what's new with Azure Bastion, such as the latest release notes, known issues, bug fixes, deprecated functionality, and upcoming changes. +++ Last updated : 10/24/2024++++# What's new in Azure Bastion? ++Azure Bastion is updated regularly. Stay up to date with the latest announcements. This article provides you with information about: ++* Recent releases +* Previews underway with known limitations (if applicable) +* Deprecated functionality (if applicable) ++You can also find the latest Bastion updates and subscribe to the RSS feed [here](https://azure.microsoft.com/blog/product/azure-bastion/). ++## Recent releases and announcements ++| Type | Name | Description | Date added | Limitations | +|||||| +| Feature | [Microsoft Entra ID support for portal (SSH)](bastion-connect-vm-ssh-linux.md#microsoft-entra-id-authentication) |Microsoft Entra ID support for SSH connections in portal is now GA. | July 2024 | N/A| +|Feature | [Graphical session recording](session-recording.md) | Graphical session recording is now in public preview in all regions that Bastion is available in. | June 2024 | Can't currently be used with native client. +| Feature | [Private Only Bastion](private-only-deployment.md)| Private Only Bastion is now in public preview in all regions that Bastion is available in.| June 2024 | N/A| +| SKU | [Bastion Premium SKU](bastion-overview.md#sku)| Bastion Premium SKU is now in public preview in all regions that Bastion is available in. | June 2024 | N/A| +|Feature | [Availability Zones for Bastion](../reliability/reliability-bastion.md?toc=/azure/bastion/TOC.json) |Availability Zones is now in public preview as a customer-enabled feature in select regions. | May 2024 | See available region list [here](../reliability/reliability-bastion.md?toc=%2Fazure%2Fbastion%2FTOC.json#prerequisites). +|SKU | [Bastion Developer SKU](quickstart-developer-sku.md) | Bastion Developer SKU is now in GA for select regions. | May 2024 | See available region list [here](quickstart-developer-sku.md#about-the-developer-sku). +++## Next steps ++* [What is Azure Bastion?](bastion-overview.md) +* [Bastion FAQ](bastion-faq.md) +* [Bastion SKUs](bastion-overview.md#sku) |
batch | Quick Deploy Batch Account Two Pools Start Task Terraform | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/batch/quick-deploy-batch-account-two-pools-start-task-terraform.md | + + Title: 'Deploy an Azure Batch account and two pools with a start task - Terraform' +description: In this article, you deploy an Azure Batch account and two pools with a start task using Terraform. + Last updated : 10/24/2024+++++#customer intent: As a Terraform user, I want to see how to create an Azure resource group, Storage account, Batch account, and two Batch pools with different scaling configurations. +content_well_notification: + - AI-contribution +ai-usage: ai-assisted +++# Deploy an Azure Batch account and two pools with a start task - Terraform ++In this quickstart, you create an Azure Batch account, an Azure Storage account, and two Batch pools using Terraform. Batch is a cloud-based job scheduling service that parallelizes and distributes the processing of large volumes of data across many computers. It's typically used for tasks like rendering 3D graphics, analyzing large datasets, or processing video. In this case, the resources created include a Batch account (which is the central organizing entity for distributed processing tasks), a Storage account for holding the data to be processed, and two Batch pools, which are groups of virtual machines that execute the tasks. +++> [!div class="checklist"] +> * Specify the required version of Terraform and the required providers. +> * Define the Azure provider with no additional features. +> * Define variables for the resource group location and name prefix. +> * Generate a random name for the Azure resource group. +> * Create a resource group with the generated name at a specified location. +> * Generate a random string for the Storage account name. +> * Create a Storage account with the generated name in the created resource group. +> * Generate a random string for the Batch account name. +> * Create a Batch account with the generated name in the created resource group and linked to the created Storage account. +> * Generate a random name for the Batch pool. +> * Create a Batch pool with a fixed scale in the created resource group and linked to the created Batch account. +> * Create a Batch pool with autoscale in the created resource group and linked to the created Batch account. +> * Output the names of the created resource group, Storage account, Batch account, and both Batch pools. ++## Prerequisites ++- Create an Azure account with an active subscription. You can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F). +- [Install and configure Terraform](/azure/developer/terraform/quickstart-configure). ++## Implement the Terraform code ++> [!NOTE] +> The sample code for this article is located in the [Azure Terraform GitHub repo](https://github.com/Azure/terraform/tree/master/quickstart/101-batch-pools-with-start-task). You can view the log file containing the [test results from current and previous versions of Terraform](https://github.com/Azure/terraform/tree/master/quickstart/101-batch-pools-with-start-task/TestRecord.md). +> +> See more [articles and sample code showing how to use Terraform to manage Azure resources](/azure/terraform). ++1. Create a directory in which to test and run the sample Terraform code, and make it the current directory. ++1. Create a file named `main.tf`, and insert the following code: + :::code language="Terraform" source="~/terraform_samples/quickstart/101-batch-pools-with-start-task/main.tf"::: ++1. Create a file named `outputs.tf`, and insert the following code: + :::code language="Terraform" source="~/terraform_samples/quickstart/101-batch-pools-with-start-task/outputs.tf"::: ++1. Create a file named `providers.tf`, and insert the following code: + :::code language="Terraform" source="~/terraform_samples/quickstart/101-batch-pools-with-start-task/providers.tf"::: ++1. Create a file named `variables.tf`, and insert the following code: + :::code language="Terraform" source="~/terraform_samples/quickstart/101-batch-pools-with-start-task/variables.tf"::: ++## Initialize Terraform +++## Create a Terraform execution plan +++## Apply a Terraform execution plan +++## Verify the results ++### [Azure CLI](#tab/azure-cli) ++Run [`az batch account show`](/cli/azure/batch/account#az-batch-account-show) to view the Batch account. ++```azurecli +az batch account show --name <batch_account_name> --resource-group <resource_group_name> +``` ++In the above command, replace `<batch_account_name>` with the name of your Batch account and `<resource_group_name>` with the name of your resource group. ++++## Clean up resources +++## Troubleshoot Terraform on Azure ++[Troubleshoot common problems when using Terraform on Azure](/azure/developer/terraform/troubleshoot). ++## Next steps ++> [!div class="nextstepaction"] +> [See more articles about Batch accounts](/search/?terms=Azure%20batch%20account%20and%20terraform). |
batch | Quick Deploy Batch Account Two Pools Terraform | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/batch/quick-deploy-batch-account-two-pools-terraform.md | + + Title: 'Deploy an Azure Batch account and two pools - Terraform' +description: In this article, you deploy an Azure Batch account and two pools using Terraform. + Last updated : 10/24/2024+++++#customer intent: As a Terraform user, I want to see how to create an Azure resource group, Storage account, Batch account, and two Batch pools with different scaling configurations. +content_well_notification: + - AI-contribution +ai-usage: ai-assisted +++# Deploy an Azure Batch account and two pools - Terraform ++In this quickstart, you create an Azure Batch account, an Azure Storage account, and two Batch pools using Terraform. Batch is a cloud-based job scheduling service that parallelizes and distributes the processing of large volumes of data across many computers. It's typically used for parametric sweeps, Monte Carlo simulations, financial risk modeling, and other high-performance computing applications. A Batch account is the top-level resource in the Batch service that provides access to pools, jobs, and tasks. The Storage account is used to store and manage all the files that are used and generated by the Batch service, while the two Batch pools are collections of compute nodes that execute the tasks. +++> [!div class="checklist"] +> * Specify the required version of Terraform and the required providers. +> * Define the Azure provider with no additional features. +> * Define variables for the location of the resource group and the prefix of the resource group name. +> * Generate a random name for the resource group using the provided prefix. +> * Create an Azure resource group with the generated name at the specified location. +> * Generate a random string to be used as the name for the Storage account. +> * Create a Storage account with the generated name in the created resource group, at the same location, and with a standard account tier and locally redundant Storage replication type. +> * Generate another random string to be used as the name for the Batch account. +> * Create a Batch account with the generated name in the created resource group, at the same location, and link it to the created Storage account with Storage keys authentication mode. +> * Generate a random name for the Batch pool with a "pool" prefix. +> * Create a Batch pool with a fixed scale using the generated name in the created resource group, linked to the created Batch account, with a standard A1 virtual machine (VM) size, Ubuntu 22.04 node agent SKU, and a start task that echoes 'Hello World from $env' with a maximum of one retry and waits for success. +> * Create another Batch pool with auto scale, using the same generated name, in the created resource group, linked to the created Batch account, with a standard A1 VM size, Ubuntu 22.04 node agent SKU, and an autoscale formula. +> * Output the names of the created resource group, Storage account, Batch account, and both Batch pools. ++## Prerequisites ++- Create an Azure account with an active subscription. You can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F). +- [Install and configure Terraform](/azure/developer/terraform/quickstart-configure). ++## Implement the Terraform code ++> [!NOTE] +> The sample code for this article is located in the [Azure Terraform GitHub repo](https://github.com/Azure/terraform/tree/master/quickstart/101-batch-pools-with-job). You can view the log file containing the [test results from current and previous versions of Terraform](https://github.com/Azure/terraform/tree/master/quickstart/101-batch-pools-with-job/TestRecord.md). +> +> See more [articles and sample code showing how to use Terraform to manage Azure resources](/azure/terraform). ++1. Create a directory in which to test and run the sample Terraform code, and make it the current directory. ++1. Create a file named `main.tf`, and insert the following code: + :::code language="Terraform" source="~/terraform_samples/quickstart/101-batch-pools-with-job/main.tf"::: ++1. Create a file named `outputs.tf`, and insert the following code: + :::code language="Terraform" source="~/terraform_samples/quickstart/101-batch-pools-with-job/outputs.tf"::: ++1. Create a file named `providers.tf`, and insert the following code: + :::code language="Terraform" source="~/terraform_samples/quickstart/101-batch-pools-with-job/providers.tf"::: ++1. Create a file named `variables.tf`, and insert the following code: + :::code language="Terraform" source="~/terraform_samples/quickstart/101-batch-pools-with-job/variables.tf"::: ++## Initialize Terraform +++## Create a Terraform execution plan +++## Apply a Terraform execution plan +++## Verify the results ++### [Azure CLI](#tab/azure-cli) ++Run [`az batch account show`](/cli/azure/batch/account#az-batch-account-show) to view the Batch account. ++```azurecli +az batch account show --name <batch_account_name> --resource-group <resource_group_name> +``` ++Replace `<batch_account_name>` with the name of your Batch account and `<resource_group_name>` with the name of your resource group. ++++## Clean up resources +++## Troubleshoot Terraform on Azure ++[Troubleshoot common problems when using Terraform on Azure](/azure/developer/terraform/troubleshoot). ++## Next steps ++> [!div class="nextstepaction"] +> [See more articles about Batch accounts](/search/?terms=Azure%20batch%20account%20and%20terraform). |
communication-services | Call Automation | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/communication-services/concepts/call-automation/call-automation.md | The Call Automation events are sent to the web hook callback URI specified when | -- | | | `CallConnected` | The call successfully started (when using `Answer` or `Create` action) or your application successfully connected to an ongoing call (when using `Connect` action). | | `CallDisconnected` | Your application has been disconnected from the call. |+| `CreateCallFailed` | Your application has failed to create the call. | | `ConnectFailed` | Your application failed to connect to a call (for `Connect` call action only). | | `CallTransferAccepted` | Transfer action successfully completed and the transferee is connected to the target participant. | | `CallTransferFailed` | The transfer action failed. | |
communication-services | Room Concept | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/communication-services/concepts/rooms/room-concept.md | At a high level, to conduct calls in a Virtual Rooms you need to create and mana | Dial-out to a PSTN user | ❌ | ✔️ | ✔️* | | Add/Remove VoIP participants to an in-progress call | ❌ | ✔️ | ✔️* | | Get list of participants who joined the in-progress call | ❌ | ✔️ | ✔️* |-| Start/Stop call captions and change captions language | ❌ | ✔️* | ❌ | -| Manage call recording | ❌ | ❌ | ✔️* | +| Start/Stop call captions and change captions language | ❌ | ✔️ | ❌ | +| Manage call recording | ❌ | ❌ | ✔️ | | Send/Receive DTMF to/from PSTN participants | ❌ | ❌ | ✔️* | | Play audio prompts to participants | ❌ | ❌ | ✔️* | Rooms are created and managed via rooms APIs or SDKs. Use the rooms API/SDKs in | Virtual Rooms SDKs | 2024-04-15 | Generally Available - Fully supported | | Virtual Rooms SDKs | 2023-06-14 | Generally Available - Fully supported | | Virtual Rooms SDKs | 2023-10-30 | Public Preview - Fully supported |-| Virtual Rooms SDKs | 2023-03-31 | Will be retired on April 30, 2024 | +| Virtual Rooms SDKs | 2023-03-31 | Public Preview - retired | | Virtual Rooms SDKs | 2022-02-01 | Will be retired on April 30, 2024 |-| Virtual Rooms SDKs | 2021-04-07 | Will be retired on April 30, 2024 | +| Virtual Rooms SDKs | 2021-04-07 | Public Preview - retired | ## Predefined participant roles and permissions in Virtual Rooms calls <a name="predefined-participant-roles-and-permissions"></a> The following table provides detailed capabilities mapped to the roles. At a hig | - Show call state (Early media, Incoming, Connecting, Ringing, Connected, Hold, Disconnecting, Disconnected | ✔️ | ✔️ | ✔️ | | - Show if a participant is muted | ✔️ | ✔️ | ✔️ | | - Show the reason why a participant left a call | ✔️ | ✔️ | ✔️ |-| - Start call captions ** | ✔️ | ✔️ | ✔️ | -| - Change captions language ** | ✔️ | ✔️ | ❌ | +| - Start call captions | ✔️ | ✔️ | ✔️ | +| - Change captions language | ✔️ | ✔️ | ❌ | | - End meeting for all participants | ✔️ | ❌ | ❌ | | - Invite to join a Virtual Room participant to a call | ✔️ | ❌ | ❌ | | **Screen sharing** | | | |
communication-services | Audio Conferencing | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/communication-services/how-tos/calling-sdk/audio-conferencing.md | Title: Teams Meeting Audio Conferencing -description: Use Azure Communication Services SDKs to retrieve Teams Meeting Audio Conferencing Details +description: Use Azure Communication Services SDKs to retrieve Microsoft Teams Meeting Audio Conferencing Details. Last updated 09/28/2023 - # Microsoft Teams Meeting Audio Conferencing -In this article, you learn how to use Azure Communication Services Calling SDK to retrieve Microsoft Teams Meeting Audio Conferencing details. This functionality allows users who are already connected to a Microsoft Teams Meeting to be able to get the conference ID and dial in phone number associated with the meeting. Teams Meeting Audio Conferencing feature returns a collection of all toll and toll-free numbers, with concomitant country names and city names, giving users control on what Teams meeting dial-in details to use. ++This article describes how to use Azure Communication Services Calling SDK to retrieve Microsoft Teams Meeting Audio Conferencing details. This function enables users who are already connected to a Microsoft Teams Meeting to be able to get the conference ID and dial-in phone number associated with the meeting. The Teams Meeting Audio Conferencing feature returns a collection of all toll and toll-free numbers. The collection includes concomitant country names and city names, giving users control of which Teams meeting dial-in details to use. ## Prerequisites+ - An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F). - A deployed Communication Services resource. [Create a Communication Services resource](../../quickstarts/create-communication-resource.md).-- A user access token to enable the calling client. For more information, see [Create and manage access tokens](../../quickstarts/identity/access-tokens.md).-- Optional: Complete the quickstart to [add voice calling to your application](../../quickstarts/voice-video-calling/getting-started-with-calling.md)+- A user access token to enable the calling client. For more information. [Create and manage access tokens](../../quickstarts/identity/access-tokens.md). +- Optional: Complete the quickstart to [add voice calling to your application](../../quickstarts/voice-video-calling/getting-started-with-calling.md). ## Support-The following tables define support for Audio Conferencing in Azure Communication Services. ++This section describes support for Audio Conferencing in Azure Communication Services. ### Identities and call types+ The following table shows support for call and identity types. -|Identities | Teams meeting | Room | 1:1 call | Group call | 1:1 Teams interop call | Group Teams interop call | -|--|||-|||--| -|Communication Services user | ✔️ | | | | | | -|Microsoft 365 user | ✔️ | | | | | | +|Identities | Teams meeting | Room | 1:1 call | Group call | 1:1 Teams interop call | Group Teams interop call | +| | | | | | | | +|Communication Services user | ✔️ | | | | | | +|Microsoft 365 user | ✔️ | | | | | | ### Operations+ The following table shows support for individual APIs in calling SDK for individual identity types. -|Operations | Communication Services user | Microsoft 365 user | -|--||-| -|Get audio conferencing details | ✔️ | ✔️ | +|Operations | Communication Services user | Microsoft 365 user | +| | | | +|Get audio conferencing details | ✔️ | ✔️ | ### SDKs+ The following table shows support for the Audio Conferencing feature in individual Azure Communication Services SDKs. -| Platforms | Web | Web UI | iOS | iOS UI | Android | Android UI | Windows | -||--|--|--|--|-|--|| -|Is Supported | ✔️ | | | | | | | +| Platforms | Web | Web UI | iOS | iOS UI | Android | Android UI | Windows | +| | | | | | | | | +|Is Supported | ✔️ | | | | | | | [!INCLUDE [Audio Conferencing Client-side JavaScript](./includes/audio-conferencing/audio-conferencing-web.md)] ## Next steps+ - [Learn how to manage calls](./manage-calls.md) - [Learn how to manage video](./manage-video.md) - [Learn how to record calls](./record-calls.md) |
data-factory | Known Issues Troubleshoot Guide | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/data-factory/known-issues-troubleshoot-guide.md | + + Title: Azure Data Factory known issues +description: Learn about the currently known issues with Azure Data Factory and their possible workarounds or resolutions. +++ Last updated : 10/02/2024+++++# Azure Data Factory known issues ++This page lists the known issues in Azure Data factory. Before submitting [an Azure support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest), review this list to see if the issue that you're experiencing is already known and being addressed. ++## Active known issues ++|ADF Component|Known Issue |Status| +|:|:|:| +|Snow Flake Connector Issue|[Intermittent data retrieval issue with LookUp using the Snowflake Connector V2](#intermittent-data-retrieval-issue-with-lookup-using-the-snowflake-connector-v2)|Has workaround| +++## Recently ADF Closed known issues ++|ADF Component|Issue|Status|Date Resolved| +||||| +++### Intermittent data retrieval issue with LookUp using the Snowflake Connector v2 ++Intermittently, lookup queries against Snowflake return no values even when results are expected. No errors are generated, and the lookup activity completes successfully. This issue has been observed with Managed VNet IR and SHIR. ++**Workaround**: Add an If-condition activity after the Lookup to check its output. If the Lookup returns data, proceed without further action. If no data is returned, re-execute the Lookup activity. |
data-factory | Transform Data Machine Learning Service | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/data-factory/transform-data-machine-learning-service.md | mlPipelineId | ID of the published Azure Machine Learning pipeline | String (or experimentName | Run history experiment name of the Machine Learning pipeline run | String (or expression with resultType of string) | No mlPipelineParameters | Key, Value pairs to be passed to the published Azure Machine Learning pipeline endpoint. Keys must match the names of pipeline parameters defined in the published Machine Learning pipeline | Object with key value pairs (or Expression with resultType object) | No mlParentRunId | The parent Azure Machine Learning pipeline run ID | String (or expression with resultType of string) | No-dataPathAssignments | Dictionary used for changing datapaths in Azure Machine learning. Enables the switching of datapaths | Object with key value pairs | No +dataPathAssignments | Dictionary used for changing datapaths in Azure Machine Learning. Enables the switching of datapaths | Object with key value pairs | No continueOnStepFailure | Whether to continue execution of other steps in the Machine Learning pipeline run if a step fails | boolean | No > [!NOTE]-> To populate the dropdown items in Machine Learning pipeline name and ID, the user needs to have permission to list ML pipelines. The UI calls AzureMLService APIs directly using the logged in user's credentials. +> To populate the dropdown items in Machine Learning pipeline name and ID, the user needs to have permission to list ML pipelines. The UI calls AzureMLService APIs directly using the logged in user's credentials. The discovery time for the dropdown items would be much longer when using Private Endpoints. ## Related content See the following articles that explain how to transform data in other ways: |
digital-twins | How To Monitor | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/digital-twins/how-to-monitor.md | Below are example JSON bodies for these types of logs. ```json { "time": "2020-03-14T21:11:14.9918922Z",- "resourceId": "/SUBSCRIPTIONS/BBED119E-28B8-454D-B25E-C990C9430C8F/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", + "resourceId": "/SUBSCRIPTIONS/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", "operationName": "Microsoft.DigitalTwins/digitaltwins/write", "operationVersion": "2020-10-31", "category": "DigitalTwinOperation", Below are example JSON bodies for these types of logs. "resultDescription": "", "durationMs": 8, "callerIpAddress": "13.68.244.*",- "correlationId": "2f6a8e64-94aa-492a-bc31-16b9f0b16ab3", + "correlationId": "aaaa0000-bb11-2222-33cc-444444dddddd", "identity": { "claims": {- "appId": "872cd9fa-d31f-45e0-9eab-6e460a02d1f1" + "appId": "00001111-aaaa-2222-bbbb-3333cccc4444" } }, "level": "4", Below are example JSON bodies for these types of logs. ```json { "time": "2020-10-29T21:12:24.2337302Z",- "resourceId": "/SUBSCRIPTIONS/BBED119E-28B8-454D-B25E-C990C9430C8F/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", + "resourceId": "/SUBSCRIPTIONS/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", "operationName": "Microsoft.DigitalTwins/models/write", "operationVersion": "2020-10-31", "category": "ModelsOperation", Below are example JSON bodies for these types of logs. "resultDescription": "", "durationMs": "80", "callerIpAddress": "13.68.244.*",- "correlationId": "9dcb71ea-bb6f-46f2-ab70-78b80db76882", + "correlationId": "bbbb1111-cc22-3333-44dd-555555eeeeee", "identity": { "claims": {- "appId": "872cd9fa-d31f-45e0-9eab-6e460a02d1f1" + "appId": "00001111-aaaa-2222-bbbb-3333cccc4444" } }, "level": "4", Below are example JSON bodies for these types of logs. ```json { "time": "2020-12-04T21:11:44.1690031Z",- "resourceId": "/SUBSCRIPTIONS/BBED119E-28B8-454D-B25E-C990C9430C8F/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", + "resourceId": "/SUBSCRIPTIONS/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", "operationName": "Microsoft.DigitalTwins/query/action", "operationVersion": "2020-10-31", "category": "QueryOperation", Below are example JSON bodies for these types of logs. "resultDescription": "", "durationMs": "314", "callerIpAddress": "13.68.244.*",- "correlationId": "1ee2b6e9-3af4-4873-8c7c-1a698b9ac334", + "correlationId": "cccc2222-dd33-4444-55ee-666666ffffff", "identity": { "claims": {- "appId": "872cd9fa-d31f-45e0-9eab-6e460a02d1f1" + "appId": "00001111-aaaa-2222-bbbb-3333cccc4444" } }, "level": "4", Here's an example JSON body for an `ADTEventRoutesOperation` that isn't of `Micr ```json { "time": "2020-10-30T22:18:38.0708705Z",- "resourceId": "/SUBSCRIPTIONS/BBED119E-28B8-454D-B25E-C990C9430C8F/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", + "resourceId": "/SUBSCRIPTIONS/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", "operationName": "Microsoft.DigitalTwins/eventroutes/write", "operationVersion": "2020-10-31", "category": "EventRoutesOperation", Here's an example JSON body for an `ADTEventRoutesOperation` that isn't of `Micr "resultDescription": "", "durationMs": 42, "callerIpAddress": "212.100.32.*",- "correlationId": "7f73ab45-14c0-491f-a834-0827dbbf7f8e", + "correlationId": "dddd3333-ee44-5555-66ff-777777aaaaaa", "identity": { "claims": {- "appId": "872cd9fa-d31f-45e0-9eab-6e460a02d1f1" + "appId": "00001111-aaaa-2222-bbbb-3333cccc4444" } }, "level": "4", Here's an example JSON body for an `ADTEventRoutesOperation` that of `Microsoft. ```json { "time": "2020-11-05T22:18:38.0708705Z",- "resourceId": "/SUBSCRIPTIONS/BBED119E-28B8-454D-B25E-C990C9430C8F/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", + "resourceId": "/SUBSCRIPTIONS/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.DIGITALTWINS/DIGITALTWINSINSTANCES/MYINSTANCENAME", "operationName": "Microsoft.DigitalTwins/eventroutes/action", "operationVersion": "", "category": "EventRoutesOperation", Here's an example JSON body for an `ADTEventRoutesOperation` that of `Microsoft. "resultDescription": "Unable to send EventHub message to [myPath] for event Id [f6f45831-55d0-408b-8366-058e81ca6089].", "durationMs": -1, "callerIpAddress": "",- "correlationId": "7f73ab45-14c0-491f-a834-0827dbbf7f8e", + "correlationId": "dddd3333-ee44-5555-66ff-777777aaaaaa", "identity": { "claims": {- "appId": "872cd9fa-d31f-45e0-9eab-6e460a02d1f1" + "appId": "00001111-aaaa-2222-bbbb-3333cccc4444" } }, "level": "4", |
expressroute | Gateway Migration | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/expressroute/gateway-migration.md | In the gateway migration experience, you need to validate if your resource is ca ### Virtual network -* Gateway Subnet needs two or more prefixes for migration. -* MaxGatewayCountInVnetReached ΓÇô Reached maximum number of gateways that can be created in a Virtual Network. -- You must create a second prefix in your Gateway Subnet for migration. +MaxGatewayCountInVnetReached ΓÇô Reached maximum number of gateways that can be created in a Virtual Network. ## Next steps |
internet-peering | Howto Peering Service Voice Portal | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/internet-peering/howto-peering-service-voice-portal.md | Title: Enable Azure Peering Service Voice on a Direct peering - Azure portal description: Learn how to enable Azure Peering Service for voice on a Direct peering using the Azure portal.- Previously updated : 08/01/2023 Last updated : 10/24/2024 # Enable Azure Peering Service Voice on a Direct peering by using the Azure portal -This article shows you how to enable Azure Peering Service for voice on a Direct peering using the Azure portal. Fore more information, see [Peering Service](../peering-service/about.md). +In this article, you learn how to enable Azure Peering Service for voice on a Direct peering using the Azure portal. For more information, see [Peering Service](../peering-service/about.md). ## Prerequisites - Review the [Prerequisites to set up peering with Microsoft](prerequisites.md) before you begin configuration.-- Choose a peering resource in your subscription for which you want to enable Peering Service. If you don't have one, either [convert a legacy Direct peering](howto-legacy-direct-portal.md) or [create a new Direct peering](howto-direct-portal.md):+- A Direct peering resource. If you don't have one, either [convert a legacy Direct peering](howto-legacy-direct-portal.md) or [create a new Direct peering](howto-direct-portal.md). ## Enable Azure Peering Service Voice 1. In the search box at the top of the portal, enter *peering*. Select **Peering** in the search results. - :::image type="content" source="./media/howto-peering-service-voice-portal/internet-peering-portal-search.png" alt-text="Screenshot shows how to search for Internet peering in the Azure portal."::: + :::image type="content" source="./media/howto-peering-service-voice-portal/internet-peering-portal-search.png" alt-text="Screenshot shows how to search for Internet peering in the Azure portal." lightbox="./media/howto-peering-service-voice-portal/internet-peering-portal-search.png"::: 1. In the **Peerings** page, select the peering resource that you want to convert to Azure Peering Service Voice configuration. If you have many peerings, you can filter by subscription, location, or resource group to find the peering resources that you want to convert to Azure Peering Service Voice configuration. - :::image type="content" source="./media/howto-peering-service-voice-portal/peerings-filters.png" alt-text="Screenshot shows how to apply filters to find a peering the Azure portal."::: + :::image type="content" source="./media/howto-peering-service-voice-portal/peerings-filters.png" alt-text="Screenshot shows how to apply filters to find a peering the Azure portal." lightbox="./media/howto-peering-service-voice-portal/peerings-filters.png"::: 1. Select **Connections**, and then confirm that the **Connection State** of your peering resource is **Active**. You can't convert to Azure Peering Service Voice if the connection state is **PendingApproval**. - :::image type="content" source="./media/howto-peering-service-voice-portal/peering-connections.png" alt-text="Screenshot shows the connection state of the peering resource in the Azure portal."::: + :::image type="content" source="./media/howto-peering-service-voice-portal/peering-connections.png" alt-text="Screenshot shows the connection state of the peering resource in the Azure portal." lightbox="./media/howto-peering-service-voice-portal/peering-connections.png"::: 1. Select **Configuration**, and then select **AS8075 (with Voice)** for **Microsoft network**. Select **Save** after you make your selection. - :::image type="content" source="./media/howto-peering-service-voice-portal/peering-configuration.png" alt-text="Screenshot shows how to change Microsoft network from the Configuration page of the peering resource in the Azure portal."::: + :::image type="content" source="./media/howto-peering-service-voice-portal/peering-configuration.png" alt-text="Screenshot shows how to change Microsoft network from the Configuration page of the peering resource in the Azure portal." lightbox="./media/howto-peering-service-voice-portal/peering-configuration.png"::: -1. You'll receive an automatic email notification to let you know that your request to change peer type has been received. Once your request is reviewed and approved by the product team, you'll receive another notification. If you have pre-configured BGP and BFD prior to requesting the conversion, the configuration change will automatically run over the next 48 hours. A final notification is sent when the configuration is completed. +1. You'll receive an automatic email notification to let you know that your request to change peer type has been received. Once your request is reviewed and approved by the product team, you'll receive another notification. If you have preconfigured BGP and BFD prior to requesting the conversion, the configuration change will automatically run over the next 48 hours. A final notification is sent when the configuration is completed. ## Considerations This article shows you how to enable Azure Peering Service for voice on a Direct - The peer receives notifications at each stage of the conversion process, including submission of the request, approval, assignment of new IP addresses, and completion of the conversion. -## Next steps +## Related content - For frequently asked questions, see the [Peering Service FAQ](faqs.md#peering-service). - To learn how to convert a legacy Exchange peering, see [Convert a legacy Exchange peering to an Azure resource](howto-legacy-exchange-portal.md). |
internet-peering | Peering Registered Prefix Requirements | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/internet-peering/peering-registered-prefix-requirements.md | Title: Peering registered prefix requirements -description: Learn about the technical requirements to register your prefixes for Azure Peering Service. +description: Learn about the technical requirements to register your prefixes for Azure Peering Service and how to troubleshoot some possible validation errors. - Previously updated : 07/23/2023+ Last updated : 10/24/2024 # Peering registered prefix requirements The validation state of a peering registered prefix can be seen in the Azure por :::image type="content" source="./media/peering-registered-prefix-requirements/prefix-validation-failed.png" alt-text="Peering registered prefixes displayed with validation failure messages." lightbox="./media/peering-registered-prefix-requirements/prefix-validation-failed.png"::: -Prefixes can only be registered when all validation steps have passed. Listed in this document are possible validation errors, with troubleshooting steps to solve them. +Prefixes can only be registered after all validation steps pass. ++Follow these troubleshooting steps when you have any of the following validation errors: ### Prefix not received from IP For registered prefix validation, the AS path of the advertised routes must sati ### Internal server error -Contact peeringservice@microsoft.com with your Azure subscription and prefix to get help. +For help with internal server errors, provide your Azure subscription and prefix to mailto:peeringservice@microsoft.com. -## Next steps +## Related content -* [Internet peering for Peering Service walkthrough](walkthrough-peering-service-all.md). +* [Internet peering for Peering Service walkthrough](walkthrough-peering-service-all.md) * [Internet peering for voice services walkthrough](walkthrough-communications-services-partner.md) * [Peering Service customer walkthrough](../peering-service/customer-walkthrough.md) |
internet-peering | Walkthrough Exchange Route Server Partner | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/internet-peering/walkthrough-exchange-route-server-partner.md | Internet peering provides highly reliable and QoS (Quality of Service) enabled i The following flowchart summarizes the process to onboard to Peering Service Exchange with Route Server: ## Technical requirements To establish a Peering Service Exchange with Route Server peering, follow these - The Peer CANNOT apply rate limiting to their connection - The Peer CANNOT configure a local redundant connection as a backup connection. Backup connections must be in a different location than primary connections. - Primary, backup, and redundant sessions all must have the same bandwidth-- It's recommended to create Peering Service peerings in multiple locations so geo-redundancy can be achieved.+- We recommend creating Peering Service peerings in multiple locations so geo-redundancy can be achieved. - All origin ASNs are registered in Azure portal. - Microsoft configures all the interconnect links as LAG (link bundles) by default, so, peer MUST support LACP (Link Aggregation Control Protocol) on the interconnect links. See [Associate peer ASN to Azure subscription using the Azure portal](howto-subs 1. To create a Peering Service Exchange with Route Server peering resource, search for **Peerings** in the Azure portal. - :::image type="content" source="./media/walkthrough-exchange-route-server-partner/internet-peering-portal-search.png" alt-text="Screenshot shows how to search for Peering resources in the Azure portal."::: + :::image type="content" source="./media/walkthrough-exchange-route-server-partner/internet-peering-portal-search.png" alt-text="Screenshot shows how to search for Peering resources in the Azure portal." lightbox="./media/walkthrough-exchange-route-server-partner/internet-peering-portal-search.png"::: 1. Select **+ Create**. - :::image type="content" source="./media/walkthrough-exchange-route-server-partner/create-peering.png" alt-text="Screenshot shows how to create a Peering resource in the Azure portal."::: + :::image type="content" source="./media/walkthrough-exchange-route-server-partner/create-peering.png" alt-text="Screenshot shows how to create a Peering resource in the Azure portal." lightbox="./media/walkthrough-exchange-route-server-partner/create-peering.png"::: -1. In the **Basics** tab, enter or select your Azure subscription, resource group, name, and ASN of the peering: +1. On the **Basics** tab, enter or select your Azure subscription, resource group, name, and ASN of the peering: - :::image type="content" source="./media/walkthrough-exchange-route-server-partner/create-peering-basics.png" alt-text="Screenshot of the Basics tab of creating a peering in the Azure portal."::: + :::image type="content" source="./media/walkthrough-exchange-route-server-partner/create-peering-basics.png" alt-text="Screenshot of the Basics tab of creating a peering in the Azure portal." lightbox="./media/walkthrough-exchange-route-server-partner/create-peering-basics.png"::: > [!NOTE] - > These details you select CAN'T be changed after the peering is created. confirm they are correct before creating the peering. + > The details you select CAN'T be changed after the peering is created. confirm they are correct before creating the peering. 1. In the **Configuration** tab, you MUST choose the following required configurations to create a peering for Peering Service Exchange with Route Server: See [Associate peer ASN to Azure subscription using the Azure portal](howto-subs 1. Select your **Metro**, then select **Create new** to add a connection to your peering. - :::image type="content" source="./media/walkthrough-exchange-route-server-partner/create-peering-configuration.png" alt-text="Screenshot of the Configuration tab of creating a peering in the Azure portal."::: + :::image type="content" source="./media/walkthrough-exchange-route-server-partner/create-peering-configuration.png" alt-text="Screenshot of the Configuration tab of creating a peering in the Azure portal." lightbox="./media/walkthrough-exchange-route-server-partner/create-peering-configuration.png"::: 1. In **Direct Peering Connection**, enter or select your peering facility details then select **Save**. - :::image type="content" source="./media/walkthrough-exchange-route-server-partner/direct-peering-connection.png" alt-text="Screenshot of creating a direct peering connection."::: + :::image type="content" source="./media/walkthrough-exchange-route-server-partner/direct-peering-connection.png" alt-text="Screenshot of creating a direct peering connection." lightbox="./media/walkthrough-exchange-route-server-partner/direct-peering-connection.png"::: Peering connections for Peering Service Exchange with Route Server MUST have **Peer** as the Session Address Provider, and **Use for Peering Service** enabled. These options are chosen for you automatically. Before prefixes can be optimized for a customer, their ASN must be registered. 1. Open your Peering Service Exchange with Route Server peering in the Azure portal, and select **Registered ASNs**. - :::image type="content" source="./media/walkthrough-exchange-route-server-partner/registered-asn.png" alt-text="Screenshot shows how to go to Registered ASNs from the Peering Overview page in the Azure portal."::: + :::image type="content" source="./media/walkthrough-exchange-route-server-partner/registered-asn.png" alt-text="Screenshot shows how to go to Registered ASNs from the Peering Overview page in the Azure portal." lightbox="./media/walkthrough-exchange-route-server-partner/registered-asn.png"::: 1. Create a Registered ASN by entering the customer's Autonomous System Number (ASN) and a name. - :::image type="content" source="./media/walkthrough-exchange-route-server-partner/register-new-asn.png" alt-text="Screenshot shows how to register an ASN in the Azure portal."::: + :::image type="content" source="./media/walkthrough-exchange-route-server-partner/register-new-asn.png" alt-text="Screenshot shows how to register an ASN in the Azure portal." lightbox="./media/walkthrough-exchange-route-server-partner/register-new-asn.png"::: After your ASN is registered, a unique peering service prefix key used for activation will be generated. When your customers onboard to Peering Service, customers must follow the steps **A.** Microsoft announces roughly 280 prefixes on internet, and it may increase by 10-15% in future. So, a safe limit of 400-500 can be good to set as ΓÇ£Max prefix countΓÇ¥ -**Q.** Will Microsoft re-advertise the Peer prefixes to the Internet? +**Q.** Will Microsoft readvertise the Peer prefixes to the Internet? **A.** No. |
internet-peering | Walkthrough Peering Service All | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/internet-peering/walkthrough-peering-service-all.md | When your customers onboard to Peering Service, customers must follow the steps **Q.** I need to set the prefix limit, how many routes Microsoft would be announcing? -**A.** Microsoft announces roughly 280 prefixes on internet, and it may increase by 10-15% in future. So, a safe limit of 400-500 can be good to set as ΓÇ£Max prefix countΓÇ¥ +**A.** Microsoft announces roughly 280 prefixes on internet, and it might increase by 10-15% in future. So, a safe limit of 400-500 can be good to set as ΓÇ£Max prefix countΓÇ¥ -**Q.** Will Microsoft re-advertise the Peer prefixes to the Internet? +**Q.** Will Microsoft readvertise the Peer prefixes to the Internet? **A.** No. |
iot-operations | Howto Test Connection | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/iot-operations/manage-mqtt-broker/howto-test-connection.md | The first option is to connect from within the cluster. This option uses the def expirationSeconds: 86400 - name: trust-bundle configMap:- name: aio-ca-trust-bundle-test-only # Default root CA cert + name: azure-iot-operations-aio-ca-trust-bundle # Default root CA cert ``` 1. Use `kubectl apply -f client.yaml` to deploy the configuration. It should only take a few seconds to start. |
load-balancer | Admin State Overview | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/load-balancer/admin-state-overview.md | When deploying a load balancer with admin state, consider the following limitati - Admin state isn't supported with inbound NAT rule. - Admin state isn't supported for nonprobed load balancing rules.-- Admin state can't be set as part of the NIC-based Load Balancer backend pool Create experiences. +- Admin state can't be configured during the creation of a NIC-based Load Balancer backend pool. ## Next steps |
network-watcher | Network Watcher Using Open Source Tools | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/network-watcher/network-watcher-using-open-source-tools.md | description: Learn how to use Network Watcher packet capture with CapAnalysis to Previously updated : 02/25/2021 Last updated : 10/23/2024 The following list describes a few of the CapAnalysis features: The **Flows** tab lists flows in the packet data. For each flow, the tab shows information like the time stamp, source and destination IPs, and associated protocols. - ![capanalysis flow page][5] - - Protocol overview The **Overview** tab shows the distribution of network traffic over the various protocols and geographies. The following list describes a few of the CapAnalysis features: The **Statistics** tab shows network traffic statistics. This information includes bytes sent and received from source and destination IPs, flows for each of the source and destination IPs, protocols used for various flows, and the duration of flows. - ![capanalysis statistics][7] - - Geographical map The **GeoMAP** tab provides a map view of your network traffic. Colors scale to the volume of traffic from each country/region. You can select highlighted countries/regions to view additional flow statistics, such as the proportion of data sent and received from IPs in a country/region. You can use the Network Watcher packet capture feature to capture the necessary <!--Image references--> [1]: ./media/network-watcher-using-open-source-tools/figure1.png-[5]: ./media/network-watcher-using-open-source-tools/figure5.png [6]: ./media/network-watcher-using-open-source-tools/figure6.png-[7]: ./media/network-watcher-using-open-source-tools/figure7.png [8]: ./media/network-watcher-using-open-source-tools/figure8.png [11]: ./media/network-watcher-using-open-source-tools/figure11.png |
networking | Networking Overview | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/networking/fundamentals/networking-overview.md | +- [**Networking foundation**](#foundation): [Azure networking foundation services](../foundations/index.yml) provide core connectivity for your resources in Azure - Virtual Network (VNet), Private Link, Azure DNS, Azure Bastion, Route Server, NAT Gateway, and Traffic Manager. +- [**Load balancing and content delivery**](#delivery): [Azure load balancing and content delivery services](../load-balancer-content-delivery/index.yml)allow for management, distribution, and optimization of your applications and workloads - Load balancer, Application Gateway, and Azure Front Door. +- [**Hybrid connectivity**](#hybrid): [Azure hybrid connectivity services](../hybrid-connectivity/index.yml) secure communication to and from your resources in Azure - VPN Gateway, ExpressRoute, Virtual WAN, and Peering Service. +- [**Network security**](#security): [Azure network security services](../security/index.yml) protect your web applications and IaaS services from DDoS attacks and malicious actors - Firewall Manager, Firewall, Web Application Firewall, and DDoS Protection. +- [**Network Management and monitoring**](#management): [Azure network management and monitoring services](../monitoring-management/index.yml) provide tools to manage and monitor your network resources - Network Watcher, Azure Monitor, and Azure Virtual Network Manager. ## <a name="foundation"></a>Networking foundation -This section describes services that provide the building blocks for designing and architecting a network environment in Azure - Virtual Network (VNet), Private Link, Azure DNS, Azure Virtual Network Manager, Azure Bastion, Route Server, NAT Gateway, Traffic Manager, Azure Network Watcher, and Azure Monitor. +This section describes services that provide the building blocks for designing and architecting a network environment in Azure - Virtual Network (VNet), Private Link, Azure DNS, Azure Bastion, Route Server, NAT Gateway, and Traffic Manager. ### <a name="vnet"></a>Virtual network Traffic between your virtual network and the service travels through the Microso Using Azure DNS, you can host and resolve public domains, manage DNS resolution in your virtual networks, and enable name resolution between Azure and your on-premises resources. -### <a name="avnm"></a>Azure Virtual Network Manager --[Azure Virtual Network Manager](../../virtual-network-manager/overview.md) is a management service that enables you to group, configure, deploy, and manage virtual networks globally across subscriptions. With Virtual Network Manager, you can define [network groups](../../virtual-network-manager/concept-network-groups.md) to identify and logically segment your virtual networks. Then you can determine the [connectivity](../../virtual-network-manager/concept-connectivity-configuration.md) and [security configurations](../../virtual-network-manager/concept-security-admins.md) you want and apply them across all the selected virtual networks in network groups at once. -- ### <a name="bastion"></a>Azure Bastion [Azure Bastion](../../bastion/bastion-overview.md) is a service that you can deploy in a virtual network to allow you to connect to a virtual machine using your browser and the Azure portal. You can also connect using the native SSH or RDP client already installed on your local computer. The Azure Bastion service is a fully platform-managed PaaS service that you deploy inside your virtual network. It provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS. When you connect via Azure Bastion, your virtual machines don't need a public IP address, agent, or special client software. There are various different SKU/tiers available for Azure Bastion. The tier you select affects the features that are available. For more information, see [About Bastion configuration settings](../../bastion/configuration-settings.md). The following diagram shows endpoint priority-based routing with Traffic Manager For more information about Traffic Manager, see [What is Azure Traffic Manager?](../../traffic-manager/traffic-manager-overview.md). -### <a name="networkwatcher"></a>Azure Network Watcher --[Azure Network Watcher](../../network-watcher/network-watcher-monitoring-overview.md?toc=%2fazure%2fnetworking%2ftoc.json) provides tools to monitor, diagnose, view metrics, and enable or disable logs for resources in an Azure virtual network. ---### <a name="azuremonitor"></a>Azure Monitor --[Azure Monitor](/azure/azure-monitor/overview?toc=%2fazure%2fnetworking%2ftoc.json) maximizes the availability and performance of your applications by delivering a comprehensive solution for collecting, analyzing, and acting on telemetry from your cloud and on-premises environments. It helps you understand how your applications are performing and proactively identifies issues affecting them and the resources they depend on. - ## <a name="delivery"></a>Load balancing and content delivery This section describes networking services in Azure that help deliver applications and workloads - Load Balancer, Application Gateway, and Azure Front Door Service. Azure DDoS Protection consists of two tiers: :::image type="content" source="./media/networking-overview/ddos-protection-overview-architecture.png" alt-text="Diagram of the reference architecture for a DDoS protected PaaS web application."::: +## <a name="management"></a>Network Management and monitoring ++This section describes network management and monitoring services in Azure - Network Watcher, Azure Monitor, and Azure Virtual Network Manager. ++### <a name="networkwatcher"></a>Azure Network Watcher ++[Azure Network Watcher](../../network-watcher/network-watcher-monitoring-overview.md?toc=%2fazure%2fnetworking%2ftoc.json) provides tools to monitor, diagnose, view metrics, and enable or disable logs for resources in an Azure virtual network. +++### <a name="azuremonitor"></a>Azure Monitor ++[Azure Monitor](/azure/azure-monitor/overview?toc=%2fazure%2fnetworking%2ftoc.json) maximizes the availability and performance of your applications by delivering a comprehensive solution for collecting, analyzing, and acting on telemetry from your cloud and on-premises environments. It helps you understand how your applications are performing and proactively identifies issues affecting them and the resources they depend on. ++++### <a name="avnm"></a>Azure Virtual Network Manager ++[Azure Virtual Network Manager](../../virtual-network-manager/overview.md) is a management service that enables you to group, configure, deploy, and manage virtual networks globally across subscriptions. With Virtual Network Manager, you can define [network groups](../../virtual-network-manager/concept-network-groups.md) to identify and logically segment your virtual networks. Then you can determine the [connectivity](../../virtual-network-manager/concept-connectivity-configuration.md) and [security configurations](../../virtual-network-manager/concept-security-admins.md) you want and apply them across all the selected virtual networks in network groups at once. ++ ## Next steps - Create your first virtual network, and connect a few virtual machines to it, by completing the steps in the [Create your first virtual network](../../virtual-network/quick-create-portal.md?toc=%2fazure%2fnetworking%2ftoc.json) article. |
operator-nexus | Howto Baremetal Run Read | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/operator-nexus/howto-baremetal-run-read.md | Title: Troubleshoot bare metal machine issues using the `az networkcloud baremetalmachine run-read-command` for Operator Nexus description: Step by step guide on using the `az networkcloud baremetalmachine run-read-command` to run diagnostic commands on a BMM.--++ Previously updated : 10/15/2024 Last updated : 10/24/2024 When an optional argument `--output-directory` is provided, the output result is > [!WARNING] > Using the `--output-directory` argument will overwrite any files in the local directory that have the same name as the new files being created. +### This example executes a 'kubectl get pods' ++```azurecli +az networkcloud baremetalmachine run-read-command --name "<bareMetalMachineName>" \ + --limit-time-seconds 60 \ + --commands "[{command:'kubectl get',arguments:[pods,-n,nc-system]}]" \ + --resource-group "<cluster_MRG>" \ + --subscription "<subscription>" +``` + ### This example executes the `hostname` command and a `ping` command ```azurecli |
operator-nexus | Howto Configure Network Fabric | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/operator-nexus/howto-configure-network-fabric.md | This article describes how to create a Network Fabric by using the Azure Command ## Prerequisites * An Azure account with an active subscription.-* Install the latest version of the CLI commands (2.0 or later). For information about installing the CLI commands, see [Install Azure CLI](./howto-install-cli-extensions.md) +* Install the latest version of the CLI commands. For information about installing the CLI commands, see [Install Azure CLI](./howto-install-cli-extensions.md) * A Network Fabric controller manages multiple Network Fabrics on the same Azure region.-* Physical Operator-Nexus instance with cabling as per BoM. +* Physical Operator-Nexus instance with cabling as per BoM version. * Express Route connectivity between NFC and Operator-Nexus instances. * Terminal server pre-configured with username and password [installed and configured](./howto-platform-prerequisites.md#set-up-terminal-server) * PE devices pre-configured with necessary VLANs, Route-Targets and IP addresses.-* Supported SKUs from NFA Release 2.4 and beyond for Fabric are **M4-A400-A100-C16-ab** and **M8-A400-A100-C16-ab**. - * M4-A400-A100-C16-ab - Up to four Compute Racks (BOM 1.7.3) - * M8-A400-A100-C16-ab - Up to eight Compute Racks (BOM 1.7.3) +* Supported SKU information is [inventoried here](./reference-operator-nexus-fabric-skus.md) ## Steps to Provision a Fabric & Racks The following table specifies parameters used to create Network Fabric, | resource-group | Name of the resource group | "NFResourceGroup" |True | | location | Operator-Nexus Azure region | "eastus" |True | | resource-name | Name of the FabricResource | NF-ResourceName |True |-| nf-sku |Fabric SKU ID is the SKU of the ordered BoM. Four SKUs are supported (**M4-A400-A100-C16-aa**, **M8-A400-A100-C16-aa**, **M4-A400-A100-C16-ab** and **M8-A400-A100-C16-ab**). | M4-A400-A100-C16-ab |True | String| +| nf-sku |Fabric SKU ID is the SKU of the ordered BoM version. | M4-A400-A100-C16-ab |True | String| |nfc-id|Network Fabric Controller "ARM resource ID"|**$prefix**/NFCName|True | | |rackcount|Number of compute racks per fabric. Possible values are 2-8|8|True | |serverCountPerRack|Number of compute servers per rack. Possible values are 4, 8, 12 or 16|16|True | |
operator-service-manager | Release Notes | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/operator-service-manager/release-notes.md | The following release notes are generally available (GA): * Release Notes for Version 2.0.2788-135 * Release Notes for Version 2.0.2804-137 * Release Notes for Version 2.0.2810-144+* Release Notes for Version 2.0.2847-158 ### Release Attestation These releases are produced compliant with MicrosoftΓÇÖs Secure Development Lifecycle. This lifecycle includes processes for authorizing software changes, antimalware scanning, and scanning and mitigating security bugs and vulnerabilities. Azure Operator Service Manager is a cloud orchestration service that enables aut * Is NFO update required: YES, UPDATE ONLY ### Release Installation-This release can be installed with as an update on top of release 2.0.2763-119. Please see the following [learn documentation](manage-network-function-operator.md) for additional installation guidance. +This release can be installed with as an update on top of release 2.0.2763-119. See [learn documentation](manage-network-function-operator.md) for more installation guidance. ### Issues Resolved in This Release #### Bugfix Related Updates The following bug fixes, or other defect resolutions, are delivered with this release, for either Network Function Operator (NFO) or resource provider (RP) components. -* NFO - Adding taint tolerations to all NFO pods and scheduling them on system nodes. Daemonset pods will continue to run on all nodes of cluster). +* NFO - Adding taint tolerations to all NFO pods and scheduling them on system nodes. Daemonset pods continue to run on all nodes of cluster). #### Security Related Updates kubectl delete crd orders.acme.cert-manager.io ### Release Highlights #### Cluster Registry & Webhook ΓÇô High Availability -This mitigation release disables cluster registry and webhook high availability functionality, to restore ownership of cert-manager services to workload. Instead, NFO will use custom methods of certificate management. High availability, along with changes to rotate certs will be restored in a future release. +This mitigation release disables cluster registry and webhook high availability functionality, to restore ownership of cert-manager services to workload. Instead, NFO uses custom methods of certificate management. High availability, along with changes to rotate certs will be restored in a future release. ### Issues Resolved in This Release Azure Operator Service Manager is a cloud orchestration service that enables aut * Dependency Versions: Go/1.22.4 Helm/3.15.2 ### Release Installation-This release can be installed with as an update on top of release 2.0.2783-134. Please see the following [learn documentation](manage-network-function-operator.md) for additional installation guidance. +This release can be installed with as an update on top of release 2.0.2783-134. See [learn documentation](manage-network-function-operator.md) for more installation guidance. ### Release Highlights #### Cluster Registry ΓÇô Garbage Collection -This release extends cluster registry functionality enabling a manual trigger to identify and purging of unused images in the repository. For proper operation, the user must install both this latest version and an additional helper script, which is provided by request only. +This release extends cluster registry functionality enabling a manual trigger to identify and purging of unused images in the repository. For proper operation, the user must install both this latest version and a helper script, which is provided by request only. ### Issues Resolved in This Release Azure Operator Service Manager is a cloud orchestration service that enables aut * Dependency Versions: Go/1.22.4 - Helm/3.15.2 ### Release Installation-This release can be installed with as an update on top of release 2.0.2788-135. Please see the following [learn documentation](manage-network-function-operator.md) for additional installation guidance. +This release can be installed with as an update on top of release 2.0.2788-135. See [learn documentation](manage-network-function-operator.md) for more installation guidance. ### Release Highlights #### High availability for cluster registry and webhook. This version restores the high availability features first introduced with relea This version implements internal certificate management using a new method which does not take dependency on cert-manager. Instead, a private internal service is used to handle requirements for certificate management and rotation within the AOSM namespace. #### Safe Upgrades NF Level Rollback-This version introduces new user options to control behavior when a failure occurs during an upgrade. While pause on failure remains the default, a user can now optionally enable rollback on failure. If a failure occure, with rollback on failure any prior completed NfApps will be reverted to prior state using helm rollback command. See [learn documentation](safe-upgrades-nf-level-rollback.md) for more details on usage. +This version introduces new user options to control behavior when a failure occurs during an upgrade. While pause on failure remains the default, a user can now optionally enable rollback on failure. If a failure occurs, with rollback on failure any prior completed NfApps are reverted to prior state using helm rollback command. See [learn documentation](safe-upgrades-nf-level-rollback.md) for more details on usage. ### Issues Resolved in This Release The following bug fixes, or other defect resolutions, are delivered with this re Document Revision 1.1 ### Release Summary-Azure Operator Service Manager is a cloud orchestration service that enables automation of operator network-intensive workloads, and mission critical applications hosted on Azure Operator Nexus. Azure Operator Service Manager unifies infrastructure, software, and configuration management with a common model into a single interface, both based on trusted Azure industry standards. This Septemer 13, 2024 Azure Operator Service Manager release includes updating the NFO version to 2.0.2810-144, the details of which are further outlined in the remainder of this document. +Azure Operator Service Manager is a cloud orchestration service that enables automation of operator network-intensive workloads, and mission critical applications hosted on Azure Operator Nexus. Azure Operator Service Manager unifies infrastructure, software, and configuration management with a common model into a single interface, both based on trusted Azure industry standards. This September 13, 2024 Azure Operator Service Manager release includes updating the NFO version to 2.0.2810-144, the details of which are further outlined in the remainder of this document. ### Release Details * Release Version: Version 2.0.2810-144 Azure Operator Service Manager is a cloud orchestration service that enables aut * Dependency Versions: Go/1.22.4 - Helm/3.15.2 ### Release Installation-This release can be installed with as an update on top of release 2.0.2804-137. Please see the following [learn documentation](manage-network-function-operator.md) for additional installation guidance. +This release can be installed with as an update on top of release 2.0.2804-137. See [learn documentation](manage-network-function-operator.md) for more installation guidance. ### Issues Resolved in This Release The following bug fixes, or other defect resolutions, are delivered with this re #### Security Related Updates None++## Release 2.0.2847-158 ++Document Revision 1.0 ++### Release Summary +Azure Operator Service Manager is a cloud orchestration service that enables automation of operator network-intensive workloads, and mission critical applications hosted on Azure Operator Nexus. Azure Operator Service Manager unifies infrastructure, software, and configuration management with a common model into a single interface, both based on trusted Azure industry standards. This October 18, 2024 Azure Operator Service Manager release includes updating the NFO version to 2.0.2847-158, the details of which are further outlined in the remainder of this document. ++### Release Details +* Release Version: Version 2.0.2847-158 +* Release Date: October 18, 2024 +* Is NFO update required: YES, Update only +* Dependency Versions: Go/1.22.4 - Helm/3.15.2 ++### Release Installation +This release can be installed with as an update on top of release 2.0.2804-137. See [learn documentation](manage-network-function-operator.md) for more installation guidance. + +#### Bugfix Related Updates +The following bug fixes, or other defect resolutions, are delivered with this release, for either Network Function Operator (NFO) or resource provider (RP) components. ++* NFO - Fixes webhook and image secrets issues when trying to delete 2 network functions in same namespace. +* NFO - Adds retries to fix intermittent image download failures from the cluster registry. ++#### Security Related Updates +* CVE - A total of 19 CVEs Are addressed in this release. |
oracle | Faq Oracle Database Azure | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/oracle/oracle-db/faq-oracle-database-azure.md | BCDR using the OCI managed offering (Backup and Data Guard) won't incur any more Ingress and Egress for managed services is via Azure OCI backbone and doesn't incur charges. Virtual network traffic is charged at the current price. +### Can a Cloud Service Provider (CSP) or an Outsourcer (OCA) avail the Oracle Database@Azure Service? ++No, Oracle Database@Azure does not support Cloud Service Providers, Outsourcer Channel Agreements, or Multi-party private offers (MPPO). + ## Onboarding, Provisioning, and Migration In this section, we'll cover questions related to onboarding, provisioning, and migration to Oracle Database@Azure. ### To set up Oracle Database@Azure, what would be the role assignments needed for the Azure user? |
reliability | Migrate App Configuration | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/reliability/migrate-app-configuration.md | Title: Migrate App Configuration to a region with availability zone support -description: Learn how to migrate Azure App Configuration to availability zone support. + Title: Migrate App Configuration to availability zone support +description: Learn how to migrate an Azure App Configuration store to an Azure region with availability zone support. Previously updated : 09/10/2022 Last updated : 10/24/2024 Azure App Configuration supports Azure availability zones. This guide describes ## Availability zone support in Azure App Configuration -Azure App Configuration supports Azure availability zones to protect your application and data from single datacenter failures. All availability zone-enabled regions have a minimum of three availability zones, and each availability zone is composed of one or more datacenters equipped with independent power, cooling, and networking infrastructure. In regions where App Configuration supports availability zones, all stores have availability zones enabled by default. +Azure App Configuration supports Azure availability zones to protect your application and data from single data center failures. All availability zone-enabled regions have a minimum of three availability zones, and each availability zone is composed of one or more data centers equipped with independent power, cooling, and networking infrastructure. In regions where App Configuration supports availability zones, all stores have availability zones enabled by default. [!INCLUDE [Azure App Configuration availability zones table](../../includes/azure-app-configuration-availability-zones.md)] |
reliability | Migrate Sql Database | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/reliability/migrate-sql-database.md | To disable zone-redundancy for Hyperscale service tier, you can reverse the step 1. Select **Save**. +**To disable zone-redundancy with PowerShell:** ++```powershell +Set-AzSqlElasticpool -ResourceGroupName "RSETLEM-AzureSQLDB" -ServerName "rs-az-testserver1" -ElasticPoolName "testep10" -ZoneRedundant:$false +``` ++**To disable zone-redundancy with Azure CLI:** ++```azurecli +az sql elastic-pool update --resource-group "RSETLEM-AzureSQLDB" --server "rs-az-testserver1" --name "testep10" --zone-redundant false +``` **To disable zone-redundancy with ARM,** see [Databases - Create Or Update in ARM](/rest/api/sql/elastic-pools/create-or-update?tabs=HTTP) and use the `properties.zoneRedundant` property. To disable zone-redundancy for Hyperscale service tier, you can reverse the step 1. Select **Save**. +**To disable zone-redundancy with PowerShell:** ++```powershell +set-azsqlDatabase -ResourceGroupName "RSETLEM-AzureSQLDB" -DatabaseName "TestDB1" -ServerName "rs-az-testserver1" -ZoneRedundant:$false +``` ++**To disable zone-redundancy with Azure CLI:** ++```azurecli +az sql db update --resource-group "RSETLEM-AzureSQLDB" --server "rs-az-testserver1" --name "TestDB1" --zone-redundant false +``` **To disable zone-redundancy with ARM,** see [Databases - Create Or Update in ARM](/rest/api/sql/2022-05-01-preview/databases/create-or-update?tabs=HTTP) and use the `properties.zoneRedundant` property. |
sentinel | Data Connectors Reference | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors-reference.md | For more information about the codeless connector platform, see [Create a codele - [Armis Activities (using Azure Functions)](data-connectors/armis-activities.md) - [Armis Alerts (using Azure Functions)](data-connectors/armis-alerts.md)+- [Armis Alerts Activities (using Azure Functions)](data-connectors/armis-alerts-activities.md) - [Armis Devices (using Azure Functions)](data-connectors/armis-devices.md) ## Armorblox For more information about the codeless connector platform, see [Create a codele - [Corelight Connector Exporter](data-connectors/corelight-connector-exporter.md) +## Cribl ++- [Cribl](data-connectors/cribl.md) + ## Crowdstrike - [CrowdStrike Falcon Adversary Intelligence (using Azure Functions)](data-connectors/crowdstrike-falcon-adversary-intelligence.md) For more information about the codeless connector platform, see [Create a codele - [GreyNoise Threat Intelligence (using Azure Functions)](data-connectors/greynoise-threat-intelligence.md) +## HYAS Infosec Inc ++- [HYAS Protect (using Azure Functions)](data-connectors/hyas-protect.md) ++## Illumio, Inc. ++- [Illumio SaaS (using Azure Functions)](data-connectors/illumio-saas.md) + ## H.O.L.M. Security Sweden AB - [Holm Security Asset Data (using Azure Functions)](data-connectors/holm-security-asset-data.md) For more information about the codeless connector platform, see [Create a codele - [Imperva Cloud WAF (using Azure Functions)](data-connectors/imperva-cloud-waf.md) +## Infoblox ++- [[Recommended] Infoblox Cloud Data Connector via AMA](data-connectors/recommended-infoblox-cloud-data-connector-via-ama.md) +- [[Recommended] Infoblox SOC Insight Data Connector via AMA](data-connectors/recommended-infoblox-soc-insight-data-connector-via-ama.md) +- [Infoblox Data Connector via REST API (using Azure Functions)](data-connectors/infoblox-data-connector-via-rest-api.md) +- [Infoblox SOC Insight Data Connector via REST API](data-connectors/infoblox-soc-insight-data-connector-via-rest-api.md) + ## Infosec Global - [InfoSecGlobal Data Connector](data-connectors/infosecglobal-data-connector.md) For more information about the codeless connector platform, see [Create a codele - [Azure Stream Analytics](data-connectors/azure-stream-analytics.md) - [Syslog via AMA](data-connectors/syslog-via-ama.md) - [Microsoft Defender Threat Intelligence (Preview)](data-connectors/microsoft-defender-threat-intelligence.md)+- [Premium Microsoft Defender Threat Intelligence (Preview)](data-connectors/premium-microsoft-defender-threat-intelligence.md) - [Threat intelligence - TAXII](data-connectors/threat-intelligence-taxii.md) - [Threat Intelligence Platforms](data-connectors/threat-intelligence-platforms.md) - [Threat Intelligence Upload Indicators API (Preview)](data-connectors/threat-intelligence-upload-indicators-api.md) For more information about the codeless connector platform, see [Create a codele ## Palo Alto Networks - [Palo Alto Prisma Cloud CSPM (using Azure Functions)](data-connectors/palo-alto-prisma-cloud-cspm.md)+- [Azure CloudNGFW By Palo Alto Networks](data-connectors/azure-cloudngfw-by-palo-alto-networks.md) ## Perimeter 81 - [Perimeter 81 Activity Logs](data-connectors/perimeter-81-activity-logs.md) +## Phosphorus Cybersecurity ++- [Phosphorus Devices](data-connectors/phosphorus-devices.md) + ## Prancer Enterprise - [Prancer Data Connector](data-connectors/prancer-data-connector.md) For more information about the codeless connector platform, see [Create a codele - [Qualys Vulnerability Management (using Azure Functions)](data-connectors/qualys-vulnerability-management.md) - [Qualys VM KnowledgeBase (using Azure Functions)](data-connectors/qualys-vm-knowledgebase.md) +## Radiflow ++- [Radiflow iSID via AMA](data-connectors/radiflow-isid-via-ama.md) + ## Rubrik, Inc. - [Rubrik Security Cloud data connector (using Azure Functions)](data-connectors/rubrik-security-cloud-data-connector.md) For more information about the codeless connector platform, see [Create a codele - [Seraphic Web Security](data-connectors/seraphic-web-security.md) +## Silverfort Ltd. ++- [Silverfort Admin Console](data-connectors/silverfort-admin-console.md) + ## Slack - [Slack Audit (using Azure Functions)](data-connectors/slack-audit.md) For more information about the codeless connector platform, see [Create a codele - [Zero Networks Segment Audit](data-connectors/zero-networks-segment-audit.md) - [Zero Networks Segment Audit (Function) (using Azure Functions)](data-connectors/zero-networks-segment-audit.md) +## Zerofox, Inc. ++- [ZeroFox CTI (using Azure Functions)](data-connectors/zerofox-cti.md) +- [ZeroFox Enterprise - Alerts (Polling CCP)](data-connectors/zerofox-enterprise-alerts-polling-ccp.md) + ## Zimperium, Inc. - [Zimperium Mobile Threat Defense](data-connectors/zimperium-mobile-threat-defense.md) |
sentinel | Abnormalsecurity | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/abnormalsecurity.md | Title: "AbnormalSecurity (using Azure Functions) connector for Microsoft Sentine description: "Learn how to install the connector AbnormalSecurity (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. AbnormalSecurityXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Alicloud | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/alicloud.md | Title: "AliCloud (using Azure Functions) connector for Microsoft Sentinel" description: "Learn how to install the connector AliCloud (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. AliCloudXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Api Protection | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/api-protection.md | Title: "API Protection connector for Microsoft Sentinel" description: "Learn how to install the connector API Protection to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 The installation process is documented in great detail in the GitHub repository Step 2: Retrieve the workspace access credentials -The first installation step is to retrieve both your **Workspace ID** and **Primary Key** from the Sentinel platform. +The first installation step is to retrieve both your **Workspace ID** and **Primary Key** from the Microsoft Sentinel platform. Copy the values shown below and save them for configuration of the API log forwarder integration. In order to test the data ingestion the user should deploy the sample *httpbin* 4.1 Install the sample -The sample application can be installed locally using a [Docker compose file](https://github.com/42Crunch/azure-sentinel-integration/blob/main/sample-deployment/docker-compose.yml) which will install the httpbin API server, the 42Crunch API protection and the Sentinel log forwarder. Set the environment variables as required using the values copied from step 2. +The sample application can be installed locally using a [Docker compose file](https://github.com/42Crunch/azure-sentinel-integration/blob/main/sample-deployment/docker-compose.yml) which will install the httpbin API server, the 42Crunch API protection and the Microsoft Sentinel log forwarder. Set the environment variables as required using the values copied from step 2. 4.2 Run the sample Verfify the API protection is connected to the 42Crunch platform, and then exerc 4.3 Verify the data ingestion on Log Analytics -After approximately 20 minutes access the Log Analytics workspace on your Sentinel installation, and locate the *Custom Logs* section verify that a *apifirewall_log_1_CL* table exists. Use the sample queries to examine the data. +After approximately 20 minutes access the Log Analytics workspace on your Microsoft Sentinel installation, and locate the *Custom Logs* section verify that a *apifirewall_log_1_CL* table exists. Use the sample queries to examine the data. |
sentinel | Armis Alerts Activities | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/armis-alerts-activities.md | + + Title: "Armis Alerts Activities (using Azure Functions) connector for Microsoft Sentinel" +description: "Learn how to install the connector Armis Alerts Activities (using Azure Functions) to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Armis Alerts Activities (using Azure Functions) connector for Microsoft Sentinel ++The [Armis](https://www.armis.com/) Alerts Activities connector gives the capability to ingest Armis Alerts and Activities into Microsoft Sentinel through the Armis REST API. Refer to the API documentation: `https://<YourArmisInstance>.armis.com/api/v1/docs` for more information. The connector provides the ability to get alert and activity information from the Armis platform and to identify and prioritize threats in your environment. Armis uses your existing infrastructure to discover and identify devices without having to deploy any agents. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Azure function app code** | https://aka.ms/sentinel-ArmisAlertsActivitiesAPI-functionapp | +| **Log Analytics table(s)** | Armis_Alerts_CL<br/> Armis_Activities_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [Armis Corporation](https://support.armis.com/) | ++## Query samples ++**Armis Alert Events - All Alerts.** ++ ```kusto +Armis_Alerts_CL + + | sort by TimeGenerated desc + ``` ++**Armis Activity Events - All Activities.** ++ ```kusto +Armis_Activities_CL + + | sort by TimeGenerated desc + ``` ++++## Prerequisites ++To integrate with Armis Alerts Activities (using Azure Functions) make sure you have: ++- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/). +- **REST API Credentials/permissions**: **Armis Secret Key** is required. See the documentation to learn more about API on the `https://<YourArmisInstance>.armis.com/api/v1/doc` +++## Vendor installation instructions +++> [!NOTE] + > This connector uses Azure Functions to connect to the Armis API to pull its logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details. +++>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App. +++> [!NOTE] + > This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ArmisActivities/ArmisAlerts and load the function code. The function usually takes 10-15 minutes to activate after solution installation/update. +++**STEP 1 - Configuration steps for the Armis API** ++ Follow these instructions to create an Armis API secret key. + 1. Log into your Armis instance + 2. Navigate to Settings -> API Management + 3. If the secret key has not already been created, press the Create button to create the secret key + 4. To access the secret key, press the Show button + 5. The secret key can now be copied and used during the Armis Alerts Activities connector configuration +++**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function** ++>**IMPORTANT:** Before deploying the Armis Alerts Activities data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following) readily available.., as well as the Armis API Authorization Key(s) ++++Option 1 - Azure Resource Manager (ARM) Template ++Use this method for automated deployment of the Armis connector. ++1. Click the **Deploy to Azure** button below. ++ [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-ArmisAlertsActivitiesAPI-azuredeploy) [![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://aka.ms/sentinel-ArmisAlertsActivitiesAPI-azuredeploy-gov) +2. Select the preferred **Subscription**, **Resource Group** and **Location**. +3. Enter the below information : + - Function Name + - Workspace ID + - Workspace Key + - Armis Secret Key + - Armis URL `https://<armis-instance>.armis.com/api/v1/` + - Armis Alert Table Name + - Armis Activity Table Name + - Armis Schedule + - Avoid Duplicates (Default: true) +4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. +5. Click **Purchase** to deploy. ++Option 2 - Manual Deployment of Azure Functions ++Use the following step-by-step instructions to deploy the Armis Alerts Activities data connector manually with Azure Functions (Deployment via Visual Studio Code). +++**1. Deploy a Function App** ++> **NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development. ++1. Download the [Azure Function App](https://aka.ms/sentinel-ArmisAlertsActivitiesAPI-functionapp) file. Extract archive to your local development computer. +2. Start VS Code. Choose File in the main menu and select Open Folder. +3. Select the top level folder from extracted files. +4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button. +If you aren't already signed in, choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose **Sign in to Azure** +If you're already signed in, go to the next step. +5. Provide the following information at the prompts: ++ a. **Select folder:** Choose a folder from your workspace or browse to one that contains your function app. ++ b. **Select Subscription:** Choose the subscription to use. ++ c. Select **Create new Function App in Azure** (Don't choose the Advanced option) ++ d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. ARMISXXXXX). ++ e. **Select a runtime:** Choose Python 3.11 ++ f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. ++6. Deployment will begin. A notification is displayed after your function app is created and the deployment package is applied. +7. Go to Azure Portal for the Function App configuration. +++**2. Configure the Function App** ++1. In the Function App, select the Function App Name and select **Configuration**. +2. In the **Application settings** tab, select **+ New application setting**. +3. Add each of the following application settings individually, with their respective values (case-sensitive): + - Workspace ID + - Workspace Key + - Armis Secret Key + - Armis URL `https://<armis-instance>.armis.com/api/v1/` + - Armis Alert Table Name + - Armis Activity Table Name + - Armis Schedule + - Avoid Duplicates (Default: true) + - logAnalyticsUri (optional) + - Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`. +4. Once all application settings have been entered, click **Save**. ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/armisinc1668090987837.armis-solution?tab=Overview) in the Azure Marketplace. |
sentinel | Armis Devices | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/armis-devices.md | Title: "Armis Devices (using Azure Functions) connector for Microsoft Sentinel" description: "Learn how to install the connector Armis Devices (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. ARMISXXXXX). - e. **Select a runtime:** Choose Python 3.8 or above. + e. **Select a runtime:** Choose Python 3.11 or above. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Armorblox | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/armorblox.md | Title: "Armorblox (using Azure Functions) connector for Microsoft Sentinel" description: "Learn how to install the connector Armorblox (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 -The [Armorblox](https://www.armorblox.com/) data connector provides the capability to ingest incidents from your Armorblox instance into Microsoft Sentinel through the REST API. The connector provides ability to get events which helps to examine potential security risks, and more. +The Armorblox data connector provides the capability to ingest incidents from your Armorblox instance into Microsoft Sentinel through the REST API. The connector provides ability to get events which helps to examine potential security risks, and more. This is autogenerated content. For changes, contact the solution provider. This is autogenerated content. For changes, contact the solution provider. | **Azure function app code** | https://aka.ms/sentinel-armorblox-functionapp | | **Log Analytics table(s)** | Armorblox_CL<br/> | | **Data collection rules support** | Not currently supported |-| **Supported by** | [Armorblox](https://www.armorblox.com/contact/) | +| **Supported by** | Armorblox | ## Query samples If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. Armorblox). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Atlassian Confluence Audit | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/atlassian-confluence-audit.md | Title: "Atlassian Confluence Audit (using Azure Functions) connector for Microso description: "Learn how to install the connector Atlassian Confluence Audit (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. ConflAuditXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Auth0 Access Management | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/auth0-access-management.md | Title: "Auth0 Access Management(using Azure Function) (using Azure Functions) connector for Microsoft Sentinel" -description: "Learn how to install the connector Auth0 Access Management(using Azure Function) (using Azure Functions) to connect your data source to Microsoft Sentinel." + Title: "Auth0 Access Management(using Azure Function) connector for Microsoft Sentinel" +description: "Learn how to install the connector Auth0 Access Management(using Azure Function) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 -# Auth0 Access Management(using Azure Function) (using Azure Functions) connector for Microsoft Sentinel +# Auth0 Access Management(using Azure Function) connector for Microsoft Sentinel The [Auth0 Access Management](https://auth0.com/access-management) data connector provides the capability to ingest [Auth0 log events](https://auth0.com/docs/api/management/v2/#!/Logs/get_logs) into Microsoft Sentinel Auth0AM_CL ## Prerequisites -To integrate with Auth0 Access Management(using Azure Function) (using Azure Functions) make sure you have: +To integrate with Auth0 Access Management(using Azure Function) make sure you have: - **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/). - **REST API Credentials/permissions**: **API token** is required. [See the documentation to learn more about API token](https://auth0.com/docs/secure/tokens/access-tokens/get-management-api-access-tokens-for-production) If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. Auth0AMXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Azure Cloudngfw By Palo Alto Networks | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/azure-cloudngfw-by-palo-alto-networks.md | + + Title: "Azure CloudNGFW By Palo Alto Networks connector for Microsoft Sentinel" +description: "Learn how to install the connector Azure CloudNGFW By Palo Alto Networks to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Azure CloudNGFW By Palo Alto Networks connector for Microsoft Sentinel ++Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV Service - is Palo Alto Networks Next-Generation Firewall (NGFW) delivered as a cloud-native service on Azure. You can discover Cloud NGFW in the Azure Marketplace and consume it in your Azure Virtual Networks (VNet). With Cloud NGFW, you can access the core NGFW capabilities such as App-ID, URL filtering based technologies. It provides threat prevention and detection through cloud-delivered security services and threat prevention signatures. The connector allows you to easily connect your Cloud NGFW logs with Microsoft Sentinel, to view dashboards, create custom alerts, and improve investigation. This gives you more insight into your organization's network and improves your security operation capabilities. For more information, see the [Cloud NGFW for Azure documentation](https://docs.paloaltonetworks.com/cloud-ngfw/azure). ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | fluentbit_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [Palo Alto Networks](https://support.paloaltonetworks.com) | ++## Query samples ++**List of connected Cloud NGFW resources** ++ ```kusto +fluentbit_CL ++ | distinct FirewallName_s + ``` ++**Connectivity status of Cloud NGFW resources** ++ ```kusto +fluentbit_CL ++ | extend TimeGenerated = todatetime(TimeGenerated) ++ | summarize LastLogReceived = max(TimeGenerated) by FirewallName_s ++ | extend Status = iff(now() - LastLogReceived > 24h, "Disconnected", "Connected") ++ | project FirewallName_s, LastLogReceived, Status ++ | order by Status desc, LastLogReceived desc + ``` ++**Total data received (MB)** ++ ```kusto +fluentbit_CL ++ | extend bytes_received = toint(parse_json(Message).bytes_recv) ++ | summarize TotalBytesReceived = sum(bytes_received) ++ | extend TotalMBReceived = round(TotalBytesReceived / 1048576.0, 2) ++ | project TotalMBReceived + ``` ++**Top 5 apps** ++ ```kusto +fluentbit_CL ++ | extend app = tostring(parse_json(Message).app) ++ | summarize Count = count() by app ++ | top 5 by Count desc ++ | project app, Count + ``` ++**Top 5 categories** ++ ```kusto +fluentbit_CL ++ | extend category = tostring(parse_json(Message).category) ++ | summarize Count = count() by category ++ | top 5 by Count desc ++ | project category, Count + ``` ++**Top 5 rules** ++ ```kusto +fluentbit_CL ++ | summarize Rule=count() by tostring(parse_json(Message).rule) ++ | top 5 by Rule desc + ``` ++**Top 5 source IPs** ++ ```kusto +fluentbit_CL ++ | summarize SourceIP=count() by tostring(parse_json(Message).src_ip) ++ | top 5 by SourceIP desc + ``` ++**Top 5 destination IPs** ++ ```kusto +fluentbit_CL ++ | summarize DestinationIP=count() by tostring(parse_json(Message).dst_ip) ++ | top 5 by DestinationIP desc + ``` ++++## Vendor installation instructions ++Connect Cloud NGFW by Palo Alto Networks to Microsoft Sentinel ++Enable Log Settings on All Cloud NGFWs by Palo Alto Networks. ++++Inside your Cloud NGFW resource: ++1. Navigate to the **Log Settings** from the homepage. +2. Ensure the **Enable Log Settings** checkbox is checked. +3. From the **Log Settings** drop-down, choose the desired Log Analytics Workspace. +4. Confirm your selections and configurations. +5. Click **Save** to apply the settings. ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/paloaltonetworks.cloudngfw-sentinel-solution?tab=Overview) in the Azure Marketplace. |
sentinel | Bitglass | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/bitglass.md | Title: "Bitglass (using Azure Functions) connector for Microsoft Sentinel" description: "Learn how to install the connector Bitglass (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. BitglassXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Cisco Secure Endpoint Amp | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/cisco-secure-endpoint-amp.md | Title: "Cisco Secure Endpoint (AMP) (using Azure Functions) connector for Micros description: "Learn how to install the connector Cisco Secure Endpoint (AMP) (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Cloudflare | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/cloudflare.md | Title: "Cloudflare (Preview) (using Azure Functions) connector for Microsoft Sen description: "Learn how to install the connector Cloudflare (Preview) (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. CloudflareXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Cribl | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/cribl.md | + + Title: "Cribl connector for Microsoft Sentinel" +description: "Learn how to install the connector Cribl to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Cribl connector for Microsoft Sentinel ++The [Cribl](https://cribl.io/accelerate-cloud-migration/) connector allows you to easily connect your Cribl (Cribl Enterprise Edition - Standalone) logs with Microsoft Sentinel. This gives you more security insight into your organization's data pipelines. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | CriblAccess_CL<br/> CriblAudit_CL<br/> CriblUIAccess_CL<br/> CriblInternal_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [Cribl](https://www.cribl.io/support/) | ++## Query samples ++**Cribl Internal Logs** ++ ```kusto +CriblInternal_CL + | sort by TimeGenerated + ``` ++**Cribl Audit Logs** ++ ```kusto +CriblAudit_CL + | sort by TimeGenerated + ``` ++**Cribl Access Logs** ++ ```kusto +CriblAccess_CL + | sort by TimeGenerated + ``` ++**Cribl UI Access Logs** ++ ```kusto +CriblUIAccess_CL + | sort by TimeGenerated + ``` ++++## Vendor installation instructions ++Installation and setup instructions for Cribl Stream for Microsoft Sentinel ++Use the documentation from this Github repository and configure Cribl Stream using ++https://docs.cribl.io/stream/usecase-azure-workspace/ ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/criblinc1673975616879.microsoft-sentinel-solution-cribl?tab=Overview) in the Azure Marketplace. |
sentinel | Cyber Blind Spot Integration | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/cyber-blind-spot-integration.md | Title: "Cyber Blind Spot Integration (using Azure Functions) connector for Micro description: "Learn how to install the connector Cyber Blind Spot Integration (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. CTIXYZ). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Cybersixgill Actionable Alerts | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/cybersixgill-actionable-alerts.md | Title: "Cybersixgill Actionable Alerts (using Azure Functions) connector for Mic description: "Learn how to install the connector Cybersixgill Actionable Alerts (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. CybersixgillAlertsXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft sentinel is located. |
sentinel | Google Apigeex | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/google-apigeex.md | Title: "Google ApigeeX (using Azure Functions) connector for Microsoft Sentinel" description: "Learn how to install the connector Google ApigeeX (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Google Cloud Platform Cloud Monitoring | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/google-cloud-platform-cloud-monitoring.md | Title: "Google Cloud Platform Cloud Monitoring (using Azure Functions) connector description: "Learn how to install the connector Google Cloud Platform Cloud Monitoring (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Google Cloud Platform Dns | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/google-cloud-platform-dns.md | Title: "Google Cloud Platform DNS (using Azure Functions) connector for Microsof description: "Learn how to install the connector Google Cloud Platform DNS (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Google Cloud Platform Iam | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/google-cloud-platform-iam.md | Title: "Google Cloud Platform IAM (using Azure Functions) connector for Microsof description: "Learn how to install the connector Google Cloud Platform IAM (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Hackerview Intergration | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/hackerview-intergration.md | Title: "HackerView Intergration (using Azure Functions) connector for Microsoft description: "Learn how to install the connector HackerView Intergration (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. CTIXYZ). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Hyas Protect | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/hyas-protect.md | + + Title: "HYAS Protect (using Azure Functions) connector for Microsoft Sentinel" +description: "Learn how to install the connector HYAS Protect (using Azure Functions) to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# HYAS Protect (using Azure Functions) connector for Microsoft Sentinel ++HYAS Protect provide logs based on reputation values - Blocked, Malicious, Permitted, Suspicious. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Azure function app code** | https://aka.ms/sentinel-HYASProtect-functionapp | +| **Log Analytics table(s)** | HYASProtectDnsSecurityLogs_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [HYAS](https://www.hyas.com/contact) | ++## Query samples ++**All Logs** ++ ```kusto +HYASProtectDnsSecurityLogs_CL + ``` ++++## Prerequisites ++To integrate with HYAS Protect (using Azure Functions) make sure you have: ++- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/). +- **REST API Credentials/permissions**: **HYAS API Key** is required for making API calls. +++## Vendor installation instructions +++> [!NOTE] + > This connector uses Azure Functions to connect to the HYAS API to pull Logs into Microsoft Sentinel. This might result in additional costs for data ingestion and for storing data in Azure Blob Storage costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) and [Azure Blob Storage pricing page](https://azure.microsoft.com/pricing/details/storage/blobs/) for details. +++>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App. +++++Option 1 - Azure Resource Manager (ARM) Template ++Use this method for automated deployment of the HYAS Protect data connector using an ARM Tempate. ++1. Click the **Deploy to Azure** button below. ++ [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-HYASProtect-azuredeploy) +2. Select the preferred **Subscription**, **Resource Group** and **Location**. +3. Enter the **Function Name**, **Table Name**, **Workspace ID**, **Workspace Key**, **API Key**, **TimeInterval**, **FetchBlockedDomains**, **FetchMaliciousDomains**, **FetchSuspiciousDomains**, **FetchPermittedDomains** and deploy. +4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. +5. Click **Purchase** to deploy. ++Option 2 - Manual Deployment of Azure Functions ++Use the following step-by-step instructions to deploy the HYAS Protect Logs data connector manually with Azure Functions (Deployment via Visual Studio Code). +++**1. Deploy a Function App** ++> NOTE:You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development. ++1. Download the [Azure Function App](https://aka.ms/sentinel-HYASProtect-functionapp) file. Extract archive to your local development computer. +2. Start VS Code. Choose File in the main menu and select Open Folder. +3. Select the top level folder from extracted files. +4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button. +If you aren't already signed in, choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose **Sign in to Azure** +If you're already signed in, go to the next step. +5. Provide the following information at the prompts: ++ a. **Select folder:** Choose a folder from your workspace or browse to one that contains your function app. ++ b. **Select Subscription:** Choose the subscription to use. ++ c. Select **Create new Function App in Azure** (Don't choose the Advanced option) ++ d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. HyasProtectLogsXXX). ++ e. **Select a runtime:** Choose Python 3.8. ++ f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft sentinel is located. ++6. Deployment will begin. A notification is displayed after your function app is created and the deployment package is applied. +7. Go to Azure Portal for the Function App configuration. +++**2. Configure the Function App** ++1. In the Function App, select the Function App Name and select **Configuration**. +2. In the **Application settings** tab, select **+ New application setting**. +3. Add each of the following application settings individually, with their respective string values (case-sensitive): + APIKey + Polling + WorkspaceID + WorkspaceKey +. Once all application settings have been entered, click **Save**. ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/hyas.microsoft-sentinel-solution-hyas-protect?tab=Overview) in the Azure Marketplace. |
sentinel | Illumio Saas | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/illumio-saas.md | + + Title: "Illumio SaaS (using Azure Functions) connector for Microsoft Sentinel" +description: "Learn how to install the connector Illumio SaaS (using Azure Functions) to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Illumio SaaS (using Azure Functions) connector for Microsoft Sentinel ++[Illumio](https://www.illumio.com/) connector provides the capability to ingest events into Microsoft Sentinel. The connector provides ability to ingest auditable and flow events from AWS S3 bucket. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Azure function app code** | https://github.com/Azure/Azure-Sentinel/raw/master/Solutions/IllumioSaaS/Data%20Connectors/IllumioEventsConn.zip | +| **Log Analytics table(s)** | Illumio_Auditable_Events_CL<br/> Illumio_Flow_Events_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [Illumio](https://www.illumio.com/support/support) | ++## Query samples ++**Sample of auditable events** ++ ```kusto +Illumio_Auditable_Events_CL + + | sort by TimeGenerated desc + + | limit 10 + ``` ++**Sample of flow summaries** ++ ```kusto +Illumio_Flow_Events_CL + + | sort by TimeGenerated desc + + | limit 10 + ``` ++++## Prerequisites ++To integrate with Illumio SaaS (using Azure Functions) make sure you have: ++- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/). +- **SQS and AWS S3 account credentials/permissions**: **AWS_SECRET**, **AWS_REGION_NAME**, **AWS_KEY**, **QUEUE_URL** is required. See the documentation to learn more about data pulling. If you are using s3 bucket provided by Illumio, contact Illumio support. At your request they will provide you with the AWS S3 bucket name, AWS SQS url and AWS credentials to access them. +- **Illumio API key and secret**: **ILLUMIO_API_KEY**, **ILLUMIO_API_SECRET** is required for a workbook to make connection to SaaS PCE and fetch api responses. +++## Vendor installation instructions +++> [!NOTE] + > This connector uses Azure Functions to connect to the AWS SQS / S3 to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details. ++>**(Optional Step)** Securely store API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App. ++Prerequisites ++1. Ensure AWS SQS is configured for the s3 bucket from which flow and auditable event logs are going to be pulled. In case, Illumio provides bucket, please contact Illumio support for sqs url, s3 bucket name and aws credentials. + 2. Register AAD application - For DCR (Data collection rule) to authentiate to ingest data into log analytics, you must use Entra application. 1. [Follow the instructions here](/azure/azure-monitor/logs/tutorial-logs-ingestion-portal#create-azure-ad-application) (steps 1-5) to get **AAD Tenant Id**, **AAD Client Id** and **AAD Client Secret**. + 2. Ensure you have created a log analytics workspace. +Please keep note of the name and region where it has been deployed. ++Deployment ++Choose one of the approaches from below options. Either use the below ARM template to deploy azure resources or deploy function app manually. ++1. Azure Resource Manager (ARM) Template ++Use this method for automated deployment of Azure resources using an ARM Tempate. ++1. Click the **Deploy to Azure** button below. ++ [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-IllumioSaaS-FunctionApp) +2. Provide the required details such as Microsoft Sentinel Workspace, AWS credentials, Azure AD Application details and ingestion configurations +> **NOTE:** It is recommended to create a new Resource Group for deployment of function app and associated resources. +3. Mark the checkbox labeled **I agree to the terms and conditions stated above**. +4. Click **Purchase** to deploy. ++2. Deploy additional function apps to handle scale ++Use this method for automated deployment of additional function apps using an ARM Tempate. ++1. Click the **Deploy to Azure** button below. ++ [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-IllumioSaaS-QueueTriggerFunctionApp) +++3. Manual Deployment of Azure Functions ++Deployment via Visual Studio Code. +++**1. Deploy a Function App** ++1. Download the [Azure Function App](https://github.com/Azure/Azure-Sentinel/raw/master/Solutions/IllumioSaaS/Data%20Connectors/IllumioEventsConn.zip) file. Extract archive to your local development computer. +2. Follow the [function app manual deployment instructions](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AzureFunctionsManualDeployment.md#function-app-manual-deployment-instructions) to deploy the Azure Functions app using VSCode. +3. After successful deployment of the function app, follow next steps for configuring it. +++**2. Configure the Function App** ++1. Follow documentation to set up all required environment variables and click **Save**. Ensure you restart the function app once settings are saved. ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/illumioinc1629822633689.illumio_sentinel?tab=Overview) in the Azure Marketplace. |
sentinel | Imperva Cloud Waf | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/imperva-cloud-waf.md | Title: "Imperva Cloud WAF (using Azure Functions) connector for Microsoft Sentin description: "Learn how to install the connector Imperva Cloud WAF (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. ImpervaCloudXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Infoblox Data Connector Via Rest Api | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/infoblox-data-connector-via-rest-api.md | + + Title: "Infoblox Data Connector via REST API (using Azure Functions) connector for Microsoft Sentinel" +description: "Learn how to install the connector Infoblox Data Connector via REST API (using Azure Functions) to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Infoblox Data Connector via REST API (using Azure Functions) connector for Microsoft Sentinel ++The Infoblox Data Connector allows you to easily connect your Infoblox TIDE data and Dossier data with Microsoft Sentinel. By connecting your data to Microsoft Sentinel, you can take advantage of search & correlation, alerting, and threat intelligence enrichment for each log. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | Failed_Range_To_Ingest_CL<br/> Infoblox_Failed_Indicators_CL<br/> dossier_whois_CL<br/> dossier_tld_risk_CL<br/> dossier_threat_actor_CL<br/> dossier_rpz_feeds_records_CL<br/> dossier_rpz_feeds_CL<br/> dossier_nameserver_matches_CL<br/> dossier_nameserver_CL<br/> dossier_malware_analysis_v3_CL<br/> dossier_inforank_CL<br/> dossier_infoblox_web_cat_CL<br/> dossier_geo_CL<br/> dossier_dns_CL<br/> dossier_atp_threat_CL<br/> dossier_atp_CL<br/> dossier_ptr_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [Infoblox](https://support.infoblox.com/) | ++## Query samples ++**Failed Indicator time range received** ++ ```kusto +Failed_Range_To_Ingest_CL + + | sort by TimeGenerated desc + ``` ++**Failed Indicators Range Data** ++ ```kusto +Infoblox_Failed_Indicators_CL + + | sort by TimeGenerated desc + ``` ++**Dossier whois data source** ++ ```kusto +dossier_whois_CL + + | sort by TimeGenerated desc + ``` ++**Dossier tld risk data source** ++ ```kusto +dossier_tld_risk_CL + + | sort by TimeGenerated desc + ``` ++**Dossier threat actor data source** ++ ```kusto +dossier_threat_actor_CL + + | sort by TimeGenerated desc + ``` ++**Dossier rpz feeds records data source** ++ ```kusto +dossier_rpz_feeds_records_CL + + | sort by TimeGenerated desc + ``` ++**Dossier rpz feeds data source** ++ ```kusto +dossier_rpz_feeds_CL + + | sort by TimeGenerated desc + ``` ++**Dossier nameserver matches data source** ++ ```kusto +dossier_nameserver_matches_CL + + | sort by TimeGenerated desc + ``` ++**Dossier nameserver data source** ++ ```kusto +dossier_nameserver_CL + + | sort by TimeGenerated desc + ``` ++**Dossier malware analysis v3 data source** ++ ```kusto +dossier_malware_analysis_v3_CL + + | sort by TimeGenerated desc + ``` ++**Dossier inforank data source** ++ ```kusto +dossier_inforank_CL + + | sort by TimeGenerated desc + ``` ++**Dossier infoblox web cat data source** ++ ```kusto +dossier_infoblox_web_cat_CL + + | sort by TimeGenerated desc + ``` ++**Dossier geo data source** ++ ```kusto +dossier_geo_CL + + | sort by TimeGenerated desc + ``` ++**Dossier dns data source** ++ ```kusto +dossier_dns_CL + + | sort by TimeGenerated desc + ``` ++**Dossier atp threat data source** ++ ```kusto +dossier_atp_threat_CL + + | sort by TimeGenerated desc + ``` ++**Dossier atp data source** ++ ```kusto +dossier_atp_CL + + | sort by TimeGenerated desc + ``` ++**Dossier ptr data source** ++ ```kusto +dossier_ptr_CL + + | sort by TimeGenerated desc + ``` ++++## Prerequisites ++To integrate with Infoblox Data Connector via REST API (using Azure Functions) make sure you have: ++- **Azure Subscription**: Azure Subscription with owner role is required to register an application in Microsoft Entra ID and assign role of contributor to app in resource group. +- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/). +- **REST API Credentials/permissions**: **Infoblox API Key** is required. See the documentation to learn more about API on the [Rest API reference](https://csp.infoblox.com/apidoc?url=https://csp.infoblox.com/apidoc/docs/Infrastructure#/Services/ServicesRead) +++## Vendor installation instructions +++> [!NOTE] + > This connector uses Azure Functions to connect to the Infoblox API to create Threat Indicators for TIDE and pull Dossier data into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details. +++>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App. +++**STEP 1 - App Registration steps for the Application in Microsoft Entra ID** ++ This integration requires an App registration in the Azure portal. Follow the steps in this section to create a new application in Microsoft Entra ID: + 1. Sign in to the [Azure portal](https://portal.azure.com/). + 2. Search for and select **Microsoft Entra ID**. + 3. Under **Manage**, select **App registrations > New registration**. + 4. Enter a display **Name** for your application. + 5. Select **Register** to complete the initial app registration. + 6. When registration finishes, the Azure portal displays the app registration's Overview pane. You see the **Application (client) ID** and **Tenant ID**. The client ID and Tenant ID is required as configuration parameters for the execution of the TriggersSync playbook. ++> **Reference link:** [/azure/active-directory/develop/quickstart-register-app](/azure/active-directory/develop/quickstart-register-app) +++**STEP 2 - Add a client secret for application in Microsoft Entra ID** ++ Sometimes called an application password, a client secret is a string value required for the execution of TriggersSync playbook. Follow the steps in this section to create a new Client Secret: + 1. In the Azure portal, in **App registrations**, select your application. + 2. Select **Certificates & secrets > Client secrets > New client secret**. + 3. Add a description for your client secret. + 4. Select an expiration for the secret or specify a custom lifetime. Limit is 24 months. + 5. Select **Add**. + 6. *Record the secret's value for use in your client application code. This secret value is never displayed again after you leave this page.* The secret value is required as configuration parameter for the execution of TriggersSync playbook. ++> **Reference link:** [/azure/active-directory/develop/quickstart-register-app#add-a-client-secret](/azure/active-directory/develop/quickstart-register-app#add-a-client-secret) +++**STEP 3 - Assign role of Contributor to application in Microsoft Entra ID** ++ Follow the steps in this section to assign the role: + 1. In the Azure portal, Go to **Resource Group** and select your resource group. + 2. Go to **Access control (IAM)** from left panel. + 3. Click on **Add**, and then select **Add role assignment**. + 4. Select **Contributor** as role and click on next. + 5. In **Assign access to**, select `User, group, or service principal`. + 6. Click on **add members** and type **your app name** that you have created and select it. + 7. Now click on **Review + assign** and then again click on **Review + assign**. ++> **Reference link:** [/azure/role-based-access-control/role-assignments-portal](/azure/role-based-access-control/role-assignments-portal) +++**STEP 4 - Steps to generate the Infoblox API Credentials** ++ Follow these instructions to generate Infoblox API Key. + In the [Infoblox Cloud Services Portal](https://csp.infoblox.com/atlas/app/welcome), generate an API Key and copy it somewhere safe to use in the next step. You can find instructions on how to create API keys [**here**](https://docs.infoblox.com/space/BloxOneThreatDefense/230394187/How+Do+I+Create+an+API+Key%3F). +++**STEP 5 - Steps to deploy the connector and the associated Azure Function** ++>**IMPORTANT:** Before deploying the Infoblox data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following) readily available.., as well as the Infoblox API Authorization Credentials ++++Azure Resource Manager (ARM) Template ++Use this method for automated deployment of the Infoblox Data connector. ++1. Click the **Deploy to Azure** button below. ++ [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-infoblox-azuredeploy) +2. Select the preferred **Subscription**, **Resource Group** and **Location**. +3. Enter the below information : + Azure Tenant Id + Azure Client Id + Azure Client Secret + Infoblox API Token + Infoblox Base URL + Workspace ID + Workspace Key + Log Level (Default: INFO) + Confidence + Threat Level + App Insights Workspace Resource ID +4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. +5. Click **Purchase** to deploy. ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/infoblox.infoblox-app-for-microsoft-sentinel?tab=Overview) in the Azure Marketplace. |
sentinel | Infoblox Soc Insight Data Connector Via Rest Api | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/infoblox-soc-insight-data-connector-via-rest-api.md | + + Title: "Infoblox SOC Insight Data Connector via REST API connector for Microsoft Sentinel" +description: "Learn how to install the connector Infoblox SOC Insight Data Connector via REST API to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Infoblox SOC Insight Data Connector via REST API connector for Microsoft Sentinel ++The Infoblox SOC Insight Data Connector allows you to easily connect your Infoblox BloxOne SOC Insight data with Microsoft Sentinel. By connecting your logs to Microsoft Sentinel, you can take advantage of search & correlation, alerting, and threat intelligence enrichment for each log. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | InfobloxInsight_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [Infoblox](https://support.infoblox.com/) | ++## Query samples ++**Return all logs involving DNS Tunneling** ++ ```kusto +InfobloxInsight_CL ++ | where threatType_s == "DNS Tunneling" + ``` ++**Return all logs involving a configuration issue** ++ ```kusto +InfobloxInsight_CL ++ | where tClass_s == "TI-CONFIGURATIONISSUE" + ``` ++**Return count of critical priority insights** ++ ```kusto +InfobloxInsight_CL ++ | where priorityText_s == "CRITICAL" + + | summarize dcount(insightId_g) by priorityText_s + ``` ++**Return each spreading insight by ThreatClass** ++ ```kusto +InfobloxInsight_CL ++ | where isnotempty(spreadingDate_t) + + | summarize dcount(insightId_g) by tClass_s + ``` ++**Return each Insight by ThreatFamily** ++ ```kusto +InfobloxInsight_CL ++ | + | summarize dcount(insightId_g) by tFamily_s + ``` ++++## Vendor installation instructions ++Workspace Keys ++In order to use the playbooks as part of this solution, find your **Workspace ID** and **Workspace Primary Key** below for your convenience. +++ Workspace Key ++Parsers ++>This data connector depends on a parser based on a Kusto Function to work as expected called [**InfobloxInsight**](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Infoblox%20SOC%20Insights/Parsers/InfobloxInsight.yaml) which is deployed with the Microsoft Sentinel Solution. ++SOC Insights ++>This data connector assumes you have access to Infoblox BloxOne Threat Defense SOC Insights. You can find more information about SOC Insights [**here**](https://docs.infoblox.com/space/BloxOneThreatDefense/501514252/SOC+Insights). ++Follow the steps below to configure this data connector +++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/infoblox.infoblox-app-for-microsoft-sentinel?tab=Overview) in the Azure Marketplace. |
sentinel | Luminar Iocs And Leaked Credentials | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/luminar-iocs-and-leaked-credentials.md | Title: "Luminar IOCs and Leaked Credentials (using Azure Functions) connector fo description: "Learn how to install the connector Luminar IOCs and Leaked Credentials (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. CognyteLuminarXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft sentinel is located. |
sentinel | Mulesoft Cloudhub | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/mulesoft-cloudhub.md | Title: "MuleSoft Cloudhub (using Azure Functions) connector for Microsoft Sentin description: "Learn how to install the connector MuleSoft Cloudhub (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 To integrate with MuleSoft Cloudhub (using Azure Functions) make sure you have: > This data connector depends on a parser based on a Kusto Function to work as expected [**MuleSoftCloudhub**](https://aka.ms/sentinel-MuleSoftCloudhub-parser) which is deployed with the Microsoft Sentinel Solution. +**Note: This data connector fetch only the logs of the CloudHub application using Platform API and not of CloudHub 2.0 application** ++ **STEP 1 - Configuration steps for the MuleSoft Cloudhub API** Follow the instructions to obtain the credentials. If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. MuleSoftXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Phosphorus Devices | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/phosphorus-devices.md | + + Title: "Phosphorus Devices connector for Microsoft Sentinel" +description: "Learn how to install the connector Phosphorus Devices to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Phosphorus Devices connector for Microsoft Sentinel ++The Phosphorus Device Connector provides the capability to Phosphorus to ingest device data logs into Microsoft Sentinel through the Phosphorus REST API. The Connector provides visibility into the devices enrolled in Phosphorus. This Data Connector pulls devices information along with its corresponding alerts. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | Phosphorus_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [Phosphorus Inc.](https://phosphorus.io) | ++## Query samples ++**List all Phosphorus Device Logs** ++ ```kusto +Phosphorus_CL + + | sort by TimeGenerated desc + ``` ++++## Prerequisites ++To integrate with Phosphorus Devices make sure you have: ++- **REST API Credentials/permissions**: **Phosphorus API Key** is required. Please make sure that the API Key associated with the User has the Manage Settings permissions enabled. ++ Follow these instructions to enable Manage Settings permissions. + 1. Log in to the Phosphorus Application + 2. Go to 'Settings' -> 'Groups' + 3. Select the Group the Integration user is a part of + 4. Navigate to 'Product Actions' -> toggle on the 'Manage Settings' permission. +++## Vendor installation instructions +++**STEP 1 - Configuration steps for the Phosphorus API** ++ Follow these instructions to create a Phosphorus API key. + 1. Log into your Phosphorus instance + 2. Navigate to Settings -> API + 3. If the API key has not already been created, press the **Add button** to create the API key + 4. The API key can now be copied and used during the Phosphorus Device connector configuration ++Connect the Phosphorus Application with Microsoft Sentinel ++**STEP 2 - Fill in the details below** ++>**IMPORTANT:** Before deploying the Phosphorus Device data connector, have the Phosphorus Instance Domain Name readily available as well as the Phosphorus API Key(s) +++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/4043.microsoft-sentinel-solution-phosphorus?tab=Overview) in the Azure Marketplace. |
sentinel | Premium Microsoft Defender Threat Intelligence | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/premium-microsoft-defender-threat-intelligence.md | + + Title: "Premium Microsoft Defender Threat Intelligence (Preview) connector for Microsoft Sentinel" +description: "Learn how to install the connector Premium Microsoft Defender Threat Intelligence (Preview) to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Premium Microsoft Defender Threat Intelligence (Preview) connector for Microsoft Sentinel ++Microsoft Sentinel provides you the capability to import threat intelligence generated by Microsoft to enable monitoring, alerting and hunting. Use this data connector to import Indicators of Compromise (IOCs) from Microsoft Defender Threat Intelligence (MDTI) into Microsoft Sentinel. Threat indicators can include IP addresses, domains, URLs, and file hashes, etc. Note: This is a paid connector. To use and ingest data from it, please purchase the "MDTI API Access" SKU from the Partner Center. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | ThreatIntelligenceIndicator<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [Microsoft Corporation](https://support.microsoft.com/) | ++## Query samples ++**Summarize by threat type** ++ ```kusto +ThreatIntelligenceIndicator ++ | where ExpirationDateTime > now() ++ | where SourceSystem == "Premium Microsoft Defender Threat Intelligence" ++ | where ExpirationDateTime > now() ++ | join ( SigninLogs ) on $left.NetworkIP == $right.IPAddress + | summarize count() by ThreatType + ``` ++**Summarize by 1 hour bins** ++ ```kusto +ThreatIntelligenceIndicator ++ | where SourceSystem == "Premium Microsoft Defender Threat Intelligence" ++ | where TimeGenerated >= ago(1d) + | summarize count()ΓÇïΓÇï + ``` ++++## Vendor installation instructions ++Use this data connector to import Indicators of Compromise (IOCs) from Premium Microsoft Defender Threat Intelligence (MDTI) into Microsoft Sentinel. ++++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-threatintelligence-taxii?tab=Overview) in the Azure Marketplace. |
sentinel | Proofpoint On Demand Email Security | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/proofpoint-on-demand-email-security.md | Title: "Proofpoint On Demand Email Security (using Azure Functions) connector fo description: "Learn how to install the connector Proofpoint On Demand Email Security (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. ProofpointXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Radiflow Isid Via Ama | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/radiflow-isid-via-ama.md | + + Title: "Radiflow iSID via AMA connector for Microsoft Sentinel" +description: "Learn how to install the connector Radiflow iSID via AMA to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Radiflow iSID via AMA connector for Microsoft Sentinel ++iSID enables non-disruptive monitoring of distributed ICS networks for changes in topology and behavior, using multiple security packages, each offering a unique capability pertaining to a specific type of network activity ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | CommonSecurityLog (RadiflowEvent)<br/> | +| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) | +| **Supported by** | [Radiflow](https://www.radiflow.com) | ++## Query samples ++**Top 5 protocols by number of events** ++ ```kusto +RadiflowEvent ++ | where DeviceProduct =~ "iSID" ++ | where isnotempty(Protocol) ++ | summarize count() by Port, Protocol ++ | project-keep count_, Port, Protocol ++ | top 5 by Protocol + ``` ++++## Vendor installation instructions +++> [!NOTE] + > This data connector depends on a parser based on a Kusto Function to work as expected [**RadiflowEvent**] which is deployed with the Microsoft Sentinel Solution. +++2. Secure your machine ++Make sure to configure the machine's security according to your organization's security policy +++[Learn more >](https://aka.ms/SecureCEF) ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/radiflow.azure-sentinel-solution-radiflow?tab=Overview) in the Azure Marketplace. |
sentinel | Recommended Infoblox Cloud Data Connector Via Ama | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/recommended-infoblox-cloud-data-connector-via-ama.md | + + Title: "[Recommended] Infoblox Cloud Data Connector via AMA connector for Microsoft Sentinel" +description: "Learn how to install the connector [Recommended] Infoblox Cloud Data Connector via AMA to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# [Recommended] Infoblox Cloud Data Connector via AMA connector for Microsoft Sentinel ++The Infoblox Cloud Data Connector allows you to easily connect your Infoblox data with Microsoft Sentinel. By connecting your logs to Microsoft Sentinel, you can take advantage of search & correlation, alerting, and threat intelligence enrichment for each log. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | CommonSecurityLog<br/> | +| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) | +| **Supported by** | [Infoblox](https://support.infoblox.com/) | ++## Query samples ++**Return all Block DNS Query/Response logs** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "RPZ" + ``` ++**Return all DNS Query/Response logs** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "DNS" + ``` ++**Return all DHCP Query/Response logs** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "DHCP" + ``` ++**Return all Service Logs Query/Response logs** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "Service" + ``` ++**Return all Audit Query/Response logs** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "Audit" + ``` ++**Return all Category Filters security events logs** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "RPZ" + + | where AdditionalExtensions has_cs "InfobloxRPZ=CAT_" + ``` ++**Return all Application Filters security events logs** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "RPZ" + + | where AdditionalExtensions has_cs "InfobloxRPZ=APP_" + ``` ++**Return Top 10 TD Domains Hit Count** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "RPZ" ++ | summarize count() by DestinationDnsDomain ++ | top 10 by count_ desc + ``` ++**Return Top 10 TD Source IPs Hit Count** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID has_cs "RPZ" ++ | summarize count() by SourceIP ++ | top 10 by count_ desc + ``` ++**Return Recently Created DHCP Leases** ++ ```kusto +CommonSecurityLog ++ | where DeviceEventClassID == "DHCP-LEASE-CREATE" + ``` ++++## Vendor installation instructions +++>**IMPORTANT:** This Microsoft Sentinel data connector assumes an Infoblox Data Connector host has already been created and configured in the Infoblox Cloud Services Portal (CSP). As the [**Infoblox Data Connector**](https://docs.infoblox.com/display/BloxOneThreatDefense/Deploying+the+Data+Connector+Solution) is a feature of Threat Defense, access to an appropriate Threat Defense subscription is required. See this [**quick-start guide**](https://www.infoblox.com/wp-content/uploads/infoblox-deployment-guide-data-connector.pdf) for more information and licensing requirements. ++1. Linux Syslog agent configuration ++Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel. ++> Notice that the data from all regions will be stored in the selected workspace ++1.1 Select or create a Linux machine ++Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Azure or other clouds. ++1.2 Install the CEF collector on the Linux machine ++Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP. ++> 1. Make sure that you have Python on your machine using the following command: python -version. ++> 2. You must have elevated permissions (sudo) on your machine. ++ Run the following command to install and apply the CEF collector: ++ `sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}` ++2. Configure Infoblox to send Syslog data to the Infoblox Cloud Data Connector to forward to the Syslog agent ++Follow the steps below to configure the Infoblox CDC to send data to Microsoft Sentinel via the Linux Syslog agent. +1. Navigate to **Manage > Data Connector**. +2. Click the **Destination Configuration** tab at the top. +3. Click **Create > Syslog**. + - **Name**: Give the new Destination a meaningful **name**, such as **Microsoft-Sentinel-Destination**. + - **Description**: Optionally give it a meaningful **description**. + - **State**: Set the state to **Enabled**. + - **Format**: Set the format to **CEF**. + - **FQDN/IP**: Enter the IP address of the Linux device on which the Linux agent is installed. + - **Port**: Leave the port number at **514**. + - **Protocol**: Select desired protocol and CA certificate if applicable. + - Click **Save & Close**. +4. Click the **Traffic Flow Configuration** tab at the top. +5. Click **Create**. + - **Name**: Give the new Traffic Flow a meaningful **name**, such as **Microsoft-Sentinel-Flow**. + - **Description**: Optionally give it a meaningful **description**. + - **State**: Set the state to **Enabled**. + - Expand the **Service Instance** section. + - **Service Instance**: Select your desired Service Instance for which the Data Connector service is enabled. + - Expand the **Source Configuration** section. + - **Source**: Select **BloxOne Cloud Source**. + - Select all desired **log types** you wish to collect. Currently supported log types are: + - Threat Defense Query/Response Log + - Threat Defense Threat Feeds Hits Log + - DDI Query/Response Log + - DDI DHCP Lease Log + - Expand the **Destination Configuration** section. + - Select the **Destination** you just created. + - Click **Save & Close**. +6. Allow the configuration some time to activate. ++3. Validate connection ++Follow the instructions to validate your connectivity: ++Open Log Analytics to check if the logs are received using the CommonSecurityLog schema. ++>It may take about 20 minutes until the connection streams data to your workspace. ++If the logs are not received, run the following connectivity validation script: ++> 1. Make sure that you have Python on your machine using the following command: python -version ++>2. You must have elevated permissions (sudo) on your machine ++ Run the following command to validate your connectivity: ++ `sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}` ++4. Secure your machine ++Make sure to configure the machine's security according to your organization's security policy +++[Learn more >](https://aka.ms/SecureCEF) ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/infoblox.infoblox-app-for-microsoft-sentinel?tab=Overview) in the Azure Marketplace. |
sentinel | Recommended Infoblox Soc Insight Data Connector Via Ama | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/recommended-infoblox-soc-insight-data-connector-via-ama.md | + + Title: "[Recommended] Infoblox SOC Insight Data Connector via AMA connector for Microsoft Sentinel" +description: "Learn how to install the connector [Recommended] Infoblox SOC Insight Data Connector via AMA to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# [Recommended] Infoblox SOC Insight Data Connector via AMA connector for Microsoft Sentinel ++The Infoblox SOC Insight Data Connector allows you to easily connect your Infoblox BloxOne SOC Insight data with Microsoft Sentinel. By connecting your logs to Microsoft Sentinel, you can take advantage of search & correlation, alerting, and threat intelligence enrichment for each log. ++This data connector ingests Infoblox SOC Insight CDC logs into your Log Analytics Workspace using the new Azure Monitor Agent. Learn more about ingesting using the new Azure Monitor Agent [here](/azure/sentinel/connect-cef-ama). **Microsoft recommends using this Data Connector.** ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | CommonSecurityLog (InfobloxCDC_SOCInsights)<br/> | +| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) | +| **Supported by** | [Infoblox](https://support.infoblox.com/) | ++## Query samples ++**Return all logs involving DNS Tunneling** ++ ```kusto +InfobloxCDC_SOCInsights ++ | where ThreatType == "DNS Tunneling" + ``` ++**Return all logs involving a configuration issue** ++ ```kusto +InfobloxCDC_SOCInsights ++ | where ThreatClass == "TI-CONFIGURATIONISSUE" + ``` ++**Return all high threat level logs** ++ ```kusto +InfobloxCDC_SOCInsights ++ | where ThreatLevel == "High" + ``` ++**Return raised status logs** ++ ```kusto +InfobloxCDC_SOCInsights ++ | where Status == "RAISED" + ``` ++**Return logs involving a high amount of unblocked DNS hits** ++ ```kusto +InfobloxCDC_SOCInsights ++ | where NotBlockedCount >= 100 + ``` ++**Return each Insight by ThreatFamily** ++ ```kusto +InfobloxCDC_SOCInsights ++ | summarize dcount(InfobloxInsightID) by ThreatFamily + ``` ++++## Prerequisites ++To integrate with [Recommended] Infoblox SOC Insight Data Connector via AMA make sure you have: ++- ****: To collect data from non-Azure VMs, they must have Azure Arc installed and enabled. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc) +- ****: Common Event Format (CEF) via AMA and Syslog via AMA data connectors must be installed. [Learn more](/azure/sentinel/connect-cef-ama#open-the-connector-page-and-create-the-dcr) +++## Vendor installation instructions ++Workspace Keys ++In order to use the playbooks as part of this solution, find your **Workspace ID** and **Workspace Primary Key** below for your convenience. +++ Workspace Key ++Parsers ++>This data connector depends on a parser based on a Kusto Function to work as expected called [**InfobloxCDC_SOCInsights**](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Infoblox%20SOC%20Insights/Parsers/InfobloxCDC_SOCInsights.yaml) which is deployed with the Microsoft Sentinel Solution. ++SOC Insights ++>This data connector assumes you have access to Infoblox BloxOne Threat Defense SOC Insights. You can find more information about SOC Insights [**here**](https://docs.infoblox.com/space/BloxOneThreatDefense/501514252/SOC+Insights). ++Infoblox Cloud Data Connector ++>This data connector assumes an Infoblox Data Connector host has already been created and configured in the Infoblox Cloud Services Portal (CSP). As the [**Infoblox Data Connector**](https://docs.infoblox.com/display/BloxOneThreatDefense/Deploying+the+Data+Connector+Solution) is a feature of BloxOne Threat Defense, access to an appropriate BloxOne Threat Defense subscription is required. See this [**quick-start guide**](https://www.infoblox.com/wp-content/uploads/infoblox-deployment-guide-data-connector.pdf) for more information and licensing requirements. +++2. Secure your machine ++Make sure to configure the machine's security according to your organization's security policy +++[Learn more >](https://aka.ms/SecureCEF) ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/infoblox.infoblox-app-for-microsoft-sentinel?tab=Overview) in the Azure Marketplace. |
sentinel | Sailpoint Identitynow | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/sailpoint-identitynow.md | Title: "SailPoint IdentityNow (using Azure Function) connector for Microsoft Sentinel" -description: "Learn how to install the connector SailPoint IdentityNow (using Azure Function) to connect your data source to Microsoft Sentinel." + Title: "SailPoint IdentityNow (using Azure Functions) connector for Microsoft Sentinel" +description: "Learn how to install the connector SailPoint IdentityNow (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 -# SailPoint IdentityNow (using Azure Function) connector for Microsoft Sentinel +# SailPoint IdentityNow (using Azure Functions) connector for Microsoft Sentinel The [SailPoint](https://www.sailpoint.com/) IdentityNow data connector provides the capability to ingest [SailPoint IdentityNow] search events into Microsoft Sentinel through the REST API. The connector provides customers the ability to extract audit information from their IdentityNow tenant. It is intended to make it even easier to bring IdentityNow user activity and governance events into Microsoft Sentinel to improve insights from your security incident and event monitoring solution. SailPointIDN_Triggers_CL ## Prerequisites -To integrate with SailPoint IdentityNow (using Azure Function) make sure you have: +To integrate with SailPoint IdentityNow (using Azure Functions) make sure you have: - **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/). - **SailPoint IdentityNow API Authentication Credentials**: TENANT_ID, CLIENT_ID and CLIENT_SECRET are required for authentication. If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. searcheventXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.9. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Silverfort Admin Console | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/silverfort-admin-console.md | + + Title: "Silverfort Admin Console connector for Microsoft Sentinel" +description: "Learn how to install the connector Silverfort Admin Console to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# Silverfort Admin Console connector for Microsoft Sentinel ++The [Silverfort](https://silverfort.com) ITDR Admin Console connector solution allows ingestion of Silverfort events and logging into Microsoft Sentinel. + Silverfort provides syslog based events and logging using Common Event Format (CEF). By forwarding your Silverfort ITDR Admin Console CEF data into Microsoft Sentinel, you can take advantage of Sentinels's search & correlation, alerting, and threat intelligence enrichment on Silverfort data. + Please contact Silverfort or consult the Silverfort documentation for more information. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | CommonSecurityLog (DATATYPE_NAME)<br/> | +| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) | +| **Supported by** | [Silverfort](https://www.silverfort.com/customer-success/#support) | ++## Query samples ++**Get all User Brute Force incidents** ++ ```kusto +CommonSecurityLog + + | where DeviceVendor has 'Silverfort' + + | where DeviceProduct has 'Admin Console' + + | where DeviceEventClassID == "NewIncident" + + | where Message has "UserBruteForce" ++ ``` ++++## Vendor installation instructions ++1. Linux Syslog agent configuration ++Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel. ++> Notice that the data from all regions will be stored in the selected workspace ++1.1 Select or create a Linux machine ++Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Azure or other clouds. ++1.2 Install the CEF collector on the Linux machine ++Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP. ++> 1. Make sure that you have Python on your machine using the following command: python -version. ++> 2. You must have elevated permissions (sudo) on your machine. ++ Run the following command to install and apply the CEF collector: ++ `sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}` ++2. Forward Common Event Format (CEF) logs to Syslog agent ++Set your security solution to send Syslog messages in CEF format to the proxy machine. Make sure you to send the logs to port 514 TCP on the machine's IP address. ++3. Validate connection ++Follow the instructions to validate your connectivity: ++Open Log Analytics to check if the logs are received using the CommonSecurityLog schema. ++>It may take about 20 minutes until the connection streams data to your workspace. ++If the logs are not received, run the following connectivity validation script: ++> 1. Make sure that you have Python on your machine using the following command: python -version ++>2. You must have elevated permissions (sudo) on your machine ++ Run the following command to validate your connectivity: ++ `sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}` ++4. Secure your machine ++Make sure to configure the machine's security according to your organization's security policy +++[Learn more >](https://aka.ms/SecureCEF) ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/silverfort.microsoft-sentinel-solution-silverfort?tab=Overview) in the Azure Marketplace. |
sentinel | Tenable Vulnerability Management | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/tenable-vulnerability-management.md | Title: "Tenable Vulnerability Management (using Azure Functions) connector for M description: "Learn how to install the connector Tenable Vulnerability Management (using Azure Functions) to connect your data source to Microsoft Sentinel." Previously updated : 07/26/2024 Last updated : 10/15/2024 If you're already signed in, go to the next step. d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. TenableVMXXXXX). - e. **Select a runtime:** Choose Python 3.8. + e. **Select a runtime:** Choose Python 3.11. f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located. |
sentinel | Threat Intelligence Upload Indicators Api | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/threat-intelligence-upload-indicators-api.md | Title: "Threat Intelligence Upload Indicators API (Preview) connector for Micros description: "Learn how to install the connector Threat Intelligence Upload Indicators API (Preview) to connect your data source to Microsoft Sentinel." Previously updated : 04/26/2024 Last updated : 10/15/2024 This is autogenerated content. For changes, contact the solution provider. | **Data collection rules support** | Not currently supported | | **Supported by** | [Microsoft Corporation](https://support.microsoft.com/) | +## Query samples ++**All Threat Intelligence APIs Indicators** ++ ```kusto +ThreatIntelligenceIndicator + | where SourceSystem !in ('SecurityGraph', 'Azure Sentinel', 'Microsoft Sentinel') + | sort by TimeGenerated desc + ``` ++++## Vendor installation instructions ++You can connect your threat intelligence data sources to Microsoft Sentinel by either: +++>Using an integrated Threat Intelligence Platform (TIP), such as Threat Connect, Palo Alto Networks MineMeld, MISP, and others. ++>Calling the Microsoft Sentinel data plane API directly from another application. + - Note: The 'Status' of the connector will not appear as 'Connected' here, because the data is ingested by making an API call. ++Follow These Steps to Connect to your Threat Intelligence: ++1. Get Microsoft Entra ID Access Token ++[concat('To send request to the APIs, you need to acquire Azure Active Directory access token. You can follow instruction in this page: /azure/databricks/dev-tools/api/latest/aad/app-aad-token#get-an-azure-ad-access-token + - Notice: Please request AAD access token with scope value: ', variables('management'), '.default')] ++2. Send indicators to Sentinel ++You can send indicators by calling our Upload Indicators API. For more information about the API, click [here](/azure/sentinel/upload-indicators-api). ++>HTTP method: POST ++>Endpoint: `https://api.ti.sentinel.azure.com/workspaces/[WorkspaceID]/threatintelligenceindicators:upload?api-version=2022-07-01` ++>WorkspaceID: the workspace that the indicators are uploaded to. +++>Header Value 1: "Authorization" = "Bearer [Microsoft Entra ID Access Token from step 1]" +++> Header Value 2: "Content-Type" = "application/json" + +>Body: The body is a JSON object containing an array of indicators in STIX format. ++ ## Next steps |
sentinel | Zerofox Cti | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/zerofox-cti.md | + + Title: "ZeroFox CTI (using Azure Functions) connector for Microsoft Sentinel" +description: "Learn how to install the connector ZeroFox CTI (using Azure Functions) to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# ZeroFox CTI (using Azure Functions) connector for Microsoft Sentinel ++The ZeroFox CTI data connectors provide the capability to ingest the different [ZeroFox](https://www.zerofox.com/threat-intelligence/) cyber threat intelligence alerts into Microsoft Sentinel. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | ZeroFox_CTI_advanced_dark_web_CL<br/> ZeroFox_CTI_botnet_CL<br/> ZeroFox_CTI_breaches_CL<br/> ZeroFox_CTI_C2_CL<br/> ZeroFox_CTI_compromised_credentials_CL<br/> ZeroFox_CTI_credit_cards_CL<br/> ZeroFox_CTI_dark_web_CL<br/> ZeroFox_CTI_discord_CL<br/> ZeroFox_CTI_disruption_CL<br/> ZeroFox_CTI_email_addresses_CL<br/> ZeroFox_CTI_exploits_CL<br/> ZeroFox_CTI_irc_CL<br/> ZeroFox_CTI_malware_CL<br/> ZeroFox_CTI_national_ids_CL<br/> ZeroFox_CTI_phishing_CL<br/> ZeroFox_CTI_phone_numbers_CL<br/> ZeroFox_CTI_ransomware_CL<br/> ZeroFox_CTI_telegram_CL<br/> ZeroFox_CTI_threat_actors_CL<br/> ZeroFox_CTI_vulnerabilities_CL<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [ZeroFox](https://www.zerofox.com/contact-us/) | ++## Query samples ++**ZeroFox CTI C2-domains Logs** ++ ```kusto +ZeroFox_CTI_C2_CL + + | sort by TimeGenerated desc + ``` ++**ZeroFox CTI Email Addresses Logs** ++ ```kusto +ZeroFox_CTI_email_addresses_CL + + | sort by TimeGenerated desc + ``` ++**ZeroFox CTI Malware Logs** ++ ```kusto +ZeroFox_CTI_malware_CL + + | sort by TimeGenerated desc + ``` ++++## Prerequisites ++To integrate with ZeroFox CTI (using Azure Functions) make sure you have: ++- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/). +- **ZeroFox API Credentials/permissions**: **ZeroFox Username**, **ZeroFox Personal Access Token** are required for ZeroFox CTI REST API. +++## Vendor installation instructions +++> [!NOTE] + > This connector uses Azure Functions to connect to the ZeroFox CTI REST API to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details. +++>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App. +++**STEP 1 - Retrieval of ZeroFox credentials:** ++ Follow these instructions for set up logging and obtain credentials. +1. [Log into ZeroFox's website.](https://cloud.zerofox.com/login) using your username and password +2 - Click into the Settings button and go to the Data Connectors Section. +3 - Select the API DATA FEEDS tab and head to the bottom of the page, select **Reset** in the API Information box, to obtain a Personal Access Token to be used along with your username. +++**STEP 2 - Deploy the Azure Function data connectors using the Azure Resource Manager template: ** ++>**IMPORTANT:** Before deploying the ZeroFox CTI data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following), readily available. ++++Preparing resources for deployment. ++1. Click the **Deploy to Azure** button below. ++ [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-zerofox-azuredeploy) +2. Select the preferred **Subscription**, **Resource Group**, Log analytics Workspace and **Location**. +3. Enter the **Workspace ID**, **Workspace Key**, **ZeroFox Username**, **ZeroFox Personal Access Token** +4. +5. Click **Review + Create** to deploy. ++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/zerofoxinc1695922129370.zerofox-sentinel-connector?tab=Overview) in the Azure Marketplace. |
sentinel | Zerofox Enterprise Alerts Polling Ccp | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/sentinel/data-connectors/zerofox-enterprise-alerts-polling-ccp.md | + + Title: "ZeroFox Enterprise - Alerts (Polling CCP) connector for Microsoft Sentinel" +description: "Learn how to install the connector ZeroFox Enterprise - Alerts (Polling CCP) to connect your data source to Microsoft Sentinel." ++ Last updated : 10/15/2024++++++# ZeroFox Enterprise - Alerts (Polling CCP) connector for Microsoft Sentinel ++Collects alerts from ZeroFox API. ++This is autogenerated content. For changes, contact the solution provider. ++## Connector attributes ++| Connector attribute | Description | +| | | +| **Log Analytics table(s)** | {{graphQueriesTableName}}<br/> | +| **Data collection rules support** | Not currently supported | +| **Supported by** | [ZeroFox](https://www.zerofox.com/contact-us/) | ++## Query samples ++**List all ZeroFox alerts** ++ ```kusto +{{graphQueriesTableName}} ++ | sort by TimeGenerated asc + ``` ++**Count alerts by network type** ++ ```kusto +{{graphQueriesTableName}} ++ | summarize Count = count() by ThreatSource=network_s + ``` ++**Count alerts by entity** ++ ```kusto +{{graphQueriesTableName}} ++ | summarize Count = count() by Entity=entity_name_s + ``` ++++## Prerequisites ++To integrate with ZeroFox Enterprise - Alerts (Polling CCP) make sure you have: ++- **ZeroFox Personal Access Token (PAT)**: A ZeroFox PAT is required. You can get it in Data Connectors > [API Data Feeds](https://cloud.zerofox.com/data_connectors/api). +++## Vendor installation instructions ++Connect ZeroFox to Microsoft Sentinel ++Provide your ZeroFox PAT +++++## Next steps ++For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/zerofoxinc1695922129370.zerofox-sentinel-connector?tab=Overview) in the Azure Marketplace. |
site-recovery | Site Recovery Whats New | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/site-recovery/site-recovery-whats-new.md | For Site Recovery components, we support N-4 versions, where N is the latest rel **Update** | **Unified Setup** | **Replication appliance / Configuration server** | **Mobility service agent** | **Site Recovery Provider** | **Recovery Services agent** | | | | | -[Rollup 75](https://support.microsoft.com/topic/update-rollup-75-for-azure-site-recovery-4884b937-8976-454a-9b80-57e0200eb2ec) | 9.62.7172.1 | 9.62.7172.1 | 9.56.6879.1 | 5.24.0814.2 | 2.0.9932.0 +[Rollup 76](https://support.microsoft.com/topic/update-rollup-75-for-azure-site-recovery-4884b937-8976-454a-9b80-57e0200eb2ec) | 9.63.7187.1 | 9.63.7187.1 | 9.63.7187.1 | 5.24.0902.11 | 2.0.9938.0 +[Rollup 75](https://support.microsoft.com/topic/update-rollup-75-for-azure-site-recovery-4884b937-8976-454a-9b80-57e0200eb2ec) | 9.62.7172.1 | 9.62.7172.1 | 9.62.7172.1 | 5.24.0814.2 | 2.0.9932.0 [Rollup 74](https://support.microsoft.com/topic/update-rollup-74-for-azure-site-recovery-584e3586-4c55-4cc2-8b1c-63038b6b4464) | 9.62.7096.1 | 9.62.7096.1 | 9.62.7096.1 | 5.24.0614.1 | 2.0.9919.0 [Rollup 73](https://support.microsoft.com/topic/update-rollup-73-for-azure-site-recovery-d3845f1e-2454-4ae8-b058-c1fec6206698) | 9.61.7016.1 | 9.61.7016.1 | 9.61.7016.1 | 5.24.0317.5 | 2.0.9917.0 [Rollup 72](https://support.microsoft.com/topic/update-rollup-72-for-azure-site-recovery-kb5036010-aba602a9-8590-4afe-ac8a-599141ec99a5) | 9.60.6956.1 | NA | 9.60.6956.1 | 5.24.0117.5 | 2.0.9917.0 [Rollup 71](https://support.microsoft.com/topic/update-rollup-71-for-azure-site-recovery-kb5035688-4df258c7-7143-43e7-9aa5-afeef9c26e1a) | 9.59.6930.1 | NA | 9.59.6930.1 | NA | NA-[Rollup 70](https://support.microsoft.com/topic/e94901f6-7624-4bb4-8d43-12483d2e1d50) | 9.57.6920.1 | 9.57.6911.1 / NA | 9.57.6911.1 | 5.23.1204.5 (VMware) | 2.0.9263.0 (VMware) + [Learn more](service-updates-how-to.md) about update installation and support. +## Updates (October 2024) ++### Update Rollup 76 ++Update [rollup 76](https://support.microsoft.com/topic/update-rollup-75-for-azure-site-recovery-4884b937-8976-454a-9b80-57e0200eb2ec) provides the following updates: ++**Update** | **Details** + | +**Providers and agents** | Updates to Site Recovery agents and providers as detailed in the rollup KB article. +**Issue fixes/improvements** | Many fixes and improvement as detailed in the rollup KB article. +**Azure VM disaster recovery** | Added support for Debian 11, SLES 12, SLES 15, Ubuntu 22.04 to 18.04 distros, Oracle Linux 9.4, and RHEL 9 Linux distros. +**VMware VM/physical disaster recovery to Azure** | Added support for Debian 11, SLES 12, SLES 15, Ubuntu 22.04 to 18.04 distros, Oracle Linux 9.4, and RHEL 9 Linux distros. + ## Updates (August 2024) Update [rollup 75](https://support.microsoft.com/topic/update-rollup-75-for-azur **VMware VM/physical disaster recovery to Azure** | No improvements added.  - ## Updates (July 2024) ### Update Rollup 74 |
site-recovery | Vmware Physical Azure Support Matrix | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/site-recovery/vmware-physical-azure-support-matrix.md | Debian 12 <br> **Note**: Support for Debian 12 is available for Modernized exper **Release** | **Mobility service version** | **Kernel version** | | | |-SUSE Linux Enterprise Server 12, SP1, SP2, SP3, SP4, SP5 | 9.63 | By default, all [stock SUSE 12 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> No new kernels in this release. | +SUSE Linux Enterprise Server 12, SP1, SP2, SP3, SP4, SP5 | 9.63 | By default, all [stock SUSE 12 SP1, SP2, SP3, SP4, SP5, SP6 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> No new kernels in this release. | SUSE Linux Enterprise Server 12, SP1, SP2, SP3, SP4, SP5 | 9.62 | By default, all [stock SUSE 12 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> **SUSE 12 Azure kernels support added for Modernized experience:** <br> 4.12.14-16.185-azure:5 <br> 4.12.14-16.188-azure:5 <br> 4.12.14-16.191azure:5 <br> 4.12.14-16.194-azure:5 | SUSE Linux Enterprise Server 12, SP1, SP2, SP3, SP4, SP5 | [9.61](https://support.microsoft.com/topic/update-rollup-73-for-azure-site-recovery-d3845f1e-2454-4ae8-b058-c1fec6206698) | By default, all [stock SUSE 12 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> **SUSE 12 Azure kernels support added for Modernized experience:** <br> 4.12.14-16.173-azure <br> 4.12.14-16.182-azure:5 <br><br> **SUSE 12 Azure kernels support added for Classic experience:** <br> 4.12.14-16.163-azure:5 <br> 4.12.14-16.168-azure:5 | SUSE Linux Enterprise Server 12, SP1, SP2, SP3, SP4 | 9.60 | By default, all [stock SUSE 12 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> 4.12.14-16.163-azure:5 <br> 4.12.14-16.168-azure | SUSE Linux Enterprise Server 12, SP1, SP2, SP3, SP4 | [9.57](https://support.mic **Release** | **Mobility service version** | **Kernel version** | | | |-SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4, SP5 | 9.63 | By default, all [stock SUSE 12 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> No new kernels in this release. | +SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4, SP5 | 9.63 | By default, all [stock SUSE 15 SP1, SP2, SP3, SP4, SP5, SP6 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> No new kernels in this release. | SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4, SP5 | 9.62 | By default, all [stock SUSE 15 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> **SUSE 15 Azure kernels support added for Modernized experience:** <br> 5.14.21-150500.33.54-azure:5 <br> 5.14.21-150500.33.57-azure:5 <br> 5.14.21-150500.33.60-azure:5 <br> 5.14.21-150500.33.63-azure:5 | SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4, SP5 | [9.61](https://support.microsoft.com/topic/update-rollup-73-for-azure-site-recovery-d3845f1e-2454-4ae8-b058-c1fec6206698) | By default, all [stock SUSE 15 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> **SUSE 15 Azure kernels support added for Modernized experience:** <br> 5.14.21-150500.33.37-azure <br> 5.14.21-150500.33.48-azure:5 <br> 5.14.21-150500.33.51-azure:5 <br><br> **SUSE 15 Azure kernels support added for Classic experience:** <br> 5.14.21-150500.33.29-azure:5 <br>5.14.21-150500.33.34-azure:5 <br> 5.14.21-150500.33.42-azure |-SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4 | 9.60 | By default, all [stock SUSE 12 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> 5.14.21-150500.33.29-azure <br>5.14.21-150500.33.34-azure | -SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4 | 9.59 | By default, all [stock SUSE 12 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> No new SUSE 15 kernels supported in this release. | +SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4 | 9.60 | By default, all [stock SUSE 15 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> 5.14.21-150500.33.29-azure <br>5.14.21-150500.33.34-azure | +SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4 | 9.59 | By default, all [stock SUSE 15 SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> No new SUSE 15 kernels supported in this release. | SUSE Linux Enterprise Server 15, SP1, SP2, SP3, SP4, SP5 <br> **Note:** SUSE 15 SP5 is only supported for Modernized experience. | [9.57](https://support.microsoft.com/topic/e94901f6-7624-4bb4-8d43-12483d2e1d50) | By default, all [stock SUSE 15, SP1, SP2, SP3, SP4, SP5 kernels](https://www.suse.com/support/kb/doc/?id=000019587) are supported.</br> No new SUSE 15 kernels supported in this release.| |
storage-actions | Storage Task Properties Operators Operations | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/storage-actions/storage-tasks/storage-task-properties-operators-operations.md | The following table shows the operators that you can use in a clause to evaluate | contains | equals |equals | equals | | empty | greater | greater | not | | equals | greaterOrEquals |greaterOrEquals ||-| endWith | less | less || +| endsWith | less | less || | length | lessOrEquals | lessOrEquals || | startsWith | addToTime | || | Matches | | || |
storage | Access Tiers Online Manage | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/storage/blobs/access-tiers-online-manage.md | N/A When moving a large number of blobs to another tier, use a batch operation for optimal performance. A batch operation sends multiple API calls to the service with a single request. The suboperations supported by the [Blob Batch](/rest/api/storageservices/blob-batch) operation include [Delete Blob](/rest/api/storageservices/delete-blob) and [Set Blob Tier](/rest/api/storageservices/set-blob-tier). -> [!NOTE] -> The [Set Blob Tier](/rest/api/storageservices/set-blob-tier) suboperation of the [Blob Batch](/rest/api/storageservices/blob-batch) operation is not yet supported in accounts that have a hierarchical namespace. - To change access tier of blobs with a batch operation, use one of the Azure Storage client libraries. The following code example shows how to perform a basic batch operation with the .NET client library: :::code language="csharp" source="~/azure-storage-snippets/blobs/howto/dotnet/dotnet-v12/AccessTiers.cs" id="Snippet_BulkArchiveContainerContents"::: |
storage | Blob Storage Estimate Costs | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/storage/blobs/blob-storage-estimate-costs.md | See [Estimate the cost of using AzCopy to transfer blobs](azcopy-cost-estimation When you upload data, your client divides that data into blocks and uploads each block individually. Each block that is upload is billed as a _write_ operation. A final write operation is needed to assemble blocks into a blob that is stored in the account. The number of write operations required to upload a blob depends on the size of each block. **8 MiB** is the default block size for uploads to the Blob Service endpoint (`blob.core.windows.net`) and that size is configurable. **4 MiB** is the block size for uploads to the Data Lake Storage endpoint (`dfs.core.windows.net`) and that size isn't configurable. A smaller block size performs better because blocks can upload in parallel. However, the cost is higher because more write operations are required to upload a blob. -Using the [Sample prices](#sample-prices) that appear in this article, and assuming an **8-MiB** block size, the following table estimates the cost to upload **1000** blobs that are each **5 MiB** in size to the hot tier. +Using the [Sample prices](#sample-prices) that appear in this article, and assuming an **8-MiB** block size, the following table estimates the cost to upload **1000** blobs that are each **5 GiB** in size to the hot tier. | Price factor | Value | |-|-| Using the [Sample prices](#sample-prices) that appear in this article, and assum | Write operation to commit the blocks | 1 | | **Total write operations (1,000 * 641)** | 641,000 | | Price of a single write operation (price / 10,000) | $0.0000055 |-| **Cost of write operations (641,000 * operation price)** | **$3.5255** | +| **Cost of write operations (641,000 * price of a single operation)** | **$3.5255** | | **Total cost (write + properties)** | **$3.5250055** | For more detailed examples, see [Estimate the cost to upload](azcopy-cost-estimation.md#the-cost-to-upload). Using the [Sample prices](#sample-prices) that appear in this article, the follo | Price of a single read operation (price / 10,000) | $0.000001 | | **Cost of read operations (1000 * operation price)** | **$0.001** | | Price of data retrieval (per GiB) | $0.01 |-| **Cost of data retrieval (5 * operation price)** | **$0.05** | +| **Cost of data retrieval (5 * price of data retrieval)** | **$0.05** | | **Total cost (read + retrieval)** | **$0.051** | Utilities such as AzCopy also use list operations and operations to obtain blob properties. As a proportion of the overall bill, these charges are relatively small. For examples, see [Estimate the cost to download](azcopy-cost-estimation.md#the-cost-to-download). Using the [Sample prices](#sample-prices) that appear in this article, the follo | Price factor | Value | |-|--| | Price of a single write operation (price / 10,000) | $0.0000055 |-| **Cost to write (1000 * operation price)** | **$0.0055** | +| **Cost to write (1000 * price of a single operation)** | **$0.0055** | | Price of a single read operation (price / 10,000) | $0.00000044 |-| **Cost of read operations (1,000 * operation price)** | **$0.00044** | +| **Cost of read operations (1,000 * price of a single operation)** | **$0.00044** | | **Total cost (previous section + retrieval + read)** | **$0.0068** | For a complete example, see [Estimate the cost to copy between containers](azcopy-cost-estimation.md#the-cost-to-copy-between-containers). Using the [Sample prices](#sample-prices) that appear in this article, the follo | Price factor | Hot | Cool | Cold | ||-||| | Price of a single write operation to the Blob Service endpoint (price / 10,000) | $0.0000055 | $0.00001 | $0.000018 |-| **Cost to rename blob virtual directories (1000 * operation price)** | **$0.0055** | **$0.01** | **$.018** | +| **Cost to rename blob virtual directories (1000 * price of a single operation)** | **$0.0055** | **$0.01** | **$.018** | | Price of a single iterative write operation to the Data Lake Storage endpoint (price / 100) | $0.000715 | $0.000715 | $0.000715 |-| **Cost to rename Data Lake Storage directories (1000 * operation price)** | **$0.715** | **$0.715** | **$0.715** | +| **Cost to rename Data Lake Storage directories (1000 * price of a single operation)** | **$0.715** | **$0.715** | **$0.715** | Based on these calculations, the cost to rename 1,000 blobs in the hot tier differs by **70** cents. Using the [Sample prices](#sample-prices) that appear in this article, the follo | Price factor | Hot | Cool | Cold | ||||| | Price of a single write operation to the Blob Service endpoint (price / 10,000) | $0.0000055 | $0.00001 | $0.000018 |-| **Cost to rename blob virtual directories (1000 * (1000 * operation price))** | **$5.50** | **$10.00** | **$18.00** | +| **Cost to rename blob virtual directories (1000 * (1000 * price of a single operation)** | **$5.50** | **$10.00** | **$18.00** | | Price of a single iterative write operation to the Data Lake Storage endpoint (price / 100) | $0.000715 | $0.000715 | $0.000715 |-| **Cost to rename Data Lake Storage directories (1000 * operation price)** | **$0.715** | **$0.715** | **0.715** | +| **Cost to rename Data Lake Storage directories (1000 * price of a single operation)** | **$0.715** | **$0.715** | **0.715** | Based on these calculations, the cost to rename 1,000 directories in the hot tier that each contain 1,000 blobs differs by almost **$5.00**. For directories in the cold tier, the difference is over **$17**. |
storage | Storage Blobs List Go | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/storage/blobs/storage-blobs-list-go.md | If you name your blobs using a delimiter, then you can choose to list blobs hier By default, a listing operation returns blobs in a flat listing. In a flat listing, blobs aren't organized by virtual directory. -The following example lists the blobs in the specified container using a flat listing. This example blob snapshots and blob versions, if they exist: +The following example lists the blobs in the specified container using a flat listing. This example includes blob snapshots and blob versions, if they exist: :::code language="go" source="~/blob-devguide-go/cmd/list-blobs/list_blobs.go" id="snippet_list_blobs_flat"::: The Azure SDK for Go contains libraries that build on top of the Azure REST API, - [Enumerating Blob Resources](/rest/api/storageservices/enumerating-blob-resources) - [Blob versioning](versioning-overview.md) |
storage | Storage Files How To Mount Nfs Shares | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/storage/files/storage-files-how-to-mount-nfs-shares.md | If your mount fails, it's possible that your private endpoint wasn't set up corr ## NFS file share snapshots -Customers using NFS Azure file shares can create, list, and delete file share snapshots. This capability allows users to roll back entire file systems or recover files that were accidentally deleted or corrupted. See [Use share snapshots with Azure Files](storage-snapshots-files.md#nfs-file-share-snapshots). +Customers using NFS Azure file shares can take file share snapshots. This capability allows users to roll back entire file systems or recover files that were accidentally deleted or corrupted. See [Use share snapshots with Azure Files](storage-snapshots-files.md#nfs-file-share-snapshots). ## Next step -- If you experience any issues, see [Troubleshoot NFS Azure file shares](/troubleshoot/azure/azure-storage/files-troubleshoot-linux-nfs?toc=/azure/storage/files/toc.json).+- If you experience any issues, see [Troubleshoot NFS Azure file shares](/troubleshoot/azure/azure-storage/files-troubleshoot-linux-nfs?toc=/azure/storage/files/toc.json). |
synapse-analytics | Gateway Ip Addresses | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/synapse-analytics/security/gateway-ip-addresses.md | We strongly encourage customers to move away from relying on **any individual Ga | China East | 139.219.130.35 | 52.130.112.136/29 | | China East 2 | 40.73.82.1 | 52.130.120.88/29 | | China North | | 52.130.128.88/29 |-| China North 2 | 40.73.50.0 | 52.130.40.64/29 | +| China North 2 | 40.73.50.0 | 52.130.40.64/29 | | East Asia | 13.75.32.4, 13.75.32.14, 20.205.77.200, 20.205.83.224 | 13.75.32.192/29, 13.75.33.192/29, 20.195.72.32/27, 20.205.77.176/29, 20.205.77.200/29, 20.205.83.224/29 | | East US | 40.121.158.30, 40.79.153.12, 40.78.225.32 | 20.42.65.64/29, 20.42.73.0/29, 52.168.116.64/29, 20.62.132.160/29 | | East US 2 | 40.79.84.180, 52.177.185.181, 52.167.104.0, 104.208.150.3, 40.70.144.193 | 104.208.150.192/29, 40.70.144.192/29, 52.167.104.192/29, 20.62.58.128/27 | We strongly encourage customers to move away from relying on **any individual Ga | Central India | 104.211.96.159, 104.211.86.30 , 104.211.86.31, 40.80.48.32, 20.192.96.32 | 104.211.86.32/29, 20.192.96.32/29, 40.80.48.32/29, 20.192.43.160/29 | | South India | 104.211.224.146 | 40.78.192.32/29, 40.78.193.32/29, 52.172.113.96/27 | | West India | 104.211.160.80, 104.211.144.4 | 104.211.144.32/29, 104.211.145.32/29, 52.136.53.160/27 |+| Central Israel | | 20.217.59.248/29, 20.217.91.192/29, 20.217.75.192/29 | +| North Italy | | 4.232.107.184/29, 4.232.195.192/29, 4.232.123.192/29 | | Japan East | 40.79.184.8, 40.79.192.5, 13.78.104.32, 40.79.184.32 | 13.78.104.32/29, 40.79.184.32/29, 40.79.192.32/29, 20.191.165.160/27 | | Japan West | 104.214.148.156, 40.74.97.10 | 40.74.96.32/29, 20.18.179.192/29, 20.189.225.160/27 | | Korea Central | 52.231.32.42, 52.231.17.22 ,52.231.17.23, 20.44.24.32, 20.194.64.33 | 20.194.64.32/29,20.44.24.32/29, 52.231.16.32/29, 20.194.73.64/27 | | Korea South | 52.231.151.96 | 52.231.151.96/27, 52.231.151.88/29, 52.147.112.160/27 |+| Malaysia South | | 20.17.67.248/29 | | North Central US | 52.162.104.33, 52.162.105.9 | 52.162.105.192/29, 52.162.105.200/29, 20.49.119.32/27, 20.125.171.192/29 | | North Europe | 52.138.224.1, 13.74.104.113 | 13.69.233.136/29, 13.74.105.192/29, 52.138.229.72/29, 52.146.133.128/27 | | Norway East | 51.120.96.0, 51.120.96.33, 51.120.104.32, 51.120.208.32 | 51.120.96.32/29, 51.120.104.32/29, 51.120.208.32/29, 51.120.232.192/27 | | Norway West | 51.120.216.0 | 51.120.217.32/29, 51.13.136.224/27 |+| Poland Central | | 20.215.27.192/29, 20.215.155.248/29, 20.215.19.192/29 | +| Qatar Central | | 20.21.43.248/29, 20.21.75.192/29, 20.21.67.192/29 | | South Africa North | 102.133.152.0, 102.133.120.2, 102.133.152.32 | 102.133.120.32/29, 102.133.152.32/29, 102.133.248.32/29, 102.133.221.224/27 | | South Africa West | 102.133.24.0 | 102.133.25.32/29, 102.37.80.96/27 | | South Central US | 104.214.16.32, 20.45.121.1, 20.49.88.1 | 20.45.121.32/29, 20.49.88.32/29, 20.49.89.32/29, 40.124.64.136/29, 20.65.132.160/27 | | South East Asia | 104.43.15.0, 40.78.232.3, 13.67.16.193 | 13.67.16.192/29, 23.98.80.192/29, 40.78.232.192/29, 20.195.65.32/27 |+| Spain Central | | 68.221.99.184/29, 68.221.154.88/29, 68.221.147.192/29 | +| Sweden Central | | 51.12.224.32/29, 51.12.232.32/29 | +| Sweden South | | 51.12.200.32/29, 51.12.201.32/29 | | Switzerland North | 51.107.56.0 | 51.107.56.32/29, 51.103.203.192/29, 20.208.19.192/29, 51.107.242.32/27 | | Switzerland West | 51.107.152.0 | 51.107.153.32/29, 51.107.250.64/27 |+| Taiwan North | | 51.53.107.248/29 | +| Taiwan Northwest | | 51.53.187.248/29 | | UAE Central | 20.37.72.64 | 20.37.72.96/29, 20.37.73.96/29 | | UAE North | 65.52.248.0 | 40.120.72.32/29, 65.52.248.32/29, 20.38.152.24/29, 20.38.143.64/27 | | UK South | 51.140.184.11, 51.105.64.0, 51.140.144.36, 51.105.72.32 | 51.105.64.32/29, 51.105.72.32/29, 51.140.144.32/29, 51.143.209.224/27 | |
synapse-analytics | Sql Data Warehouse Manage Monitor | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-manage-monitor.md | To investigate further details about a single step, inspect the `operation_type` ### Step 3: Investigate SQL on the distributed databases -Use the Request ID and the Step Index to retrieve details from [sys.dm_pdw_sql_requests](/sql/t-sql/database-console-commands/dbcc-pdw-showexecutionplan-transact-sql?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest&preserve-view=true), which contains execution information of the query step on all of the distributed databases. +Use the Request ID and the Step Index to retrieve details from [sys.dm_pdw_sql_requests](/sql/relational-databases/system-dynamic-management-views/sys-dm-pdw-sql-requests-transact-sql?view=azure-sqldw-latest&preserve-view=true), which contains execution information of the query step on all of the distributed databases. ```sql -- Find the distribution run times for a SQL step. |
virtual-network-manager | Concept User Defined Route | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/concept-user-defined-route.md | description: Learn to automate and simplifying routing behaviors using user-defi Previously updated : 05/09/2024 Last updated : 10/23/2024 # Customer Intent: As a network engineer, I want learn how I can automate and simplify routing within my Azure Network using User-defined routes.+> [!IMPORTANT] +> User-defined routes management with Azure Virtual Network Manager is in public preview. Public previews are made available to you on the condition that you agree to the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). Some features might not be supported or might have constrained capabilities. This preview version is provided without a service level agreement, and it's not recommended for production workloads. ## What is UDR management? Azure Virtual Network Manager (AVNM) allows you to describe your desired routing ## How does UDR management work? -In virtual network manager, you create a routing configuration. Inside the configuration, you create rule collections to describe the UDRs needed for a network group (target network group). In the rule collection, route rules are used to describe the desired routing behavior for the subnets or virtual networks in the target network group. Once the configuration is created, you'll need to [deploy the configuration](./concept-deployments.md) for it to apply to your resources. Upon deployment, all routes are stored in a route table located inside a virtual network manager-managed resource group. +In virtual network manager, you create a routing configuration. Inside the configuration, you create rule collections to describe the UDRs needed for a network group (target network group). In the rule collection, route rules are used to describe the desired routing behavior for the subnets or virtual networks in the target network group. Once the configuration is created, you need to [deploy the configuration](./concept-deployments.md) for it to apply to your resources. Upon deployment, all routes are stored in a route table located inside a virtual network manager-managed resource group. Routing configurations create UDRs for you based on what the route rules specify. For example, you can specify that the spoke network group, consisting of two virtual networks, accesses the DNS service's address through a Firewall. Your network manager creates UDRs to make this routing behavior happen. Here are the common routing scenarios that you can simplify and automate by usin | hub and spoke network with Spoke network to on-premises needs to go via Network Virtual Appliance | | | Gateway -> Network Virtual Appliance -> Spoke network | | -## Adding additional virtual networks +## Adding other virtual networks -When you add additional virtual networks to a network group, the routing configuration is automatically applied to the new virtual network. Your network manager automatically detects the new virtual network and applies the routing configuration to it. When you remove a virtual network from the network group, the applied routing configuration is automatically removed as well. +When you add other virtual networks to a network group, the routing configuration is automatically applied to the new virtual network. Your network manager automatically detects the new virtual network and applies the routing configuration to it. When you remove a virtual network from the network group, the applied routing configuration is automatically removed as well. -Newly created or deleted subnets will have their route table updated with eventual consistency. The processing time may vary based on the volume of subnet creation and deletion. +Newly created or deleted subnets have their route table updated with eventual consistency. The processing time may vary based on the volume of subnet creation and deletion. ## Limitations of UDR management The following are the limitations of UDR management with Azure Virtual Network M - When a virtual network manager-created UDR is manually modified in the route table, the route isn't up when an empty commit is performed. Also, any update to the rule isn't reflected in the route with the same destination. - Existing Azure services in the Hub virtual network maintain their existing limitations with respect to Route Table and UDRs. - Azure Virtual Network Manager requires a managed resource group to store the route table. If you need to delete the resource group, deletion must happen before any new deployments are attempted for resources in the same subscription.-- UDR Management supports creating 1000 UDRs within a route table. This means that you can create a routing configuration with a maximum of 1000 routing rules. +- UDR Management supports creating 1000 UDRs within a route table. This means that you can create a routing configuration with a maximum of 1,000 routing rules. ## Next step |
virtual-network-manager | Create Virtual Network Manager Bicep | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/create-virtual-network-manager-bicep.md | Use the **Network Manager** section for each virtual network to verify that you ## Clean up resources -If you no longer need Azure Virtual Network Manager, you can remove it after you remove all configurations, deployments, and network groups: --1. To remove all configurations from a region, start in Virtual Network Manager and select **Deploy configurations**. Select the following settings, and then select **Next**. -- :::image type="content" source="./media/create-virtual-network-manager-portal/none-configuration.png" alt-text="Screenshot of the tab for configuring a goal state for network resources, with the option for removing existing connectivity configurations selected."::: -- | Setting | Value | - | - | -- | - | **Configurations** | Select **Include connectivity configurations in your goal state**. | - | **Connectivity configurations** | Select **None - Remove existing connectivity configurations**. | - | **Target regions** | Select **East US** as the deployed region. | --1. Select **Deploy** to complete the deployment removal. --1. To delete a configuration, go to the left pane of Virtual Network Manager. Under **Settings**, select **Configurations**. Select the checkbox next to the configuration that you want to remove, and then select **Delete** at the top of the resource pane. --1. On the **Delete a configuration** pane, select the following options, and then select **Delete**. -- :::image type="content" source="./media/create-virtual-network-manager-portal/configuration-delete-options.png" alt-text="Screenshot of the pane for deleting a configuration."::: -- | Setting | Value | - | - | -- | - | **Delete option** | Select **Force delete the resource and all dependent resources**. | - | **Confirm deletion** | Enter the name of the configuration. In this example, it's **cc-learn-prod-eastus-001**. | --1. To delete a network group, go to the left pane of Virtual Network Manager. Under **Settings**, select **Network groups**. Select the checkbox next to the network group that you want to remove, and then select **Delete** at the top of the resource pane. --1. On the **Delete a network group** pane, select the following options, and then select **Delete**. -- :::image type="content" source="./media/create-virtual-network-manager-portal/network-group-delete-options.png" alt-text="Screenshot of Network group to be deleted option selection." lightbox="./media/create-virtual-network-manager-portal/network-group-delete-options.png"::: -- | Setting | Value | - | - | -- | - | **Delete option** | Select **Force delete the resource and all dependent resources**. | - | **Confirm deletion** | Enter the name of the network group. In this example, it's **ng-learn-prod-eastus-001**. | --1. Select **Yes** to confirm the network group deletion. --1. After you remove all network groups, go to the left pane of Virtual Network Manager. Select **Overview**, and then select **Delete**. --1. On the **Delete a network manager** pane, select the following options, and then select **Delete**. -- :::image type="content" source="./media/create-virtual-network-manager-portal/network-manager-delete.png" alt-text="Screenshot of the pane for deleting a network manager."::: -- | Setting | Value | - | - | -- | - | **Delete option** | Select **Force delete the resource and all dependent resources**. | - | **Confirm deletion** | Enter the name of the Virtual Network Manager instance. In this example, it's **vnm-learn-eastus-001**. | --1. Select **Yes** to confirm the deletion. --1. To delete the resource group and virtual networks, locate resource group you created during the deployment and select **Delete resource group**. Confirm that you want to delete by entering the name in the text box, and then select **Delete**. +If you no longer need Azure Virtual Network Manager and the associated virtual networks, you can remove it by deleting the resource group and its resources. +1. In the **Azure portal**, browse to your resource group - **resource-group**. +1. Select **resource-group** and select **Delete resource group**. +1. In the **Delete a resource group** window, confirm that you want to delete by entering **resource-group** in the text box, and then select **Delete**. 1. If you used **Dynamic Network Group Membership**, delete the deployed Azure Policy Definition and Assignment by navigating to the Subscription in the Portal and selecting the **Policies**. In Policies, find the **Assignment** named `AVNM quickstart dynamic group membership Policy` and delete it, then do the same for the **Definition** named `AVNM quickstart dynamic group membership Policy`. ## Next steps |
virtual-network-manager | Create Virtual Network Manager Powershell | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/create-virtual-network-manager-powershell.md | Install the latest *Az.Network* Azure PowerShell module by using this command: ## Create a resource group -Before you can create an Azure Virtual Network Manager instance, you have to create a resource group to host it. Create a resource group by using [New-AzResourceGroup](/powershell/module/az.Resources/New-azResourceGroup). This example creates a resource group named *vnm-learn-eastus-001ResourceGroup* in the East US location: +Before you can create an Azure Virtual Network Manager instance, you have to create a resource group to host it. Create a resource group by using [New-AzResourceGroup](/powershell/module/az.Resources/New-azResourceGroup). This example creates a resource group named *resource-group* in the *West US 2* region: ```azurepowershell--$location = "East US" +# Create a resource group +$location = "West US 2" $rg = @{- Name = 'rg-learn-eastus-001' + Name = 'resource-group' Location = $location } New-AzResourceGroup @rg New-AzResourceGroup @rg Define the scope and access type for the Azure Virtual Network Manager instance by using [New-AzNetworkManagerScope](/powershell/module/az.network/new-aznetworkmanagerscope). This example defines a scope with a single subscription and sets the access type to *Connectivity*. Replace `<subscription_id>` with the ID of the subscription that you want to manage through Azure Virtual Network Manager. ```azurepowershell--Import-Module -Name Az.Network -RequiredVersion "5.3.0" +$subID= <subscription_id> [System.Collections.Generic.List[string]]$subGroup = @() -$subGroup.Add("/subscriptions/<subscription_id>") +$subGroup.Add("/subscriptions/$subID") [System.Collections.Generic.List[String]]$access = @() $access.Add("Connectivity"); $scope = New-AzNetworkManagerScope -Subscription $subGroup ## Create a Virtual Network Manager instance -Create a Virtual Network Manager instance by using [New-AzNetworkManager](/powershell/module/az.network/new-aznetworkmanager). This example creates an instance named *vnm-learn-eastus-001* in the East US location: +Create a Virtual Network Manager instance by using [New-AzNetworkManager](/powershell/module/az.network/new-aznetworkmanager). This example creates an instance named *network-manager* in the *West US 2* region: ```azurepowershell $avnm = @{- Name = 'vnm-learn-eastus-001' - ResourceGroupName = $rg.Name + Name = 'network-manager' + ResourceGroupName = $rg.ResourceGroupName NetworkManagerScope = $scope NetworkManagerScopeAccess = $access Location = $location $networkmanager = New-AzNetworkManager @avnm ## Create three virtual networks -Create three virtual networks by using [New-AzVirtualNetwork](/powershell/module/az.network/new-azvirtualnetwork). This example creates virtual networks named *vnet-learn-prod-eastus-001*, *vnet-learn-prod-eastus-002*, and *vnet-learn-test-eastus-003* in the East US location. If you already have virtual networks that you want create a mesh network with, you can skip to the next section. +Create three virtual networks by using [New-AzVirtualNetwork](/powershell/module/az.network/new-azvirtualnetwork). This example creates virtual networks named *vnet-spoke-001*, *vnet-spoke-002*, and *vnet-hub-001* in the *West US 2* region. If you already have virtual networks that you want create a mesh network with, you can skip to the next section. ```azurepowershell-$vnet001 = @{ - Name = 'vnet-learn-prod-eastus-001' - ResourceGroupName = $rg.Name +$vnetspoke001 = @{ + Name = 'vnet-spoke-001' + ResourceGroupName = $rg.ResourceGroupName Location = $location AddressPrefix = '10.0.0.0/16' } -$vnet_learn_prod_eastus_001 = New-AzVirtualNetwork @vnet001 +$vnet_spoke_001 = New-AzVirtualNetwork @vnetspoke001 -$vnet002 = @{ - Name = 'vnet-learn-prod-eastus-002' - ResourceGroupName = $rg.Name +$vnetspoke002 = @{ + Name = 'vnet-spoke-002' + ResourceGroupName = $rg.ResourceGroupName Location = $location AddressPrefix = '10.1.0.0/16' }-$vnet_learn_prod_eastus_002 = New-AzVirtualNetwork @vnet002 +$vnet_spoke_002 = New-AzVirtualNetwork @vnetspoke002 -$vnet003 = @{ - Name = 'vnet-learn-test-eastus-003' - ResourceGroupName = $rg.Name +$vnethub001 = @{ + Name = 'vnet-hub-001' + ResourceGroupName = $rg.ResourceGroupName Location = $location AddressPrefix = '10.2.0.0/16' }-$vnet_learn_test_eastus_003 = New-AzVirtualNetwork @vnet003 +$vnet_hub_001 = New-AzVirtualNetwork @vnethub001 ``` ### Add a subnet to each virtual network $vnet_learn_test_eastus_003 = New-AzVirtualNetwork @vnet003 To complete the configuration of the virtual networks, create a subnet configuration named *default* with a subnet address prefix of */24* by using [Add-AzVirtualNetworkSubnetConfig](/powershell/module/az.network/add-azvirtualnetworksubnetconfig). Then, use [Set-AzVirtualNetwork](/powershell/module/az.network/set-azvirtualnetwork) to apply the subnet configuration to the virtual network. ```azurepowershell-$subnet_vnet001 = @{ +$subnet_vnetspoke001 = @{ Name = 'default'- VirtualNetwork = $vnet_learn_prod_eastus_001 + VirtualNetwork = $vnet_spoke_001 AddressPrefix = '10.0.0.0/24' }-$subnetConfig_vnet001 = Add-AzVirtualNetworkSubnetConfig @subnet_vnet001 -$vnet_learn_prod_eastus_001 | Set-AzVirtualNetwork +$subnetConfig_vnetspoke001 = Add-AzVirtualNetworkSubnetConfig @subnet_vnetspoke001 +$vnet_spoke_001 | Set-AzVirtualNetwork -$subnet_vnet002 = @{ +$subnet_vnetspoke002 = @{ Name = 'default'- VirtualNetwork = $vnet_learn_prod_eastus_002 + VirtualNetwork = $vnet_spoke_002 AddressPrefix = '10.1.0.0/24' }-$subnetConfig_vnet002 = Add-AzVirtualNetworkSubnetConfig @subnet_vnet002 -$vnet_learn_prod_eastus_002 | Set-AzVirtualNetwork +$subnetConfig_vnetspoke002 = Add-AzVirtualNetworkSubnetConfig @subnet_vnetspoke002 +$vnet_spoke_002 | Set-AzVirtualNetwork -$subnet_vnet003 = @{ +$subnet_vnet_hub_001 = @{ Name = 'default'- VirtualNetwork = $vnet_learn_test_eastus_003 + VirtualNetwork = $vnet_hub_001 AddressPrefix = '10.2.0.0/24' }-$subnetConfig_vnet003 = Add-AzVirtualNetworkSubnetConfig @subnet_vnet003 -$vnet_learn_test_eastus_003 | Set-AzVirtualNetwork +$subnetConfig_vnet_hub_001 = Add-AzVirtualNetworkSubnetConfig @subnet_vnet_hub_001 +$vnet_hub_001 | Set-AzVirtualNetwork ``` ## Create a network group -Virtual Network Manager applies configurations to groups of virtual networks by placing them in network groups. Create a network group by using [New-AzNetworkManagerGroup](/powershell/module/az.network/new-aznetworkmanagergroup). This example creates a network group named *ng-learn-prod-eastus-001* in the East US location: +Virtual Network Manager applies configurations to groups of virtual networks by placing them in network groups. Create a network group by using [New-AzNetworkManagerGroup](/powershell/module/az.network/new-aznetworkmanagergroup). This example creates a network group named *network-group* in the West US 2 region: ```azurepowershell $ng = @{- Name = 'ng-learn-prod-eastus-001' - ResourceGroupName = $rg.Name + Name = 'network-group' + ResourceGroupName = $rg.ResourceGroupName NetworkManagerName = $networkManager.Name } $ng = New-AzNetworkManagerGroup @ng $ng = @{ ## Define membership for a mesh configuration -After you create your network group, you define its membership by adding virtual networks. You can add these networks manually or by using Azure Policy. --# [Manual membership](#tab/manualmembership) --### Add membership manually --In this task, you add the static members *vnet-learn-prod-eastus-001* and *vnet-learn-prod-eastus-002* to the network group *ng-learn-prod-eastus-001* by using [New-AzNetworkManagerStaticMember](/powershell/module/az.network/new-aznetworkmanagerstaticmember). +In this task, you add the static members *vnet-spoke-001* and *vnet-spoke-002* to the network group *network-group* by using [New-AzNetworkManagerStaticMember](/powershell/module/az.network/new-aznetworkmanagerstaticmember). Static members must have a unique name that's scoped to the network group. We recommend that you use a consistent hash of the virtual network ID. This approach uses the Azure Resource Manager template's `uniqueString()` implementation. Static members must have a unique name that's scoped to the network group. We re ``` ```azurepowershell-$sm_vnet001 = @{ - Name = Get-UniqueString $vnet_learn_prod_eastus_001.Id - ResourceGroupName = $rg.Name +$sm_vnetspoke001 = @{ + Name = Get-UniqueString $vnet_spoke_001.Id + ResourceGroupName = $rg.ResourceGroupName NetworkGroupName = $ng.Name NetworkManagerName = $networkManager.Name- ResourceId = $vnet_learn_prod_eastus_001.Id + ResourceId = $vnet_spoke_001.Id }- $sm_vnet001 = New-AzNetworkManagerStaticMember @sm_vnet001 + $sm_vnetspoke001 = New-AzNetworkManagerStaticMember @sm_vnetspoke001 ``` ```azurepowershell-$sm_vnet002 = @{ - Name = Get-UniqueString $vnet_learn_prod_eastus_002.Id - ResourceGroupName = $rg.Name +$sm_vnetspoke002 = @{ + Name = Get-UniqueString $vnet_spoke_002.Id + ResourceGroupName = $rg.ResourceGroupName NetworkGroupName = $ng.Name NetworkManagerName = $networkManager.Name- ResourceId = $vnet_learn_prod_eastus_002.Id + ResourceId = $vnet_spoke_002.Id }- $sm_vnet002 = New-AzNetworkManagerStaticMember @sm_vnet002 + $sm_vnetspoke002 = New-AzNetworkManagerStaticMember @sm_vnetspoke002 ```- -# [Azure Policy](#tab/azurepolicy) --### Create a policy definition for dynamic membership --By using [Azure Policy](concept-azure-policy-integration.md), you define a condition to dynamically add two virtual networks to your network group when the name of the virtual network includes *-prod*. --> [!NOTE] -> We recommend that you scope all of your conditionals to scan for only type `Microsoft.Network/virtualNetworks`, for efficiency. --1. Define the conditional statement and store it in a variable: -- ```azurepowershell - $conditionalMembership = '{ - "if": { - "allOf": [ - { - "field": "type", - "equals": "Microsoft.Network/virtualNetworks" - }, - { - "field": "name", - "contains": "prod" - } - ] - }, - "then": { - "effect": "addToNetworkGroup", - "details": { - "networkGroupId": "/subscriptions/<subscription_id>/resourceGroups/rg-learn-eastus-001/providers/Microsoft.Network/networkManagers/vnm-learn-eastus-001/networkGroups/ng-learn-prod-eastus-001"} - }, - }' - - ``` --1. Create the Azure Policy definition by using the conditional statement defined in the previous step and using [New-AzPolicyDefinition](/powershell/module/az.resources/new-azpolicydefinition). -- In this example, the policy definition name is prefixed with *poldef-learn-prod-* and suffixed with a unique string that's generated from a consistent hash in the network group ID. Policy resources must have a scope unique name. -- ```azurepowershell - function Get-UniqueString ([string]$id, $length=13) - { - $hashArray = (new-object System.Security.Cryptography.SHA512Managed).ComputeHash($id.ToCharArray()) - -join ($hashArray[1..$length] | ForEach-Object { [char]($_ % 26 + [byte][char]'a') }) - } - - $UniqueString = Get-UniqueString $ng.Id - ``` -- ```azurepowershell - $polDef = @{ - Name = "poldef-learn-prod-"+$UniqueString - Mode = 'Microsoft.Network.Data' - Policy = $conditionalMembership - } - - $policyDefinition = New-AzPolicyDefinition @polDef - ``` --1. Assign the policy definition at a scope within your network manager's scope so that it can begin taking effect: -- ```azurepowershell - $polAssign = @{ - Name = "polassign-learn-prod-"+$UniqueString - PolicyDefinition = $policyDefinition - } - - $policyAssignment = New-AzPolicyAssignment @polAssign - ``` -- ## Create a connectivity configuration -In this task, you create a connectivity configuration with the network group *ng-learn-prod-eastus-001* by using [New-AzNetworkManagerConnectivityConfiguration](/powershell/module/az.network/new-aznetworkmanagerconnectivityconfiguration) and [New-AzNetworkManagerConnectivityGroupItem](/powershell/module/az.network/new-aznetworkmanagerconnectivitygroupitem): +In this task, you create a connectivity configuration with the network group *network-group* by using [New-AzNetworkManagerConnectivityConfiguration](/powershell/module/az.network/new-aznetworkmanagerconnectivityconfiguration) and [New-AzNetworkManagerConnectivityGroupItem](/powershell/module/az.network/new-aznetworkmanagerconnectivitygroupitem): 1. Create a connectivity group item: In this task, you create a connectivity configuration with the network group *ng ```azurepowershell $config = @{- Name = 'cc-learn-prod-eastus-001' - ResourceGroupName = $rg.Name + Name = 'connectivity-configuration' + ResourceGroupName = $rg.ResourceGroupName NetworkManagerName = $networkManager.Name ConnectivityTopology = 'Mesh' AppliesToGroup = $configGroup Commit the configuration to the target regions by using `Deploy-AzNetworkManager [System.Collections.Generic.List[string]]$configIds = @() $configIds.add($connectivityconfig.id) [System.Collections.Generic.List[string]]$target = @() -$target.Add("westus") +$target.Add("westus2") $deployment = @{ Name = $networkManager.Name- ResourceGroupName = $rg.Name + ResourceGroupName = $rg.ResourceGroupName ConfigurationId = $configIds TargetLocation = $target CommitType = 'Connectivity' }-Deploy-AzNetworkManagerCommit @deployment +Deploy-AzNetworkManagerCommit @deployment ``` ## Clean up resources -If you no longer need the Azure Virtual Network Manager instance, make sure all of following points are true before you delete the resource: --* There are no deployments of configurations to any region. -* All configurations have been deleted. -* All network groups have been deleted. --To delete the resource: --1. Remove the connectivity deployment by deploying an empty configuration via `Deploy-AzNetworkManagerCommit`: -- ```azurepowershell - [System.Collections.Generic.List[string]]$configIds = @() - [System.Collections.Generic.List[string]]$target = @() - $target.Add("westus") - $removedeployment = @{ - Name = 'vnm-learn-eastus-001' - ResourceGroupName = $rg.Name - ConfigurationId = $configIds - Target = $target - CommitType = 'Connectivity' - } - Deploy-AzNetworkManagerCommit @removedeployment - ``` --1. Remove the connectivity configuration by using `Remove-AzNetworkManagerConnectivityConfiguration`: -- ```azurepowershell - - Remove-AzNetworkManagerConnectivityConfiguration -Name $connectivityconfig.Name -ResourceGroupName $rg.Name -NetworkManagerName $networkManager.Name - - ``` --1. Remove the policy resources by using `Remove-AzPolicy*`: -- ```azurepowershell - - Remove-AzPolicyAssignment -Name $policyAssignment.Name - Remove-AzPolicyAssignment -Name $policyDefinition.Name - - ``` --1. Remove the network group by using `Remove-AzNetworkManagerGroup`: -- ```azurepowershell - Remove-AzNetworkManagerGroup -Name $ng.Name -ResourceGroupName $rg.Name -NetworkManagerName $networkManager.Name - ``` --1. Delete the Virtual Network Manager instance by using `Remove-AzNetworkManager`: -- ```azurepowershell - Remove-AzNetworkManager -name $networkManager.Name -ResourceGroupName $rg.Name - ``` +If you no longer need the Azure Virtual Network Manager instance and it's associate resources, delete the resource group that contains them. Deleting the resource group also deletes the resources that you created. -1. If you no longer need the resource that you created, delete the resource group by using [Remove-AzResourceGroup](/powershell/module/az.resources/remove-azresourcegroup): +1. Delete the resource group using [Remove-AzResourceGroup](/powershell/module/az.resources/remove-azresourcegroup): ```azurepowershell- Remove-AzResourceGroup -Name $rg.Name -Force + Remove-AzResourceGroup -Name $rg.ResourceGroupName -Force ``` ## Next steps |
virtual-network-manager | Create Virtual Network Manager Template | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/create-virtual-network-manager-template.md | description: In this article, you deploy various network topologies with Azure V Previously updated : 08/15/2023 Last updated : 10/23/2024 When you no longer need the resources that you created with the private endpoint 1. To delete the resource group, open the resource group in the Azure portal and select **Delete resource group**. 1. Enter the name of the resource group, and then select **Delete**. 1. One the resource group is deleted, verify the network manager instance and all related resources are deleted.+1. If you used **Dynamic Network Group Membership**, delete the deployed Azure Policy Definition and Assignment by navigating to your Subscription in the Portal and selecting the **Policies**. In Policies, find the **Assignment** named `AVNM quickstart dynamic group membership Policy` and delete it, then do the same for the **Definition** named `AVNM quickstart dynamic group membership Policy`. ## Next steps For more information about deploying Azure Virtual Network Manager, see: > [!div class="nextstepaction"]-> [Quickstart: Create a mesh network topology with Azure Virtual Network Manager using Terraform](create-virtual-network-manager-terraform.md) +> [Quickstart: Create a mesh network topology with Azure Virtual Network Manager using Terraform](create-virtual-network-manager-terraform.md) |
virtual-network-manager | How To Block High Risk Ports | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/how-to-block-high-risk-ports.md | With your virtual network manager created, you now create a network group contai ItΓÇÖs time to construct our security admin rules within a configuration in order to apply those rules to all the VNets within your network group at once. In this section, you create a security admin configuration. Then you create a rule collection and add rules for high risks ports like SSH or RDP. This configuration denies network traffic to all virtual networks in the network group. 1. Return to your virtual network manager resource. 1. Select **Configurations** under *Settings* and then select **+ Create**.-- :::image type="content" source="./media/create-virtual-network-manager-portal/add-configuration.png" alt-text="Screenshot of add a security admin configuration."::: - 1. Select **Security configuration** from the drop-down menu.-- :::image type="content" source="./media/create-virtual-network-manager-portal/security-admin-dropdown.png" alt-text="Screenshot of add a configuration drop-down."::: - 1. On the **Basics** tab, enter a *Name* to identify this security configuration and select **Next: Rule collections**. :::image type="content" source="./media/how-to-block-network-traffic-portal/security-configuration-name.png" alt-text="Screenshot of security configuration name field."::: |
virtual-network-manager | How To Block Network Traffic Portal | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/how-to-block-network-traffic-portal.md | Before you start to configure security admin rules, confirm that you've done the ## Create a SecurityAdmin configuration 1. Select **Configurations** under *Settings* and then select **+ Create**.-- :::image type="content" source="./media/create-virtual-network-manager-portal/add-configuration.png" alt-text="Screenshot of add a security admin configuration."::: - 1. Select **Security configuration** from the drop-down menu.-- :::image type="content" source="./media/create-virtual-network-manager-portal/security-admin-dropdown.png" alt-text="Screenshot of add a configuration drop-down."::: - 1. On the **Basics** tab, enter a *Name* to identify this security configuration and select **Next: Rule collections**. :::image type="content" source="./media/how-to-block-network-traffic-portal/security-configuration-name.png" alt-text="Screenshot of security configuration name field."::: |
virtual-network-manager | How To Create Hub And Spoke | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/how-to-create-hub-and-spoke.md | To manually add the desired virtual networks for your Mesh configuration to your :::image type="content" source="./media/create-virtual-network-manager-portal/add-virtual-networks.png" alt-text="Screenshot of add virtual networks to network group page."::: 1. To review the network group membership manually added, select **Group Members** on the *Network Group* page under **Settings**.- :::image type="content" source="media/create-virtual-network-manager-portal/group-members-list.png" alt-text="Screenshot of group membership under Group Membership." lightbox="media/create-virtual-network-manager-portal/group-members-list.png"::: ++ :::image type="content" source="./media/how-to-create-hub-and-spoke/group-members-list.png" alt-text="Screenshot that shows a list of group members."::: ## Create a hub and spoke connectivity configuration This section guides you through how to create a hub-and-spoke configuration with 1. Select **Connectivity configuration** from the drop-down menu to begin creating a connectivity configuration. - :::image type="content" source="./media/create-virtual-network-manager-portal/connectivity-configuration-dropdown.png" alt-text="Screenshot of configuration drop-down menu."::: - 1. On the **Basics** page, enter the following information, and select **Next: Topology >**. - :::image type="content" source="./media/create-virtual-network-manager-portal/connectivity-configuration.png" alt-text="Screenshot of add a connectivity configuration page."::: - | Setting | Value | | - | -- | | Name | Enter a *name* for this configuration. | This section guides you through how to create a hub-and-spoke configuration with :::image type="content" source="media/how-to-create-hub-and-spoke/topology.png" alt-text="Screenshot of Add Topology screen for hub and spoke topology."::: -1. Select **Delete existing peerings** checkbox if you want to remove all previously created VNet peering between virtual networks in the network group defined in this configuration, and then select **Select a hub**. +1. Select **Delete existing peerings** checkbox if you want to remove all previously created virtual network peering between virtual networks in the network group defined in this configuration, and then select **Select a hub**. 1. On the **Select a hub** page, Select a virtual network that acts as the hub virtual network and select **Select**. :::image type="content" source="media/how-to-create-hub-and-spoke/select-hub.png" alt-text="Screenshot of Select a hub list."::: This section guides you through how to create a hub-and-spoke configuration with :::image type="content" source="./media/how-to-create-hub-and-spoke/spokes-settings.png" alt-text="Screenshot of spoke network groups settings."::: - * *Direct connectivity*: Select **Enable peering within network group** if you want to establish VNet peering between virtual networks in the network group of the same region. - * *Global Mesh*: Select **Enable mesh connectivity across regions** if you want to establish VNet peering for all virtual networks in the network group across regions. + * *Direct connectivity*: Select **Enable peering within network group** if you want to establish virtual network peering between virtual networks in the network group of the same region. + * *Global Mesh*: Select **Enable mesh connectivity across regions** if you want to establish virtual network peering for all virtual networks in the network group across regions. * *Gateway*: Select **Use hub as a gateway** if you have a virtual network gateway in the hub virtual network that you want this network group to use to pass traffic to on-premises. Select the settings you want to enable for each network group. To have this configuration take effect in your environment, you need to deploy t | Target regions | Select all the regions that apply to virtual networks you select for the configuration. | 1. Select **Next** and then select **Deploy** to complete the deployment.-- :::image type="content" source="./media/create-virtual-network-manager-portal/deployment-confirmation.png" alt-text="Screenshot of deployment confirmation message."::: - 1. The deployment displays in the list for the selected region. The deployment of the configuration can take a few minutes to complete. - :::image type="content" source="./media/create-virtual-network-manager-portal/deployment-in-progress.png" alt-text="Screenshot of configuration deployment in progress status."::: + :::image type="content" source="./media/how-to-create-hub-and-spoke/deployment-succeeded.png" alt-text="Screenshot of configuration deployment in progress status."::: > [!NOTE] > If you're currently using peering and want to manage topology and connectivity with Azure Virtual Network Manager, you can migrate without any downtime to your network. Virtual network manager instances are fully compatible with pre-existing hub and spoke topology deployment using peering. This means that you won't need to delete any existing peered connections between the spokes and the hub as the network manager will automatically detect and manage them. To have this configuration take effect in your environment, you need to deploy t ## Next steps - Learn about [Security admin rules](concept-security-admins.md)-- Learn how to block network traffic with a [SecurityAdmin configuration](how-to-block-network-traffic-portal.md).+- Learn how to block network traffic with a [SecurityAdmin configuration](how-to-block-network-traffic-portal.md). |
virtual-network-manager | How To Create Mesh Network | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/how-to-create-mesh-network.md | To manually add the desired virtual networks for your Mesh configuration to your :::image type="content" source="./media/create-virtual-network-manager-portal/add-virtual-networks.png" alt-text="Screenshot of add virtual networks to network group page."::: 1. To review the network group membership manually added, select **Group Members** on the *Network Group* page under **Settings**.- :::image type="content" source="media/create-virtual-network-manager-portal/group-members-list.png" alt-text="Screenshot of group membership under Group Membership." lightbox="media/create-virtual-network-manager-portal/group-members-list.png"::: ++ :::image type="content" source="./media/how-to-create-hub-and-spoke/group-members-list.png" alt-text="Screenshot that shows a list of group members."::: ## Create a mesh connectivity configuration This section guides you through how to create a mesh configuration with the netw 1. Select **Connectivity configuration** from the drop-down menu to begin creating a connectivity configuration. - :::image type="content" source="./media/create-virtual-network-manager-portal/connectivity-configuration-dropdown.png" alt-text="Screenshot of configuration drop-down menu."::: - 1. On the **Basics** page, enter the following information, and select **Next: Topology >**. - :::image type="content" source="./media/create-virtual-network-manager-portal/connectivity-configuration.png" alt-text="Screenshot of add a connectivity configuration page."::: - | Setting | Value | | - | -- | | Name | Enter a *name* for this configuration. | |
virtual-network-manager | How To Create User Defined Route | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/how-to-create-user-defined-route.md | In this article, you learn how to deploy [User-Defined Routes (UDRs)](concept-us - Routing configuration to create UDRs for the network group +> [!IMPORTANT] +> User-defined routes management with Azure Virtual Network Manager is in public preview. Public previews are made available to you on the condition that you agree to the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). Some features might not be supported or might have constrained capabilities. This preview version is provided without a service level agreement, and it's not recommended for production workloads. ## Prerequisites In this step, you deploy a Virtual Network Manager instance with the defined sco | Setting | Value | | - | -- | | **Subscription** | Select the subscription where you want to deploy Virtual Network Manager. |- | **Resource group** | Select **Create new** and enter **rg-vnm**.</br> Select **Ok**. | - | **Name** | Enter **vnm-1**. | - | **Region** | Select **(US) East US** or a region of your choosing. Virtual Network Manager can manage virtual networks in any region. The selected region is where the Virtual Network Manager instance is deployed. | + | **Resource group** | Select **Create new** and enter **resource-group**.</br> Select **Ok**. | + | **Name** | Enter **network-manager**. | + | **Region** | Select **(US) West US 2** or a region of your choosing. Virtual Network Manager can manage virtual networks in any region. The selected region is where the Virtual Network Manager instance is deployed. | | **Description** | *(Optional)* Provide a description about this Virtual Network Manager instance and the task it's managing. | | [Features](concept-network-manager-scope.md#features) | Select **User defined routing** from the dropdown list. | In this step, you create two virtual networks to become members of a network gro | Setting | Value | | - | -- | | **Subscription** | Select the subscription where you want to deploy this virtual network. |- | **Resource group** | Select **rg-vnm**. | + | **Resource group** | Select **resource-group**. | | **Virtual network name** | Enter **vnet-spoke-001**. |- | **Region** | Select **(US) East US**. | + | **Region** | Select **(US) West US 2**. | 1. Select **Next > Next** or the **IP addresses** tab. - 1. On the **IP addresses** tab, enter an IPv4 address range of **10.0.0.0** and **/16**. 1. Under **Subnets**, select **default** and enter the following information in the **Edit Subnet** window: In this step, you create two virtual networks to become members of a network gro | Setting | Value | | - | -- | | **Subscription** | Select the same subscription that you selected in step 2. |- | **Resource group** | Select **rg-vnm**. | + | **Resource group** | Select **resource-group**. | | **Virtual network name** | Enter **vnet-spoke-002**. |- | **Region** | Select **(US) East US**. | + | **Region** | Select **(US) West US 2**. | | **Edit subnet window** | | | **Subnet purpose** | Leave as **Default**. | | **Name** | Leave as **default**. | In this step, you create two virtual networks to become members of a network gro In this step, you create a network group containing your virtual networks using Azure policy. -1. From the **Home** page, select **Resource groups** and browse to the **rg-vnm** resource group, and select the **vnm-1** Virtual Network Manager instance. +1. From the **Home** page, select **Resource groups** and browse to the **resource-group** resource group, and select the **vnm-1** Virtual Network Manager instance. 1. Under **Settings**, select **Network groups**. Then select **Create**. In this step, you create a network group containing your virtual networks using | Setting | Value | | - | -- |- | **Name** | Enter **ng-spoke**. | + | **Name** | Enter **network-group**. | | **Description** | *(Optional)* Provide a description about this network group. | | **Member type** | Select **Virtual network**. | 1. Select **Create**. -1. Select **ng-spoke** and choose **Create Azure Policy**. - - :::image type="content" source="media/how-to-deploy-user-defined-routes/network-group-page.png" alt-text="Screenshot of network group page with options for group creation and membership view."::: -+1. Select **network-group** and choose **Create Azure Policy**. 1. In **Create Azure Policy**, enter or select the following information: | Setting | Value | | - | -- |- | **Policy name** | Enter **ng-azure-policy**. | + | **Policy name** | Enter **azure-policy**. | | **Scope** | Select **Select Scope** and choose your subscription, if not already selected. | 1. Under **Criteria**, enter a conditional statement to define the network group membership. Enter or select the following information: In this step, you define the UDRs for the network group by creating a routing co | **Name** | Enter **rule-collection-1**. | | **Description** | *(Optional)* Provide a description about this rule collection. | | **Enable BGP route propagation** | Leave **unchecked**. |- | **Target network groups** | select **ng-spoke**. | + | **Target network groups** | select **network-group**. | :::image type="content" source="media/how-to-deploy-user-defined-routes/add-rule-collection.png" alt-text="Screenshot of Add a rule collection window with target network group selected."::: In this step, you deploy the routing configuration to create the UDRs for the ne | **Include user defined routing configurations in your goal state** | Select checkbox. | | **User defined routing configurations** | Select **routing-configuration**. | | **Region** | |- | **Target regions** | Select **(US) East US**. | + | **Target regions** | Select **(US) West US 2)**. | 1. Select **Next** and then **Deploy** to deploy the routing configuration. |
virtual-network-manager | How To Manage User Defined Routes Multiple Hub Spoke Topologies | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network-manager/how-to-manage-user-defined-routes-multiple-hub-spoke-topologies.md | Title: "Manage User-defined Routes (UDRs) across multiple hub-and-spoke topologi description: Learn to manage User Defined Routes (UDRs) across multiple hub-and-spoke topologies with Azure Virtual Network Manager. Previously updated : 08/02/2024 Last updated : 10/23/2024 # customer intent: As a network administrator, I want to deploy a Spoke-to-Spoke topology with two hubs using Virtual Network Manager.+> [!IMPORTANT] +> User-defined routes management with Azure Virtual Network Manager is in public preview. Public previews are made available to you on the condition that you agree to the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). Some features might not be supported or might have constrained capabilities. This preview version is provided without a service level agreement, and it's not recommended for production workloads. + ## Prerequisites :::image type="content" source="media/how-to-manage-user-defined-routes-multiple-hub-spoke-topologies/spoke-to-spoke-two-hubs-topology-network-manager.png" alt-text="Diagram of a multi-hub topology with hub-and-spoke virtual network topologies."::: |
virtual-network | How To Create Encryption | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network/how-to-create-encryption.md | Title: Create a virtual network with encryption - Azure portal + Title: Create a virtual network with encryption -description: Learn how to create an encrypted virtual network by using the Azure portal. A virtual network lets Azure resources communicate with each other and the internet. +description: Learn how to create an encrypted virtual network. A virtual network lets Azure resources communicate with each other and the internet. -# Create a virtual network with encryption by using the Azure portal +# Create a virtual network with encryption Azure Virtual Network encryption is a feature of Azure Virtual Network. With Virtual Network encryption, you can seamlessly encrypt and decrypt internal network traffic over the wire, with minimal effect to performance and scale. Virtual Network encryption protects data that traverses your virtual network from virtual machine to virtual machine. An Azure account with an active subscription. [Create one for free](https://azur ### [PowerShell](#tab/powershell) - Have an Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).+ - Install Azure PowerShell locally or use Azure Cloud Shell.+ - Sign in to Azure PowerShell and select the subscription with which you want to use this feature. For more information, see [Sign in with Azure PowerShell](/powershell/azure/authenticate-azureps).+ - Ensure that your `Az.Network` module is 4.3.0 or later. To verify the installed module, use the command `Get-InstalledModule -Name Az.Network`. If the module requires an update, use the command `Update-Module -Name Az.Network`, if necessary. If you choose to install and use PowerShell locally, this article requires the Azure PowerShell module version 5.4.1 or later. Run `Get-Module -ListAvailable Az` to find the installed version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-Az-ps). If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure. |
virtual-network | Default Outbound Access | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network/ip-services/default-outbound-access.md | The public IPv4 address used for the access is called the default outbound acces If you deploy a virtual machine in Azure and it doesn't have explicit outbound connectivity, it's assigned a default outbound access IP. >[!Important] >On September 30, 2025, default outbound access for new deployments will be retired. For more information, see the [official announcement](https://azure.microsoft.com/updates/default-outbound-access-for-vms-in-azure-will-be-retired-transition-to-a-new-method-of-internet-access/). We recommend that you use one of the explicit forms of connectivity discussed in the following section. If you deploy a virtual machine in Azure and it doesn't have explicit outbound c * Secure by default - * It's not recommended to open a virtual network to the Internet by default using the zero trust network security principle. + * It's not recommended to open a virtual network to the Internet by default using the Zero Trust network security principle. * Explicit vs. implicit |
virtual-network | Tutorial Create Route Table Portal | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network/tutorial-create-route-table-portal.md | |
virtual-network | Tutorial Filter Network Traffic | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network/tutorial-filter-network-traffic.md | Title: "Tutorial: Filter network traffic with a network security group (NSG) - Azure portal" + Title: "Tutorial: Filter network traffic with a network security group (NSG)" -description: In this tutorial, you learn how to filter network traffic to a subnet, with a network security group (NSG), using the Azure portal. +description: In this tutorial, you learn how to filter network traffic to a subnet with a network security group (NSG). ai-usage: ai-assisted # Customer intent: I want to filter network traffic to virtual machines that perform similar functions, such as web servers. -# Tutorial: Filter network traffic with a network security group using the Azure portal +# Tutorial: Filter network traffic with a network security group You can use a network security group to filter inbound and outbound network traffic to and from Azure resources in an Azure virtual network. |
virtual-network | Tutorial Restrict Network Access To Resources | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network/tutorial-restrict-network-access-to-resources.md | Title: 'Tutorial: Restrict access to PaaS resources with service endpoints - Azure portal' -description: In this tutorial, you learn how to limit and restrict network access to Azure resources, such as an Azure Storage, with virtual network service endpoints using the Azure portal. + Title: 'Tutorial: Restrict access to PaaS resources with service endpoints' +description: In this tutorial, you learn how to limit and restrict network access to Azure resources, such as an Azure Storage, with virtual network service endpoints. ai-usage: ai-assisted # Customer intent: I want only resources in a virtual network subnet to access an Azure PaaS resource, such as an Azure Storage account. -# Tutorial: Restrict network access to PaaS resources with virtual network service endpoints using the Azure portal +# Tutorial: Restrict network access to PaaS resources with virtual network service endpoints Virtual network service endpoints enable you to limit network access to some Azure service resources to a virtual network subnet. You can also remove internet access to the resources. Service endpoints provide direct connection from your virtual network to supported Azure services, allowing you to use your virtual network's private address space to access the Azure services. Traffic destined to Azure resources through service endpoints always stays on the Microsoft Azure backbone network. |
virtual-network | Virtual Network Encryption Overview | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-network/virtual-network-encryption-overview.md | Virtual network encryption enhances existing encryption in transit capabilities Virtual network encryption has the following requirements: -- Virtual Network encryption is supported on general-purpose and memory optimized virtual machine instance sizes including:+- Virtual Network encryption is supported on the following virtual machine instance sizes: | Type | VM Series | VM SKU | | | | | | General purpose workloads | D-series V4 </br> D-series V5 </br> D-series V6 | **[Dv4 and Dsv4-series](/azure/virtual-machines/dv4-dsv4-series)** </br> **[Ddv4 and Ddsv4-series](/azure/virtual-machines/ddv4-ddsv4-series)** </br> **[Dav4 and Dasv4-series](/azure/virtual-machines/dav4-dasv4-series)** </br> **[Dv5 and Dsv5-series](/azure/virtual-machines/dv5-dsv5-series)** </br> **[Ddv5 and Ddsv5-series](/azure/virtual-machines/ddv5-ddsv5-series)** </br> **[Dlsv5 and Dldsv5-series](/azure/virtual-machines/dlsv5-dldsv5-series)** </br> **[Dasv5 and Dadsv5-series](/azure/virtual-machines/dasv5-dadsv5-series)** </br> **[Dasv6 and Dadsv6-series](/azure/virtual-machines/dasv6-dadsv6-series)** </br> **[Dalsv6 and Daldsv6-series](/azure/virtual-machines/dalsv6-daldsv6-series)** |- | General purpose and memory intensive workloads | E-series V4 </br> E-series V5 </br> E-series V6 | **[Ev4 and Esv4-series](/azure/virtual-machines/ev4-esv4-series)** </br> **[Edv4 and Edsv4-series](/azure/virtual-machines/edv4-edsv4-series)** </br> **[Eav4 and Easv4-series](/azure/virtual-machines/eav4-easv4-series)** </br> **[Ev5 and Esv5-series](/azure/virtual-machines/ev5-esv5-series)** </br> **[Edv5 and Edsv5-series](/azure/virtual-machines/edv5-edsv5-series)** </br> **[Easv5 and Eadsv5-series](/azure/virtual-machines/easv5-eadsv5-series)** </br> **[Easv6 and Eadsv6-series](/azure/virtual-machines/easv6-eadsv6-series)** | - | Storage intensive workloads | LSv3 | **[LSv3-series](/azure/virtual-machines/lsv3-series)** | - | Memory intensive workloads | M-series | **[Mv2-series](/azure/virtual-machines/mv2-series)** </br> **[Msv2 and Mdsv2-series Medium Memory](/azure/virtual-machines/msv2-mdsv2-series)** </br> **[Msv3 and Mdsv3 Medium Memory Series](/azure/virtual-machines/msv3-mdsv3-medium-series)** | + | Memory intensive workloads | E-series V4 </br> E-series V5 </br> E-series V6 </br> M-series V2 </br> M-series V3 | **[Ev4 and Esv4-series](/azure/virtual-machines/ev4-esv4-series)** </br> **[Edv4 and Edsv4-series](/azure/virtual-machines/edv4-edsv4-series)** </br> **[Eav4 and Easv4-series](/azure/virtual-machines/eav4-easv4-series)** </br> **[Ev5 and Esv5-series](/azure/virtual-machines/ev5-esv5-series)** </br> **[Edv5 and Edsv5-series](/azure/virtual-machines/edv5-edsv5-series)** </br> **[Easv5 and Eadsv5-series](/azure/virtual-machines/easv5-eadsv5-series)** </br> **[Easv6 and Eadsv6-series](/azure/virtual-machines/easv6-eadsv6-series)** </br> **[Mv2-series](/azure/virtual-machines/mv2-series)** </br> **[Msv2 and Mdsv2 Medium Memory series](/azure/virtual-machines/msv2-mdsv2-series)** </br> **[Msv3 and Mdsv3 Medium Memory series](/azure/virtual-machines/msv3-mdsv3-medium-series)** | + | Storage intensive workloads | L-series V3 | **[LSv3-series](/azure/virtual-machines/lsv3-series)** | + | Compute optimized | F-series V6 | **[Falsv6-series](/azure/virtual-machines/sizes/compute-optimized/falsv6-series)** </br> **[Famsv6-series](/azure/virtual-machines/sizes/compute-optimized/famsv6-series)** </br> **[Fasv6-series](/azure/virtual-machines/sizes/compute-optimized/fasv6-series)** | - Accelerated Networking must be enabled on the network interface of the virtual machine. For more information about Accelerated Networking, see ΓÇ»[What is Accelerated Networking?](/azure/virtual-network/accelerated-networking-overview) |
virtual-wan | Howto Connect Vnet Hub Powershell | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-wan/howto-connect-vnet-hub-powershell.md | This article helps you connect your virtual network to your virtual hub using Po Before you create a connection, be aware of the following: * A virtual network can only be connected to one virtual hub at a time.-* In order to connect it to a virtual hub, the remote virtual network can't have a gateway. +* In order to connect it to a virtual hub, the remote virtual network can't have a gateway (ExpressRoute or VPN) or RouteServer. * Some configuration settings, such as **Propagate static route**, can only be configured in the Azure portal at this time. See the [Azure portal](howto-connect-vnet-hub.md) version of this article for steps. |
virtual-wan | Howto Connect Vnet Hub | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-wan/howto-connect-vnet-hub.md | This article helps you connect your virtual network to your virtual hub using th Before you create a connection, be aware of the following: * A virtual network can only be connected to one virtual hub at a time.-* In order to connect it to a virtual hub, the remote virtual network can't have a gateway. +* In order to connect it to a virtual hub, the remote virtual network can't have a gateway (ExpressRoute or VPN) or RouteServer. > [!IMPORTANT] > If VPN gateways are present in the virtual hub, this operation as well as any other write operation on the connected VNet can cause disconnection to Point-to-site clients as well as reconnection of site-to-site tunnels and BGP sessions. |
virtual-wan | Whats New | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/virtual-wan/whats-new.md | You can also find the latest Azure Virtual WAN updates and subscribe to the RSS | Type |Area |Name |Description | Date added | Limitations | | ||||||-| Metric| Routing | [New Virtual Hub Metrics](monitor-virtual-wan-reference.md#hub-router-metrics)| There are now two additional Virtual WAN hub metrics that display the virtual hub's capacity and spoke VM utilization: **Routing Infrastructure Units** and **Spoke VM Utilization**.| August 2024 | The **Spoke VM Utilization** metric represents an approximate number of deployed spoke VMs as a percentage of the total number of spoke VMs that the hub's routing infrastructure units can support. -| Feature| Routing | [Routing intent](how-to-routing-policies.md)| Routing intent is the mechanism through which you can configure Virtual WAN to send private or internet traffic via a security solution deployed in the hub.|May 2023|Routing Intent is Generally Available in Azure public cloud. See documentation for [additional limitations](how-to-routing-policies.md#knownlimitations).| +| Metric| Routing | [New Virtual Hub Metrics](monitor-virtual-wan-reference.md#hub-router-metrics)| There are now two new Virtual WAN hub metrics that display the virtual hub's capacity and spoke VM utilization: **Routing Infrastructure Units** and **Spoke VM Utilization**.| August 2024 | The **Spoke VM Utilization** metric represents an approximate number of deployed spoke VMs as a percentage of the total number of spoke VMs that the hub's routing infrastructure units can support. +| Feature| Routing | [Routing intent](how-to-routing-policies.md)| Routing intent is the mechanism through which you can configure Virtual WAN to send private or internet traffic via a security solution deployed in the hub.|May 2023|Routing Intent is Generally Available in Azure public cloud. See documentation for [other limitations](how-to-routing-policies.md#knownlimitations).| |Feature| Routing |[Virtual hub routing preference](about-virtual-hub-routing-preference.md)|Hub routing preference gives you more control over your infrastructure by allowing you to select how your traffic is routed when a virtual hub router learns multiple routes across S2S VPN, ER, and SD-WAN NVA connections. |October 2022| | |Feature| Routing|[Bypass next hop IP for workloads within a spoke VNet connected to the virtual WAN hub generally available](how-to-virtual-hub-routing.md)|Bypassing next hop IP for workloads within a spoke VNet connected to the virtual WAN hub lets you deploy and access other resources in the VNet with your NVA without any additional configuration.|October 2022| | |SKU/Feature/Validation | Routing | [BGP end point (General availability)](scenario-bgp-peering-hub.md) | The virtual hub router now exposes the ability to peer with it, thereby exchanging routing information directly through Border Gateway Protocol (BGP) routing protocol. | June 2022 | | The following features are currently in gated public preview. After working with |3| Two ExpressRoute circuits in the same peering location connected to multiple hubs |If you have two ExpressRoute circuits in the same peering location, and both of these circuits are connected to multiple virtual hubs in the same Virtual WAN, then connectivity to your Azure resources might be impacted. | July 2023 | Make sure each virtual hub has at least 1 virtual network connected to it. This ensures connectivity to your Azure resources. The Virtual WAN team is also working on a fix for this issue. | |4| ExpressRoute ECMP Support | Today, ExpressRoute ECMP is not enabled by default for virtual hub deployments. When multiple ExpressRoute circuits are connected to a Virtual WAN hub, ECMP enables traffic from spoke virtual networks to on-premises over ExpressRoute to be distributed across all ExpressRoute circuits advertising the same on-premises routes. | | To enable ECMP for your Virtual WAN hub, please reach out to virtual-wan-ecmp@microsoft.com. | | 5| Virtual WAN hub address prefixes are not advertised to other Virtual WAN hubs in the same Virtual WAN.| You can't leverage Virtual WAN hub-to-hub full mesh routing capabilities to provide connectivity between NVA orchestration software deployed in a VNET or on-premises connected to a Virtual WAN hub to an Integrated NVA or SaaS solution deployed in a different Virtual WAN hub. | | If your NVA or SaaS orchestrator is deployed on-premises, connect that on-premises site to all Virtual WAN hubs with NVAs or SaaS solutions deployed in them. If your orchestrator is in an Azure VNET, manage NVAs or SaaS solutions using public IP. Support for Azure VNET orchestrators is on the roadmap.|-|6| Configuring routing intent to route between connectivity and firewall NVAs in the same Virtual WAN Hub| Virtual WAN routing intent private routing policy does not support routing between a SD-WAN NVA and a Firewall NVA (or SaaS solution) deployed in the same Virtual hub.| | Deploy the connectivity and firewall integrated NVAs in two different hubs in the same Azure region. Alternatively, deploy the connectivity NVA to a spoke Virtual Network connected to your Virtual WAN Hub and leverage the [BGP peering](scenario-bgp-peering-hub.md).| +|6| Configuring routing intent to route between connectivity and firewall NVAs in the same Virtual WAN Hub| Virtual WAN routing intent private routing policy does not support routing between an SD-WAN NVA and a Firewall NVA (or SaaS solution) deployed in the same Virtual hub.| | Deploy the connectivity and firewall integrated NVAs in two different hubs in the same Azure region. Alternatively, deploy the connectivity NVA to a spoke Virtual Network connected to your Virtual WAN Hub and leverage the [BGP peering](scenario-bgp-peering-hub.md).| | 7| BGP between the Virtual WAN hub router and NVAs deployed in the Virtual WAN hub does not come up if the ASN used for BGP peering is updated post-deployment.|Virtual Hub router expects NVA in the hub to use the ASN that was configured on the router when the NVA was first deployed. Updating the ASN associated with the NVA on the NVA resource does not properly register the new ASN with the Virtual Hub router so the router rejects BGP sessions from the NVA if the NVA OS is configured to use the new ASN. | |Delete and recreate the NVA in the Virtual WAN hub with the correct ASN.| |8| Advertising default route (0.0.0.0/0) from on-premises (VPN, ExpressRoute, BGP endpoint) or statically configured on a Virtual Network connection is not supported for forced tunneling use cases.| The 0.0.0.0/0 route advertised from on-premises (or statically configured on a Virtual Network connection) is not applied to the Azure Firewall or other security solutions deployed in the Virtual WAN hub. Packets inspected by the security solution in the hub are routed directly to the internet, bypassing the route learnt from on-premises||Publish the default route from on-premises only in non-secure hub scenarios.|+|9| Routing intent update operations fail in deployments where private routing policy next hop resource is an NVA or SaaS solution.| In deployments where private routing policy is configured with next hop NVA or SaaS solutions alongside additional private prefixes, modifying routing intent fails. Examples of operations that fail are adding or removing internet or private routing policies. This known issue doesn't impact deployments with no additional private prefixes configured. | |Remove any additional private prefixes, update routing intent and then re-configure additional private prefixes.| ## Next steps |
web-application-firewall | Waf Front Door Drs | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/web-application-firewall/afds/waf-front-door-drs.md | Azure Web Application Firewall on Azure Front Door protects web applications fro The Default Rule Set (DRS) also includes the Microsoft Threat Intelligence Collection rules that are written in partnership with the Microsoft Intelligence team to provide increased coverage, patches for specific vulnerabilities, and better false positive reduction. +> [!NOTE] +> When a ruleset version is changed in a WAF Policy, any existing customizations you made to your ruleset will be reset to the defaults for the new ruleset. See: [Upgrading or changing ruleset version](#upgrading-or-changing-ruleset-version). + ## Default rule sets The Azure-managed DRS includes rules against the following threat categories: When your WAF uses an older version of the Default Rule Set (before DRS 2.0), yo The version of the DRS that you use also determines which content types are supported for request body inspection. For more information, see [What content types does WAF support?](waf-faq.yml#what-content-types-does-waf-support-) in the FAQ. +### Upgrading or changing ruleset version ++If you are upgrading, or assigning a new ruleset version, and would like to preserve existing rule overrides and exclusions, it is recommended to use PowerShell, CLI, REST API, or a templates to make ruleset version changes. A new version of a ruleset can have newer rules, additional rule groups, and may have updates to existing signatures to enforce better security and reduce false positives. It is recommended to validate changes in a test environment, fine tune if necessary, and then deploy in a production environment. ++> [!NOTE] +> If you are using the Azure portal to assign a new managed ruleset to a WAF policy, all the previous customizations from the existing managed ruleset such as rule state, rule actions, and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules, or policy settings will remain unaffected during the new ruleset assignment. You will need to redefine rule overrides and validate changes before deploying in a production environment. + ### DRS 2.1 DRS 2.1 rules offer better protection than earlier versions of the DRS. It includes other rules developed by the Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding. |
web-application-firewall | Waf Front Door Tuning | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/web-application-firewall/afds/waf-front-door-tuning.md | If you see rule ID 949110 during the process of tuning your WAF, its presence in Review the other WAF log entries for the same request by searching for the log entries with the same tracking reference. Look at each of the rules that were triggered. Tune each rule by following the guidance in this article. + > [!WARNING] + > When assigning a new managed ruleset to a WAF policy, all the previous customizations from the existing managed rulesets such as rule state, rule actions and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules and policy settings will remain unaffected during the new ruleset assignment. + ## Next steps - Learn about [Azure Web Application Firewall](../overview.md). |
web-application-firewall | Application Gateway Crs Rulegroups Rules | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md | Title: CRS rule groups and rules + Title: CRS and DRS rule groups and rules -description: This page provides information on web application firewall CRS rule groups and rules. +description: This page provides information on web application firewall CRS and DRS rule groups and rules. Previously updated : 05/30/2024 Last updated : 10/23/2024 You also have the option of using rules that are defined based on the OWASP core You can disable rules individually, or set specific actions for each rule. This article lists the current rules and rule sets available. If a published rule set requires an update, we'll document it here. > [!NOTE]-> When changing from one ruleset version to another all disabled and enabled rule settings will return to the default for the ruleset you're migrating to. This means that if you previously disabled or enabled a rule, you will need to disable or enable it again once you've moved to the new ruleset version. +> When a ruleset version is changed in a WAF Policy, any existing customizations you made to your ruleset will be reset to the defaults for the new ruleset. See: [Upgrading or changing ruleset version](#upgrading-or-changing-ruleset-version). ## Default rule sets If the anomaly score is 5 or greater, and the WAF is in Prevention mode, the req For example, a single *Critical* rule match is enough for the WAF to block a request when in Prevention mode, because the overall anomaly score is 5. However, one *Warning* rule match only increases the anomaly score by 3, which isn't enough by itself to block the traffic. When an anomaly rule is triggered, it shows a "Matched" action in the logs. If the anomaly score is 5 or greater, there is a separate rule triggered with either "Blocked" or "Detected" action depending on whether WAF policy is in Prevention or Detection mode. For more information, please see [Anomaly Scoring mode](ag-overview.md#anomaly-scoring-mode). +### Upgrading or changing ruleset version ++If you are upgrading, or assigning a new ruleset version, and would like to preserve existing rule overrides and exclusions, it is recommended to use PowerShell, CLI, REST API, or a templates to make ruleset version changes. A new version of a ruleset can have newer rules, additional rule groups, and may have updates to existing signatures to enforce better security and reduce false positives. It is recommended to validate changes in a test environment, fine tune if necessary, and then deploy in a production environment. ++> [!NOTE] +> If you are using the Azure portal to assign a new managed ruleset to a WAF policy, all the previous customizations from the existing managed ruleset such as rule state, rule actions, and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules, policy settings, and global exclusions will remain unaffected during the new ruleset assignment. You will need to redefine rule overrides and validate changes before deploying in a production environment. + ### DRS 2.1 DRS 2.1 rules offer better protection than earlier versions of the DRS. It includes more rules developed by the Microsoft Threat Intelligence team and updates to signatures to reduce false positives. It also supports transformations beyond just URL decoding. |
web-application-firewall | Web Application Firewall Troubleshoot | https://github.com/MicrosoftDocs/azure-docs/commits/main/articles/web-application-firewall/ag/web-application-firewall-troubleshoot.md | If the request contains cookies, the **Cookies** tab can be selected to view the > [!NOTE] > If you know that your app will never need any file upload above a given size, you can restrict that by setting a limit. + > [!WARNING] + > When assigning a new managed ruleset to a WAF policy, all the previous customizations from the existing managed rulesets such as rule state, rule actions and rule level exclusions will be reset to the new managed ruleset's defaults. However, any custom rules, policy settings, and global exclusions will remain unaffected during the new ruleset assignment. + ## Firewall Metrics (WAF_v1 only) For v1 Web Application Firewalls, the following metrics are now available in the portal: |