You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/environment.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,7 +92,7 @@ You can monitor the status of your environments through Azure Monitor alerts or
92
92
93
93
Understanding the limits and quotas for Container Apps environments helps you plan your application architecture effectively.
94
94
95
-
To see the quotas relevant to your environment, see [Quotas in Azure Container Apps](./quotas.md) for ways to return your quota limits.
95
+
To see the quotas relevant to your environment, see [Quotas for Azure Container Apps](./quotas.md) for ways to return your quota limits.
96
96
97
97
For the most up-to-date limits and quotas, refer to the [Azure Container Apps service limits](/azure/azure-resource-manager/management/azure-subscription-service-limits#container-apps-limits).
Copy file name to clipboardExpand all lines: articles/data-factory/introduction.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,8 @@ This visual guide provides a detailed overview of the complete Data Factory arch
54
54
55
55
:::image type="content" source="media\introduction\data-factory-visual-guide-small.png" alt-text="A detailed visual guide to the complete system architecture for Azure Data Factory, presented in a single high resolution image." lightbox="media\introduction\data-factory-visual-guide.png":::
56
56
57
-
To see more detail, select the preceding image to zoom in, or browse to the [high resolution image](/azure/data-factory/media/introduction/data-factory-visual-guide.png).
57
+
To see more detail, select the preceding image to zoom in, or browse to the [high resolution image](/azure/data-factory/media/introduction/data-factory-visual-guide.png).
58
+
Learn about the [development of this visual guide and the sketch the docs project here](https://dev.to/azure/a-visual-guide-to-azure-data-factory-53ik).
Copy file name to clipboardExpand all lines: articles/expressroute/gateway-migration.md
+9-3Lines changed: 9 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,8 +42,12 @@ For enhanced reliability and high availability, we recommend migrating to an Az-
42
42
### Migrate to ErGwScale (Scalable Gateway)
43
43
The ExpressRoute Scalable Gateway (ErGwScale) is a new virtual network gateway SKU that provides flexible, high-bandwidth connectivity for your Azure virtual networks.
44
44
45
-
You can configure the gateway's performance by setting the minimum and maximum scale units between **1** and **40**:
46
-
- To configure a fixed-size gateway, set both the **minimum** and **maximum** scale units to the same value (for example, set both to **1**).
45
+
> [!IMPORTANT]
46
+
>The minimum scale unit must be 1, when the maximum scale unit is 1.
47
+
48
+
49
+
You can configure the gateway's scaling, as per requirements, by setting the minimum and maximum scale units:
50
+
- To configure a fixed-size gateway, set both the **minimum** and **maximum** scale units to the same value (for example, set both to **1**, set both to **20**, set both to **40**).
47
51
- To enable autoscaling, set the **minimum scale unit** to **2** or higher, and specify the desired **maximum scale unit** (up to 40).
48
52
49
53
This allows the gateway to automatically scale based on your workload requirements.
@@ -52,7 +56,9 @@ For more information, see [About Scalable Gateway](scalable-gateway.md).
52
56
53
57
| Scenario | Minimum Scale Unit | Maximum Scale Unit | Autoscaling Enabled? |
Copy file name to clipboardExpand all lines: articles/expressroute/scalable-gateway.md
+22-2Lines changed: 22 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,12 +19,32 @@ The ExpressRoute scalable gateway (ErGwScale) is a new virtual network gateway S
19
19
20
20
The virtual network gateway infrastructure autoscales between the minimum and maximum scale unit that you configure, based on the bandwidth or flow count utilization. Scale operations might take up to 30 minutes to complete. If you want to achieve a fixed connectivity at a specific bandwidth value, you can configure a fixed scale unit by setting the minimum scale unit and the maximum scale unit to the same value.
21
21
22
+
## Upgrade and migration paths
23
+
24
+
You can move to the Scalable Gateway SKU using either an upgrade or migration process, depending on your current gateway SKU. The following diagram summarizes your options:
25
+
26
+
```mermaid
27
+
flowchart TD
28
+
A[Current Gateway SKU]
29
+
A -->|ErGw1, ErGw2, ErGw3| B[Direct Upgrade - Portal or PowerShell]
30
+
A -->|Standard, High Performance, Ultra Performance| C[ExpressRoute Gateway Migration Tool]
31
+
B --> D[Scalable Gateway SKU]
32
+
C --> D
33
+
```
34
+
**Upgrade options**
35
+
- If you have an existing gateway using the ErGw1, ErGw2, or ErGw3 SKU, you can [upgrade](expressroute-howto-add-gateway-portal-resource-manager.md#upgrade-the-gateway-sku) directly to the Scalable Gateway SKU. No migration tool is required.
36
+
- Upgrades can be performed through the Azure portal or by using PowerShell.
37
+
38
+
This process may take up to 2 hours to complete. During this time, the gateway remains available and does not experience downtime.
39
+
40
+
**Migration options**
41
+
- If your gateway uses the Standard, High Performance, or Ultra Performance SKU, you must use the [migration Tool](gateway-migration.md) to move to the Scalable Gateway SKU.
42
+
22
43
## Limitations
23
44
45
+
***IPsec over ExpressRoute**: ErGwScale currently doesn't support IPsec traffic over ExpressRoute.
24
46
***Basic IP**: ErGwScale doesn't support the Basic IP SKU. You need to use a Standard IP SKU to configure ErGwScale.
25
47
***Minimum and maximum scale units**: You can configure the scale unit for ErGwScale between 1 and 40. The *minimum scale unit* can't be lower than 1 and the *maximum scale unit* can't be higher than 40.
26
-
***Migration scenarios**: You can't migrate from Standard/ErGw1Az or HighPerf/ErGw2Az/UltraPerf/ErGw3Az to ErGwScale in the preview.
27
-
***IPsec over ExpressRoute**: ErGwScale currently doesn't support IPsec traffic over ExpressRoute.
Copy file name to clipboardExpand all lines: articles/firewall/tcp-session-behavior.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,6 +61,20 @@ Certain applications, such as traditional SAP GUI and SAP Remote Function Call (
61
61
> [!NOTE]
62
62
> If you're running SAP workloads through an Azure Firewall, test your configuration and review the [SAP design documentation](/azure/sap/workloads/deployment-checklist?tabs=pilot#pilot-phase-strongly-recommended) to ensure a successful Azure deployment.
63
63
64
+
### TCP reset behavior during scale-in events
65
+
66
+
When Azure Firewall scales in, it enters a drain mode for 90 seconds before an underlying firewall instance is recycled:
67
+
68
+
-**First 45 seconds:** The firewall stops accepting new connections but allows existing connections to continue without sending TCP reset packets.
69
+
-**Next 45 seconds:** The firewall sends TCP RST packets to all active session flows to ensure clean termination before recycling. These resets inform both the client and the server that the connection is closing cleaning, so neither side hangs indefinitely waiting for packets that will not arrive once the underlying instance is decommissioned.
70
+
- To ensure that both client and server endpoints promptly detect these resets, configure a **bi-directional TCP keep-alive messages at 30-second intervals**. Keep-alive probes generate periodic traffic even when no application data is exchanged, helping both sides detect connection closure in real time and avoid half-open sessions - cases where one side believes the connection is still alive after the other side has closed it. This configuration allows applications to gracefully recover connections when a firewall instance is recycled during scale-in.
71
+
- If a 30-second keep-alive interval is not feasible, consider configuring [prescaling](/azure/firewall/prescaling) to maintain a higher minimum capacity, reducing the likelihood of scale-in events that could disrupt long-running connections.
72
+
73
+
This scale-in TCP reset behavior applies for both north-south and east-west traffic. It ensures clients and servers are properly notified before the firewall instance is decommissioned. The drain period and reset behavior are not configurable during scale-in events.
74
+
75
+
> [!NOTE]
76
+
> TCP reset behavior during scale-in differs from idle timeout behavior. For idle timeout, RST packets are sent only for north-south traffic, while during scale-in, RST packets are sent for both north-south and east-west traffic.
77
+
64
78
## Next steps
65
79
66
80
To learn more about Azure Firewall performance, see [Azure Firewall performance](firewall-performance.md).
0 commit comments