{
  "errors": [],
  "events": [
    {
      "author": "halkazwini",
      "date": "2026-04-07T21:03:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 6,
      "files": [
        {
          "additions": 0,
          "deletions": 117,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure Network Watcher",
              "type": "removed"
            },
            {
              "text": "Use rule impact analyzer in traffic analytics",
              "type": "removed"
            },
            {
              "text": "In this article, you learn how to use the rule impact analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-what-if.md",
          "status": "removed",
          "title": "Traffic Analytics What If"
        },
        {
          "additions": 100,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure Network Watcher",
              "type": "added"
            },
            {
              "text": "Analyze security rules using Rule Impact Analyzer in Traffic Analytics (preview)",
              "type": "added"
            },
            {
              "text": "In this article, you learn how to use the rule impact analyzer feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-rule-impact-analyzer.md",
          "status": "added",
          "title": "Traffic Analytics Rule Impact Analyzer"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-rule-impact-analyzer/rule-configuration-basic.png",
          "status": "added",
          "title": "Rule Configuration Basic"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-rule-impact-analyzer/run-simulation.png",
          "status": "added",
          "title": "Run Simulation"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-rule-impact-analyzer/simulation-results.png",
          "status": "added",
          "title": "Simulation Results"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-rule-impact-analyzer/simulation-scope.png",
          "status": "added",
          "title": "Simulation Scope"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a671f9c94f87280355a7489ea7b1b9192b018a42",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "titleSuffix: Azure Network Watcher",
          "type": "added"
        },
        {
          "text": "Analyze security rules using Rule Impact Analyzer in Traffic Analytics (preview)",
          "type": "added"
        },
        {
          "text": "In this article, you learn how to use the rule impact analyzer feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
          "type": "added"
        },
        {
          "text": "The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
          "type": "added"
        },
        {
          "text": "Rule Impact Analyzer is currently in PREVIEW.",
          "type": "added"
        },
        {
          "text": "See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.",
          "type": "added"
        },
        {
          "text": "titleSuffix: Azure Network Watcher",
          "type": "removed"
        },
        {
          "text": "Use rule impact analyzer in traffic analytics",
          "type": "removed"
        },
        {
          "text": "In this article, you learn how to use the rule impact analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
          "type": "removed"
        },
        {
          "text": "The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
          "type": "removed"
        }
      ],
      "message": "finalize all instructions",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 84,
      "sha": "a671f9c94f87280355a7489ea7b1b9192b018a42",
      "short_sha": "a671f9c",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 100,
        "deletions": 117,
        "total": 217
      },
      "summary": "Network Watcher: adds \"The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a671f9c94f87280355a7489ea7b1b9192b018a42"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-28T15:29:56Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
          "meaningful_changes": [
            {
              "text": "1.10.21 | v1.2.1 | v1.27 | Load Aware Routing, fixes for AGC + AKS Istio add-on, fix readiness probe for ingress, security patches",
              "type": "removed"
            },
            {
              "text": "1.10.23 | v1.2.1 | v1.27 | security patches",
              "type": "added"
            },
            {
              "text": "1.10.21 | v1.2.1 | v1.27 | Load Aware Routing, fixes for AGC + AKS Istio add-on, fix readiness probe for ingress, security patches",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/alb-controller-release-notes.md",
          "status": "modified",
          "title": "Alb Controller Release Notes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a5f3a8be16ea911128eadc319a40283b8ffd4657",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1.10.21 | v1.2.1 | v1.27 | Load Aware Routing, fixes for AGC + AKS Istio add-on, fix readiness probe for ingress, security patches",
          "type": "removed"
        },
        {
          "text": "1.10.23 | v1.2.1 | v1.27 | security patches",
          "type": "added"
        },
        {
          "text": "1.10.21 | v1.2.1 | v1.27 | Load Aware Routing, fixes for AGC + AKS Istio add-on, fix readiness probe for ingress, security patches",
          "type": "added"
        }
      ],
      "message": "Update ALB Controller release notes for version 1.10.23",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "a5f3a8be16ea911128eadc319a40283b8ffd4657",
      "short_sha": "a5f3a8b",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 2,
        "total": 5
      },
      "summary": "Application Gateway: adds \"1.10.21 | v1.2.1 | v1.27 | Load Aware Routing, fixes for AGC + AKS Istio add-on, fix readiness probe for ingress, security patches\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a5f3a8be16ea911128eadc319a40283b8ffd4657"
    },
    {
      "author": "Suren Jamiyanaa",
      "date": "2026-04-27T19:12:04Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/firewall/monitor-firewall-reference",
          "meaningful_changes": [
            {
              "text": "Flow Trace logs capture traffic evaluated by network rules and NAT rules (Layer 3/4).",
              "type": "added"
            },
            {
              "text": "Traffic evaluated by application rules (Layer 7) is not included in Flow Trace logs. To monitor application rule activity, use Azure Firewall Application Rule logs.",
              "type": "added"
            }
          ],
          "path": "articles/firewall/monitor-firewall-reference.md",
          "status": "modified",
          "title": "Monitor Firewall Reference"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:c648b395e4508fdff26377a1b88ee69aee913291",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Flow Trace logs capture traffic evaluated by network rules and NAT rules (Layer 3/4).",
          "type": "added"
        },
        {
          "text": "Traffic evaluated by application rules (Layer 7) is not included in Flow Trace logs. To monitor application rule activity, use Azure Firewall Application Rule logs.",
          "type": "added"
        }
      ],
      "message": "firewall: add note clarifying Flow Trace logs scope (L3/4 only)",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/monitor-firewall-reference",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "c648b395e4508fdff26377a1b88ee69aee913291",
      "short_sha": "c648b39",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 0,
        "total": 4
      },
      "summary": "Azure Firewall: adds \"Traffic evaluated by application rules (Layer 7) is not included in Flow Trace logs. To monitor application rule activity, use Azure Firewall Application Rule logs.\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/c648b395e4508fdff26377a1b88ee69aee913291"
    },
    {
      "author": "wtnlee",
      "date": "2026-04-24T16:55:14Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 3,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-howto-add-gateway-portal-resource-manager",
          "meaningful_changes": [
            {
              "text": "Additionally, if your Virtual WAN hub has undergone the software upgrade associated with enabling route maps, a known issue prevents the virtual network gateway from properly identifying Virtual WAN routes. As a...",
              "type": "added"
            },
            {
              "text": "Allow traffic from remote Virtual WAN network - Enables VNet-to-Virtual WAN traffic through ExpressRoute.",
              "type": "removed"
            },
            {
              "text": "Allow traffic from remote Virtual WAN network - Enables VNet-to-Virtual WAN traffic through ExpressRoute. When this setting is enabled, Virtual Network gateway will learn routes for virtual networks directly connected...",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/expressroute-howto-add-gateway-portal-resource-manager.md",
          "status": "modified",
          "title": "Expressroute Howto Add Gateway Portal Resource Manager"
        },
        {
          "additions": 5,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-about-virtual-network-gateways",
          "meaningful_changes": [
            {
              "text": "If your Virtual WAN hub has undergone the software upgrade associated with enabling route maps, a known issue prevents the virtual network gateway from properly identifying Virtual WAN routes. As a result, the Allow...",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/expressroute-about-virtual-network-gateways.md",
          "status": "modified",
          "title": "Expressroute About Virtual Network Gateways"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:043f2208f52caed11a383a0de60f04d83777add3",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If your Virtual WAN hub has undergone the software upgrade associated with enabling route maps, a known issue prevents the virtual network gateway from properly identifying Virtual WAN routes. As a result, the Allow...",
          "type": "added"
        },
        {
          "text": "Additionally, if your Virtual WAN hub has undergone the software upgrade associated with enabling route maps, a known issue prevents the virtual network gateway from properly identifying Virtual WAN routes. As a...",
          "type": "added"
        },
        {
          "text": "Allow traffic from remote Virtual WAN network - Enables VNet-to-Virtual WAN traffic through ExpressRoute.",
          "type": "removed"
        },
        {
          "text": "Allow traffic from remote Virtual WAN network - Enables VNet-to-Virtual WAN traffic through ExpressRoute. When this setting is enabled, Virtual Network gateway will learn routes for virtual networks directly connected...",
          "type": "added"
        }
      ],
      "message": "fixed issues with exr",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-howto-add-gateway-portal-resource-manager",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "043f2208f52caed11a383a0de60f04d83777add3",
      "short_sha": "043f220",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 8,
        "deletions": 1,
        "total": 9
      },
      "summary": "ExpressRoute: adds \"Allow traffic from remote Virtual WAN network - Enables VNet-to-Virtual WAN traffic through ExpressRoute. When this setting is enabled, Virtual Network gateway will learn routes for virtual networks directly connected...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/043f2208f52caed11a383a0de60f04d83777add3"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:50:05Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
          "meaningful_changes": [
            {
              "text": "1.9.13 | v1.2.1 | v1.27 | Concurrency-related pod crash fix, security updates",
              "type": "removed"
            },
            {
              "text": "1.10.21 | v1.2.1 | v1.27 | Load Aware Routing, fixes for AGC + AKS Istio add-on, fix readiness probe for ingress, security patches",
              "type": "added"
            },
            {
              "text": "1.9.13 | v1.2.1 | v1.27 | Concurrency-related pod crash fix, security updates",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/alb-controller-release-notes.md",
          "status": "modified",
          "title": "Alb Controller Release Notes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:dfffd496ffaaaed30e2f6c51043383793dd6ae51",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1.9.13 | v1.2.1 | v1.27 | Concurrency-related pod crash fix, security updates",
          "type": "removed"
        },
        {
          "text": "1.10.21 | v1.2.1 | v1.27 | Load Aware Routing, fixes for AGC + AKS Istio add-on, fix readiness probe for ingress, security patches",
          "type": "added"
        },
        {
          "text": "1.9.13 | v1.2.1 | v1.27 | Concurrency-related pod crash fix, security updates",
          "type": "added"
        }
      ],
      "message": "Update ALB Controller release notes for version 1.10.21",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "dfffd496ffaaaed30e2f6c51043383793dd6ae51",
      "short_sha": "dfffd49",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 2,
        "total": 5
      },
      "summary": "Application Gateway: adds \"1.10.21 | v1.2.1 | v1.27 | Load Aware Routing, fixes for AGC + AKS Istio add-on, fix readiness probe for ingress, security patches\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/dfffd496ffaaaed30e2f6c51043383793dd6ae51"
    },
    {
      "author": "Suren Jamiyanaa",
      "date": "2026-04-20T18:14:01Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 7,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/firewall/tcp-session-behavior",
          "meaningful_changes": [
            {
              "text": "East-west traffic: Azure Firewall doesn't send a reset packet (RST) when an idle timeout occurs. This behavior can cause unexpected problems in applications. Configure a keep-alive mechanism within your application to...",
              "type": "removed"
            },
            {
              "text": "East-west traffic: Azure Firewall doesn't send a reset packet (RST) when an idle timeout occurs.",
              "type": "added"
            },
            {
              "text": "Because no reset packet is sent, the underlying connection might be removed by platform infrastructure without explicitly notifying Azure Firewall. As a result, Azure Firewall can temporarily retain the flow state even...",
              "type": "added"
            }
          ],
          "path": "articles/firewall/tcp-session-behavior.md",
          "status": "modified",
          "title": "Tcp Session Behavior"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2f1b0412765ddcaf6a157156e28ab2b3329e19a9",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "East-west traffic: Azure Firewall doesn't send a reset packet (RST) when an idle timeout occurs. This behavior can cause unexpected problems in applications. Configure a keep-alive mechanism within your application to...",
          "type": "removed"
        },
        {
          "text": "East-west traffic: Azure Firewall doesn't send a reset packet (RST) when an idle timeout occurs.",
          "type": "added"
        },
        {
          "text": "Because no reset packet is sent, the underlying connection might be removed by platform infrastructure without explicitly notifying Azure Firewall. As a result, Azure Firewall can temporarily retain the flow state even...",
          "type": "added"
        },
        {
          "text": "During this period, subsequent packets that match the existing flow might continue to be allowed until the firewall flow state expires. This can create a temporary mismatch between the actual connection state and the...",
          "type": "added"
        },
        {
          "text": "To mitigate this behavior, use application-level TCP keep-alives and implement retry logic to ensure connections are re-established after idle timeouts.",
          "type": "added"
        }
      ],
      "message": "firewall: add east-west flow state retention behavior to tcp-session-behavior",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/tcp-session-behavior",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "2f1b0412765ddcaf6a157156e28ab2b3329e19a9",
      "short_sha": "2f1b041",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 7,
        "deletions": 1,
        "total": 8
      },
      "summary": "Azure Firewall: adds \"Because no reset packet is sent, the underlying connection might be removed by platform infrastructure without explicitly notifying Azure Firewall. As a result, Azure Firewall can temporarily retain the flow state even...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2f1b0412765ddcaf6a157156e28ab2b3329e19a9"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-16T15:24:56Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-gateway-v2-migrate",
          "meaningful_changes": [
            {
              "text": "Azure Kubernetes Service (AKS) managed NAT gateway doesn't support StandardV2 NAT Gateway deployment. To use a StandardV2 NAT gateway with AKS, StandardV2 NAT Gateway must be deployed as user-assigned.",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/nat-gateway-v2-migrate.md",
          "status": "modified",
          "title": "Nat Gateway V2 Migrate"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:7f167006dafe22cdd289e5f0d448f1cd95834914",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Kubernetes Service (AKS) managed NAT gateway doesn't support StandardV2 NAT Gateway deployment. To use a StandardV2 NAT gateway with AKS, StandardV2 NAT Gateway must be deployed as user-assigned.",
          "type": "removed"
        }
      ],
      "message": "Update unsupported scenarios for StandardV2 NAT Gateway",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-gateway-v2-migrate",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "7f167006dafe22cdd289e5f0d448f1cd95834914",
      "short_sha": "7f16700",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 4,
        "total": 4
      },
      "summary": "NAT Gateway: removes \"Azure Kubernetes Service (AKS) managed NAT gateway doesn't support StandardV2 NAT Gateway deployment. To use a StandardV2 NAT gateway with AKS, StandardV2 NAT Gateway must be deployed as user-assigned.\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/7f167006dafe22cdd289e5f0d448f1cd95834914"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T19:25:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 10,
      "files": [
        {
          "additions": 63,
          "deletions": 31,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "zonepivotgroups: flow-log-types",
              "type": "added"
            },
            {
              "text": "Visualizing network security group flow logs with Power BI",
              "type": "removed"
            },
            {
              "text": "Visualizing flow logs with Power BI",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi.md",
          "status": "modified",
          "title": "Network Watcher Visualize NSG Flow Logs Power Bi"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure10.png",
          "status": "renamed",
          "title": "Figure10"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure11.png",
          "status": "renamed",
          "title": "Figure11"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure13.png",
          "status": "renamed",
          "title": "Figure13"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure5.png",
          "status": "renamed",
          "title": "Figure5"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure6.png",
          "status": "renamed",
          "title": "Figure6"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure7.png",
          "status": "renamed",
          "title": "Figure7"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure8.png",
          "status": "renamed",
          "title": "Figure8"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure9.png",
          "status": "renamed",
          "title": "Figure9"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/scenario.png",
          "status": "renamed",
          "title": "Scenario"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fbafab70a17b4cfc1603a9944f0566e8806872a0",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "zonepivotgroups: flow-log-types",
          "type": "added"
        },
        {
          "text": "Visualizing network security group flow logs with Power BI",
          "type": "removed"
        },
        {
          "text": "Visualizing flow logs with Power BI",
          "type": "added"
        },
        {
          "text": "::: zone pivot=\"virtual-network\"",
          "type": "added"
        },
        {
          "text": "Virtual Network flow logs allow you to view information about ingress and egress IP traffic on Virtual Networks. These flow logs show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple...",
          "type": "added"
        },
        {
          "text": "It can be difficult to gain insights into flow logging data by manually searching the log files. In this article, you learn how to visualize your most recent flow logs to learn more about traffic on your network.",
          "type": "added"
        }
      ],
      "message": "add vnet flow logs",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "fbafab70a17b4cfc1603a9944f0566e8806872a0",
      "short_sha": "fbafab7",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 63,
        "deletions": 31,
        "total": 94
      },
      "summary": "Network Watcher: adds \"Virtual Network flow logs allow you to view information about ingress and egress IP traffic on Virtual Networks. These flow logs show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fbafab70a17b4cfc1603a9944f0566e8806872a0"
    },
    {
      "author": "Brian Lehr",
      "date": "2026-04-02T20:17:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/default-outbound-access",
          "meaningful_changes": [
            {
              "text": "After March 31, 2026, new virtual networks will default to using private subnets, meaning that an explicit outbound method must be enabled in order to reach public endpoints on the internet and within Microsoft. For...",
              "type": "removed"
            },
            {
              "text": "For the API released after March 31, 2026, new virtual networks default to using private subnets, meaning that an explicit outbound method must be enabled in order to reach public endpoints on the internet and within...",
              "type": "added"
            },
            {
              "text": "With the API version released after March 31, 2026, the defaultOutboundAccess property for subnets in new VNETs will be set to \"false\" by default. This change makes subnets private by default and prevents generation of...",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/ip-services/default-outbound-access.md",
          "status": "modified",
          "title": "Default Outbound Access"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:604a31f048c1913e9c6695887fc666bad96dafee",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "After March 31, 2026, new virtual networks will default to using private subnets, meaning that an explicit outbound method must be enabled in order to reach public endpoints on the internet and within Microsoft. For...",
          "type": "removed"
        },
        {
          "text": "For the API released after March 31, 2026, new virtual networks default to using private subnets, meaning that an explicit outbound method must be enabled in order to reach public endpoints on the internet and within...",
          "type": "added"
        },
        {
          "text": "With the API version released after March 31, 2026, the defaultOutboundAccess property for subnets in new VNETs will be set to \"false\" by default. This change makes subnets private by default and prevents generation of...",
          "type": "removed"
        },
        {
          "text": "This behavior applies across all configuration methods--ARM templates, Azure portal, PowerShell, and CLI. Earlier versions of ARM templates (or tools like Terraform that can specify older versions) will continue to set...",
          "type": "removed"
        },
        {
          "text": "In the API version released after March 31, 2026, the defaultOutboundAccess property for subnets in new VNETs will be set to \"false\" by default. This change makes subnets private by default and prevents generation of...",
          "type": "added"
        }
      ],
      "message": "Revise default outbound access notes for clarity",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/default-outbound-access",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "604a31f048c1913e9c6695887fc666bad96dafee",
      "short_sha": "604a31f",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 3,
        "total": 5
      },
      "summary": "Virtual Network: adds \"In the API version released after March 31, 2026, the defaultOutboundAccess property for subnets in new VNETs will be set to \"false\" by default. This change makes subnets private by default and prevents generation of...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/604a31f048c1913e9c6695887fc666bad96dafee"
    },
    {
      "author": "Russell Rundell",
      "date": "2026-03-30T21:47:44Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/classic-retirement-faq",
          "meaningful_changes": [
            {
              "text": "Starting August 15, 2025, Azure Front Door (classic) will no longer support Managed certificates. To avoid service disruption, either switch to Bring Your Own Certificate (BYOC) or migrate to AFD Standard and Premium...",
              "type": "removed"
            },
            {
              "text": "Starting August 15, 2025, Azure Front Door (classic) will no longer support Managed certificates. To avoid service disruption, either switch to Bring Your Own Certificate (BYOC) or migrate to AFD Standard and Premium...",
              "type": "added"
            },
            {
              "text": "If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/classic-retirement-faq.md",
          "status": "modified",
          "title": "Classic Retirement Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:751f9fdcb2aa40d167636fdeb60f8f719ba4cb5c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Starting August 15, 2025, Azure Front Door (classic) will no longer support Managed certificates. To avoid service disruption, either switch to Bring Your Own Certificate (BYOC) or migrate to AFD Standard and Premium...",
          "type": "removed"
        },
        {
          "text": "Starting August 15, 2025, Azure Front Door (classic) will no longer support Managed certificates. To avoid service disruption, either switch to Bring Your Own Certificate (BYOC) or migrate to AFD Standard and Premium...",
          "type": "added"
        },
        {
          "text": "If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...",
          "type": "added"
        }
      ],
      "message": "CSS-Networking: AFD - add note re migration with expired certs",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/classic-retirement-faq",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 80,
      "sha": "751f9fdcb2aa40d167636fdeb60f8f719ba4cb5c",
      "short_sha": "751f9fd",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 1,
        "total": 3
      },
      "summary": "Front Door: adds \"Starting August 15, 2025, Azure Front Door (classic) will no longer support Managed certificates. To avoid service disruption, either switch to Bring Your Own Certificate (BYOC) or migrate to AFD Standard and Premium...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/751f9fdcb2aa40d167636fdeb60f8f719ba4cb5c"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-14T06:28:02Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/whats-new",
          "meaningful_changes": [
            {
              "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
              "type": "removed"
            },
            {
              "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/whats-new.md",
          "status": "modified",
          "title": "Whats New"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e204edfe308bbb6fe7e5660e0599c22b1e76654c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
          "type": "removed"
        },
        {
          "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314680 from raboilla/patch-54",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/whats-new",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 78,
      "sha": "e204edfe308bbb6fe7e5660e0599c22b1e76654c",
      "short_sha": "e204edf",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "VPN Gateway: adds \"Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e204edfe308bbb6fe7e5660e0599c22b1e76654c"
    },
    {
      "author": "Ramya Boilla",
      "date": "2026-04-14T05:35:45Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/basic-public-ip-migrate-howto",
          "meaningful_changes": [
            {
              "text": "This article helps you migrate a Basic SKU public IP address to a Standard SKU for VPN Gateway deployments that use gateway SKUs VpnGw 1-5. For more information about Basic SKU public IP address migration, see About...",
              "type": "removed"
            },
            {
              "text": "This article helps you migrate a Basic SKU public IP address to a Standard SKU for VPN Gateway deployments that use gateway SKUs VpnGw 1-5 including legacy SKU's like High-Performance and Standard SKU. For more...",
              "type": "added"
            },
            {
              "text": "Basic SKU public IP address migration for VPN Gateway is currently Generally Available for Active-Passive with some limitations (see known issues). ; For Active-Active Gateways this is in Preview.",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/basic-public-ip-migrate-howto.md",
          "status": "modified",
          "title": "Basic Public Ip Migrate Howto"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:07486fed30a9016b632734a453ce1f12ec436c73",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "This article helps you migrate a Basic SKU public IP address to a Standard SKU for VPN Gateway deployments that use gateway SKUs VpnGw 1-5. For more information about Basic SKU public IP address migration, see About...",
          "type": "removed"
        },
        {
          "text": "This article helps you migrate a Basic SKU public IP address to a Standard SKU for VPN Gateway deployments that use gateway SKUs VpnGw 1-5 including legacy SKU's like High-Performance and Standard SKU. For more...",
          "type": "added"
        },
        {
          "text": "Basic SKU public IP address migration for VPN Gateway is currently Generally Available for Active-Passive with some limitations (see known issues). ; For Active-Active Gateways this is in Preview.",
          "type": "removed"
        },
        {
          "text": "Basic SKU public IP address migration for VPN Gateway is currently Generally Available for Active-Passive and Active-Active scenarios. ;",
          "type": "added"
        },
        {
          "text": "Migration functionality is rolling out to regions. If you don't see the Migrate tab in the Azure portal, it means that the migration process isn't available yet in your region. For more information, see the VPN Gateway...",
          "type": "removed"
        }
      ],
      "message": "GA for A-A :Clarify Basic SKU public IP migration details",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/basic-public-ip-migrate-howto",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 78,
      "sha": "07486fed30a9016b632734a453ce1f12ec436c73",
      "short_sha": "07486fe",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 4,
        "total": 6
      },
      "summary": "VPN Gateway: adds \"Basic SKU public IP address migration for VPN Gateway is currently Generally Available for Active-Passive and Active-Active scenarios. ;\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/07486fed30a9016b632734a453ce1f12ec436c73"
    },
    {
      "author": "Ramya Boilla",
      "date": "2026-04-14T05:30:31Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/whats-new",
          "meaningful_changes": [
            {
              "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
              "type": "removed"
            },
            {
              "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/whats-new.md",
          "status": "modified",
          "title": "Whats New"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:223c936d2583571efc52f89295568231bee6e001",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
          "type": "removed"
        },
        {
          "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
          "type": "added"
        }
      ],
      "message": "Updated A-A:Revise timelines for VPN Gateway IP migration events",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/whats-new",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 78,
      "sha": "223c936d2583571efc52f89295568231bee6e001",
      "short_sha": "223c936",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "VPN Gateway: adds \"Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/223c936d2583571efc52f89295568231bee6e001"
    },
    {
      "author": "Ramya Boilla",
      "date": "2026-04-09T16:26:51Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/basic-public-ip-migrate-about",
          "meaningful_changes": [
            {
              "text": "For VPN Gateway SKUs VpnGw1-5:",
              "type": "removed"
            },
            {
              "text": "For VPN Gateway SKUs VpnGw1-5 and Legacy SKU's which include High-Performance SKU and Standard SKU:",
              "type": "added"
            },
            {
              "text": "No, you can't create a Basic SKU VPN gateway with a Basic SKU public IP address after June 2025. New Basic SKU VPN gateways require a Standard public IP address SKU.",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/basic-public-ip-migrate-about.md",
          "status": "modified",
          "title": "Basic Public Ip Migrate About"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:7081f6bec27ac61aae67f6bb4917d216ca162325",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For VPN Gateway SKUs VpnGw1-5:",
          "type": "removed"
        },
        {
          "text": "For VPN Gateway SKUs VpnGw1-5 and Legacy SKU's which include High-Performance SKU and Standard SKU:",
          "type": "added"
        },
        {
          "text": "No, you can't create a Basic SKU VPN gateway with a Basic SKU public IP address after June 2025. New Basic SKU VPN gateways require a Standard public IP address SKU.",
          "type": "removed"
        },
        {
          "text": "No, you can't create a Basic SKU VPN gateway with a Basic SKU public IP address. New Basic SKU VPN gateways require a Standard public IP address SKU.",
          "type": "added"
        }
      ],
      "message": "Added legacy SKU info-Update VPN gateway migration details and requirements",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/basic-public-ip-migrate-about",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 78,
      "sha": "7081f6bec27ac61aae67f6bb4917d216ca162325",
      "short_sha": "7081f6b",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "VPN Gateway: adds \"No, you can't create a Basic SKU VPN gateway with a Basic SKU public IP address. New Basic SKU VPN gateways require a Standard public IP address SKU.\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/7081f6bec27ac61aae67f6bb4917d216ca162325"
    },
    {
      "author": "Suren Jamiyanaa",
      "date": "2026-04-27T19:19:29Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 18,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/firewall/fqdn-tags",
          "meaningful_changes": [
            {
              "text": "FQDN tag port behavior",
              "type": "added"
            },
            {
              "text": "When using an FQDN tag in an Azure Firewall application rule, traffic may be allowed over both HTTPS (port 443) and HTTP (port 80), even if the rule specifies only https:443. This is expected because FQDN tags map to...",
              "type": "added"
            },
            {
              "text": "Even with https:443 configured, HTTP (port 80) traffic may be allowed.",
              "type": "added"
            }
          ],
          "path": "articles/firewall/fqdn-tags.md",
          "status": "modified",
          "title": "Fqdn Tags"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:8190b423118f465b0c4a17563696acbd635ba8d4",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "FQDN tag port behavior",
          "type": "added"
        },
        {
          "text": "When using an FQDN tag in an Azure Firewall application rule, traffic may be allowed over both HTTPS (port 443) and HTTP (port 80), even if the rule specifies only https:443. This is expected because FQDN tags map to...",
          "type": "added"
        },
        {
          "text": "Even with https:443 configured, HTTP (port 80) traffic may be allowed.",
          "type": "added"
        },
        {
          "text": "This behavior applies only to FQDN tag rules. Custom FQDN rules enforce the specified protocol and port.",
          "type": "added"
        },
        {
          "text": "FQDN tag | Protocol configured | May also allow",
          "type": "added"
        },
        {
          "text": "WindowsUpdate | HTTPS:443 | HTTP:80 \u2014 this is expected behavior, not a misconfiguration.",
          "type": "added"
        }
      ],
      "message": "firewall: add FQDN tag port behavior section to fqdn-tags doc",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/fqdn-tags",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 76,
      "sha": "8190b423118f465b0c4a17563696acbd635ba8d4",
      "short_sha": "8190b42",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 18,
        "deletions": 0,
        "total": 18
      },
      "summary": "Azure Firewall: adds \"When using an FQDN tag in an Azure Firewall application rule, traffic may be allowed over both HTTPS (port 443) and HTTP (port 80), even if the rule specifies only https:443. This is expected because FQDN tags map to...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/8190b423118f465b0c4a17563696acbd635ba8d4"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-27T16:23:38Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 12,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/application-gateway-for-containers-components",
          "meaningful_changes": [
            {
              "text": "Network Security Groups on the association subnet",
              "type": "added"
            },
            {
              "text": "For associations created on or after April 23, 2026, Network Security Groups (NSGs) are fully supported on the Application Gateway for Containers association subnet. This includes both inbound and outbound rules.",
              "type": "added"
            },
            {
              "text": "For associations created before April 23, 2026, inbound NSG rules can be configured; however, inbound traffic on ports 80 and 443 is always allowed, regardless of the configured rules.",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/application-gateway-for-containers-components.md",
          "status": "modified",
          "title": "Application Gateway For Containers Components"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:366bf94857e689c705c922681e9dce99c6f572c7",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Network Security Groups on the association subnet",
          "type": "added"
        },
        {
          "text": "For associations created on or after April 23, 2026, Network Security Groups (NSGs) are fully supported on the Application Gateway for Containers association subnet. This includes both inbound and outbound rules.",
          "type": "added"
        },
        {
          "text": "For associations created before April 23, 2026, inbound NSG rules can be configured; however, inbound traffic on ports 80 and 443 is always allowed, regardless of the configured rules.",
          "type": "added"
        },
        {
          "text": "\"Deny all\" rules are supported on the association subnet, with the following considerations:",
          "type": "added"
        },
        {
          "text": "Deny all inbound rules will block traffic on ports 80 and 443, preventing access to the frontend.",
          "type": "added"
        },
        {
          "text": "Deny all outbound rules may block traffic egressing from the proxy to the AKS cluster.",
          "type": "added"
        }
      ],
      "message": "NSG support",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/application-gateway-for-containers-components",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 76,
      "sha": "366bf94857e689c705c922681e9dce99c6f572c7",
      "short_sha": "366bf94",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 12,
        "deletions": 1,
        "total": 13
      },
      "summary": "Application Gateway: adds \"For associations created on or after April 23, 2026, Network Security Groups (NSGs) are fully supported on the Application Gateway for Containers association subnet. This includes both inbound and outbound rules.\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/366bf94857e689c705c922681e9dce99c6f572c7"
    },
    {
      "author": "Srijan Chakraborty",
      "date": "2026-04-13T09:11:54Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
          "meaningful_changes": [
            {
              "text": "The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
              "type": "removed"
            },
            {
              "text": "The rules impact analyzer enables you to preview the impact of security admin rules and network security group (NSG) rules before applying them to your environment. This feature helps you validate rule behavior...",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-rule-impact-analyzer.md",
          "status": "modified",
          "title": "Traffic Analytics Rule Impact Analyzer"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:9bf7d41ccca33148ebffe63d23a0f1bfd321c177",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
          "type": "removed"
        },
        {
          "text": "The rules impact analyzer enables you to preview the impact of security admin rules and network security group (NSG) rules before applying them to your environment. This feature helps you validate rule behavior...",
          "type": "added"
        }
      ],
      "message": "Clarify rules impact analyzer description with NSG",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 76,
      "sha": "9bf7d41ccca33148ebffe63d23a0f1bfd321c177",
      "short_sha": "9bf7d41",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Network Watcher: adds \"The rules impact analyzer enables you to preview the impact of security admin rules and network security group (NSG) rules before applying them to your environment. This feature helps you validate rule behavior...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9bf7d41ccca33148ebffe63d23a0f1bfd321c177"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-16T19:08:35Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 8,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/tutorial-migrate-outbound-nat",
          "meaningful_changes": [
            {
              "text": "For default outbound access replacement, StandardV2 NAT Gateway is deployed in the tutorial to ensure that you are using the zone-redundant version of NAT gateway (Standard SKU NAT Gateway is zonal). See StandardV2 NAT...",
              "type": "added"
            },
            {
              "text": "For the Load balancer outbound rule replacement, Standard SKU NAT Gateway is deployed in this tutorial and the frontend IP of the Load balancer is moved to the Standard NAT Gateway. StandardV2 NAT Gateway can be used...",
              "type": "added"
            },
            {
              "text": "SKU | Select Standard.",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/tutorial-migrate-outbound-nat.md",
          "status": "modified",
          "title": "Tutorial Migrate Outbound Nat"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:13da9a46357e2ee9e1ed7e4dd7ba93534cdd7bb8",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For default outbound access replacement, StandardV2 NAT Gateway is deployed in the tutorial to ensure that you are using the zone-redundant version of NAT gateway (Standard SKU NAT Gateway is zonal). See StandardV2 NAT...",
          "type": "added"
        },
        {
          "text": "For the Load balancer outbound rule replacement, Standard SKU NAT Gateway is deployed in this tutorial and the frontend IP of the Load balancer is moved to the Standard NAT Gateway. StandardV2 NAT Gateway can be used...",
          "type": "added"
        },
        {
          "text": "SKU | Select Standard.",
          "type": "removed"
        },
        {
          "text": "Availability zone | Select Zone-redundant.",
          "type": "removed"
        },
        {
          "text": "SKU | Select StandardV2.",
          "type": "added"
        },
        {
          "text": "SKU | Select Standard.",
          "type": "removed"
        }
      ],
      "message": "Migrate tutorial to StandardV2 NAT Gateway",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/tutorial-migrate-outbound-nat",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Operational or migration guidance",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 74,
      "sha": "13da9a46357e2ee9e1ed7e4dd7ba93534cdd7bb8",
      "short_sha": "13da9a4",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 8,
        "deletions": 3,
        "total": 11
      },
      "summary": "NAT Gateway: adds \"For default outbound access replacement, StandardV2 NAT Gateway is deployed in the tutorial to ensure that you are using the zone-redundant version of NAT gateway (Standard SKU NAT Gateway is zonal). See StandardV2 NAT...\".",
      "tier": "click",
      "tier_label": "Click now",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/13da9a46357e2ee9e1ed7e4dd7ba93534cdd7bb8"
    },
    {
      "author": "Jessie",
      "date": "2026-04-29T02:49:53Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 70,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Effective April 14, 2026, existing managed certificates will be retired.",
              "type": "removed"
            },
            {
              "text": "Effective April 14, 2026, existing managed certificates are retired. All existing managed certificates have been either migrated by customer or AFD team to Azure Front Door standard or premium. Please use Azure Front...",
              "type": "added"
            },
            {
              "text": "What actions should I take to avoid service disruption?",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:beab3f4f6c0d714ba419b81e40f3856393e62b77",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Effective April 14, 2026, existing managed certificates will be retired.",
          "type": "removed"
        },
        {
          "text": "Effective April 14, 2026, existing managed certificates are retired. All existing managed certificates have been either migrated by customer or AFD team to Azure Front Door standard or premium. Please use Azure Front...",
          "type": "added"
        },
        {
          "text": "What actions should I take to avoid service disruption?",
          "type": "removed"
        },
        {
          "text": "Microsoft will automatically migrate eligible profiles on a \"best effort\" basis to Azure Front Door Standard/Premium between April 10 and April 14, 2026, unless you notify us otherwise. Classic and Azure Front Door...",
          "type": "removed"
        },
        {
          "text": "If you plan to migrate to Azure Front Door Standard/Premium or switch to BYOC yourself, please notify Microsoft by April 9, 2026 by setting the required feature flag, see instructions below.",
          "type": "removed"
        },
        {
          "text": "You can check the auto-migration eligibility by following the migration steps. If step 1 Validate compatibility succeeds, your profile is eligible. If you proceed with auto\u2011migration, monitor your email for final...",
          "type": "removed"
        }
      ],
      "message": "Revise Azure Front Door and CDN FAQ on migration",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Operational or migration guidance",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 72,
      "sha": "beab3f4f6c0d714ba419b81e40f3856393e62b77",
      "short_sha": "beab3f4",
      "signal": "Removal or deprecation",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 70,
        "total": 72
      },
      "summary": "Front Door: adds \"Effective April 14, 2026, existing managed certificates are retired. All existing managed certificates have been either migrated by customer or AFD team to Azure Front Door standard or premium. Please use Azure Front...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/beab3f4f6c0d714ba419b81e40f3856393e62b77"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T21:10:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 5,
      "files": [
        {
          "additions": 23,
          "deletions": 25,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "Visualizing flow logs with Power BI",
              "type": "removed"
            },
            {
              "text": "Visualize flow logs with Power BI",
              "type": "added"
            },
            {
              "text": "The following bar chart shows the Flow by NSG and Rule. With this information, you can see the NSGs responsible for the most traffic, and the breakdown of traffic on an NSG by rule.",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi.md",
          "status": "modified",
          "title": "Network Watcher Visualize NSG Flow Logs Power Bi"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure11.png",
          "status": "removed",
          "title": "Figure11"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/figure13.png",
          "status": "removed",
          "title": "Figure13"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/flows-rule1.png",
          "status": "added",
          "title": "Flows Rule1"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/flows-rule2.png",
          "status": "renamed",
          "title": "Flows Rule2"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f90964f9e03219df986149233b3fe2655dc81283",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Visualizing flow logs with Power BI",
          "type": "removed"
        },
        {
          "text": "Visualize flow logs with Power BI",
          "type": "added"
        },
        {
          "text": "The following bar chart shows the Flow by NSG and Rule. With this information, you can see the NSGs responsible for the most traffic, and the breakdown of traffic on an NSG by rule.",
          "type": "removed"
        },
        {
          "text": "The following informational charts display information about the NSGs present in the logs, the number of Flows captured over the period, and the date of the earliest log captured. This information gives you an idea of...",
          "type": "removed"
        },
        {
          "text": "::: zone pivot=\"virtual-network\"",
          "type": "added"
        },
        {
          "text": "The following bar chart shows the flow by virtual network and rule. With this information, you can see the virtual networks responsible for the most traffic, and the breakdown of traffic on a VNet by rule.",
          "type": "added"
        }
      ],
      "message": "graphs",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 72,
      "sha": "f90964f9e03219df986149233b3fe2655dc81283",
      "short_sha": "f90964f",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 23,
        "deletions": 25,
        "total": 48
      },
      "summary": "Network Watcher: adds \"The following bar chart shows the flow by virtual network and rule. With this information, you can see the virtual networks responsible for the most traffic, and the breakdown of traffic on a VNet by rule.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f90964f9e03219df986149233b3fe2655dc81283"
    },
    {
      "author": "halkazwini",
      "date": "2026-03-31T21:43:52Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/classic-retirement-faq",
          "meaningful_changes": [
            {
              "text": "If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...",
              "type": "removed"
            },
            {
              "text": "If you migrate to Azure Front Door Standard or Premium after your managed certificates have already expired, then after migration, the certificates will change to Pending Revalidation state or start to rotate after 1-2...",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/classic-retirement-faq.md",
          "status": "modified",
          "title": "Classic Retirement Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f6d073010f3a4d5a1da8378b4f17dc6a053de14c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...",
          "type": "removed"
        },
        {
          "text": "If you migrate to Azure Front Door Standard or Premium after your managed certificates have already expired, then after migration, the certificates will change to Pending Revalidation state or start to rotate after 1-2...",
          "type": "added"
        }
      ],
      "message": "managed certificates",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/classic-retirement-faq",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Operational or migration guidance",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 72,
      "sha": "f6d073010f3a4d5a1da8378b4f17dc6a053de14c",
      "short_sha": "f6d0730",
      "signal": "Removal or deprecation",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Front Door: adds \"If you migrate to Azure Front Door Standard or Premium after your managed certificates have already expired, then after migration, the certificates will change to Pending Revalidation state or start to rotate after 1-2...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f6d073010f3a4d5a1da8378b4f17dc6a053de14c"
    },
    {
      "author": "Russell Rundell",
      "date": "2026-03-30T22:11:06Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/classic-retirement-faq",
          "meaningful_changes": [
            {
              "text": "If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...",
              "type": "removed"
            },
            {
              "text": "If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/classic-retirement-faq.md",
          "status": "modified",
          "title": "Classic Retirement Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:84137cd1616d63fa251678ab983a9d24f8fcfc93",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...",
          "type": "removed"
        },
        {
          "text": "If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...",
          "type": "added"
        }
      ],
      "message": "line 23 updated link",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/classic-retirement-faq",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Operational or migration guidance",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 72,
      "sha": "84137cd1616d63fa251678ab983a9d24f8fcfc93",
      "short_sha": "84137cd",
      "signal": "Removal or deprecation",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Front Door: adds \"If you migrate to AFD Standard and Premium after your managed certificates have already expired, then after migration the certificates will change to \"Pending Revalidation\" state or start to rotate after 1-2 days...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/84137cd1616d63fa251678ab983a9d24f8fcfc93"
    },
    {
      "author": "Ramya Boilla",
      "date": "2026-04-28T23:35:23Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 8,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/point-to-site-certificate-gateway",
          "meaningful_changes": [
            {
              "text": "For non\u2011AZ gateway SKUs, the third Public IP used for P2S is Microsoft\u2011managed and not billed to the customer. ;",
              "type": "added"
            },
            {
              "text": "When migrating to an AZ\u2011supported SKU using the migration tool, the platform requires the third Public IP to be created within the customer\u2019s subscription. This Public IP becomes customer\u2011managed and billable, as it is...",
              "type": "added"
            },
            {
              "text": "This behavior is expected by design and ensures proper load balancing and redundancy for P2S connections on AZ\u2011redundant gateways.",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/point-to-site-certificate-gateway.md",
          "status": "modified",
          "title": "Point To Site Certificate Gateway"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:06bfdcbd4c2a05a3b72f0d7ee4ec80a475489c40",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For non\u2011AZ gateway SKUs, the third Public IP used for P2S is Microsoft\u2011managed and not billed to the customer. ;",
          "type": "added"
        },
        {
          "text": "When migrating to an AZ\u2011supported SKU using the migration tool, the platform requires the third Public IP to be created within the customer\u2019s subscription. This Public IP becomes customer\u2011managed and billable, as it is...",
          "type": "added"
        },
        {
          "text": "This behavior is expected by design and ensures proper load balancing and redundancy for P2S connections on AZ\u2011redundant gateways.",
          "type": "added"
        }
      ],
      "message": "AZ-SKU info: Add important notes on Public IP for P2S gateways",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/point-to-site-certificate-gateway",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 70,
      "sha": "06bfdcbd4c2a05a3b72f0d7ee4ec80a475489c40",
      "short_sha": "06bfdcb",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 8,
        "deletions": 0,
        "total": 8
      },
      "summary": "VPN Gateway: adds \"This behavior is expected by design and ensures proper load balancing and redundancy for P2S connections on AZ\u2011redundant gateways.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/06bfdcbd4c2a05a3b72f0d7ee4ec80a475489c40"
    },
    {
      "author": "Ramya Boilla",
      "date": "2026-04-23T22:22:16Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 25,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/basic-public-ip-migrate-about",
          "meaningful_changes": [
            {
              "text": "How long can I wait before committing my migration changes?",
              "type": "added"
            },
            {
              "text": "Migration validation is usually completed within a short timeframe. Customers are advised to complete validation and commit migration changes within a few days, as leaving migrations pending for extended periods is not...",
              "type": "added"
            },
            {
              "text": "Will migrating the VPN Gateway impact ExpressRoute traffic in a co\u2011existing setup?",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/basic-public-ip-migrate-about.md",
          "status": "modified",
          "title": "Basic Public Ip Migrate About"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:7688d887cfc08aadca595930fc1da38f89d59614",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "How long can I wait before committing my migration changes?",
          "type": "added"
        },
        {
          "text": "Migration validation is usually completed within a short timeframe. Customers are advised to complete validation and commit migration changes within a few days, as leaving migrations pending for extended periods is not...",
          "type": "added"
        },
        {
          "text": "Will migrating the VPN Gateway impact ExpressRoute traffic in a co\u2011existing setup?",
          "type": "added"
        },
        {
          "text": "No. When following the recommended migration order, migrating the VPN Gateway first does not migrate, disrupt, or impact ExpressRoute traffic. ExpressRoute connectivity remains unaffected during the VPN Gateway...",
          "type": "added"
        },
        {
          "text": "Active-Active VpnGw1-5 Gateway SKU",
          "type": "added"
        },
        {
          "text": "How does migration behave for an Active\u2011Active VPN Gateway using a Basic Public IP? Does it cause a full gateway outage?",
          "type": "added"
        }
      ],
      "message": "Update migration FAQ section in VPN Gateway documentation",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/basic-public-ip-migrate-about",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 70,
      "sha": "7688d887cfc08aadca595930fc1da38f89d59614",
      "short_sha": "7688d88",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 25,
        "deletions": 1,
        "total": 26
      },
      "summary": "VPN Gateway: adds \"No. When following the recommended migration order, migrating the VPN Gateway first does not migrate, disrupt, or impact ExpressRoute traffic. ExpressRoute connectivity remains unaffected during the VPN Gateway...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/7688d887cfc08aadca595930fc1da38f89d59614"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:55:21Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 97,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/api-specification-kubernetes",
          "meaningful_changes": [
            {
              "text": "Gateway API alpha2.NamespacedPolicyTargetReference",
              "type": "removed"
            },
            {
              "text": "Gateway API .NamespacedPolicyTargetReference",
              "type": "added"
            },
            {
              "text": "( Appears on: LoadBalancingConfig )",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/api-specification-kubernetes.md",
          "status": "modified",
          "title": "API Specification Kubernetes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d853ba2e6fd0f31485413398d17362a4eb1fad30",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Gateway API alpha2.NamespacedPolicyTargetReference",
          "type": "removed"
        },
        {
          "text": "Gateway API .NamespacedPolicyTargetReference",
          "type": "added"
        },
        {
          "text": "( Appears on: LoadBalancingConfig )",
          "type": "added"
        },
        {
          "text": "LoadAwareConfig defines the configuration for load aware routing.",
          "type": "added"
        },
        {
          "text": "Kubernetes meta/v1.Duration",
          "type": "added"
        },
        {
          "text": "An endpoint must report load metrics continuously for at least this long before the endpoint",
          "type": "added"
        }
      ],
      "message": "Update article date and add routing configuration details",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/api-specification-kubernetes",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 70,
      "sha": "d853ba2e6fd0f31485413398d17362a4eb1fad30",
      "short_sha": "d853ba2",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 97,
        "deletions": 2,
        "total": 99
      },
      "summary": "Application Gateway: adds \"An endpoint must report load metrics continuously for at least this long before the endpoint\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d853ba2e6fd0f31485413398d17362a4eb1fad30"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-10T23:23:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/gateway-sku-consolidation",
          "meaningful_changes": [
            {
              "text": "The existing gateway SKUs are supported until they're migrated to the new SKUs. The old SKUs are currently scheduled for deprecation on September 16, 2026. There will be no impact to existing SKUs that are supported by...",
              "type": "removed"
            },
            {
              "text": "The existing gateway SKUs are supported until they're migrated to the new SKUs. The old SKUs are currently scheduled for deprecation after September, 2026. There will be no impact to existing SKUs that are supported by...",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/gateway-sku-consolidation.md",
          "status": "modified",
          "title": "Gateway Sku Consolidation"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e1540d357b0a6c0afe47fc88d2d1182a2370b55e",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "The existing gateway SKUs are supported until they're migrated to the new SKUs. The old SKUs are currently scheduled for deprecation on September 16, 2026. There will be no impact to existing SKUs that are supported by...",
          "type": "removed"
        },
        {
          "text": "The existing gateway SKUs are supported until they're migrated to the new SKUs. The old SKUs are currently scheduled for deprecation after September, 2026. There will be no impact to existing SKUs that are supported by...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313699 from aybatra/patch-59",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/gateway-sku-consolidation",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 70,
      "sha": "e1540d357b0a6c0afe47fc88d2d1182a2370b55e",
      "short_sha": "e1540d3",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "VPN Gateway: adds \"The existing gateway SKUs are supported until they're migrated to the new SKUs. The old SKUs are currently scheduled for deprecation after September, 2026. There will be no impact to existing SKUs that are supported by...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e1540d357b0a6c0afe47fc88d2d1182a2370b55e"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T22:01:19Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 5,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Does AFD provide telemetry to show which rules engine rule AFD processes for each request?",
              "type": "removed"
            },
            {
              "text": "Does Front Door provide telemetry to show which rules engine rule Front Door processes for each request?",
              "type": "added"
            },
            {
              "text": "Azure Front Door resources cannot be disabled. They can only be deleted. Variable meters like Data Transfer Out, Data Transfer In and Requests are not charged when there is no traffic but base fee is charged even if...",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d7a481deab005940e55134aed75c21a1cb71aca0",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Does AFD provide telemetry to show which rules engine rule AFD processes for each request?",
          "type": "removed"
        },
        {
          "text": "Does Front Door provide telemetry to show which rules engine rule Front Door processes for each request?",
          "type": "added"
        },
        {
          "text": "Azure Front Door resources cannot be disabled. They can only be deleted. Variable meters like Data Transfer Out, Data Transfer In and Requests are not charged when there is no traffic but base fee is charged even if...",
          "type": "removed"
        },
        {
          "text": "Azure Front Door resources cannot be disabled. They can only be deleted. Variable meters like Data Transfer Out, Data Transfer In and Requests are not charged when there is no traffic but base fee is charged even if...",
          "type": "added"
        },
        {
          "text": "AFD does not support dynamic compression for content greater than 8 MB. However, if the content has been already compressed by the origin, Front Door supports serving static compressed content over 8 MB as long as...",
          "type": "removed"
        },
        {
          "text": "Front Door does not support dynamic compression for content greater than 8 MB. However, if the content has been already compressed by the origin, Front Door supports serving static compressed content over 8 MB as long...",
          "type": "added"
        }
      ],
      "message": "remove AFD",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 70,
      "sha": "d7a481deab005940e55134aed75c21a1cb71aca0",
      "short_sha": "d7a481d",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 5,
        "total": 10
      },
      "summary": "Front Door: adds \"Azure Front Door resources cannot be disabled. They can only be deleted. Variable meters like Data Transfer Out, Data Transfer In and Requests are not charged when there is no traffic but base fee is charged even if...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d7a481deab005940e55134aed75c21a1cb71aca0"
    },
    {
      "author": "Vyshnavi-MSFT",
      "date": "2026-04-29T18:15:50Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 6,
      "files": [
        {
          "additions": 108,
          "deletions": 58,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/mutual-authentication-overview",
          "meaningful_changes": [
            {
              "text": "Mutual authentication, or client authentication, allows for the Application Gateway to authenticate the client sending requests. Usually, only the client is authenticating the Application Gateway; mutual authentication...",
              "type": "removed"
            },
            {
              "text": "Mutual authentication, or client authentication, allows Application Gateway to authenticate the client sending requests. Usually, only the client authenticates the Application Gateway. Mutual authentication allows both...",
              "type": "added"
            },
            {
              "text": "We recommend using TLS 1.2 with mutual authentication as TLS 1.2 will be mandated in the future.",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/mutual-authentication-overview.md",
          "status": "modified",
          "title": "Mutual Authentication Overview"
        },
        {
          "additions": 88,
          "deletions": 56,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/mutual-authentication-arm-template",
          "meaningful_changes": [
            {
              "text": "This quickstart shows how to deploy an Azure Application Gateway with mutual TLS (mTLS) passthrough using an ARM template and API version 2025-03-01. In passthrough mode, the gateway requests a client certificate but...",
              "type": "removed"
            },
            {
              "text": "This quickstart shows you how to deploy an Azure Application Gateway with mutual TLS (mTLS) passthrough using an Azure Resource Manager template (ARM template) and API version 2025-03-01. In passthrough mode, the...",
              "type": "added"
            },
            {
              "text": "No client CA certificate required at the gateway.",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/mutual-authentication-arm-template.md",
          "status": "modified",
          "title": "Mutual Authentication Arm Template"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/media/mutual-authentication-arm-template/create-ssl-profile-passthrough.png",
          "status": "added",
          "title": "Create Ssl Profile Passthrough"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/media/mutual-authentication-arm-template/mtls-passthrough.png",
          "status": "added",
          "title": "Mtls Passthrough"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/media/mutual-authentication-portal/create-ssl-profile-passthrough.png",
          "status": "added",
          "title": "Create Ssl Profile Passthrough"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/media/mutual-authentication-portal/mtls-passthrough.png",
          "status": "added",
          "title": "Mtls Passthrough"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0e2b308f955b6f6f78018adc1d27ea04cc8b5d9a",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "This quickstart shows how to deploy an Azure Application Gateway with mutual TLS (mTLS) passthrough using an ARM template and API version 2025-03-01. In passthrough mode, the gateway requests a client certificate but...",
          "type": "removed"
        },
        {
          "text": "This quickstart shows you how to deploy an Azure Application Gateway with mutual TLS (mTLS) passthrough using an Azure Resource Manager template (ARM template) and API version 2025-03-01. In passthrough mode, the...",
          "type": "added"
        },
        {
          "text": "No client CA certificate required at the gateway.",
          "type": "removed"
        },
        {
          "text": "verifyClientAuthMode supports Strict and Passthrough.",
          "type": "removed"
        },
        {
          "text": "No client CA certificate is required at the gateway.",
          "type": "added"
        },
        {
          "text": "The verifyClientAuthMode property supports Strict and Passthrough values.",
          "type": "added"
        },
        {
          "text": "Mutual authentication, or client authentication, allows for the Application Gateway to authenticate the client sending requests. Usually, only the client is authenticating the Application Gateway; mutual authentication...",
          "type": "removed"
        },
        {
          "text": "Mutual authentication, or client authentication, allows Application Gateway to authenticate the client sending requests. Usually, only the client authenticates the Application Gateway. Mutual authentication allows both...",
          "type": "added"
        },
        {
          "text": "We recommend using TLS 1.2 with mutual authentication as TLS 1.2 will be mandated in the future.",
          "type": "removed"
        },
        {
          "text": "We recommend using TLS 1.2 with mutual authentication because TLS 1.2 will be mandated in the future.",
          "type": "added"
        }
      ],
      "message": "Updated ms.learn docs with mtls passthrough portal updates",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/mutual-authentication-overview",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 68,
      "sha": "0e2b308f955b6f6f78018adc1d27ea04cc8b5d9a",
      "short_sha": "0e2b308",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 196,
        "deletions": 114,
        "total": 310
      },
      "summary": "Application Gateway: adds \"This quickstart shows you how to deploy an Azure Application Gateway with mutual TLS (mTLS) passthrough using an Azure Resource Manager template (ARM template) and API version 2025-03-01. In passthrough mode, the...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0e2b308f955b6f6f78018adc1d27ea04cc8b5d9a"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-13T20:14:14Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 9,
          "deletions": 9,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
          "meaningful_changes": [
            {
              "text": "Dual stacking. Azure virtual networks support dual stacking. A network that supports dual stacking can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an...",
              "type": "removed"
            },
            {
              "text": "Dual-stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...",
              "type": "added"
            },
            {
              "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/ipv6-ip-planning.md",
          "status": "modified",
          "title": "Ipv6 Ip Planning"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:b292dd612f40bd04228d1269e7efb0d096843702",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Dual stacking. Azure virtual networks support dual stacking. A network that supports dual stacking can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an...",
          "type": "removed"
        },
        {
          "text": "Dual-stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...",
          "type": "added"
        },
        {
          "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
          "type": "removed"
        },
        {
          "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
          "type": "added"
        },
        {
          "text": "Global addresses: Global addresses are public IP addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6 addresses...",
          "type": "removed"
        },
        {
          "text": "Global unicast addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #15574 from nleut/main",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term",
        "Architecture guidance is useful context, not urgent product change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 68,
      "sha": "b292dd612f40bd04228d1269e7efb0d096843702",
      "short_sha": "b292dd6",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 9,
        "deletions": 9,
        "total": 18
      },
      "summary": "Architecture Center: adds \"Dual-stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/b292dd612f40bd04228d1269e7efb0d096843702"
    },
    {
      "author": "mbender-ms",
      "date": "2026-04-13T16:20:29Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 21,
      "files": [
        {
          "additions": 0,
          "deletions": 125,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-troubleshoot-health-event-logs",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure Load Balancer",
              "type": "removed"
            },
            {
              "text": "Troubleshoot load balancer health event logs",
              "type": "removed"
            },
            {
              "text": "In this article, you learn how to troubleshoot common health event logs for Azure Load Balancer. It covers many common health event logs that you can encounter when using Azure Load Balancer.",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/load-balancer-troubleshoot-health-event-logs.md",
          "status": "removed",
          "title": "Load Balancer Troubleshoot Health Event Logs"
        },
        {
          "additions": 0,
          "deletions": 118,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-troubleshoot-backend-traffic",
          "meaningful_changes": [
            {
              "text": "manager: dcscontentpm",
              "type": "removed"
            },
            {
              "text": "Troubleshoot Azure Load Balancer backend traffic responses",
              "type": "removed"
            },
            {
              "text": "This page provides troubleshooting information for Azure Load Balancer questions.",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/load-balancer-troubleshoot-backend-traffic.md",
          "status": "removed",
          "title": "Load Balancer Troubleshoot Backend Traffic"
        },
        {
          "additions": 0,
          "deletions": 104,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/troubleshoot-outbound-connection",
          "meaningful_changes": [
            {
              "text": "Troubleshoot Azure Load Balancer outbound connectivity issues",
              "type": "removed"
            },
            {
              "text": "Learn troubleshooting guidance for outbound connections in Azure Load Balancer. This includes understanding source network address translation (SNAT) and its impact on connections, using individual public IPs on VMs...",
              "type": "removed"
            },
            {
              "text": "To learn more about SNAT ports, see Source Network Address Translation for outbound connections.",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/troubleshoot-outbound-connection.md",
          "status": "removed",
          "title": "Troubleshoot Outbound Connection"
        },
        {
          "additions": 0,
          "deletions": 87,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/troubleshoot-rhc",
          "meaningful_changes": [
            {
              "text": "Troubleshoot resource health and inbound availability problems",
              "type": "removed"
            },
            {
              "text": "This article can help you investigate problems that affect the availability of your load balancer's frontend IP and backend resources.",
              "type": "removed"
            },
            {
              "text": "You can use the resource health feature in Azure Load Balancer to determine the health of your load balancer. It analyzes the Data Path Availability metric to determine whether the load-balancing endpoints, the...",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/troubleshoot-rhc.md",
          "status": "removed",
          "title": "Troubleshoot Rhc"
        },
        {
          "additions": 0,
          "deletions": 82,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-troubleshoot",
          "meaningful_changes": [
            {
              "text": "Troubleshoot Azure Load Balancer",
              "type": "removed"
            },
            {
              "text": "This article provides troubleshooting information for common questions about Azure Load Balancer (Basic and Standard tiers). For more information about Standard Load Balancer, see the Standard Load Balancer overview.",
              "type": "removed"
            },
            {
              "text": "When a load balancer's connectivity is unavailable, the most common symptoms are:",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/load-balancer-troubleshoot.md",
          "status": "removed",
          "title": "Load Balancer Troubleshoot"
        },
        {
          "additions": 0,
          "deletions": 77,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-troubleshoot-health-probe-status",
          "meaningful_changes": [
            {
              "text": "Troubleshoot Azure Load Balancer health probe status",
              "type": "removed"
            },
            {
              "text": "This page provides troubleshooting information common Azure Load Balancer health probe questions.",
              "type": "removed"
            },
            {
              "text": "Symptom: VMs behind the Load Balancer aren't responding to health probes",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/load-balancer-troubleshoot-health-probe-status.md",
          "status": "removed",
          "title": "Load Balancer Troubleshoot Health Probe Status"
        },
        {
          "additions": 64,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-support-help",
          "meaningful_changes": [
            {
              "text": "Support and troubleshooting for Azure Load Balancer",
              "type": "added"
            },
            {
              "text": "Here are suggestions for where you can get help when developing your Azure Load Balancer solutions.",
              "type": "added"
            },
            {
              "text": "Self help troubleshooting",
              "type": "added"
            }
          ],
          "path": "articles/load-balancer/load-balancer-support-help.md",
          "status": "added",
          "title": "Load Balancer Support Help"
        },
        {
          "additions": 0,
          "deletions": 45,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-common-deployment-errors",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure Load Balancer",
              "type": "removed"
            },
            {
              "text": "Troubleshoot common Azure deployment errors with Azure Load Balancer",
              "type": "removed"
            },
            {
              "text": "This article describes some common Azure Load Balancer deployment errors and provides information to resolve the errors. If you're looking for information about an error code and that information isn't provided in this...",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/load-balancer-common-deployment-errors.md",
          "status": "removed",
          "title": "Load Balancer Common Deployment Errors"
        },
        {
          "additions": 0,
          "deletions": 41,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/troubleshoot-load-balancer-imds",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure Load Balancer",
              "type": "removed"
            },
            {
              "text": "Common error codes when using IMDS to retrieve load balancer information",
              "type": "removed"
            },
            {
              "text": "This article describes common deployment errors and how to resolve those errors while using the Azure Instance Metadata Service (IMDS) to retrieve load balancer information.",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/troubleshoot-load-balancer-imds.md",
          "status": "removed",
          "title": "Troubleshoot Load Balancer Imds"
        },
        {
          "additions": 2,
          "deletions": 16,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshoot Azure Load Balancer",
              "type": "removed"
            },
            {
              "text": "href: load-balancer-troubleshoot.md",
              "type": "removed"
            },
            {
              "text": "name: Support and troubleshooting for Azure Load Balancer",
              "type": "added"
            }
          ],
          "path": "articles/load-balancer/TOC.yml",
          "status": "modified",
          "title": "Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fb1f4be60c3577c1aad4438db70e9cd9c1992449",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshoot Azure Load Balancer",
          "type": "removed"
        },
        {
          "text": "href: load-balancer-troubleshoot.md",
          "type": "removed"
        },
        {
          "text": "name: Support and troubleshooting for Azure Load Balancer",
          "type": "added"
        },
        {
          "text": "href: load-balancer-support-help.md",
          "type": "added"
        },
        {
          "text": "name: Health Probe status",
          "type": "removed"
        },
        {
          "text": "href: load-balancer-troubleshoot-health-probe-status.md",
          "type": "removed"
        },
        {
          "text": "Common error codes and troubleshooting steps",
          "type": "removed"
        },
        {
          "text": "Support and troubleshooting for Azure Load Balancer",
          "type": "added"
        },
        {
          "text": "text: Troubleshoot Azure Load Balancer",
          "type": "removed"
        },
        {
          "text": "url: /azure/load-balancer/load-balancer-troubleshoot",
          "type": "removed"
        }
      ],
      "message": "Retire LB troubleshoot set and add support-help page",
      "paths": [
        "articles/load-balancer"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-troubleshoot-health-event-logs",
      "primary_product": "load-balancer",
      "primary_product_label": "Load Balancer",
      "product_labels": [
        "Load Balancer"
      ],
      "products": [
        "load-balancer"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Operational or migration guidance",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 68,
      "sha": "fb1f4be60c3577c1aad4438db70e9cd9c1992449",
      "short_sha": "fb1f4be",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-load-balancer"
      ],
      "sources": [
        "Load Balancer docs"
      ],
      "stats": {
        "additions": 82,
        "deletions": 712,
        "total": 794
      },
      "summary": "Load Balancer: adds \"name: Support and troubleshooting for Azure Load Balancer\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fb1f4be60c3577c1aad4438db70e9cd9c1992449"
    },
    {
      "author": "Ramya Boilla",
      "date": "2026-04-07T22:04:28Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/vpn-gateway-about-skus-legacy",
          "meaningful_changes": [
            {
              "text": "Standard and High Performance SKUs will be deprecated on March 31, 2026. All legacy SKUs use Basic IP address today, and we recommend you use the Azure portal to migrate a Basic IP address to a Standard IP address...",
              "type": "removed"
            },
            {
              "text": "Standard and High Performance SKUs will be deprecated on June 30th, 2026. All legacy SKUs use Basic IP address today, and we recommend you use the Azure portal to migrate a Basic IP address to a Standard IP address...",
              "type": "added"
            },
            {
              "text": "The Standard and High Performance SKUs will be deprecated on March 31, 2026. All legacy SKUs use Basic IP addresses today, and you can use the Azure portal to migrate a Basic IP address to a Standard IP address before...",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/vpn-gateway-about-skus-legacy.md",
          "status": "modified",
          "title": "Vpn Gateway About Skus Legacy"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:930e6531b7d82f3e95b66a6c19a55398dc708cc6",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Standard and High Performance SKUs will be deprecated on March 31, 2026. All legacy SKUs use Basic IP address today, and we recommend you use the Azure portal to migrate a Basic IP address to a Standard IP address...",
          "type": "removed"
        },
        {
          "text": "Standard and High Performance SKUs will be deprecated on June 30th, 2026. All legacy SKUs use Basic IP address today, and we recommend you use the Azure portal to migrate a Basic IP address to a Standard IP address...",
          "type": "added"
        },
        {
          "text": "The Standard and High Performance SKUs will be deprecated on March 31, 2026. All legacy SKUs use Basic IP addresses today, and you can use the Azure portal to migrate a Basic IP address to a Standard IP address before...",
          "type": "removed"
        },
        {
          "text": "The Standard and High Performance SKUs will be deprecated on June 30th, 2026. All legacy SKUs use Basic IP addresses today, and you can use the Azure portal to migrate a Basic IP address to a Standard IP address before...",
          "type": "added"
        }
      ],
      "message": "Updated timeline for Legacy SKU: Update deprecation date for legacy SKUs",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/vpn-gateway-about-skus-legacy",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 68,
      "sha": "930e6531b7d82f3e95b66a6c19a55398dc708cc6",
      "short_sha": "930e653",
      "signal": "Removal or deprecation",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "VPN Gateway: adds \"The Standard and High Performance SKUs will be deprecated on June 30th, 2026. All legacy SKUs use Basic IP addresses today, and you can use the Azure portal to migrate a Basic IP address to a Standard IP address before...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/930e6531b7d82f3e95b66a6c19a55398dc708cc6"
    },
    {
      "author": "Dennis Rea",
      "date": "2026-04-06T20:52:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 4,
      "files": [
        {
          "additions": 229,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/cross-tenant-secure-access-private-endpoints",
          "meaningful_changes": [
            {
              "text": "Cross-tenant secure access to apps by using private endpoints",
              "type": "added"
            },
            {
              "text": "Like most Azure platform as a service (PaaS) solutions, Azure web apps and function apps are publicly reachable over the internet by default. You can restrict inbound traffic to Azure web apps and function apps by...",
              "type": "added"
            },
            {
              "text": "Private endpoints provide clients in your private network with secure access to your app over Azure Private Link. Private endpoints use IP addresses from the Azure virtual network address space. Network traffic between...",
              "type": "added"
            }
          ],
          "path": "docs/networking/guide/cross-tenant-secure-access-private-endpoints.md",
          "status": "added",
          "title": "Cross Tenant Secure Access Private Endpoints"
        },
        {
          "additions": 0,
          "deletions": 174,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/cross-tenant-secure-access-private-endpoints-content",
          "meaningful_changes": [
            {
              "text": "Like most Azure platform as a service (PaaS) services, Azure web apps and function apps can be accessed from the internet by default. If you want to restrict the inbound traffic to a web app or function app, Azure...",
              "type": "removed"
            },
            {
              "text": "If you use access restrictions, you can configure the internal firewall of the resource by defining lists of allow and deny rules. You can base the restrictions on IP addresses (IPv4 and IPv6) or service tags, or you...",
              "type": "removed"
            },
            {
              "text": "The second built-in option, a private endpoint, gives clients in your private network secure access to your app over Azure Private Link. A private endpoint uses an IP address from your Azure virtual network address...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/cross-tenant-secure-access-private-endpoints-content.md",
          "status": "removed",
          "title": "Cross Tenant Secure Access Private Endpoints Content"
        },
        {
          "additions": 0,
          "deletions": 23,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "YamlMime:Architecture",
              "type": "removed"
            },
            {
              "text": "ai-usage: ai-assisted",
              "type": "removed"
            },
            {
              "text": "name: Cross-tenant secure access to Azure web apps and function apps with private endpoints",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/cross-tenant-secure-access-private-endpoints.yml",
          "status": "removed",
          "title": "Cross Tenant Secure Access Private Endpoints"
        },
        {
          "additions": 991,
          "deletions": 669,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/guide/images/cross-tenant-secure-access-private-endpoints-architecture.svg",
          "status": "modified",
          "title": "Cross Tenant Secure Access Private Endpoints Architecture"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:980084aee72e8d3b65ca414062256200d7d1aca7",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Like most Azure platform as a service (PaaS) services, Azure web apps and function apps can be accessed from the internet by default. If you want to restrict the inbound traffic to a web app or function app, Azure...",
          "type": "removed"
        },
        {
          "text": "If you use access restrictions, you can configure the internal firewall of the resource by defining lists of allow and deny rules. You can base the restrictions on IP addresses (IPv4 and IPv6) or service tags, or you...",
          "type": "removed"
        },
        {
          "text": "The second built-in option, a private endpoint, gives clients in your private network secure access to your app over Azure Private Link. A private endpoint uses an IP address from your Azure virtual network address...",
          "type": "removed"
        },
        {
          "text": "This guide presents an architecture that uses the private endpoint option. The private endpoint securely exposes an Azure web app in one tenant to a client that consumes the app in another Azure tenant. You can also...",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"./images/cross-tenant-secure-access-private-endpoints-architecture.svg\" alt-text=\"Architecture diagram that shows how a private endpoint securely connects a user on a virtual machine in...",
          "type": "removed"
        },
        {
          "text": "Download a Visio file of this architecture.",
          "type": "removed"
        },
        {
          "text": "Cross-tenant secure access to apps by using private endpoints",
          "type": "added"
        },
        {
          "text": "Like most Azure platform as a service (PaaS) solutions, Azure web apps and function apps are publicly reachable over the internet by default. You can restrict inbound traffic to Azure web apps and function apps by...",
          "type": "added"
        },
        {
          "text": "Private endpoints provide clients in your private network with secure access to your app over Azure Private Link. Private endpoints use IP addresses from the Azure virtual network address space. Network traffic between...",
          "type": "added"
        },
        {
          "text": "This guide presents an architecture that uses a private endpoint. The private endpoint securely exposes an Azure web app in one tenant to a client that consumes the web app in another Azure tenant. You can also use...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #15459 from v-ccolin/cross-tenant-03-19",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/cross-tenant-secure-access-private-endpoints",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 68,
      "sha": "980084aee72e8d3b65ca414062256200d7d1aca7",
      "short_sha": "980084a",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 1220,
        "deletions": 866,
        "total": 2086
      },
      "summary": "Architecture Center: adds \"Private endpoints provide clients in your private network with secure access to your app over Azure Private Link. Private endpoints use IP addresses from the Azure virtual network address space. Network traffic between...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/980084aee72e8d3b65ca414062256200d7d1aca7"
    },
    {
      "author": "Dennis Rea",
      "date": "2026-04-06T20:47:37Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 8,
      "files": [
        {
          "additions": 1404,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
              "type": "added"
            },
            {
              "text": ".st2 {fill:none;stroke:0084e6;stroke-dasharray:3,3;stroke-width:1}",
              "type": "added"
            },
            {
              "text": ".st3 {fill:none;stroke:none;stroke-width:0.25}",
              "type": "added"
            }
          ],
          "path": "docs/networking/guide/images/network-virtual-appliance-high-availability-load-balancer-internet-outbound.svg",
          "status": "added",
          "title": "Network Virtual Appliance High Availability Load Balancer Internet Outbound"
        },
        {
          "additions": 1363,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
              "type": "added"
            },
            {
              "text": ".st2 {fill:none;stroke:0084e6;stroke-dasharray:3,3;stroke-width:1}",
              "type": "added"
            },
            {
              "text": ".st3 {fill:none;stroke:none;stroke-width:0.25}",
              "type": "added"
            }
          ],
          "path": "docs/networking/guide/images/network-virtual-appliance-high-availability-load-balancer-internet-inbound.svg",
          "status": "added",
          "title": "Network Virtual Appliance High Availability Load Balancer Internet Inbound"
        },
        {
          "additions": 0,
          "deletions": 1243,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
              "type": "removed"
            },
            {
              "text": ".st2 {fill:none;stroke:0084e6;stroke-dasharray:3,3;stroke-width:1}",
              "type": "removed"
            },
            {
              "text": ".st3 {fill:none;stroke:none;stroke-width:0.25}",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/images/load-balancer-internet.svg",
          "status": "removed",
          "title": "Load Balancer Internet"
        },
        {
          "additions": 376,
          "deletions": 381,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st4 {fill:000000;font-family:Segoe UI;font-size:0.916672em}",
              "type": "removed"
            },
            {
              "text": ".st4 {fill:000000;font-family:Segoe UI;font-size:0.833336em}",
              "type": "added"
            },
            {
              "text": ".st7 {fill:000000;font-family:Segoe UI;font-size:0.833336em}",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/images/private-ip-internet.svg",
          "status": "modified",
          "title": "Private Ip Internet"
        },
        {
          "additions": 246,
          "deletions": 246,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st17 {fill:000000;font-family:Segoe UI;font-size:0.916672em;font-weight:bold}",
              "type": "removed"
            },
            {
              "text": ".st17 {fill:000000;font-family:Segoe UI;font-size:0.916672em}",
              "type": "added"
            },
            {
              "text": ".st19 {fill:000000;font-family:Segoe UI;font-size:0.916672em}",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/images/gateway-load-balancer-internet.svg",
          "status": "modified",
          "title": "Gateway Load Balancer Internet"
        },
        {
          "additions": 74,
          "deletions": 53,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/network-virtual-appliance-high-availability",
          "meaningful_changes": [
            {
              "text": "This article describes common ways to deploy a set of network virtual appliances (NVAs) for high availability in Azure. An NVA typically controls the flow of traffic between network segments that have different...",
              "type": "removed"
            },
            {
              "text": "This article describes common ways to deploy a set of network virtual appliances (NVAs) for high availability in Azure. An NVA typically controls the flow of traffic between network segments that have different...",
              "type": "added"
            },
            {
              "text": "Many design patterns use NVAs to inspect traffic between different security zones. These patterns might use NVAs for the following purposes:",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/network-virtual-appliance-high-availability.md",
          "status": "modified",
          "title": "Network Virtual Appliance High Availability"
        },
        {
          "additions": 709,
          "deletions": 551,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/guide/images/load-balancer-on-premises.svg",
          "status": "modified",
          "title": "Load Balancer On Premises"
        },
        {
          "additions": 627,
          "deletions": 464,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/guide/images/route-server-internet.svg",
          "status": "modified",
          "title": "Route Server Internet"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:11e7e0144ab26f375898fcfe45e4b552b95f4f20",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": ".st17 {fill:000000;font-family:Segoe UI;font-size:0.916672em;font-weight:bold}",
          "type": "removed"
        },
        {
          "text": ".st17 {fill:000000;font-family:Segoe UI;font-size:0.916672em}",
          "type": "added"
        },
        {
          "text": ".st19 {fill:000000;font-family:Segoe UI;font-size:0.916672em}",
          "type": "removed"
        },
        {
          "text": ".st19 {fill:000000;font-family:Segoe UI;font-size:0.916672em;font-weight:bold}",
          "type": "added"
        },
        {
          "text": "<v:pageProperties width=\"9.34474\" height=\"5.87004\" v:drawingScale=\"1\" v:pageScale=\"1\" v:drawingUnits=\"19\"",
          "type": "removed"
        },
        {
          "text": "<v:pageProperties width=\"8.67776\" height=\"5.70368\" v:drawingScale=\"1\" v:pageScale=\"1\" v:drawingUnits=\"19\"",
          "type": "added"
        },
        {
          "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
          "type": "removed"
        },
        {
          "text": ".st2 {fill:none;stroke:0084e6;stroke-dasharray:3,3;stroke-width:1}",
          "type": "removed"
        },
        {
          "text": ".st3 {fill:none;stroke:none;stroke-width:0.25}",
          "type": "removed"
        },
        {
          "text": ".st4 {fill:000000;font-family:Segoe UI;font-size:0.916672em}",
          "type": "removed"
        }
      ],
      "message": "Merge pull request #15449 from v-ccolin/high-availability-03-17",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/network-virtual-appliance-high-availability",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "New scoped article or spec file",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 68,
      "sha": "11e7e0144ab26f375898fcfe45e4b552b95f4f20",
      "short_sha": "11e7e01",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 4799,
        "deletions": 2938,
        "total": 7737
      },
      "summary": "Architecture Center: adds \"<v:pageProperties width=\"8.67776\" height=\"5.70368\" v:drawingScale=\"1\" v:pageScale=\"1\" v:drawingUnits=\"19\"\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/11e7e0144ab26f375898fcfe45e4b552b95f4f20"
    },
    {
      "author": "MSFT-FrankLpnsk",
      "date": "2026-03-30T16:43:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 5,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/point-to-site-vpn-client-winget",
          "meaningful_changes": [
            {
              "text": "See more on Azure VPN Client supported windows settings here.",
              "type": "added"
            },
            {
              "text": "No GUI installer: This method uses the command line. Users who prefer a graphical click-to-install experience should use the Microsoft Store listing where available.",
              "type": "removed"
            },
            {
              "text": "No GUI installer: This method uses the command line. Users who prefer a graphical click-to-install experience should use the Microsoft Store listing or the Download Center where available.",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/point-to-site-vpn-client-winget.md",
          "status": "modified",
          "title": "Point To Site Vpn Client Winget"
        },
        {
          "additions": 5,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/azure-vpn-client-versions",
          "meaningful_changes": [
            {
              "text": "Supported Windows Versions:",
              "type": "added"
            },
            {
              "text": "!INCLUDE [Supported Windows versions]",
              "type": "added"
            },
            {
              "text": "Release notes and version information",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/azure-vpn-client-versions.md",
          "status": "modified",
          "title": "Azure Vpn Client Versions"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:04c4db4cf2a2b0b4d7ff5c07da3cdf38c038de25",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Supported Windows Versions:",
          "type": "added"
        },
        {
          "text": "!INCLUDE [Supported Windows versions]",
          "type": "added"
        },
        {
          "text": "Release notes and version information",
          "type": "added"
        },
        {
          "text": "See more on Azure VPN Client supported windows settings here.",
          "type": "added"
        },
        {
          "text": "No GUI installer: This method uses the command line. Users who prefer a graphical click-to-install experience should use the Microsoft Store listing where available.",
          "type": "removed"
        },
        {
          "text": "No GUI installer: This method uses the command line. Users who prefer a graphical click-to-install experience should use the Microsoft Store listing or the Download Center where available.",
          "type": "added"
        },
        {
          "text": "Platform restrictions: Only Windows 11 and Windows Server 2025 or later are supported. Older OS versions should continue using the Microsoft Store or other available channels.",
          "type": "removed"
        },
        {
          "text": "Platform restrictions: Only Windows 11 and Windows Server 2025 or later are supported.",
          "type": "added"
        },
        {
          "text": "Note: The Azure VPN Client may be released to winget and Download Center on a staggered schedule compared to the Microsoft Store. Check for updates regularly using winget upgrade to ensure you have the latest version.",
          "type": "removed"
        }
      ],
      "message": "updated after feedback",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/point-to-site-vpn-client-winget",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 68,
      "sha": "04c4db4cf2a2b0b4d7ff5c07da3cdf38c038de25",
      "short_sha": "04c4db4",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 10,
        "deletions": 3,
        "total": 13
      },
      "summary": "VPN Gateway: adds \"See more on Azure VPN Client supported windows settings here.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/04c4db4cf2a2b0b4d7ff5c07da3cdf38c038de25"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-14T19:55:44Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 42,
          "deletions": 52,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-overview",
          "meaningful_changes": [
            {
              "text": "Azure NAT Gateway is a fully managed and highly resilient Network Address Translation (NAT) service. You can use Azure NAT Gateway to let all instances in a subnet connect outbound to the internet while remaining fully...",
              "type": "removed"
            },
            {
              "text": "Azure NAT Gateway is a fully managed and highly resilient Network Address Translation (NAT) service. Use Azure NAT Gateway to let all instances in a subnet connect outbound to the internet while remaining fully...",
              "type": "added"
            },
            {
              "text": "To learn more on how to deploy StandardV2 NAT Gateway, see Create a StandardV2 NAT Gateway.",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/nat-overview.md",
          "status": "modified",
          "title": "Nat Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:432d91e836c6aa6baf371c0a539dc8348bf80f05",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure NAT Gateway is a fully managed and highly resilient Network Address Translation (NAT) service. You can use Azure NAT Gateway to let all instances in a subnet connect outbound to the internet while remaining fully...",
          "type": "removed"
        },
        {
          "text": "Azure NAT Gateway is a fully managed and highly resilient Network Address Translation (NAT) service. Use Azure NAT Gateway to let all instances in a subnet connect outbound to the internet while remaining fully...",
          "type": "added"
        },
        {
          "text": "To learn more on how to deploy StandardV2 NAT Gateway, see Create a StandardV2 NAT Gateway.",
          "type": "removed"
        },
        {
          "text": "To learn more about how to deploy StandardV2 NAT Gateway, see Create a StandardV2 NAT Gateway.",
          "type": "added"
        },
        {
          "text": "IPv6 outbound traffic using Load balancer outbound rules is disrupted when StandardV2 NAT Gateway is associated to a subnet. If you require both IPv4 and IPv6 outbound connectivity, use either Load balancer outbound...",
          "type": "removed"
        },
        {
          "text": "IPv6 outbound traffic that uses Load balancer outbound rules is disrupted when you associate StandardV2 NAT Gateway to a subnet. If you require both IPv4 and IPv6 outbound connectivity, use either Load balancer...",
          "type": "added"
        }
      ],
      "message": "Update nat-overview",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-overview",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 66,
      "sha": "432d91e836c6aa6baf371c0a539dc8348bf80f05",
      "short_sha": "432d91e",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 42,
        "deletions": 52,
        "total": 94
      },
      "summary": "NAT Gateway: adds \"IPv6 outbound traffic that uses Load balancer outbound rules is disrupted when you associate StandardV2 NAT Gateway to a subnet. If you require both IPv4 and IPv6 outbound connectivity, use either Load balancer...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/432d91e836c6aa6baf371c0a539dc8348bf80f05"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-08T15:18:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 62,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/connection-troubleshoot-overview",
          "meaningful_changes": [
            {
              "text": "Connection troubleshoot returns the following error messages.",
              "type": "added"
            },
            {
              "text": "IssueType | Description",
              "type": "added"
            },
            {
              "text": "AgentStopped | The Network Watcher agent on the source VM has stopped or is unresponsive.",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/connection-troubleshoot-overview.md",
          "status": "modified",
          "title": "Connection Troubleshoot Overview"
        },
        {
          "additions": 56,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/ct-errors",
          "meaningful_changes": [
            {
              "text": "IssueType | Description",
              "type": "added"
            },
            {
              "text": "AgentStopped | The Network Watcher agent on the source VM has stopped or is unresponsive.",
              "type": "added"
            },
            {
              "text": "GuestFirewall | Traffic is being blocked by the guest OS firewall on the source or destination VM.",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/ct-errors.md",
          "status": "added",
          "title": "Ct Errors"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:383fd3eaca8918ada3abe645f7f7405d29cca1a1",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Connection troubleshoot returns the following error messages.",
          "type": "added"
        },
        {
          "text": "IssueType | Description",
          "type": "added"
        },
        {
          "text": "AgentStopped | The Network Watcher agent on the source VM has stopped or is unresponsive.",
          "type": "added"
        },
        {
          "text": "GuestFirewall | Traffic is being blocked by the guest OS firewall on the source or destination VM.",
          "type": "added"
        },
        {
          "text": "DNSResolution | The DNS lookup for the destination hostname failed on the source agent.",
          "type": "added"
        },
        {
          "text": "SocketError | The source agent failed to bind or listen on the required local socket (e.g., SocketBindFailed or ListenFailed).",
          "type": "added"
        },
        {
          "text": "IssueType | Description",
          "type": "added"
        },
        {
          "text": "AgentStopped | The Network Watcher agent on the source VM has stopped or is unresponsive.",
          "type": "added"
        },
        {
          "text": "GuestFirewall | Traffic is being blocked by the guest OS firewall on the source or destination VM.",
          "type": "added"
        },
        {
          "text": "DNSResolution | The DNS lookup for the destination hostname failed on the source agent.",
          "type": "added"
        }
      ],
      "message": "add errors table",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/connection-troubleshoot-overview",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 66,
      "sha": "383fd3eaca8918ada3abe645f7f7405d29cca1a1",
      "short_sha": "383fd3e",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 118,
        "deletions": 1,
        "total": 119
      },
      "summary": "Network Watcher: adds \"GuestFirewall | Traffic is being blocked by the guest OS firewall on the source or destination VM.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/383fd3eaca8918ada3abe645f7f7405d29cca1a1"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T18:09:15Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 19,
          "deletions": 19,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-multi-public-ip-powershell",
          "meaningful_changes": [
            {
              "text": "Deploy an Azure Firewall with multiple public IP addresses using Azure PowerShell",
              "type": "removed"
            },
            {
              "text": "Deploy an Azure Firewall with multiple public IP addresses by using Azure PowerShell",
              "type": "added"
            },
            {
              "text": "SNAT - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. Azure Firewall randomly selects the first source public IP address to use for a connection and...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-multi-public-ip-powershell.md",
          "status": "modified",
          "title": "Deploy Multi Public Ip Powershell"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e0af9c2ad3bc375b6a8cf6ab45dab97a30855ad2",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Deploy an Azure Firewall with multiple public IP addresses using Azure PowerShell",
          "type": "removed"
        },
        {
          "text": "Deploy an Azure Firewall with multiple public IP addresses by using Azure PowerShell",
          "type": "added"
        },
        {
          "text": "SNAT - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. Azure Firewall randomly selects the first source public IP address to use for a connection and...",
          "type": "removed"
        },
        {
          "text": "Azure Firewall with multiple public IP addresses is available via the Azure portal, Azure PowerShell, Azure CLI, REST, and templates.",
          "type": "removed"
        },
        {
          "text": "You can deploy an Azure Firewall in a Hub VNET with up to 250 public IP addresses, however DNAT destination rules will also count toward the 250 maximum.",
          "type": "removed"
        },
        {
          "text": "The limit for an Azure Firewall in a VHUB deployment with Bring your own Public IP is 250 addresses and for classic VHUB deployment is 80 public IP addresses.",
          "type": "removed"
        }
      ],
      "message": "docs: Rename vnet resource name to myVirtualNetwork to avoid variable name confusion, fix list bullet indentation",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/deploy-multi-public-ip-powershell",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 66,
      "sha": "e0af9c2ad3bc375b6a8cf6ab45dab97a30855ad2",
      "short_sha": "e0af9c2",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 19,
        "deletions": 19,
        "total": 38
      },
      "summary": "Azure Firewall: removes \"SNAT - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. Azure Firewall randomly selects the first source public IP address to use for a connection and...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e0af9c2ad3bc375b6a8cf6ab45dab97a30855ad2"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-16T18:16:46Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-sku",
          "meaningful_changes": [
            {
              "text": "Standard SKU NAT Gateway can\u2019t be upgraded to StandardV2 SKU NAT Gateway. You must deploy StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway.",
              "type": "removed"
            },
            {
              "text": "Standard SKU NAT Gateway can\u2019t be upgraded to StandardV2 SKU NAT Gateway. You must deploy StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway.",
              "type": "added"
            },
            {
              "text": "Terraform doesn't yet support attachment of IPv6 StandardV2 public IPs to StandardV2 NAT Gateway. IPv4 StandardV2 public IPs can be attached to StandardV2 NAT Gateway with terraform. No other clients are impacted.",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/nat-sku.md",
          "status": "modified",
          "title": "Nat Sku"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5f1255a0e402877b5142d52478868661ad6fd0c6",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Standard SKU NAT Gateway can\u2019t be upgraded to StandardV2 SKU NAT Gateway. You must deploy StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway.",
          "type": "removed"
        },
        {
          "text": "Standard SKU NAT Gateway can\u2019t be upgraded to StandardV2 SKU NAT Gateway. You must deploy StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway.",
          "type": "added"
        },
        {
          "text": "Terraform doesn't yet support attachment of IPv6 StandardV2 public IPs to StandardV2 NAT Gateway. IPv4 StandardV2 public IPs can be attached to StandardV2 NAT Gateway with terraform. No other clients are impacted.",
          "type": "added"
        }
      ],
      "message": "Update known limitations for NAT Gateway",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-sku",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 64,
      "sha": "5f1255a0e402877b5142d52478868661ad6fd0c6",
      "short_sha": "5f1255a",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 1,
        "total": 4
      },
      "summary": "NAT Gateway: adds \"Terraform doesn't yet support attachment of IPv6 StandardV2 public IPs to StandardV2 NAT Gateway. IPv4 StandardV2 public IPs can be attached to StandardV2 NAT Gateway with terraform. No other clients are impacted.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5f1255a0e402877b5142d52478868661ad6fd0c6"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-16T18:15:44Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-overview",
          "meaningful_changes": [
            {
              "text": "Standard SKU NAT Gateway can't be upgraded to StandardV2 NAT Gateway. You must first create StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway on your subnet.",
              "type": "removed"
            },
            {
              "text": "Standard SKU NAT Gateway can't be upgraded to StandardV2 NAT Gateway. You must first create StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway on your subnet.",
              "type": "added"
            },
            {
              "text": "Terraform doesn't yet support attachment of IPv6 StandardV2 public IPs to StandardV2 NAT Gateway. IPv4 StandardV2 public IPs can be attached to StandardV2 NAT Gateway with terraform. No other clients are impacted.",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/nat-overview.md",
          "status": "modified",
          "title": "Nat Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:db8ae1577ac5596f24187064196fee7d5bd9d7ff",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Standard SKU NAT Gateway can't be upgraded to StandardV2 NAT Gateway. You must first create StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway on your subnet.",
          "type": "removed"
        },
        {
          "text": "Standard SKU NAT Gateway can't be upgraded to StandardV2 NAT Gateway. You must first create StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway on your subnet.",
          "type": "added"
        },
        {
          "text": "Terraform doesn't yet support attachment of IPv6 StandardV2 public IPs to StandardV2 NAT Gateway. IPv4 StandardV2 public IPs can be attached to StandardV2 NAT Gateway with terraform. No other clients are impacted.",
          "type": "added"
        }
      ],
      "message": "Update NAT Gateway limitations in documentation",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-overview",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 64,
      "sha": "db8ae1577ac5596f24187064196fee7d5bd9d7ff",
      "short_sha": "db8ae15",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 1,
        "total": 3
      },
      "summary": "NAT Gateway: adds \"Terraform doesn't yet support attachment of IPv6 StandardV2 public IPs to StandardV2 NAT Gateway. IPv4 StandardV2 public IPs can be attached to StandardV2 NAT Gateway with terraform. No other clients are impacted.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/db8ae1577ac5596f24187064196fee7d5bd9d7ff"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-16T15:02:15Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-sku",
          "meaningful_changes": [
            {
              "text": "Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/nat-sku.md",
          "status": "modified",
          "title": "Nat Sku"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:869c908dbd70cea95b83f31988de21f58cd899fc",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.",
          "type": "removed"
        }
      ],
      "message": "Update NAT Gateway SKU documentation",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-sku",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 64,
      "sha": "869c908dbd70cea95b83f31988de21f58cd899fc",
      "short_sha": "869c908",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 7,
        "total": 7
      },
      "summary": "NAT Gateway: removes \"Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/869c908dbd70cea95b83f31988de21f58cd899fc"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-16T14:56:06Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-overview",
          "meaningful_changes": [
            {
              "text": "Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/nat-overview.md",
          "status": "modified",
          "title": "Nat Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1541432d2525c9847b5de1f51ac5d265368f5eac",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.",
          "type": "removed"
        }
      ],
      "message": "Update limitations for StandardV2 NAT Gateway",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-overview",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 64,
      "sha": "1541432d2525c9847b5de1f51ac5d265368f5eac",
      "short_sha": "1541432",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 4,
        "total": 4
      },
      "summary": "NAT Gateway: removes \"Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1541432d2525c9847b5de1f51ac5d265368f5eac"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-10T14:04:02Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/overview-v2",
          "meaningful_changes": [
            {
              "text": "TCP/TLS proxy: Azure Application Gateway now also supports Layer 4 (TCP protocol) and TLS (Transport Layer Security) proxying. This feature is currently in public preview. For more information, see Application Gateway...",
              "type": "removed"
            },
            {
              "text": "TCP/TLS proxy: Azure Application Gateway now also supports Layer 4 (TCP protocol) and TLS (Transport Layer Security) proxying. For more information, see Application Gateway TCP/TLS proxy overview.",
              "type": "added"
            },
            {
              "text": "Functionality - advanced | AKS (via AGIC); URL rewrite; mTLS; Private Link; Private-only (preview); TCP/TLS Proxy (preview) | | \u2713; \u2713; \u2713; \u2713; \u2713; \u2713",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/overview-v2.md",
          "status": "modified",
          "title": "Overview V2"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:55eae2d8a33b34b6f5d1518708037daf4820dfa8",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "TCP/TLS proxy: Azure Application Gateway now also supports Layer 4 (TCP protocol) and TLS (Transport Layer Security) proxying. This feature is currently in public preview. For more information, see Application Gateway...",
          "type": "removed"
        },
        {
          "text": "TCP/TLS proxy: Azure Application Gateway now also supports Layer 4 (TCP protocol) and TLS (Transport Layer Security) proxying. For more information, see Application Gateway TCP/TLS proxy overview.",
          "type": "added"
        },
        {
          "text": "Functionality - advanced | AKS (via AGIC); URL rewrite; mTLS; Private Link; Private-only (preview); TCP/TLS Proxy (preview) | | \u2713; \u2713; \u2713; \u2713; \u2713; \u2713",
          "type": "removed"
        },
        {
          "text": "Functionality - advanced | AKS (via AGIC); URL rewrite; mTLS; Private Link; Private-only; TCP/TLS Proxy | | \u2713; \u2713; \u2713; \u2713; \u2713; \u2713",
          "type": "added"
        }
      ],
      "message": "Remove preview tags",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/overview-v2",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Removal, deprecation, or unsupported guidance",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 64,
      "sha": "55eae2d8a33b34b6f5d1518708037daf4820dfa8",
      "short_sha": "55eae2d",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Application Gateway: adds \"Functionality - advanced | AKS (via AGIC); URL rewrite; mTLS; Private Link; Private-only; TCP/TLS Proxy | | \u2713; \u2713; \u2713; \u2713; \u2713; \u2713\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/55eae2d8a33b34b6f5d1518708037daf4820dfa8"
    },
    {
      "author": "Brian Lehr",
      "date": "2026-04-06T18:13:13Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 34,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/create-public-ip-prefix-terraform",
          "meaningful_changes": [
            {
              "text": "Create a standard v2 zone-redundant public IPv4 address prefix named myIPv4Stdv2",
              "type": "added"
            },
            {
              "text": "Create a standard v2 zone-redundant public IPv6 address prefix named myIPv6Stdv2",
              "type": "added"
            },
            {
              "text": "Zone-Redundant Standardv2 IPv4 prefix",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/ip-services/create-public-ip-prefix-terraform.md",
          "status": "modified",
          "title": "Create Public Ip Prefix Terraform"
        },
        {
          "additions": 27,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/create-public-ip-terraform",
          "meaningful_changes": [
            {
              "text": "Create a standard v2 zone-redundant public IPv4 address named myStandardv2PublicIP",
              "type": "added"
            },
            {
              "text": "Zone-Redundant Standardv2 SKU",
              "type": "added"
            },
            {
              "text": "Create a standard v2 zone-redundant IP address",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/ip-services/create-public-ip-terraform.md",
          "status": "modified",
          "title": "Create Public Ip Terraform"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b63661f8ddd494328df7b644803fd98ef4b32b30",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Create a standard v2 zone-redundant public IPv4 address prefix named myIPv4Stdv2",
          "type": "added"
        },
        {
          "text": "Create a standard v2 zone-redundant public IPv6 address prefix named myIPv6Stdv2",
          "type": "added"
        },
        {
          "text": "Zone-Redundant Standardv2 IPv4 prefix",
          "type": "added"
        },
        {
          "text": "To create a Standard v2 IPv4 public IP prefix, specify IPv4 as the ipversion value. All Standardv2 IPv4 public IP prefixes must be zone-redundant, so specify [\"1\", \"2\", \"3\"] as the zones value.",
          "type": "added"
        },
        {
          "text": "resource \"azurermpublicipprefix\" \"publicipprefixipv4stdv2\" {",
          "type": "added"
        },
        {
          "text": "name = \"myIPv4Stdv2\"",
          "type": "added"
        },
        {
          "text": "Create a standard v2 zone-redundant public IPv4 address named myStandardv2PublicIP",
          "type": "added"
        },
        {
          "text": "Zone-Redundant Standardv2 SKU",
          "type": "added"
        },
        {
          "text": "Create a standard v2 zone-redundant IP address",
          "type": "added"
        },
        {
          "text": "Standard v2 SKU public IP is required for use of the Standard v2 NAT Gateway with zone-redundancy. For more information about SKUs, see Public IP addresses.",
          "type": "added"
        }
      ],
      "message": "Add Standardv2 SKU tabs to Terraform public IP and prefix docs",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/create-public-ip-prefix-terraform",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 64,
      "sha": "b63661f8ddd494328df7b644803fd98ef4b32b30",
      "short_sha": "b63661f",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 61,
        "deletions": 0,
        "total": 61
      },
      "summary": "Virtual Network: adds \"To create a Standard v2 IPv4 public IP prefix, specify IPv4 as the ipversion value. All Standardv2 IPv4 public IP prefixes must be zone-redundant, so specify [\"1\", \"2\", \"3\"] as the zones value.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b63661f8ddd494328df7b644803fd98ef4b32b30"
    },
    {
      "author": "Courtney Wales",
      "date": "2026-04-01T19:56:58Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 3,
      "files": [
        {
          "additions": 369,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/firewall/integrate-with-nat-gateway-v2",
          "meaningful_changes": [
            {
              "text": "Integrate Azure Firewall with NAT Gateway V2",
              "type": "added"
            },
            {
              "text": "This tutorial shows how to deploy Azure Firewall with NAT Gateway V2 (StandardV2 SKU) for zone-redundant outbound SNAT. You also deploy a test virtual machine and Azure Bastion to verify the configuration.",
              "type": "added"
            },
            {
              "text": "Azure Firewall provides 2,496 SNAT ports per public IP address configured per backend virtual machine scale set instance (at least two instances). You can associate up to 250 public IP addresses. To scale and...",
              "type": "added"
            }
          ],
          "path": "articles/firewall/integrate-with-nat-gateway-v2.md",
          "status": "added",
          "title": "Integrate With Nat Gateway V2"
        },
        {
          "additions": 8,
          "deletions": 4,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Scale outbound SNAT ports",
              "type": "removed"
            },
            {
              "text": "href: integrate-with-nat-gateway.md",
              "type": "removed"
            },
            {
              "text": "name: SNAT private ranges",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/toc.yml",
          "status": "modified",
          "title": "Firewall Toc"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/firewall/integrate-with-nat-gateway",
          "meaningful_changes": [
            {
              "text": "Deploying NAT gateway with a zone redundant firewall isn't a recommended deployment option, as Standard NAT gateway doesn't support zone-redundant deployments. StandardV2 NAT Gateway does support zone-redundant...",
              "type": "removed"
            },
            {
              "text": "Deploying NAT gateway with a zone redundant firewall isn't a recommended deployment option, as Standard NAT gateway doesn't support zone-redundant deployments. StandardV2 NAT Gateway does support zone-redundant...",
              "type": "added"
            }
          ],
          "path": "articles/firewall/integrate-with-nat-gateway.md",
          "status": "modified",
          "title": "Integrate With Nat Gateway"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5cd0ba44fdfea718e7f1325549e23cb40aca04a8",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Integrate Azure Firewall with NAT Gateway V2",
          "type": "added"
        },
        {
          "text": "This tutorial shows how to deploy Azure Firewall with NAT Gateway V2 (StandardV2 SKU) for zone-redundant outbound SNAT. You also deploy a test virtual machine and Azure Bastion to verify the configuration.",
          "type": "added"
        },
        {
          "text": "Azure Firewall provides 2,496 SNAT ports per public IP address configured per backend virtual machine scale set instance (at least two instances). You can associate up to 250 public IP addresses. To scale and...",
          "type": "added"
        },
        {
          "text": "Why NAT Gateway V2?",
          "type": "added"
        },
        {
          "text": "The Standard NAT Gateway SKU doesn't support zone-redundant deployments. If you deploy a zone-redundant Azure Firewall with a Standard NAT Gateway, the NAT Gateway becomes a single point of failure during a zonal...",
          "type": "added"
        },
        {
          "text": "For more information about NAT Gateway SKUs, see NAT Gateway SKUs.",
          "type": "added"
        },
        {
          "text": "Deploying NAT gateway with a zone redundant firewall isn't a recommended deployment option, as Standard NAT gateway doesn't support zone-redundant deployments. StandardV2 NAT Gateway does support zone-redundant...",
          "type": "removed"
        },
        {
          "text": "Deploying NAT gateway with a zone redundant firewall isn't a recommended deployment option, as Standard NAT gateway doesn't support zone-redundant deployments. StandardV2 NAT Gateway does support zone-redundant...",
          "type": "added"
        },
        {
          "text": "name: Scale outbound SNAT ports",
          "type": "removed"
        },
        {
          "text": "href: integrate-with-nat-gateway.md",
          "type": "removed"
        }
      ],
      "message": "Merge pull request #313216 from gopimsft/docs/azfw-natgw-v2-tutorial",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/integrate-with-nat-gateway-v2",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 64,
      "sha": "5cd0ba44fdfea718e7f1325549e23cb40aca04a8",
      "short_sha": "5cd0ba4",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 378,
        "deletions": 5,
        "total": 383
      },
      "summary": "Azure Firewall: adds \"The Standard NAT Gateway SKU doesn't support zone-redundant deployments. If you deploy a zone-redundant Azure Firewall with a Standard NAT Gateway, the NAT Gateway becomes a single point of failure during a zonal...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5cd0ba44fdfea718e7f1325549e23cb40aca04a8"
    },
    {
      "author": "Diana Richards",
      "date": "2026-04-14T16:13:27Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 10,
      "files": [
        {
          "additions": 1319,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
              "type": "added"
            },
            {
              "text": ".st2 {fill:url(grad0-7);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
              "type": "added"
            },
            {
              "text": ".st3 {fill:50e6ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/_images/spoke-spoke-azure-virtual-network-manager.svg",
          "status": "added",
          "title": "Spoke Spoke Azure Virtual Network Manager"
        },
        {
          "additions": 1257,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
              "type": "added"
            },
            {
              "text": ".st2 {fill:url(grad0-7);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
              "type": "added"
            },
            {
              "text": ".st3 {fill:50e6ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/_images/spoke-spoke-routing.svg",
          "status": "added",
          "title": "Spoke Spoke Routing"
        },
        {
          "additions": 150,
          "deletions": 136,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. For a Microsoft-managed hub infrastructure solution, see Hub-spoke network topology with Azure...",
              "type": "removed"
            },
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern, also known as hub and spoke, is the network topology that the Cloud...",
              "type": "added"
            },
            {
              "text": "Hub-spoke is one of the network topologies recommended by the Cloud Adoption Framework. See, Define an Azure network topology to understand why this topology is considered a best practice for many organizations.",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        },
        {
          "additions": 4,
          "deletions": 4,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "thumbnailUrl: /azure/architecture/browse/thumbs/hub-spoke.png",
              "type": "removed"
            },
            {
              "text": "thumbnailUrl: /azure/architecture/browse/thumbs/hub-spoke-network-topology-architecture.png",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke.yml",
          "status": "modified",
          "title": "Hub Spoke"
        },
        {
          "additions": 2721,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-spoke-network-topology-architecture.svg",
          "status": "added",
          "title": "Hub Spoke Network Topology Architecture"
        },
        {
          "additions": 2122,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-spoke.svg",
          "status": "added",
          "title": "Hub Spoke"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-and-spoke.png",
          "status": "removed",
          "title": "Hub And Spoke"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-spoke.png",
          "status": "removed",
          "title": "Hub Spoke"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/spoke-spoke-avnm.png",
          "status": "removed",
          "title": "Spoke Spoke Avnm"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/spoke-spoke-routing.png",
          "status": "removed",
          "title": "Spoke Spoke Routing"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:3276a5fb52f793abc297a27d7100d7d5e017d57e",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
          "type": "added"
        },
        {
          "text": ".st2 {fill:url(grad0-7);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st3 {fill:50e6ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st4 {fill:c3f1ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st5 {fill:9cebff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st6 {fill:url(grad0-21);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
          "type": "added"
        },
        {
          "text": ".st2 {fill:url(grad0-7);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st3 {fill:50e6ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st4 {fill:c3f1ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        }
      ],
      "message": "Merge pull request #15513 from v-ccolin/hub-spoke-03-30",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "New scoped article or spec file",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 62,
      "sha": "3276a5fb52f793abc297a27d7100d7d5e017d57e",
      "short_sha": "3276a5f",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 7573,
        "deletions": 140,
        "total": 7713
      },
      "summary": "Architecture Center: adds \".st6 {fill:url(grad0-21);stroke:none;stroke-linecap:butt;stroke-width:0.75}\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/3276a5fb52f793abc297a27d7100d7d5e017d57e"
    },
    {
      "author": "Chad Kittel",
      "date": "2026-04-13T16:55:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
          "meaningful_changes": [
            {
              "text": "Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.",
              "type": "removed"
            },
            {
              "text": "Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.",
              "type": "added"
            },
            {
              "text": "Azure Kubernetes Service (AKS) | For more information, see Use kubenet with dual-stack networking.",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/ipv6-ip-planning.md",
          "status": "modified",
          "title": "Ipv6 Ip Planning"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:004948a80a8533d7f22c7eaa7b95bf23b251ae20",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.",
          "type": "removed"
        },
        {
          "text": "Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.",
          "type": "added"
        },
        {
          "text": "Azure Kubernetes Service (AKS) | For more information, see Use kubenet with dual-stack networking.",
          "type": "removed"
        },
        {
          "text": "Azure Kubernetes Service (AKS) | For more information, see Configure Azure CNI Overlay with dual-stack networking.",
          "type": "added"
        }
      ],
      "message": "Don't mention kubnet anymore on this article",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 62,
      "sha": "004948a80a8533d7f22c7eaa7b95bf23b251ae20",
      "short_sha": "004948a",
      "signal": "New or changed support",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Architecture Center: adds \"Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/004948a80a8533d7f22c7eaa7b95bf23b251ae20"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-10T15:34:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 8,
      "files": [
        {
          "additions": 1319,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
              "type": "added"
            },
            {
              "text": ".st2 {fill:url(grad0-7);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
              "type": "added"
            },
            {
              "text": ".st3 {fill:50e6ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/_images/spoke-spoke-azure-virtual-network-manager.svg",
          "status": "added",
          "title": "Spoke Spoke Azure Virtual Network Manager"
        },
        {
          "additions": 1257,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
              "type": "added"
            },
            {
              "text": ".st2 {fill:url(grad0-7);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
              "type": "added"
            },
            {
              "text": ".st3 {fill:50e6ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/_images/spoke-spoke-routing.svg",
          "status": "added",
          "title": "Spoke Spoke Routing"
        },
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/spoke-spoke-routing.png\" alt-text=\"Diagram that shows routing between spokes that uses Azure Firewall.\" lightbox=\"./images/spoke-spoke-routing.png\":::",
              "type": "removed"
            },
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/spoke-spoke-routing.svg\" alt-text=\"Diagram that shows routing between spokes that uses Azure Firewall.\" lightbox=\"./images/spoke-spoke-routing.svg\":::",
              "type": "added"
            },
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/spoke-spoke-avnm.png\" alt-text=\"Diagram that shows using Virtual Network Manager for direct connectivity between spokes.\"...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        },
        {
          "additions": 2122,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-spoke.svg",
          "status": "added",
          "title": "Hub Spoke"
        },
        {
          "additions": 456,
          "deletions": 456,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-spoke-network-topology-architecture.svg",
          "status": "modified",
          "title": "Hub Spoke Network Topology Architecture"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-and-spoke.png",
          "status": "removed",
          "title": "Hub And Spoke"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/spoke-spoke-avnm.png",
          "status": "removed",
          "title": "Spoke Spoke Avnm"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/spoke-spoke-routing.png",
          "status": "removed",
          "title": "Spoke Spoke Routing"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:648d610c8428bee7484153c274fc529165e3a499",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
          "type": "added"
        },
        {
          "text": ".st2 {fill:url(grad0-7);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st3 {fill:50e6ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st4 {fill:c3f1ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st5 {fill:9cebff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st6 {fill:url(grad0-21);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st1 {fill:ffffff;stroke:none;stroke-width:0.25}",
          "type": "added"
        },
        {
          "text": ".st2 {fill:url(grad0-7);stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st3 {fill:50e6ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        },
        {
          "text": ".st4 {fill:c3f1ff;stroke:none;stroke-linecap:butt;stroke-width:0.75}",
          "type": "added"
        }
      ],
      "message": "diagrams",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "New scoped article or spec file",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 62,
      "sha": "648d610c8428bee7484153c274fc529165e3a499",
      "short_sha": "648d610",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 5157,
        "deletions": 459,
        "total": 5616
      },
      "summary": "Architecture Center: adds \".st6 {fill:url(grad0-21);stroke:none;stroke-linecap:butt;stroke-width:0.75}\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/648d610c8428bee7484153c274fc529165e3a499"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-03-30T20:19:48Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 10,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/firewall/choose-firewall-sku",
          "meaningful_changes": [
            {
              "text": "Azure Firewall Premium: Ideal for securing highly sensitive applications, such as payment processing. It includes advanced threat protection features like malware and TLS inspection.",
              "type": "removed"
            },
            {
              "text": "Azure Firewall Standard: Suitable for customers requiring Layer 3\u2013Layer 7 firewall capabilities with autoscaling to manage peak traffic up to 30 Gbps. It includes enterprise features like threat intelligence, DNS...",
              "type": "removed"
            },
            {
              "text": "Azure Firewall Basic: Designed for SMB customers with throughput requirements up to 250 Mbps.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/choose-firewall-sku.md",
          "status": "modified",
          "title": "Choose Firewall Sku"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:faf1a6da67138be3ff5d644cacecff0827984b0e",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Firewall Premium: Ideal for securing highly sensitive applications, such as payment processing. It includes advanced threat protection features like malware and TLS inspection.",
          "type": "removed"
        },
        {
          "text": "Azure Firewall Standard: Suitable for customers requiring Layer 3\u2013Layer 7 firewall capabilities with autoscaling to manage peak traffic up to 30 Gbps. It includes enterprise features like threat intelligence, DNS...",
          "type": "removed"
        },
        {
          "text": "Azure Firewall Basic: Designed for SMB customers with throughput requirements up to 250 Mbps.",
          "type": "removed"
        },
        {
          "text": "Azure Firewall Premium: Secure highly sensitive applications, such as payment processing. It includes advanced threat protection features like malware and TLS inspection.",
          "type": "added"
        },
        {
          "text": "Azure Firewall Standard: Get Layer 3\u2013Layer 7 firewall capabilities with autoscaling to manage peak traffic up to 30 Gbps. It includes enterprise features like threat intelligence, DNS proxy, custom DNS, and web...",
          "type": "added"
        },
        {
          "text": "Azure Firewall Basic: Throughput up to 250 Mbps.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313581 from duongau/duau/firewall-uuf-564137-choose-sku",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/choose-firewall-sku",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 62,
      "sha": "faf1a6da67138be3ff5d644cacecff0827984b0e",
      "short_sha": "faf1a6d",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 10,
        "deletions": 7,
        "total": 17
      },
      "summary": "Azure Firewall: adds \"Azure Firewall Standard: Get Layer 3\u2013Layer 7 firewall capabilities with autoscaling to manage peak traffic up to 30 Gbps. It includes enterprise features like threat intelligence, DNS proxy, custom DNS, and web...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/faf1a6da67138be3ff5d644cacecff0827984b0e"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T18:09:03Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 205,
          "deletions": 183,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-firewall-basic-portal-policy",
          "meaningful_changes": [
            {
              "text": "Deploy and configure Azure Firewall Basic and policy using the Azure portal",
              "type": "removed"
            },
            {
              "text": "Deploy and configure Azure Firewall Basic and policy by using the Azure portal",
              "type": "added"
            },
            {
              "text": "Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. It is...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-firewall-basic-portal-policy.md",
          "status": "modified",
          "title": "Deploy Firewall Basic Portal Policy"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ecefca55b50b9ace27b99e273030862b01118f4d",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Deploy and configure Azure Firewall Basic and policy using the Azure portal",
          "type": "removed"
        },
        {
          "text": "Deploy and configure Azure Firewall Basic and policy by using the Azure portal",
          "type": "added"
        },
        {
          "text": "Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. It is...",
          "type": "removed"
        },
        {
          "text": "Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. Deploy...",
          "type": "added"
        },
        {
          "text": "Filtering network and application traffic is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports...",
          "type": "removed"
        },
        {
          "text": "Filtering network and application traffic is an important part of an overall network security plan. For example, you might want to limit access to websites. Or, you might want to limit the outbound IP addresses and...",
          "type": "added"
        }
      ],
      "message": "docs: Replace VNet abbreviation with 'virtual network', rewrite portal navigation step",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/deploy-firewall-basic-portal-policy",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 62,
      "sha": "ecefca55b50b9ace27b99e273030862b01118f4d",
      "short_sha": "ecefca5",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 205,
        "deletions": 183,
        "total": 388
      },
      "summary": "Azure Firewall: adds \"Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. Deploy...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ecefca55b50b9ace27b99e273030862b01118f4d"
    },
    {
      "author": "Srijan Chakraborty",
      "date": "2026-04-28T10:20:48Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 17,
          "deletions": 14,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-sentinel",
          "meaningful_changes": [
            {
              "text": "Detect threats and use AI-assisted investigation capabilities",
              "type": "removed"
            },
            {
              "text": "Microsoft Sentinel uses analytics rules and built-in intelligence to analyze Traffic Analytics data and detect suspicious or malicious network activity. Microsoft Sentinel evaluates normalized network flow data to...",
              "type": "removed"
            },
            {
              "text": "Microsoft Sentinel correlates Traffic Analytics signals with other data sources and threat intelligence to provide high-fidelity detections. By combining network traffic context with MITRE ATT&CK techniques...",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-sentinel.md",
          "status": "modified",
          "title": "Traffic Analytics Sentinel"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f18b2fde2ec1c38a5cf30c4485f61cd3e70dc992",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Detect threats and use AI-assisted investigation capabilities",
          "type": "removed"
        },
        {
          "text": "Microsoft Sentinel uses analytics rules and built-in intelligence to analyze Traffic Analytics data and detect suspicious or malicious network activity. Microsoft Sentinel evaluates normalized network flow data to...",
          "type": "removed"
        },
        {
          "text": "Microsoft Sentinel correlates Traffic Analytics signals with other data sources and threat intelligence to provide high-fidelity detections. By combining network traffic context with MITRE ATT&CK techniques...",
          "type": "removed"
        },
        {
          "text": "When an incident is generated, Microsoft Sentinel provides AI-assisted investigation experience that helps analysts understand the scope and impact of the activity. Incidents are enriched with entities such as IP...",
          "type": "removed"
        },
        {
          "text": "By integrating Traffic Analytics with Microsoft Sentinel, you enable end-to-end network threat detection and investigation, combining large-scale network visibility with intelligent correlation and automated insights...",
          "type": "removed"
        },
        {
          "text": "Detection rule | What does it do? | What does it indicate?",
          "type": "removed"
        }
      ],
      "message": "Added table and improved section on Analytics Rules",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-sentinel",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "f18b2fde2ec1c38a5cf30c4485f61cd3e70dc992",
      "short_sha": "f18b2fd",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 17,
        "deletions": 14,
        "total": 31
      },
      "summary": "Network Watcher: removes \"By integrating Traffic Analytics with Microsoft Sentinel, you enable end-to-end network threat detection and investigation, combining large-scale network visibility with intelligent correlation and automated insights...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f18b2fde2ec1c38a5cf30c4485f61cd3e70dc992"
    },
    {
      "author": "Srijan Chakraborty",
      "date": "2026-04-24T07:24:20Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-sentinel",
          "meaningful_changes": [
            {
              "text": "Anomalous connection rate | Identifies an abnormal spike in allowed or denied connections between a source and destination based on behavioral baselines. | Potential brute force attempts, data exfiltration, or...",
              "type": "removed"
            },
            {
              "text": "Abnormal port-to-protocol usage | Identifies traffic where a well-known protocol is observed over a non-standard port using flow characteristics and behavioral analysis. | Malicious command-and-control or data...",
              "type": "removed"
            },
            {
              "text": "Geographic anomaly in traffic | Identifies network traffic originating from or communicating with unusual or previously unseen geographic locations. | Possible compromised workloads or unauthorized external...",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-sentinel.md",
          "status": "modified",
          "title": "Traffic Analytics Sentinel"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:13ac2a4f01a95090f311549557f2f9d3c7f0dad5",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Anomalous connection rate | Identifies an abnormal spike in allowed or denied connections between a source and destination based on behavioral baselines. | Potential brute force attempts, data exfiltration, or...",
          "type": "removed"
        },
        {
          "text": "Abnormal port-to-protocol usage | Identifies traffic where a well-known protocol is observed over a non-standard port using flow characteristics and behavioral analysis. | Malicious command-and-control or data...",
          "type": "removed"
        },
        {
          "text": "Geographic anomaly in traffic | Identifies network traffic originating from or communicating with unusual or previously unseen geographic locations. | Possible compromised workloads or unauthorized external...",
          "type": "removed"
        },
        {
          "text": "Excessive failed connections | Identifies repeated failed connection attempts to specific destinations or ports over a defined time window. | Identifies repeated failed connection attempts to specific destinations or...",
          "type": "removed"
        },
        {
          "text": "Suspicious inbound or outbound traffic volume | Identifies unusually large volumes of inbound or outbound traffic compared to historical baselines. | Potential data exfiltration, lateral movement, or...",
          "type": "removed"
        }
      ],
      "message": "Remove unsupported detection rules from traffic analytics",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-sentinel",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "13ac2a4f01a95090f311549557f2f9d3c7f0dad5",
      "short_sha": "13ac2a4",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 5,
        "total": 5
      },
      "summary": "Network Watcher: removes \"Excessive failed connections | Identifies repeated failed connection attempts to specific destinations or ports over a defined time window. | Identifies repeated failed connection attempts to specific destinations or...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/13ac2a4f01a95090f311549557f2f9d3c7f0dad5"
    },
    {
      "author": "Srijan Chakraborty",
      "date": "2026-04-15T11:47:48Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
          "meaningful_changes": [
            {
              "text": "In this article, you learn how to use the rule impact analyzer feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
              "type": "removed"
            },
            {
              "text": "In this article, you learn how to use the rule impact analyzer feature with network groups in the traffic analytics blade of Network Watcher. You can use the Azure portal to create a security admin configuration, add a...",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-rule-impact-analyzer.md",
          "status": "modified",
          "title": "Traffic Analytics Rule Impact Analyzer"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:17e9778d3afd5c987134c349d1f70c980cfdd86b",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "In this article, you learn how to use the rule impact analyzer feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
          "type": "removed"
        },
        {
          "text": "In this article, you learn how to use the rule impact analyzer feature with network groups in the traffic analytics blade of Network Watcher. You can use the Azure portal to create a security admin configuration, add a...",
          "type": "added"
        }
      ],
      "message": "Clarify usage of Rule Impact Analyzer in Traffic Analytics",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "17e9778d3afd5c987134c349d1f70c980cfdd86b",
      "short_sha": "17e9778",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Network Watcher: adds \"In this article, you learn how to use the rule impact analyzer feature with network groups in the traffic analytics blade of Network Watcher. You can use the Azure portal to create a security admin configuration, add a...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/17e9778d3afd5c987134c349d1f70c980cfdd86b"
    },
    {
      "author": "Jessie",
      "date": "2026-04-13T23:04:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 3,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "If autorotation does not meet the above-mentioned validation requirements, the certificate state changes to Pending revalidation, and you need to revalidate domain ownership.",
              "type": "removed"
            },
            {
              "text": "If your domain does not meet the above-mentioned validation requirements or has HTTPS disabled, the certificate state changes to Pending revalidation, and you must revalidate domain ownership.",
              "type": "added"
            },
            {
              "text": "You can manually revalidate domain ownership for renewal by:",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e4532df56fcfd4a6f8a9370523b880c5f93b0bf1",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If autorotation does not meet the above-mentioned validation requirements, the certificate state changes to Pending revalidation, and you need to revalidate domain ownership.",
          "type": "removed"
        },
        {
          "text": "If your domain does not meet the above-mentioned validation requirements or has HTTPS disabled, the certificate state changes to Pending revalidation, and you must revalidate domain ownership.",
          "type": "added"
        },
        {
          "text": "You can manually revalidate domain ownership for renewal by:",
          "type": "removed"
        },
        {
          "text": "Adding the required DNS validation record following step 3 for [domains pending validation]:(https://learn.microsoft.com/en-us/azure/frontdoor/standard-premium/how-to-add-custom-domainadd-a-new-custom-domain)",
          "type": "removed"
        },
        {
          "text": "You can manually revalidate domain ownership for renewal if you don't want to wait for the auto-rotation by either:",
          "type": "added"
        },
        {
          "text": "Adding the required DNS validation record following step 3 for domains pending validation",
          "type": "added"
        }
      ],
      "message": "Update certificate renewal instructions in FAQ",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "e4532df56fcfd4a6f8a9370523b880c5f93b0bf1",
      "short_sha": "e4532df",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 3,
        "total": 7
      },
      "summary": "Front Door: removes \"Adding the required DNS validation record following step 3 for [domains pending validation]:(https://learn.microsoft.com/en-us/azure/frontdoor/standard-premium/how-to-add-custom-domainadd-a-new-custom-domain)\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e4532df56fcfd4a6f8a9370523b880c5f93b0bf1"
    },
    {
      "author": "ZarrVenkat",
      "date": "2026-04-10T11:44:33Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/firewall/firewall-known-issues",
          "meaningful_changes": [
            {
              "text": "Physical zone 3 in South Central US | Basic, Standard, and Premium | - You can't deploy a new Azure Firewall in zone 3. Estimated date available: March 31, 2026 | We recommend you deploy a new Azure Firewall to the...",
              "type": "removed"
            },
            {
              "text": "Physical zone 3 in South Central US | Basic, Standard, and Premium | - You can't deploy a new Azure Firewall in zone 3. Estimated date available: June 31, 2027 | We recommend you deploy a new Azure Firewall to the...",
              "type": "added"
            }
          ],
          "path": "articles/firewall/firewall-known-issues.md",
          "status": "modified",
          "title": "Firewall Known Issues"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:869d8c0951986e92a0ba510ea4f25195b11e217b",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Physical zone 3 in South Central US | Basic, Standard, and Premium | - You can't deploy a new Azure Firewall in zone 3. Estimated date available: March 31, 2026 | We recommend you deploy a new Azure Firewall to the...",
          "type": "removed"
        },
        {
          "text": "Physical zone 3 in South Central US | Basic, Standard, and Premium | - You can't deploy a new Azure Firewall in zone 3. Estimated date available: June 31, 2027 | We recommend you deploy a new Azure Firewall to the...",
          "type": "added"
        }
      ],
      "message": "Update availability date for South Central US zone 3",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/firewall-known-issues",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "869d8c0951986e92a0ba510ea4f25195b11e217b",
      "short_sha": "869d8c0",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Azure Firewall: adds \"Physical zone 3 in South Central US | Basic, Standard, and Premium | - You can't deploy a new Azure Firewall in zone 3. Estimated date available: June 31, 2027 | We recommend you deploy a new Azure Firewall to the...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/869d8c0951986e92a0ba510ea4f25195b11e217b"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-09T15:49:00Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 8,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-manage-subnet",
          "meaningful_changes": [
            {
              "text": "If attempts to add, change, or delete a subnet in your virtual network fail, ensure there are no connections to other resources that may block the action:",
              "type": "added"
            },
            {
              "text": "Gateway connections",
              "type": "added"
            },
            {
              "text": "Virtual network peerings",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/virtual-network-manage-subnet.md",
          "status": "modified",
          "title": "Virtual Network Manage Subnet"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b866a42a0f6ef8536c78daa491fe8519c95a94df",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If attempts to add, change, or delete a subnet in your virtual network fail, ensure there are no connections to other resources that may block the action:",
          "type": "added"
        },
        {
          "text": "Gateway connections",
          "type": "added"
        },
        {
          "text": "Virtual network peerings",
          "type": "added"
        },
        {
          "text": "App Service Environment (ASE)",
          "type": "added"
        }
      ],
      "message": "Merge pull request #128110 from jeremywilley1024/patch-1",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-manage-subnet",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "b866a42a0f6ef8536c78daa491fe8519c95a94df",
      "short_sha": "b866a42",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 8,
        "deletions": 0,
        "total": 8
      },
      "summary": "Virtual Network: adds \"If attempts to add, change, or delete a subnet in your virtual network fail, ensure there are no connections to other resources that may block the action:\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b866a42a0f6ef8536c78daa491fe8519c95a94df"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-09T15:30:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 7,
          "deletions": 8,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-manage-subnet",
          "meaningful_changes": [
            {
              "text": "If attempts to add, change, or delete a subnet in your virtual network fail, ensure there are no connections to other resources that may block the action:",
              "type": "removed"
            },
            {
              "text": "1. Gateway connections",
              "type": "removed"
            },
            {
              "text": "4. Virtual network peerings",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/virtual-network-manage-subnet.md",
          "status": "modified",
          "title": "Virtual Network Manage Subnet"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:87837e95d1dc312e27a3c4f58b21bab872a4a5c3",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If attempts to add, change, or delete a subnet in your virtual network fail, ensure there are no connections to other resources that may block the action:",
          "type": "removed"
        },
        {
          "text": "1. Gateway connections",
          "type": "removed"
        },
        {
          "text": "4. Virtual network peerings",
          "type": "removed"
        },
        {
          "text": "5. App Service Environment (ASE)",
          "type": "removed"
        },
        {
          "text": "If attempts to add, change, or delete a subnet in your virtual network fail, ensure there are no connections to other resources that may block the action:",
          "type": "added"
        },
        {
          "text": "Gateway connections",
          "type": "added"
        }
      ],
      "message": "Refactor note on subnet management actions",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-manage-subnet",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "87837e95d1dc312e27a3c4f58b21bab872a4a5c3",
      "short_sha": "87837e9",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 7,
        "deletions": 8,
        "total": 15
      },
      "summary": "Virtual Network: adds \"If attempts to add, change, or delete a subnet in your virtual network fail, ensure there are no connections to other resources that may block the action:\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/87837e95d1dc312e27a3c4f58b21bab872a4a5c3"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T21:13:44Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
          "meaningful_changes": [
            {
              "text": "Traffic analytics enabled for your virtual network flow logs or network security group fow logs. For more information, see Enable traffic analytics on virtual network flow logs or Enable traffic analytics on network...",
              "type": "removed"
            },
            {
              "text": "Traffic analytics enabled for your virtual network flow logs or network security group flow logs. For more information, see Enable traffic analytics on virtual network flow logs or Enable traffic analytics on network...",
              "type": "added"
            },
            {
              "text": "Taffic Analytics overview",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-rule-impact-analyzer.md",
          "status": "modified",
          "title": "Traffic Analytics Rule Impact Analyzer"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:157a721822ea766ecedfd13bc257d26a115aa926",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Traffic analytics enabled for your virtual network flow logs or network security group fow logs. For more information, see Enable traffic analytics on virtual network flow logs or Enable traffic analytics on network...",
          "type": "removed"
        },
        {
          "text": "Traffic analytics enabled for your virtual network flow logs or network security group flow logs. For more information, see Enable traffic analytics on virtual network flow logs or Enable traffic analytics on network...",
          "type": "added"
        },
        {
          "text": "Taffic Analytics overview",
          "type": "removed"
        },
        {
          "text": "Traffic Analytics overview",
          "type": "added"
        }
      ],
      "message": "tweaks",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "157a721822ea766ecedfd13bc257d26a115aa926",
      "short_sha": "157a721",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 4,
        "total": 8
      },
      "summary": "Network Watcher: adds \"Traffic analytics enabled for your virtual network flow logs or network security group flow logs. For more information, see Enable traffic analytics on virtual network flow logs or Enable traffic analytics on network...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/157a721822ea766ecedfd13bc257d26a115aa926"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-05T19:10:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 13,
          "deletions": 13,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
          "meaningful_changes": [
            {
              "text": "Use rule impact analyzer in traffic analytics",
              "type": "added"
            },
            {
              "text": "A network group. If you don't have a network group, see Create a network group.",
              "type": "removed"
            },
            {
              "text": "The right permissions. Traffic Analytics must be enabled to run Rule Impact Analysis, so ensure you have the required permissions to access and operate on Traffic Analytics data. For details, see Azure RBAC Permissions...",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-what-if.md",
          "status": "modified",
          "title": "Traffic Analytics What If"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:8a3de73b1117bf0828095218e8226916504592a0",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Use rule impact analyzer in traffic analytics",
          "type": "added"
        },
        {
          "text": "A network group. If you don't have a network group, see Create a network group.",
          "type": "removed"
        },
        {
          "text": "The right permissions. Traffic Analytics must be enabled to run Rule Impact Analysis, so ensure you have the required permissions to access and operate on Traffic Analytics data. For details, see Azure RBAC Permissions...",
          "type": "removed"
        },
        {
          "text": "Traffic analytics enabled for your virtual network flow logs or network security group fow logs. For more information, see Enable traffic analytics on virtual network flow logs or Enable traffic analytics on network...",
          "type": "added"
        },
        {
          "text": "Required role-based access control (RBAC) permissions. For more information, see Trafic analytics RBAC Permissions.",
          "type": "added"
        },
        {
          "text": "Access to the Azure portal",
          "type": "removed"
        }
      ],
      "message": "draft article",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 60,
      "sha": "8a3de73b1117bf0828095218e8226916504592a0",
      "short_sha": "8a3de73",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 13,
        "deletions": 13,
        "total": 26
      },
      "summary": "Network Watcher: adds \"Traffic analytics enabled for your virtual network flow logs or network security group fow logs. For more information, see Enable traffic analytics on virtual network flow logs or Enable traffic analytics on network...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/8a3de73b1117bf0828095218e8226916504592a0"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-28T16:34:22Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 18,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/firewall/fqdn-tags",
          "meaningful_changes": [
            {
              "text": "FQDN tag port behavior",
              "type": "added"
            },
            {
              "text": "When using an FQDN tag in an Azure Firewall application rule, traffic may be allowed over both HTTPS (port 443) and HTTP (port 80), even if the rule specifies only https:443. This is expected because FQDN tags map to...",
              "type": "added"
            },
            {
              "text": "Even with https:443 configured, HTTP (port 80) traffic may be allowed.",
              "type": "added"
            }
          ],
          "path": "articles/firewall/fqdn-tags.md",
          "status": "modified",
          "title": "Fqdn Tags"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:4efa4ffc46260b3d09d63db86417dd2c357f3479",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "FQDN tag port behavior",
          "type": "added"
        },
        {
          "text": "When using an FQDN tag in an Azure Firewall application rule, traffic may be allowed over both HTTPS (port 443) and HTTP (port 80), even if the rule specifies only https:443. This is expected because FQDN tags map to...",
          "type": "added"
        },
        {
          "text": "Even with https:443 configured, HTTP (port 80) traffic may be allowed.",
          "type": "added"
        },
        {
          "text": "This behavior applies only to FQDN tag rules. Custom FQDN rules enforce the specified protocol and port.",
          "type": "added"
        },
        {
          "text": "FQDN tag | Protocol configured | May also allow",
          "type": "added"
        },
        {
          "text": "WindowsUpdate | HTTPS:443 | HTTP:80 \u2014 this is expected behavior, not a misconfiguration.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #315232 from sujamiya/firewall-fqdn-tag-port-behavior",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/fqdn-tags",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 58,
      "sha": "4efa4ffc46260b3d09d63db86417dd2c357f3479",
      "short_sha": "4efa4ff",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 18,
        "deletions": 0,
        "total": 18
      },
      "summary": "Azure Firewall: adds \"When using an FQDN tag in an Azure Firewall application rule, traffic may be allowed over both HTTPS (port 443) and HTTP (port 80), even if the rule specifies only https:443. This is expected because FQDN tags map to...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/4efa4ffc46260b3d09d63db86417dd2c357f3479"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-22T18:55:23Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of Application Gateway for Containers are...",
              "type": "removed"
            },
            {
              "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of the ALB Controller are not supported with...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/faq.yml",
          "status": "modified",
          "title": "For Containers Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a38c05ec646a1d53952419cad97dd2345b38894c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of Application Gateway for Containers are...",
          "type": "removed"
        },
        {
          "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of the ALB Controller are not supported with...",
          "type": "added"
        }
      ],
      "message": "Update faq.yml",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "High-impact networking behavior or lifecycle term",
        "Matches high-interest App Gateway for Containers / AKS topic"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 58,
      "sha": "a38c05ec646a1d53952419cad97dd2345b38894c",
      "short_sha": "a38c05e",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: adds \"answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of the ALB Controller are not supported with...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a38c05ec646a1d53952419cad97dd2345b38894c"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:43:10Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "question: Does Application Gateway for Containers support AKS Automatic?",
              "type": "added"
            },
            {
              "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of Application Gateway for Containers are...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/faq.yml",
          "status": "modified",
          "title": "For Containers Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:c1d3b09f33ee172c0f9238bf2a925d1a8da18634",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "question: Does Application Gateway for Containers support AKS Automatic?",
          "type": "added"
        },
        {
          "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of Application Gateway for Containers are...",
          "type": "added"
        }
      ],
      "message": "Update faq.yml",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "High-impact networking behavior or lifecycle term",
        "Matches high-interest App Gateway for Containers / AKS topic"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 58,
      "sha": "c1d3b09f33ee172c0f9238bf2a925d1a8da18634",
      "short_sha": "c1d3b09",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 1,
        "total": 5
      },
      "summary": "Application Gateway: adds \"answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of Application Gateway for Containers are...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/c1d3b09f33ee172c0f9238bf2a925d1a8da18634"
    },
    {
      "author": "nleut",
      "date": "2026-04-13T16:30:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
          "meaningful_changes": [
            {
              "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
              "type": "removed"
            },
            {
              "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
              "type": "added"
            }
          ],
          "path": "docs/networking/guide/ipv6-ip-planning.md",
          "status": "modified",
          "title": "Ipv6 Ip Planning"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:428900c5d5cfd07c62f1baefab68bfef9a0a754d",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
          "type": "removed"
        },
        {
          "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
          "type": "added"
        }
      ],
      "message": "Clarified internet advertisement for customer-owned IPv6 addresses",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 58,
      "sha": "428900c5d5cfd07c62f1baefab68bfef9a0a754d",
      "short_sha": "428900c",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Architecture Center: adds \"Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/428900c5d5cfd07c62f1baefab68bfef9a0a754d"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-09T15:57:05Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 35,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-routing-appliance-overview",
          "meaningful_changes": [
            {
              "text": "Common routing patterns (hub and spoke)",
              "type": "added"
            },
            {
              "text": "Most deployments use a virtual network routing appliance in a hub virtual network to provide scalable spoke-to-spoke (east-west) transit. Common patterns include:",
              "type": "added"
            },
            {
              "text": "Pattern 1: Route Azure private address space to the appliance",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/virtual-network-routing-appliance-overview.md",
          "status": "modified",
          "title": "Virtual Network Routing Appliance Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:c0def706fc559641b30efd18bdac4f28b55d3d11",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Common routing patterns (hub and spoke)",
          "type": "added"
        },
        {
          "text": "Most deployments use a virtual network routing appliance in a hub virtual network to provide scalable spoke-to-spoke (east-west) transit. Common patterns include:",
          "type": "added"
        },
        {
          "text": "Pattern 1: Route Azure private address space to the appliance",
          "type": "added"
        },
        {
          "text": "Use UDRs on spoke subnets to route your Azure private address space (for example, RFC1918) to the routing appliance, while routing internet egress and on-premises prefixes to other next hops as appropriate.",
          "type": "added"
        },
        {
          "text": "This pattern is useful when:",
          "type": "added"
        },
        {
          "text": "You want the routing appliance to carry east-west traffic, but not become the default next hop for all traffic.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #128199 from simonpainter/update/network-virtual-appliance-docs",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-routing-appliance-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 58,
      "sha": "c0def706fc559641b30efd18bdac4f28b55d3d11",
      "short_sha": "c0def70",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 35,
        "deletions": 0,
        "total": 35
      },
      "summary": "Virtual Network: adds \"Use UDRs on spoke subnets to route your Azure private address space (for example, RFC1918) to the routing appliance, while routing internet egress and on-premises prefixes to other next hops as appropriate.\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/c0def706fc559641b30efd18bdac4f28b55d3d11"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T19:21:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 7,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "Flows by NSG and rule",
              "type": "removed"
            },
            {
              "text": "Flows by virtual network and rule",
              "type": "added"
            },
            {
              "text": "Flows by network security group and rule",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/flow-logs-power-bi.md",
          "status": "modified",
          "title": "Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:64968c7196f650d3587376d5183b2425fb8a2c11",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Flows by NSG and rule",
          "type": "removed"
        },
        {
          "text": "Flows by virtual network and rule",
          "type": "added"
        },
        {
          "text": "Flows by network security group and rule",
          "type": "added"
        },
        {
          "text": "Modify the queries if other data exists in another directory.",
          "type": "removed"
        },
        {
          "text": "Modify the queries if your data exists in a different directory.",
          "type": "added"
        },
        {
          "text": "Modify the queries if other data exists in another directory.",
          "type": "removed"
        }
      ],
      "message": "Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-whatif",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 58,
      "sha": "64968c7196f650d3587376d5183b2425fb8a2c11",
      "short_sha": "64968c7",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 7,
        "deletions": 5,
        "total": 12
      },
      "summary": "Network Watcher: adds \"Flows by network security group and rule\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/64968c7196f650d3587376d5183b2425fb8a2c11"
    },
    {
      "author": "shmallad",
      "date": "2026-04-07T06:30:20Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
          "meaningful_changes": [
            {
              "text": "Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/network-security-perimeter-concepts.md",
          "status": "modified",
          "title": "Network Security Perimeter Concepts"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6b72868a553ca53d9185b6d3b9d2706725b0465f",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available",
          "type": "removed"
        }
      ],
      "message": "Remove Service Bus from network security perimeter table",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language",
        "Removal, deprecation, or unsupported guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 58,
      "sha": "6b72868a553ca53d9185b6d3b9d2706725b0465f",
      "short_sha": "6b72868",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 1,
        "total": 1
      },
      "summary": "Private Link: removes \"Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6b72868a553ca53d9185b6d3b9d2706725b0465f"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T19:36:14Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "Flows by NSG and rule",
              "type": "removed"
            },
            {
              "text": "Flows by network security group and rule",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi.md",
          "status": "modified",
          "title": "Network Watcher Visualize NSG Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:7c26dda38a1c3b77ed25507e0de19d7249868434",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Flows by NSG and rule",
          "type": "removed"
        },
        {
          "text": "Flows by network security group and rule",
          "type": "added"
        }
      ],
      "message": "edit bullet points in pivot zones",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 58,
      "sha": "7c26dda38a1c3b77ed25507e0de19d7249868434",
      "short_sha": "7c26dda",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 1,
        "total": 5
      },
      "summary": "Network Watcher: adds \"Flows by network security group and rule\".",
      "tier": "skim",
      "tier_label": "Worth a skim",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/7c26dda38a1c3b77ed25507e0de19d7249868434"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T19:48:50Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 22,
          "deletions": 13,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": ":::image type=\"content\" source=\"./media/flow-logs-power-bi/scenario.png\" alt-text=\"Diagram of the scenario.\":::",
              "type": "added"
            },
            {
              "text": "The template provided is editable so you can modify it to add new data, visuals, or edit queries to suit your needs.",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"./media/flow-logs-power-bi/scenario.png\" alt-text=\"Diagram of the scenario.\":::",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi.md",
          "status": "modified",
          "title": "Network Watcher Visualize NSG Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:51e8716dd0a397f6940b3aff96fe663fe2977c79",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": ":::image type=\"content\" source=\"./media/flow-logs-power-bi/scenario.png\" alt-text=\"Diagram of the scenario.\":::",
          "type": "added"
        },
        {
          "text": "The template provided is editable so you can modify it to add new data, visuals, or edit queries to suit your needs.",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"./media/flow-logs-power-bi/scenario.png\" alt-text=\"Diagram of the scenario.\":::",
          "type": "removed"
        },
        {
          "text": "The template is editable so you can modify it to add new data, visuals, or edit queries to suit your needs.",
          "type": "added"
        },
        {
          "text": "StorageAccountName: the name of the storage account containing the flow logs that you would like to load and visualize.",
          "type": "removed"
        },
        {
          "text": "NumberOfLogFiles: the number of log files that you would like to download and visualize in Power BI. For example, if 50 is specified, the 50 latest log files. If we have 2 NSGs enabled and configured to send NSG flow...",
          "type": "removed"
        }
      ],
      "message": "setup section",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 56,
      "sha": "51e8716dd0a397f6940b3aff96fe663fe2977c79",
      "short_sha": "51e8716",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 22,
        "deletions": 13,
        "total": 35
      },
      "summary": "Network Watcher: adds \"The template is editable so you can modify it to add new data, visuals, or edit queries to suit your needs.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/51e8716dd0a397f6940b3aff96fe663fe2977c79"
    },
    {
      "author": "Chad Kittel",
      "date": "2026-04-13T13:26:15Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 13,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Azure Firewall is a managed cloud-based network security service that protects Virtual Network resources. This stateful firewall service has built-in high availability and unrestricted cloud scalability to help you...",
              "type": "removed"
            },
            {
              "text": "Azure Firewall is a managed cloud-based network security service that protects Virtual Network resources. This stateful firewall service has built-in high availability and unrestricted cloud scalability to help you...",
              "type": "added"
            },
            {
              "text": "Azure VPN Gateway is a virtual network gateway that sends encrypted traffic between a virtual network on Azure and different networks over the public internet. You can also use VPN Gateway to send encrypted traffic...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:5eaae9073f926e84a0d71c1a73d051312ff7a9b3",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Firewall is a managed cloud-based network security service that protects Virtual Network resources. This stateful firewall service has built-in high availability and unrestricted cloud scalability to help you...",
          "type": "removed"
        },
        {
          "text": "Azure Firewall is a managed cloud-based network security service that protects Virtual Network resources. This stateful firewall service has built-in high availability and unrestricted cloud scalability to help you...",
          "type": "added"
        },
        {
          "text": "Azure VPN Gateway is a virtual network gateway that sends encrypted traffic between a virtual network on Azure and different networks over the public internet. You can also use VPN Gateway to send encrypted traffic...",
          "type": "removed"
        },
        {
          "text": "In this architecture, Azure Firewall has multiple potential roles. The firewall is the primary egress point for traffic from peered spoke virtual networks to the internet. The firewall can also inspect inbound traffic...",
          "type": "added"
        },
        {
          "text": "Azure VPN Gateway is a virtual network gateway that sends encrypted traffic between a virtual network on Azure and different networks over the public internet. You can also use VPN Gateway to send encrypted traffic...",
          "type": "added"
        },
        {
          "text": "In this architecture, VPN Gateway can connect spokes to the remote network. Spokes typically don't deploy their own VPN gateway. They use the centralized solution that the hub provides. To manage this connectivity, you...",
          "type": "added"
        }
      ],
      "message": "Apply suggestions from code review",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 54,
      "sha": "5eaae9073f926e84a0d71c1a73d051312ff7a9b3",
      "short_sha": "5eaae90",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 13,
        "deletions": 7,
        "total": 20
      },
      "summary": "Architecture Center: adds \"In this architecture, Azure Firewall has multiple potential roles. The firewall is the primary egress point for traffic from peered spoke virtual networks to the internet. The firewall can also inspect inbound traffic...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/5eaae9073f926e84a0d71c1a73d051312ff7a9b3"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T04:50:23Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/quickstart-create-nat-gateway-v2",
          "meaningful_changes": [
            {
              "text": "Terraform is currently unavailable. Use the Azure portal, CLI, or Azure PowerShell to create a Standard V2 NAT Gateway.",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/quickstart-create-nat-gateway-v2.md",
          "status": "modified",
          "title": "Quickstart Create Nat Gateway V2"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fa96d594180e9c0e4c09bcfed5d9ea88778cad10",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Terraform is currently unavailable. Use the Azure portal, CLI, or Azure PowerShell to create a Standard V2 NAT Gateway.",
          "type": "removed"
        }
      ],
      "message": "docs: Remove Terraform unavailable note from NAT Gateway V2 quickstart",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/quickstart-create-nat-gateway-v2",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 54,
      "sha": "fa96d594180e9c0e4c09bcfed5d9ea88778cad10",
      "short_sha": "fa96d59",
      "signal": "Removal or deprecation",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 3,
        "total": 3
      },
      "summary": "NAT Gateway: removes \"Terraform is currently unavailable. Use the Azure portal, CLI, or Azure PowerShell to create a Standard V2 NAT Gateway.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fa96d594180e9c0e4c09bcfed5d9ea88778cad10"
    },
    {
      "author": "simipaul",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 6,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Remote spoke access for virtual machines - The hub can be a convenient location to build out a cross-organization remote connectivity solution for RDP and SSH access to virtual machines distributed throughout spoke...",
              "type": "removed"
            },
            {
              "text": "Remote spoke access for virtual machines - The hub can be a convenient location to build out a cross-organization remote connectivity solution for Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to...",
              "type": "added"
            },
            {
              "text": "Azure Bastion is a fully managed service that provides more secure and seamless Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to VMs without exposing their public IP addresses. In this...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:2c8d5afe41cc54eaa3b6613b35490e80dc89f60f",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Remote spoke access for virtual machines - The hub can be a convenient location to build out a cross-organization remote connectivity solution for RDP and SSH access to virtual machines distributed throughout spoke...",
          "type": "removed"
        },
        {
          "text": "Remote spoke access for virtual machines - The hub can be a convenient location to build out a cross-organization remote connectivity solution for Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to...",
          "type": "added"
        },
        {
          "text": "Azure Bastion is a fully managed service that provides more secure and seamless Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to VMs without exposing their public IP addresses. In this...",
          "type": "removed"
        },
        {
          "text": "Azure Bastion is a fully managed service that provides more secure and seamless RDP and SSH access to VMs without exposing their public IP addresses. In this architecture, Azure Bastion is used as a managed offering to...",
          "type": "added"
        },
        {
          "text": "In this architecture, Azure Firewall has multiple potential roles. The firewall is the primary egress point for Internet-destined traffic from the peered spoke virtual networks. The firewall can also be used to inspect...",
          "type": "removed"
        },
        {
          "text": "In this architecture, Azure Firewall has multiple potential roles. The firewall is the primary egress point for Internet-destined traffic from the peered spoke virtual networks. The firewall can also be used to inspect...",
          "type": "added"
        }
      ],
      "message": "Expanding on acronyms for first use",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 54,
      "sha": "2c8d5afe41cc54eaa3b6613b35490e80dc89f60f",
      "short_sha": "2c8d5af",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 6,
        "deletions": 6,
        "total": 12
      },
      "summary": "Architecture Center: adds \"In this architecture, Azure Firewall has multiple potential roles. The firewall is the primary egress point for Internet-destined traffic from the peered spoke virtual networks. The firewall can also be used to inspect...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/2c8d5afe41cc54eaa3b6613b35490e80dc89f60f"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-03-31T19:51:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/gateway-migration",
          "meaningful_changes": [
            {
              "text": "GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. For more information, see Create multiple prefixes for a subnet.",
              "type": "removed"
            },
            {
              "text": "GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. For more information, see Create multiple prefixes for a subnet.",
              "type": "added"
            },
            {
              "text": "Adding multiple prefixes to the GatewaySubnet is currently in Public Preview and supported only via PowerShell. When you add an additional prefix, both prefixes will be used by the migrated gateway, so don't delete the...",
              "type": "removed"
            }
          ],
          "path": "articles/expressroute/gateway-migration.md",
          "status": "modified",
          "title": "Gateway Migration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1141304f69038f2152edd598b2037cd59fc7183e",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. For more information, see Create multiple prefixes for a subnet.",
          "type": "removed"
        },
        {
          "text": "GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. For more information, see Create multiple prefixes for a subnet.",
          "type": "added"
        },
        {
          "text": "Adding multiple prefixes to the GatewaySubnet is currently in Public Preview and supported only via PowerShell. When you add an additional prefix, both prefixes will be used by the migrated gateway, so don't delete the...",
          "type": "removed"
        },
        {
          "text": "Adding multiple prefixes to the GatewaySubnet is currently in Public Preview and supported only via PowerShell. When you add an additional prefix, both prefixes will be used by the migrated gateway, so don't delete the...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313855 from fibarrio/patch-1",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/gateway-migration",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 54,
      "sha": "1141304f69038f2152edd598b2037cd59fc7183e",
      "short_sha": "1141304",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "ExpressRoute: adds \"Adding multiple prefixes to the GatewaySubnet is currently in Public Preview and supported only via PowerShell. When you add an additional prefix, both prefixes will be used by the migrated gateway, so don't delete the...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1141304f69038f2152edd598b2037cd59fc7183e"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-23T22:00:00Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 9,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
          "meaningful_changes": [
            {
              "text": "1. Optimize Performance: Different algorithms can help distribute traffic more effectively based on the current load, server capacity, and other metrics. This ensures that applications run smoothly and efficiently...",
              "type": "removed"
            },
            {
              "text": "2. Enhance Reliability: Algorithms like Circuit Breaker and Slow Start can improve the resilience of the system by preventing overloads and managing server recovery. This helps maintain service availability and reduces...",
              "type": "removed"
            },
            {
              "text": "3. Improve Resource Utilization: Weighted Round Robin and Load Aware Routing can ensure that more powerful servers handle a larger share of the traffic, optimizing resource utilization, and reducing costs.",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/load-balancing-strategies.md",
          "status": "modified",
          "title": "Load Balancing Strategies"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0b537a1b7f845c663de9cb50d2739c1c06a572ee",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1. Optimize Performance: Different algorithms can help distribute traffic more effectively based on the current load, server capacity, and other metrics. This ensures that applications run smoothly and efficiently...",
          "type": "removed"
        },
        {
          "text": "2. Enhance Reliability: Algorithms like Circuit Breaker and Slow Start can improve the resilience of the system by preventing overloads and managing server recovery. This helps maintain service availability and reduces...",
          "type": "removed"
        },
        {
          "text": "3. Improve Resource Utilization: Weighted Round Robin and Load Aware Routing can ensure that more powerful servers handle a larger share of the traffic, optimizing resource utilization, and reducing costs.",
          "type": "removed"
        },
        {
          "text": "4. Adapt to Changing Conditions: In dynamic environments, the load on backend servers can vary significantly. Load Aware Routing and Priority-based algorithms allow the system to adapt to these changes in real-time...",
          "type": "removed"
        },
        {
          "text": "5. Tailor to Specific Needs: Different applications and services can have unique requirements. By offering multiple load balancing options, Application Gateway for Containers allows customers to tailor the load...",
          "type": "removed"
        },
        {
          "text": "Optimize Performance: Different algorithms can help distribute traffic more effectively based on the current load, server capacity, and other metrics. This ensures that applications run smoothly and efficiently, even...",
          "type": "added"
        }
      ],
      "message": "Refactor load balancing algorithm benefits for clarity",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 52,
      "sha": "0b537a1b7f845c663de9cb50d2739c1c06a572ee",
      "short_sha": "0b537a1",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 9,
        "total": 14
      },
      "summary": "Application Gateway: adds \"Optimize Performance: Different algorithms can help distribute traffic more effectively based on the current load, server capacity, and other metrics. This ensures that applications run smoothly and efficiently, even...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0b537a1b7f845c663de9cb50d2739c1c06a572ee"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-23T16:39:27Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
          "meaningful_changes": [
            {
              "text": "1.2.3| v1.1 | v1.26 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port, and TLS mode",
              "type": "removed"
            },
            {
              "text": "1.2.3| v1.1 | v1.26 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port and TLS mode",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/alb-controller-release-notes.md",
          "status": "modified",
          "title": "Alb Controller Release Notes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:502b3bb0b301fabb1fbafe79cdb11ca27727199b",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1.2.3| v1.1 | v1.26 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port, and TLS mode",
          "type": "removed"
        },
        {
          "text": "1.2.3| v1.1 | v1.26 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port and TLS mode",
          "type": "added"
        }
      ],
      "message": "Update alb-controller-release-notes.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 52,
      "sha": "502b3bb0b301fabb1fbafe79cdb11ca27727199b",
      "short_sha": "502b3bb",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: adds \"1.2.3| v1.1 | v1.26 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port and TLS mode\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/502b3bb0b301fabb1fbafe79cdb11ca27727199b"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-22T17:58:10Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 6,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/overview",
          "meaningful_changes": [
            {
              "text": "Flexible load balancing strategies",
              "type": "added"
            },
            {
              "text": "Load Aware Routing",
              "type": "added"
            },
            {
              "text": "Weighted Round Robin",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/overview.md",
          "status": "modified",
          "title": "For Containers Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:eed65c2dbbfc34fd9d04c4e6053009a91c64e2ae",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Flexible load balancing strategies",
          "type": "added"
        },
        {
          "text": "Load Aware Routing",
          "type": "added"
        },
        {
          "text": "Weighted Round Robin",
          "type": "added"
        },
        {
          "text": "Load Aware Routing",
          "type": "removed"
        },
        {
          "text": "Traffic splitting / weighted round robin",
          "type": "removed"
        }
      ],
      "message": "Update overview with flexible load balancing strategies",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/overview",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 52,
      "sha": "eed65c2dbbfc34fd9d04c4e6053009a91c64e2ae",
      "short_sha": "eed65c2",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 6,
        "deletions": 2,
        "total": 8
      },
      "summary": "Application Gateway: adds \"Load Aware Routing\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/eed65c2dbbfc34fd9d04c4e6053009a91c64e2ae"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-09T15:27:35Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-routing-appliance-overview",
          "meaningful_changes": [
            {
              "text": "Most deployments use virtual network routing appliance in a hub virtual network to provide scalable spoke-to-spoke (east-west) transit. Common patterns include:",
              "type": "removed"
            },
            {
              "text": "Most deployments use a virtual network routing appliance in a hub virtual network to provide scalable spoke-to-spoke (east-west) transit. Common patterns include:",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/virtual-network-routing-appliance-overview.md",
          "status": "modified",
          "title": "Virtual Network Routing Appliance Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:9892b8e8f7cafb76b251daadfb1dd06d0d528da1",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Most deployments use virtual network routing appliance in a hub virtual network to provide scalable spoke-to-spoke (east-west) transit. Common patterns include:",
          "type": "removed"
        },
        {
          "text": "Most deployments use a virtual network routing appliance in a hub virtual network to provide scalable spoke-to-spoke (east-west) transit. Common patterns include:",
          "type": "added"
        }
      ],
      "message": "Apply suggestion from @v-regandowner",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-routing-appliance-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 52,
      "sha": "9892b8e8f7cafb76b251daadfb1dd06d0d528da1",
      "short_sha": "9892b8e",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"Most deployments use a virtual network routing appliance in a hub virtual network to provide scalable spoke-to-spoke (east-west) transit. Common patterns include:\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9892b8e8f7cafb76b251daadfb1dd06d0d528da1"
    },
    {
      "author": "Jose Moreno",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 6,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Jose Moreno | Principal Engineer",
              "type": "removed"
            },
            {
              "text": "Jose Moreno | Solutions Engineer",
              "type": "added"
            },
            {
              "text": "Add more regions and fully-mesh the hubs to each other - Spoke-to-spoke networking for multi-region connectivity patterns and Multi-region networking with Azure Route Server",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:b0450e25dd3ea3a0deb4f81b1baaba4811c6e3a5",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Jose Moreno | Principal Engineer",
          "type": "removed"
        },
        {
          "text": "Jose Moreno | Solutions Engineer",
          "type": "added"
        },
        {
          "text": "Add more regions and fully-mesh the hubs to each other - Spoke-to-spoke networking for multi-region connectivity patterns and Multi-region networking with Azure Route Server",
          "type": "removed"
        },
        {
          "text": "Add more regions - Use Azure Firewall to route a multi-hub and spoke topology.",
          "type": "added"
        },
        {
          "text": "Replace Azure Firewall with a custom network virtual appliance (NVA) - Deploy highly available NVAs",
          "type": "removed"
        },
        {
          "text": "Advanced spoke-to-spoke patterns - Spoke-to-spoke networking.",
          "type": "added"
        }
      ],
      "message": "Updated next steps",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 52,
      "sha": "b0450e25dd3ea3a0deb4f81b1baaba4811c6e3a5",
      "short_sha": "b0450e2",
      "signal": "New or changed support",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 6,
        "deletions": 4,
        "total": 10
      },
      "summary": "Architecture Center: adds \"Add more regions - Use Azure Firewall to route a multi-hub and spoke topology.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/b0450e25dd3ea3a0deb4f81b1baaba4811c6e3a5"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-05T18:45:20Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 5,
      "files": [
        {
          "additions": 123,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure Network Watcher",
              "type": "added"
            },
            {
              "text": "In this article, you learn how to use the Rule Impact Analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
              "type": "added"
            },
            {
              "text": "The Rules Impact Analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-what-if.md",
          "status": "added",
          "title": "Traffic Analytics What If"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-what-if/image1.png",
          "status": "added",
          "title": "Image1"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-what-if/image2.png",
          "status": "added",
          "title": "Image2"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-what-if/image3.png",
          "status": "added",
          "title": "Image3"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-what-if/image4.png",
          "status": "added",
          "title": "Image4"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a872c7e7708c11f55b19d09a5a8835e5df230418",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "titleSuffix: Azure Network Watcher",
          "type": "added"
        },
        {
          "text": "In this article, you learn how to use the Rule Impact Analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
          "type": "added"
        },
        {
          "text": "The Rules Impact Analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
          "type": "added"
        },
        {
          "text": "An Azure account with an active subscription. Create an account for free.",
          "type": "added"
        },
        {
          "text": "A network group. If you don't have a network group, see Create a network group.",
          "type": "added"
        },
        {
          "text": "The right permissions. Traffic Analytics must be enabled to run Rule Impact Analysis, so ensure you have the required permissions to access and operate on Traffic Analytics data. For details, see Azure RBAC Permissions...",
          "type": "added"
        }
      ],
      "message": "draft article",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 52,
      "sha": "a872c7e7708c11f55b19d09a5a8835e5df230418",
      "short_sha": "a872c7e",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 123,
        "deletions": 0,
        "total": 123
      },
      "summary": "Network Watcher: adds \"The Rules Impact Analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a872c7e7708c11f55b19d09a5a8835e5df230418"
    },
    {
      "author": "Srijan Chakraborty",
      "date": "2026-04-02T09:06:41Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 12,
          "deletions": 12,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/vnet-flow-logs-overview",
          "meaningful_changes": [
            {
              "text": "What is a platform rule in flow logs",
              "type": "removed"
            },
            {
              "text": "In flow logs, a platform rule represents network traffic that is processed by the Azure platform itself rather than by user\u2011configured rules, such as Network Security Groups (NSGs) or Azure Virtual Network Manager...",
              "type": "removed"
            },
            {
              "text": "In some scenarios, traffic associated with you application or workload may appear under a platform rule. This can occur in a limited number of well\u2011understood cases, such as when load\u2011balanced connections are recreated...",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/vnet-flow-logs-overview.md",
          "status": "modified",
          "title": "Vnet Flow Logs Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e3402b400a962e14d456fe5ad6ecf9231bd30260",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "What is a platform rule in flow logs",
          "type": "removed"
        },
        {
          "text": "In flow logs, a platform rule represents network traffic that is processed by the Azure platform itself rather than by user\u2011configured rules, such as Network Security Groups (NSGs) or Azure Virtual Network Manager...",
          "type": "removed"
        },
        {
          "text": "In some scenarios, traffic associated with you application or workload may appear under a platform rule. This can occur in a limited number of well\u2011understood cases, such as when load\u2011balanced connections are recreated...",
          "type": "removed"
        },
        {
          "text": "Does the presence of platform rules affect traffic?",
          "type": "removed"
        },
        {
          "text": "No. Platform rules do not change your traffic behavior, connectivity, security posture, or performance. They only affect how certain network flows are represented in flow logs. Platform rule entries are provided for...",
          "type": "removed"
        },
        {
          "text": "What is a platform rule in flow logs",
          "type": "added"
        }
      ],
      "message": "Reorganised platform rules section in flow logs overview",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/vnet-flow-logs-overview",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 52,
      "sha": "e3402b400a962e14d456fe5ad6ecf9231bd30260",
      "short_sha": "e3402b4",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 12,
        "deletions": 12,
        "total": 24
      },
      "summary": "Network Watcher: adds \"What is a platform rule in flow logs\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e3402b400a962e14d456fe5ad6ecf9231bd30260"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-24T01:01:27Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
          "meaningful_changes": [
            {
              "text": "The ALB Controller Istio Extension consists of two pods, deployed in active / standby configuration to allow resiliency during node failure, handle certificate lifecycle management between Application Gateway for...",
              "type": "removed"
            },
            {
              "text": "The ALB Controller Istio Extension consists of two pods, deployed in active / standby configuration to allow resiliency during node failure, handle certificate lifecycle management between Application Gateway for...",
              "type": "added"
            },
            {
              "text": "ALB Controller Service Mesh Extension will implicitly define mutual authentication to services part of a namespace with the key/value label of istio-injection: enabled.",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/service-mesh-integration.md",
          "status": "modified",
          "title": "Service Mesh Integration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a410c579137c6cda243f51add722372588321918",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "The ALB Controller Istio Extension consists of two pods, deployed in active / standby configuration to allow resiliency during node failure, handle certificate lifecycle management between Application Gateway for...",
          "type": "removed"
        },
        {
          "text": "The ALB Controller Istio Extension consists of two pods, deployed in active / standby configuration to allow resiliency during node failure, handle certificate lifecycle management between Application Gateway for...",
          "type": "added"
        },
        {
          "text": "ALB Controller Service Mesh Extension will implicitly define mutual authentication to services part of a namespace with the key/value label of istio-injection: enabled.",
          "type": "removed"
        },
        {
          "text": "ALB Controller Service Mesh Extension will implicitly define mutual authentication to the services in a namespace with the key/value label of istio-injection: enabled.",
          "type": "added"
        }
      ],
      "message": "Update service-mesh-integration.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 50,
      "sha": "a410c579137c6cda243f51add722372588321918",
      "short_sha": "a410c57",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Application Gateway: adds \"The ALB Controller Istio Extension consists of two pods, deployed in active / standby configuration to allow resiliency during node failure, handle certificate lifecycle management between Application Gateway for...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a410c579137c6cda243f51add722372588321918"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T20:25:41Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 134,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
          "meaningful_changes": [
            {
              "text": "Load balancing strategies in Application Gateway for Containers",
              "type": "added"
            },
            {
              "text": "In today's dynamic and high-demand environments, efficient load balancing is crucial for maintaining the performance and reliability of applications. Application Gateway for Containers offers multiple load balancing...",
              "type": "added"
            },
            {
              "text": "Why care about changing the load balancing algorithm",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/load-balancing-strategies.md",
          "status": "added",
          "title": "Load Balancing Strategies"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e76fbfcc1acdb15ef1feb9b58f6b7dec825b6ecc",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Load balancing strategies in Application Gateway for Containers",
          "type": "added"
        },
        {
          "text": "In today's dynamic and high-demand environments, efficient load balancing is crucial for maintaining the performance and reliability of applications. Application Gateway for Containers offers multiple load balancing...",
          "type": "added"
        },
        {
          "text": "Why care about changing the load balancing algorithm",
          "type": "added"
        },
        {
          "text": "Different load balancing algorithms provide unique benefits and are suited to various use cases. By having multiple options to choose from, you can:",
          "type": "added"
        },
        {
          "text": "1. Optimize Performance: Different algorithms can help distribute traffic more effectively based on the current load, server capacity, and other metrics. This ensures that applications run smoothly and efficiently...",
          "type": "added"
        },
        {
          "text": "2. Enhance Reliability: Algorithms like Circuit Breaker and Slow Start can improve the resilience of the system by preventing overloads and managing server recovery. This helps maintain service availability and reduces...",
          "type": "added"
        }
      ],
      "message": "Create load balancing strategies documentation",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 50,
      "sha": "e76fbfcc1acdb15ef1feb9b58f6b7dec825b6ecc",
      "short_sha": "e76fbfc",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 134,
        "deletions": 0,
        "total": 134
      },
      "summary": "Application Gateway: adds \"1. Optimize Performance: Different algorithms can help distribute traffic more effectively based on the current load, server capacity, and other metrics. This ensures that applications run smoothly and efficiently...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e76fbfcc1acdb15ef1feb9b58f6b7dec825b6ecc"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-09T17:09:33Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 4,
      "files": [
        {
          "additions": 15,
          "deletions": 10,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke.png\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\" lightbox=\"./images/hub-spoke.png\":::",
              "type": "removed"
            },
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke-network-topology-architecture.svg\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\" lightbox=\"./images/hub-spoke.png\":::",
              "type": "added"
            },
            {
              "text": "To add more regions and fully mesh the hubs to each other, use spoke-to-spoke networking for multiregion connectivity patterns and multiregion networking with Azure Route Server.",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "thumbnailUrl: /azure/architecture/browse/thumbs/hub-spoke.png",
              "type": "removed"
            },
            {
              "text": "thumbnailUrl: /azure/architecture/browse/thumbs/hub-spoke-network-topology-architecture.png",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke.yml",
          "status": "modified",
          "title": "Hub Spoke"
        },
        {
          "additions": 2721,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-spoke-network-topology-architecture.svg",
          "status": "added",
          "title": "Hub Spoke Network Topology Architecture"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/_images/hub-spoke.png",
          "status": "removed",
          "title": "Hub Spoke"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:d320592dd47472cb58706c61b50c789d72501194",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke.png\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\" lightbox=\"./images/hub-spoke.png\":::",
          "type": "removed"
        },
        {
          "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke-network-topology-architecture.svg\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\" lightbox=\"./images/hub-spoke.png\":::",
          "type": "added"
        },
        {
          "text": "To add more regions and fully mesh the hubs to each other, use spoke-to-spoke networking for multiregion connectivity patterns and multiregion networking with Azure Route Server.",
          "type": "removed"
        },
        {
          "text": "To add more regions, use Azure Firewall to route a multi-hub-spoke topology.",
          "type": "added"
        },
        {
          "text": "To use advanced spoke-to-spoke patterns, use Spoke-to-spoke networking.",
          "type": "added"
        },
        {
          "text": "To manage connectivity and security controls, use Virtual Network Manager to create new hub-spoke virtual network topologies or onboard existing topologies. Using Virtual Network Manager ensures that your hub-spoke...",
          "type": "removed"
        },
        {
          "text": "thumbnailUrl: /azure/architecture/browse/thumbs/hub-spoke.png",
          "type": "removed"
        },
        {
          "text": "thumbnailUrl: /azure/architecture/browse/thumbs/hub-spoke-network-topology-architecture.png",
          "type": "added"
        }
      ],
      "message": "edits",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail",
        "New scoped article or spec file",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 50,
      "sha": "d320592dd47472cb58706c61b50c789d72501194",
      "short_sha": "d320592",
      "signal": "New or changed support",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 2737,
        "deletions": 11,
        "total": 2748
      },
      "summary": "Architecture Center: adds \"To add more regions, use Azure Firewall to route a multi-hub-spoke topology.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/d320592dd47472cb58706c61b50c789d72501194"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 37,
          "deletions": 37,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
              "type": "removed"
            },
            {
              "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
              "type": "added"
            },
            {
              "text": "Routing: The management of traffic between the hub and the connected spokes. Routing enables secure and efficient communication.",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:4c025992efc05358540bb7b3072ee4a110592437",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
          "type": "removed"
        },
        {
          "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
          "type": "added"
        },
        {
          "text": "Routing: The management of traffic between the hub and the connected spokes. Routing enables secure and efficient communication.",
          "type": "removed"
        },
        {
          "text": "Routing: The management of traffic between the hub and the connected spokes. Routing supports secure and efficient communication.",
          "type": "added"
        },
        {
          "text": "Azure Virtual Network is the fundamental building block for private networks in Azure. Virtual Network enables many Azure resources, such as VMs, to securely communicate with cross-premises networks, the internet, and...",
          "type": "removed"
        },
        {
          "text": "Azure Virtual Network is the fundamental building block for private networks in Azure. Virtual Network supports many Azure resources, such as VMs, to securely communicate with cross-premises networks, the internet, and...",
          "type": "added"
        }
      ],
      "message": "edits",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 50,
      "sha": "4c025992efc05358540bb7b3072ee4a110592437",
      "short_sha": "4c02599",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 37,
        "deletions": 37,
        "total": 74
      },
      "summary": "Architecture Center: adds \"Azure Virtual Network is the fundamental building block for private networks in Azure. Virtual Network supports many Azure resources, such as VMs, to securely communicate with cross-premises networks, the internet, and...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/4c025992efc05358540bb7b3072ee4a110592437"
    },
    {
      "author": "Jessie",
      "date": "2026-04-07T06:26:01Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 28,
          "deletions": 17,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "On 15 August 2025, DigiCert will deprecate support for the legacy CNAME Delegation DCV workflow. DigiCert is transitioning to a new open-source software (OSS) domain control validation (DCV) platform designed to...",
              "type": "removed"
            },
            {
              "text": "Effective15 August 2025, DigiCert has transitioned to a new open-source software (OSS) domain control validation (DCV) platform designed to enhance transparency and accountability in domain validation processes...",
              "type": "added"
            },
            {
              "text": "What will happen after 15 August 2025?",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b9c0adc5768a749bb43a1152ee7bfcd82b6bca4e",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "On 15 August 2025, DigiCert will deprecate support for the legacy CNAME Delegation DCV workflow. DigiCert is transitioning to a new open-source software (OSS) domain control validation (DCV) platform designed to...",
          "type": "removed"
        },
        {
          "text": "Effective15 August 2025, DigiCert has transitioned to a new open-source software (OSS) domain control validation (DCV) platform designed to enhance transparency and accountability in domain validation processes...",
          "type": "added"
        },
        {
          "text": "What will happen after 15 August 2025?",
          "type": "removed"
        },
        {
          "text": "What\u2019s the current status?",
          "type": "added"
        },
        {
          "text": "Will no longer support for new domain onboarding and new profile creation.",
          "type": "removed"
        },
        {
          "text": "Will no longer support Azure-managed certificates.",
          "type": "removed"
        }
      ],
      "message": "Revise DigiCert CNAME Delegation FAQ and timelines",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 50,
      "sha": "b9c0adc5768a749bb43a1152ee7bfcd82b6bca4e",
      "short_sha": "b9c0adc",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 28,
        "deletions": 17,
        "total": 45
      },
      "summary": "Front Door: adds \"Effective15 August 2025, DigiCert has transitioned to a new open-source software (OSS) domain control validation (DCV) platform designed to enhance transparency and accountability in domain validation processes...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b9c0adc5768a749bb43a1152ee7bfcd82b6bca4e"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-05T20:25:54Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 19,
          "deletions": 21,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
          "meaningful_changes": [
            {
              "text": "In this article, you learn how to use the Rule Impact Analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
              "type": "removed"
            },
            {
              "text": "In this article, you learn how to use the rule impact analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
              "type": "added"
            },
            {
              "text": "The Rules Impact Analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-what-if.md",
          "status": "modified",
          "title": "Traffic Analytics What If"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-what-if/image1.png",
          "status": "removed",
          "title": "Image1"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a0aa2f19a142f787439cd06d5cd353717d66ed5c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "In this article, you learn how to use the Rule Impact Analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
          "type": "removed"
        },
        {
          "text": "In this article, you learn how to use the rule impact analysis feature with network groups in Azure Virtual Network Manager. You can use the Azure portal to create a security admin configuration, add a security admin...",
          "type": "added"
        },
        {
          "text": "The Rules Impact Analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
          "type": "removed"
        },
        {
          "text": "The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...",
          "type": "added"
        },
        {
          "text": "A network group. If you don't have a network group, see Create a network group.",
          "type": "removed"
        },
        {
          "text": "A network group. If you don't have a network group, see Create a network group.",
          "type": "added"
        }
      ],
      "message": "tweaks",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 50,
      "sha": "a0aa2f19a142f787439cd06d5cd353717d66ed5c",
      "short_sha": "a0aa2f1",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 19,
        "deletions": 21,
        "total": 40
      },
      "summary": "Network Watcher: adds \"The rules impact analyzer enables you to preview the impact of security admin rules before applying them to your environment. This feature helps you validate rule behavior, identify potential conflicts, and ensure that...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a0aa2f19a142f787439cd06d5cd353717d66ed5c"
    },
    {
      "author": "mbender-ms",
      "date": "2026-04-23T15:57:23Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 9,
      "files": [
        {
          "additions": 14,
          "deletions": 14,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
          "meaningful_changes": [
            {
              "text": "3. Improve Resource Utilization: Weighted Round Robin and Load Aware Routing can ensure that more powerful servers handle a larger share of the traffic, optimizing resource utilization and reducing costs.",
              "type": "removed"
            },
            {
              "text": "3. Improve Resource Utilization: Weighted Round Robin and Load Aware Routing can ensure that more powerful servers handle a larger share of the traffic, optimizing resource utilization, and reducing costs.",
              "type": "added"
            },
            {
              "text": "5. Tailor to Specific Needs: Different applications and services may have unique requirements. By offering multiple load balancing options, Application Gateway for Containers allows customers to tailor the load...",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/load-balancing-strategies.md",
          "status": "modified",
          "title": "Load Balancing Strategies"
        },
        {
          "additions": 9,
          "deletions": 9,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
          "meaningful_changes": [
            {
              "text": "The ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers. It uses both ARM and configuration APIs to propagate configuration to the Application...",
              "type": "removed"
            },
            {
              "text": "The ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers. It uses both Azure Resource Manager and configuration APIs to propagate configuration...",
              "type": "added"
            },
            {
              "text": "Instructions for new or existing deployments of ALB Controller deployed with helm are found in the following links:",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/alb-controller-release-notes.md",
          "status": "modified",
          "title": "Alb Controller Release Notes"
        },
        {
          "additions": 7,
          "deletions": 7,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller may be provisioned into AKS Automatic clusters. Helm deployments of the ALB Controller are not supported with...",
              "type": "removed"
            },
            {
              "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller can be provisioned into AKS Automatic clusters. Helm deployments of the ALB Controller aren't supported with...",
              "type": "added"
            },
            {
              "text": "answer: Application Gateway for Containers frontends resolve to any anycast IP address. Anycast IP addresses are advertised globally, which may lead to the ASN location being different from Application Gateway for...",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/faq.yml",
          "status": "modified",
          "title": "For Containers Faq"
        },
        {
          "additions": 7,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/migrate-from-agic-to-agc",
          "meaningful_changes": [
            {
              "text": "In the example depicted, Application Gateway for Containers and Application Gateway Ingress Controller both service backend targets using unique frontends. After validation that Application Gateway for Containers is...",
              "type": "removed"
            },
            {
              "text": "In the example depicted, Application Gateway for Containers and Application Gateway Ingress Controller both service backend targets using unique frontends. After validation that Application Gateway for Containers is...",
              "type": "added"
            },
            {
              "text": "Prior to migration, it's important to identify any dependencies on Application Gateway Ingress Controller that may not yet be available in Application Gateway for Containers. Workloads with dependency on these features...",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/migrate-from-agic-to-agc.md",
          "status": "modified",
          "title": "Migrate From Agic To Agc"
        },
        {
          "additions": 6,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/api-specification-kubernetes",
          "meaningful_changes": [
            {
              "text": "By default, health check will use the same protocol as the",
              "type": "removed"
            },
            {
              "text": "By default, health check uses the same protocol as the",
              "type": "added"
            },
            {
              "text": "is different, health check will be plaintext.",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/api-specification-kubernetes.md",
          "status": "modified",
          "title": "API Specification Kubernetes"
        },
        {
          "additions": 4,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
          "meaningful_changes": [
            {
              "text": "This integration assumes an Istio sidecar-based service mesh. Ambient (sidecar-less) mode is not supported.",
              "type": "removed"
            },
            {
              "text": "This integration assumes an Istio sidecar-based service mesh. Ambient (sidecar-less) mode isn't supported.",
              "type": "added"
            },
            {
              "text": "If ALB Controller Service Mesh is installed prior to Istio, you must restart the ALB Controller Service Mesh extension deployment. Restart of the ALB Controller Service Mesh deployment may be done with the command...",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/service-mesh-integration.md",
          "status": "modified",
          "title": "Service Mesh Integration"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
          "meaningful_changes": [
            {
              "text": "See the instructions for installation for various options of installation. Similarly, if your version of Windows has Windows Package Manager winget installed, you may execute the following command:",
              "type": "removed"
            },
            {
              "text": "See the instructions for installation for various options of installation. Similarly, if your version of Windows has Windows Package Manager winget installed, you can execute the following command:",
              "type": "added"
            },
            {
              "text": "When the helm install command is run, it deploys the helm chart to the default namespace. When alb-controller is deployed, it deploys to the azure-alb-system namespace. Both of these namespaces may be overridden...",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Helm"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/overview",
          "meaningful_changes": [
            {
              "text": "Application Gateway for Containers offers an elastic and scalable ingress to AKS clusters and comprises a new data plane as well as control plane with new set of ARM APIs, different from existing Application Gateway...",
              "type": "removed"
            },
            {
              "text": "Application Gateway for Containers offers an elastic and scalable ingress to AKS clusters and comprises a new data plane as well as control plane with new set of Azure Resource Manager APIs, different from existing...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/overview.md",
          "status": "modified",
          "title": "For Containers Overview"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon",
          "meaningful_changes": [
            {
              "text": "Here's how to update an existing AKS cluster via REST API, through the use of the Azure CLI REST command.",
              "type": "removed"
            },
            {
              "text": "Here's how to update an existing AKS cluster via REST API, by using the Azure CLI REST command.",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Addon"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:df7354c519304e1cb0bdf33d29f47b0e7a4db16d",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "The ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers. It uses both ARM and configuration APIs to propagate configuration to the Application...",
          "type": "removed"
        },
        {
          "text": "The ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers. It uses both Azure Resource Manager and configuration APIs to propagate configuration...",
          "type": "added"
        },
        {
          "text": "Instructions for new or existing deployments of ALB Controller deployed with helm are found in the following links:",
          "type": "removed"
        },
        {
          "text": "Instructions for new or existing deployments of ALB Controller deployed with Helm are found in the following links:",
          "type": "added"
        },
        {
          "text": "New deployment of ALB Controller with helm",
          "type": "removed"
        },
        {
          "text": "Upgrade existing ALB Controller with helm",
          "type": "removed"
        },
        {
          "text": "By default, health check will use the same protocol as the",
          "type": "removed"
        },
        {
          "text": "By default, health check uses the same protocol as the",
          "type": "added"
        },
        {
          "text": "is different, health check will be plaintext.",
          "type": "removed"
        },
        {
          "text": "is different, health check is plaintext.",
          "type": "added"
        }
      ],
      "message": "Refine AGC docs and quickstart guidance",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 48,
      "sha": "df7354c519304e1cb0bdf33d29f47b0e7a4db16d",
      "short_sha": "df7354c",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 51,
        "deletions": 51,
        "total": 102
      },
      "summary": "Application Gateway: adds \"Instructions for new or existing deployments of ALB Controller deployed with Helm are found in the following links:\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/df7354c519304e1cb0bdf33d29f47b0e7a4db16d"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:53:57Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/migrate-from-agic-to-agc",
          "meaningful_changes": [
            {
              "text": "Application Gateway for Containers has a migration utility that can assist in automatically translating AGIC Ingress to Gateway API for Application Gateway for Containers. More details on the migration utility may be...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/migrate-from-agic-to-agc.md",
          "status": "modified",
          "title": "Migrate From Agic To Agc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:aa837b74843034e2c75349434b70dd8fcab3abde",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Application Gateway for Containers has a migration utility that can assist in automatically translating AGIC Ingress to Gateway API for Application Gateway for Containers. More details on the migration utility may be...",
          "type": "added"
        }
      ],
      "message": "Update migration guide with new date and utility tip",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/migrate-from-agic-to-agc",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 48,
      "sha": "aa837b74843034e2c75349434b70dd8fcab3abde",
      "short_sha": "aa837b7",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 1,
        "total": 5
      },
      "summary": "Application Gateway: adds \"Application Gateway for Containers has a migration utility that can assist in automatically translating AGIC Ingress to Gateway API for Application Gateway for Containers. More details on the migration utility may be...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/aa837b74843034e2c75349434b70dd8fcab3abde"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-15T15:50:02Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "question: Why do TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but aren't observed in the Azure Firewall logs?",
              "type": "added"
            },
            {
              "text": "Azure Firewall acts as a passive listener for ports 80, 443, and 1433. Azure Firewall doesn't log TCP SYN packets on these ports unless there's application traffic. The HTTP GET request and TLS client hello are logged...",
              "type": "added"
            }
          ],
          "path": "articles/firewall/firewall-faq.yml",
          "status": "modified",
          "title": "Firewall Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6bfaf51f83468357678b28e0dbab8e78477e099f",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "question: Why do TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but aren't observed in the Azure Firewall logs?",
          "type": "added"
        },
        {
          "text": "Azure Firewall acts as a passive listener for ports 80, 443, and 1433. Azure Firewall doesn't log TCP SYN packets on these ports unless there's application traffic. The HTTP GET request and TLS client hello are logged...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #128203 from hisriram1996/patch-6",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": null,
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 48,
      "sha": "6bfaf51f83468357678b28e0dbab8e78477e099f",
      "short_sha": "6bfaf51",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 0,
        "total": 4
      },
      "summary": "Azure Firewall: adds \"Azure Firewall acts as a passive listener for ports 80, 443, and 1433. Azure Firewall doesn't log TCP SYN packets on these ports unless there's application traffic. The HTTP GET request and TLS client hello are logged...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6bfaf51f83468357678b28e0dbab8e78477e099f"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-15T15:40:22Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "question: Why the TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but are not observed in the logs of the Azure Firewall?",
              "type": "removed"
            },
            {
              "text": "question: Why do TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but aren't observed in the Azure Firewall logs?",
              "type": "added"
            },
            {
              "text": "The Azure Firewall acts as a passive listener for the ports 80, 443, and 1433. The TCP SYN packets on these ports are not logged unless there is application traffic. The HTTP GET request and TLS client hello will be...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/firewall-faq.yml",
          "status": "modified",
          "title": "Firewall Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:33f2aa4645415681d7775ba79eade706706daf39",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "question: Why the TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but are not observed in the logs of the Azure Firewall?",
          "type": "removed"
        },
        {
          "text": "question: Why do TCP ping and similar tools successfully connect to a target FQDN/IP address on ports 80, 443, and 1433 but aren't observed in the Azure Firewall logs?",
          "type": "added"
        },
        {
          "text": "The Azure Firewall acts as a passive listener for the ports 80, 443, and 1433. The TCP SYN packets on these ports are not logged unless there is application traffic. The HTTP GET request and TLS client hello will be...",
          "type": "removed"
        },
        {
          "text": "Azure Firewall acts as a passive listener for ports 80, 443, and 1433. Azure Firewall doesn't log TCP SYN packets on these ports unless there's application traffic. The HTTP GET request and TLS client hello are logged...",
          "type": "added"
        }
      ],
      "message": "Apply suggestions from code review",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": null,
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 48,
      "sha": "33f2aa4645415681d7775ba79eade706706daf39",
      "short_sha": "33f2aa4",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Azure Firewall: adds \"Azure Firewall acts as a passive listener for ports 80, 443, and 1433. Azure Firewall doesn't log TCP SYN packets on these ports unless there's application traffic. The HTTP GET request and TLS client hello are logged...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/33f2aa4645415681d7775ba79eade706706daf39"
    },
    {
      "author": "Shannon Leavitt",
      "date": "2026-04-13T13:40:32Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
          "meaningful_changes": [
            {
              "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
              "type": "removed"
            },
            {
              "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
              "type": "added"
            },
            {
              "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/ipv6-ip-planning.md",
          "status": "modified",
          "title": "Ipv6 Ip Planning"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:6cd6af5562726c998036ac5acdafd19afdf1c842",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
          "type": "removed"
        },
        {
          "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
          "type": "added"
        },
        {
          "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
          "type": "removed"
        },
        {
          "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
          "type": "added"
        },
        {
          "text": "After this IP address space is allocated to the region, you can deploy new networks and workloads by defining virtual networks and subnets from that IP space. Azure Virtual Network Manager can manage IPv6 address pools...",
          "type": "removed"
        },
        {
          "text": "After this IP address space is allocated to the region, you can deploy new networks and workloads by defining virtual networks and subnets from that IP space. Azure Virtual Network Manager can manage IPv6 address pools...",
          "type": "added"
        }
      ],
      "message": "Fixing links and typos",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 48,
      "sha": "6cd6af5562726c998036ac5acdafd19afdf1c842",
      "short_sha": "6cd6af5",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 4,
        "deletions": 4,
        "total": 8
      },
      "summary": "Architecture Center: adds \"The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/6cd6af5562726c998036ac5acdafd19afdf1c842"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-09T15:31:44Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/dns/dns-private-resolver-get-started-portal",
          "meaningful_changes": [
            {
              "text": "An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at 10.10.0.4.",
              "type": "removed"
            },
            {
              "text": "An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at 10.0.0.4.",
              "type": "added"
            }
          ],
          "path": "articles/dns/dns-private-resolver-get-started-portal.md",
          "status": "modified",
          "title": "Dns Private Resolver Get Started Portal"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:9edcb722e4f9f619bf95ed81916bfadcd4987034",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at 10.10.0.4.",
          "type": "removed"
        },
        {
          "text": "An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at 10.0.0.4.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #127841 from awestrem/patch-3",
      "paths": [
        "articles/dns"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/dns/dns-private-resolver-get-started-portal",
      "primary_product": "azure-dns",
      "primary_product_label": "Azure DNS",
      "product_labels": [
        "Azure DNS"
      ],
      "products": [
        "azure-dns"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 48,
      "sha": "9edcb722e4f9f619bf95ed81916bfadcd4987034",
      "short_sha": "9edcb72",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-dns"
      ],
      "sources": [
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Azure DNS: adds \"An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at 10.0.0.4.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9edcb722e4f9f619bf95ed81916bfadcd4987034"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T21:11:55Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 3,
      "files": [
        {
          "additions": 8,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
          "meaningful_changes": [
            {
              "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/rule-configuration.png\" alt-text=\"Screenshot that shows the Rule Configuration page of the Rule Impact Analyzer in the Azure portal.\":::",
              "type": "added"
            },
            {
              "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/run-simulation.png\" alt-text=\"Screenshot that shows the simulation scope of the Rule Impact Analyzer in the Azure portal.\":::",
              "type": "added"
            },
            {
              "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/simulation-results.png\" alt-text=\"Screenshot that shows the simulation results of the Rule Impact Analyzer in the Azure portal.\"...",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-rule-impact-analyzer.md",
          "status": "modified",
          "title": "Traffic Analytics Rule Impact Analyzer"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-rule-impact-analyzer/rule-configuration.png",
          "status": "renamed",
          "title": "Rule Configuration"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-rule-impact-analyzer/simulation-scope.png",
          "status": "removed",
          "title": "Simulation Scope"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b11e6566fc374b6169d1489376387257d36e25e2",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/rule-configuration.png\" alt-text=\"Screenshot that shows the Rule Configuration page of the Rule Impact Analyzer in the Azure portal.\":::",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/run-simulation.png\" alt-text=\"Screenshot that shows the simulation scope of the Rule Impact Analyzer in the Azure portal.\":::",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/simulation-results.png\" alt-text=\"Screenshot that shows the simulation results of the Rule Impact Analyzer in the Azure portal.\"...",
          "type": "added"
        },
        {
          "text": "Create a security admin rule using network groups",
          "type": "removed"
        },
        {
          "text": "Taffic Analytics overview",
          "type": "added"
        },
        {
          "text": "View configurations applied by Azure Virtual Network Manager",
          "type": "removed"
        }
      ],
      "message": "update screenshots",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 48,
      "sha": "b11e6566fc374b6169d1489376387257d36e25e2",
      "short_sha": "b11e656",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 8,
        "deletions": 2,
        "total": 10
      },
      "summary": "Network Watcher: adds \":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/rule-configuration.png\" alt-text=\"Screenshot that shows the Rule Configuration page of the Rule Impact Analyzer in the Azure portal.\":::\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b11e6566fc374b6169d1489376387257d36e25e2"
    },
    {
      "author": "duongau",
      "date": "2026-04-01T21:33:35Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-wan/how-to-routing-policies",
          "meaningful_changes": [
            {
              "text": "Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...",
              "type": "removed"
            },
            {
              "text": "Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...",
              "type": "added"
            }
          ],
          "path": "articles/virtual-wan/how-to-routing-policies.md",
          "status": "modified",
          "title": "How To Routing Policies"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0dd6292c124c0a4091dcda421ebe0c3a754083a3",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...",
          "type": "removed"
        },
        {
          "text": "Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...",
          "type": "added"
        }
      ],
      "message": "docs: Fix broken bookmark anchor in how-to-routing-policies.md",
      "paths": [
        "articles/virtual-wan"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-wan/how-to-routing-policies",
      "primary_product": "virtual-wan",
      "primary_product_label": "Virtual WAN",
      "product_labels": [
        "Virtual WAN"
      ],
      "products": [
        "virtual-wan"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 48,
      "sha": "0dd6292c124c0a4091dcda421ebe0c3a754083a3",
      "short_sha": "0dd6292",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-virtual-wan"
      ],
      "sources": [
        "Virtual WAN docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual WAN: adds \"Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0dd6292c124c0a4091dcda421ebe0c3a754083a3"
    },
    {
      "author": "Raghavender Mareddy",
      "date": "2026-04-29T05:38:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations",
          "meaningful_changes": [
            {
              "text": "Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich Metro",
              "type": "removed"
            },
            {
              "text": "Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Stockholm2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich...",
              "type": "added"
            },
            {
              "text": "Equinix | \u2713 | \u2713 | Amsterdam; Amsterdam Metro; Amsterdam2; Atlanta; Atlanta Metro; Berlin; Canberra2; Chicago; Chicago Metro; Dallas; Dubai2; Dublin; Frankfurt; Frankfurt2; Geneva; Hong Kong SAR; Hong Kong2; Kuala...",
              "type": "removed"
            }
          ],
          "path": "articles/expressroute/expressroute-locations.md",
          "status": "modified",
          "title": "Expressroute Locations"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f6056a5bdc90a4a9c23415871474cebeb0184cc9",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich Metro",
          "type": "removed"
        },
        {
          "text": "Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Stockholm2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich...",
          "type": "added"
        },
        {
          "text": "Equinix | \u2713 | \u2713 | Amsterdam; Amsterdam Metro; Amsterdam2; Atlanta; Atlanta Metro; Berlin; Canberra2; Chicago; Chicago Metro; Dallas; Dubai2; Dublin; Frankfurt; Frankfurt2; Geneva; Hong Kong SAR; Hong Kong2; Kuala...",
          "type": "removed"
        },
        {
          "text": "Equinix | \u2713 | \u2713 | Amsterdam; Amsterdam Metro; Amsterdam2; Atlanta; Atlanta Metro; Berlin; Canberra2; Chicago; Chicago Metro; Dallas; Dubai2; Dublin; Frankfurt; Frankfurt2; Geneva; Hong Kong SAR; Hong Kong2; Kuala...",
          "type": "added"
        }
      ],
      "message": "Update expressroute-locations with new locations and date",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "f6056a5bdc90a4a9c23415871474cebeb0184cc9",
      "short_sha": "f6056a5",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "ExpressRoute: adds \"Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Stockholm2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f6056a5bdc90a4a9c23415871474cebeb0184cc9"
    },
    {
      "author": "Raghavender Mareddy",
      "date": "2026-04-29T05:36:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations-providers",
          "meaningful_changes": [
            {
              "text": "Melbourne2 | Equinix M1 | 2 | Australia Southeast | \u2713 | Equinix",
              "type": "added"
            },
            {
              "text": "Stockholm2 | Digital Realty STO6 | 1 | Sweden Central | \u2713 | Digital Realty",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/expressroute-locations-providers.md",
          "status": "modified",
          "title": "Expressroute Locations Providers"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:aa005fb623fa9a53656059003a532778b02475f5",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Melbourne2 | Equinix M1 | 2 | Australia Southeast | \u2713 | Equinix",
          "type": "added"
        },
        {
          "text": "Stockholm2 | Digital Realty STO6 | 1 | Sweden Central | \u2713 | Digital Realty",
          "type": "added"
        }
      ],
      "message": "Update article date and add new locations",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations-providers",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "aa005fb623fa9a53656059003a532778b02475f5",
      "short_sha": "aa005fb",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 1,
        "total": 4
      },
      "summary": "ExpressRoute: adds \"Stockholm2 | Digital Realty STO6 | 1 | Sweden Central | \u2713 | Digital Realty\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/aa005fb623fa9a53656059003a532778b02475f5"
    },
    {
      "author": "Suren Jamiyanaa",
      "date": "2026-04-27T19:06:41Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/firewall/monitor-firewall-reference",
          "meaningful_changes": [
            {
              "text": "Unregister-AzProviderFeature -FeatureName AFWEnableTcpConnectionLogging -ProviderNamespace Microsoft.Network",
              "type": "added"
            },
            {
              "text": "$firewall.EnableTcpConnectionLogging = $false",
              "type": "removed"
            },
            {
              "text": "Set-AzFirewall -AzureFirewall $firewall",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/monitor-firewall-reference.md",
          "status": "modified",
          "title": "Monitor Firewall Reference"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:99abfc08de10e6f005d690991bd677ab72f7719b",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Unregister-AzProviderFeature -FeatureName AFWEnableTcpConnectionLogging -ProviderNamespace Microsoft.Network",
          "type": "added"
        },
        {
          "text": "$firewall.EnableTcpConnectionLogging = $false",
          "type": "removed"
        },
        {
          "text": "Set-AzFirewall -AzureFirewall $firewall",
          "type": "removed"
        },
        {
          "text": "Set-AzFirewall -AzureFirewall $firewall",
          "type": "added"
        }
      ],
      "message": "firewall: fix disable flow trace logs PowerShell command",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/monitor-firewall-reference",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "Operational or migration guidance",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "99abfc08de10e6f005d690991bd677ab72f7719b",
      "short_sha": "99abfc0",
      "signal": "Migration or operations",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Azure Firewall: adds \"Unregister-AzProviderFeature -FeatureName AFWEnableTcpConnectionLogging -ProviderNamespace Microsoft.Network\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/99abfc08de10e6f005d690991bd677ab72f7719b"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-26T21:58:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-howto-add-gateway-portal-resource-manager",
          "meaningful_changes": [
            {
              "text": "Availability zone-enabled SKUs: ErGw1Az, ErGw2Az, ErGw3Az",
              "type": "removed"
            },
            {
              "text": "Availability zone-enabled SKUs: ErGw1Az, ErGw2Az, ErGw3Az, ErGwScale",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/expressroute-howto-add-gateway-portal-resource-manager.md",
          "status": "modified",
          "title": "Expressroute Howto Add Gateway Portal Resource Manager"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:dce03f036ddc04896a024d9164c5a649eabc81c8",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Availability zone-enabled SKUs: ErGw1Az, ErGw2Az, ErGw3Az",
          "type": "removed"
        },
        {
          "text": "Availability zone-enabled SKUs: ErGw1Az, ErGw2Az, ErGw3Az, ErGwScale",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313631 from MekaylaMoore/patch-78",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-howto-add-gateway-portal-resource-manager",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "dce03f036ddc04896a024d9164c5a649eabc81c8",
      "short_sha": "dce03f0",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "ExpressRoute: adds \"Availability zone-enabled SKUs: ErGw1Az, ErGw2Az, ErGw3Az, ErGwScale\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/dce03f036ddc04896a024d9164c5a649eabc81c8"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:37:45Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon",
          "meaningful_changes": [
            {
              "text": "Enablement of the Application Gateway for Containers AKS add-on on an AKS Automatic cluster isn't currently supported.",
              "type": "removed"
            },
            {
              "text": "Navigate to the MC (node) resource group for your AKS cluster. You should see the following resources automatically created by the add-on:",
              "type": "removed"
            },
            {
              "text": "Navigate to the MC (node) resource group for your AKS cluster. You should see the following resources ally created by the add-on:",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Addon"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:8e5e6d64cb0628ab56576c3777d36a4fb76eb948",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Enablement of the Application Gateway for Containers AKS add-on on an AKS Automatic cluster isn't currently supported.",
          "type": "removed"
        },
        {
          "text": "Navigate to the MC (node) resource group for your AKS cluster. You should see the following resources automatically created by the add-on:",
          "type": "removed"
        },
        {
          "text": "Navigate to the MC (node) resource group for your AKS cluster. You should see the following resources ally created by the add-on:",
          "type": "added"
        },
        {
          "text": "You should see that the GatewayClass has a condition that reads Valid GatewayClass. This condition indicates that a default GatewayClass is set up and that any gateway resources that reference this GatewayClass is...",
          "type": "removed"
        },
        {
          "text": "You should see that the GatewayClass has a condition that reads Valid GatewayClass. This condition indicates that a default GatewayClass is set up and that any gateway resources that reference this GatewayClass is...",
          "type": "added"
        }
      ],
      "message": "Fix typos and update publication date in documentation",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "8e5e6d64cb0628ab56576c3777d36a4fb76eb948",
      "short_sha": "8e5e6d6",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 6,
        "total": 9
      },
      "summary": "Application Gateway: adds \"Navigate to the MC (node) resource group for your AKS cluster. You should see the following resources ally created by the add-on:\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/8e5e6d64cb0628ab56576c3777d36a4fb76eb948"
    },
    {
      "author": "duongau",
      "date": "2026-04-17T21:46:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-dns",
          "meaningful_changes": [
            {
              "text": "Azure AI Video Indexer (Microsoft.VideoIndexer/accounts) | account | privatelink.api.videoindexer.ai | api.videoindexer.ai",
              "type": "added"
            },
            {
              "text": "Azure Maps (Microsoft.Maps/accounts) | account | privatelink.account.maps.azure.com | account.maps.azure.com",
              "type": "added"
            }
          ],
          "path": "articles/private-link/private-endpoint-dns.md",
          "status": "modified",
          "title": "Private Endpoint Dns"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:112d6da43853ca5ffba4ad0a2b06fd720cc5d09c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure AI Video Indexer (Microsoft.VideoIndexer/accounts) | account | privatelink.api.videoindexer.ai | api.videoindexer.ai",
          "type": "added"
        },
        {
          "text": "Azure Maps (Microsoft.Maps/accounts) | account | privatelink.account.maps.azure.com | account.maps.azure.com",
          "type": "added"
        }
      ],
      "message": "Add Azure Maps and Video Indexer to Private Endpoint DNS zone table",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-dns",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "112d6da43853ca5ffba4ad0a2b06fd720cc5d09c",
      "short_sha": "112d6da",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 1,
        "total": 4
      },
      "summary": "Private Link: adds \"Azure AI Video Indexer (Microsoft.VideoIndexer/accounts) | account | privatelink.api.videoindexer.ai | api.videoindexer.ai\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/112d6da43853ca5ffba4ad0a2b06fd720cc5d09c"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-16T15:37:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information...",
              "type": "removed"
            },
            {
              "text": "Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. For more information about NAT gateway integration with Azure Kubernetes Service, see Managed NAT...",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/faq.yml",
          "status": "modified",
          "title": "Nat Gateway Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6b11c4007575a7601588b4990a27e479e49e6126",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information...",
          "type": "removed"
        },
        {
          "text": "Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. For more information about NAT gateway integration with Azure Kubernetes Service, see Managed NAT...",
          "type": "added"
        }
      ],
      "message": "Update FAQ for NAT gateway with Azure services",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "6b11c4007575a7601588b4990a27e479e49e6126",
      "short_sha": "6b11c40",
      "signal": "Release or version",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "NAT Gateway: adds \"Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. For more information about NAT gateway integration with Azure Kubernetes Service, see Managed NAT...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6b11c4007575a7601588b4990a27e479e49e6126"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-15T20:28:16Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Yes. Standard NAT Gateway can be used as either a Managed NAT Gateway or user-assigend NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information about NAT gateway...",
              "type": "removed"
            },
            {
              "text": "Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information...",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/faq.yml",
          "status": "modified",
          "title": "Nat Gateway Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a7a6cdd70c8da07bcabb0dd959d7610b4bbc50ed",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Yes. Standard NAT Gateway can be used as either a Managed NAT Gateway or user-assigend NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information about NAT gateway...",
          "type": "removed"
        },
        {
          "text": "Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314768 from cozhang8/patch-16",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "a7a6cdd70c8da07bcabb0dd959d7610b4bbc50ed",
      "short_sha": "a7a6cdd",
      "signal": "Release or version",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "NAT Gateway: adds \"Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a7a6cdd70c8da07bcabb0dd959d7610b4bbc50ed"
    },
    {
      "author": "cozhang8",
      "date": "2026-04-15T14:23:12Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Yes. Standard NAT Gateway can be used as either a Managed NAT Gateway or user-assigend NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information about NAT gateway...",
              "type": "removed"
            },
            {
              "text": "Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information...",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/faq.yml",
          "status": "modified",
          "title": "Nat Gateway Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0e95fa23baba4e2b88b9ed0eb19ba178641d2efe",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Yes. Standard NAT Gateway can be used as either a Managed NAT Gateway or user-assigend NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information about NAT gateway...",
          "type": "removed"
        },
        {
          "text": "Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information...",
          "type": "added"
        }
      ],
      "message": "Clarify NAT Gateway usage with Azure services",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "0e95fa23baba4e2b88b9ed0eb19ba178641d2efe",
      "short_sha": "0e95fa2",
      "signal": "Release or version",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "NAT Gateway: adds \"Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0e95fa23baba4e2b88b9ed0eb19ba178641d2efe"
    },
    {
      "author": "Raghavender Mareddy",
      "date": "2026-04-08T03:24:06Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/metro",
          "meaningful_changes": [
            {
              "text": "Frankfurt Metro | Digital Realty FRA11; Equinix FR7 | 1 | Germany West Central | \u2713 | Colt 1 ; DE-CIX; Equinix 1 ; Megaport 1",
              "type": "removed"
            },
            {
              "text": "Frankfurt Metro | Digital Realty FRA11; Equinix FR7 | 1 | Germany West Central | \u2713 | Colt 1 ; DE-CIX; Equinix 1 ; Megaport",
              "type": "added"
            },
            {
              "text": "Silicon Valley Metro | Equinix SV10; CoreSite SV7 | 1 | West US | \u2713 | Megaport 1 ; Zayo 1",
              "type": "removed"
            }
          ],
          "path": "articles/expressroute/metro.md",
          "status": "modified",
          "title": "Metro"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e51afe7455b3ffdb27f2c09c6e76881ff2c217bc",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Frankfurt Metro | Digital Realty FRA11; Equinix FR7 | 1 | Germany West Central | \u2713 | Colt 1 ; DE-CIX; Equinix 1 ; Megaport 1",
          "type": "removed"
        },
        {
          "text": "Frankfurt Metro | Digital Realty FRA11; Equinix FR7 | 1 | Germany West Central | \u2713 | Colt 1 ; DE-CIX; Equinix 1 ; Megaport",
          "type": "added"
        },
        {
          "text": "Silicon Valley Metro | Equinix SV10; CoreSite SV7 | 1 | West US | \u2713 | Megaport 1 ; Zayo 1",
          "type": "removed"
        },
        {
          "text": "Silicon Valley Metro | Equinix SV10; CoreSite SV7 | 1 | West US | \u2713 | Megaport; Zayo 1",
          "type": "added"
        },
        {
          "text": "Vienna Metro | Digital Realty VIE1; NTT GDC | 1 | Austria East | \u2713 | A1 Telekom Austria 1 ; Colt; Next Layer GMBH",
          "type": "removed"
        },
        {
          "text": "Vienna Metro | Digital Realty VIE1; NTT GDC | 1 | Austria East | \u2713 | A1 Telekom Austria; Colt; Next Layer GMBH",
          "type": "added"
        }
      ],
      "message": "Update metro.md with new locations and GA'd providers",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/metro",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "e51afe7455b3ffdb27f2c09c6e76881ff2c217bc",
      "short_sha": "e51afe7",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 5,
        "total": 10
      },
      "summary": "ExpressRoute: adds \"Frankfurt Metro | Digital Realty FRA11; Equinix FR7 | 1 | Germany West Central | \u2713 | Colt 1 ; DE-CIX; Equinix 1 ; Megaport\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e51afe7455b3ffdb27f2c09c6e76881ff2c217bc"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T20:27:10Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 11,
      "files": [
        {
          "additions": 60,
          "deletions": 18,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "Provided in the template are a set of visuals that help make sense of the flow log data. The following images show a sample of what the dashboard looks like when populated with data.",
              "type": "removed"
            },
            {
              "text": "The template includes a set of visuals that help you analyze your flow log data. The following sections describe each visual in detail, with sample images showing what the dashboard looks like when populated with data.",
              "type": "added"
            },
            {
              "text": "::: zone pivot=\"virtual-network\"",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi.md",
          "status": "modified",
          "title": "Network Watcher Visualize NSG Flow Logs Power Bi"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/flows-destination-port1.png",
          "status": "added",
          "title": "Flows Destination Port1"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/flows-destination-port2.png",
          "status": "renamed",
          "title": "Flows Destination Port2"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/flows-network-interface1.png",
          "status": "added",
          "title": "Flows Network Interface1"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/flows-network-interface2.png",
          "status": "renamed",
          "title": "Flows Network Interface2"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/flows-time1.png",
          "status": "added",
          "title": "Flows Time1"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/flows-time2.png",
          "status": "renamed",
          "title": "Flows Time2"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/power-bi-dashboard1.png",
          "status": "added",
          "title": "Power Bi Dashboard1"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/power-bi-dashboard2.png",
          "status": "renamed",
          "title": "Power Bi Dashboard2"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/flow-logs-power-bi/top-talkers1.png",
          "status": "added",
          "title": "Top Talkers1"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:3f3b48d55dd2718aade35e9eff55c3af1bd3cbcf",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Provided in the template are a set of visuals that help make sense of the flow log data. The following images show a sample of what the dashboard looks like when populated with data.",
          "type": "removed"
        },
        {
          "text": "The template includes a set of visuals that help you analyze your flow log data. The following sections describe each visual in detail, with sample images showing what the dashboard looks like when populated with data.",
          "type": "added"
        },
        {
          "text": "::: zone pivot=\"virtual-network\"",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"./media/flow-logs-power-bi/power-bi-dashboard1.png\" alt-text=\"Screenshot of the Power BI dashboard loaded with virtual network flow logs data.\"...",
          "type": "added"
        },
        {
          "text": "::: zone pivot=\"network-security-group\"",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"./media/flow-logs-power-bi/power-bi-dashboard2.png\" alt-text=\"Screenshot of the Power BI dashboard loaded with network security group flow logs data.\"...",
          "type": "added"
        }
      ],
      "message": "screenshot",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "3f3b48d55dd2718aade35e9eff55c3af1bd3cbcf",
      "short_sha": "3f3b48d",
      "signal": "Security or connectivity",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 60,
        "deletions": 18,
        "total": 78
      },
      "summary": "Network Watcher: adds \":::image type=\"content\" source=\"./media/flow-logs-power-bi/power-bi-dashboard2.png\" alt-text=\"Screenshot of the Power BI dashboard loaded with network security group flow logs data.\"...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/3f3b48d55dd2718aade35e9eff55c3af1bd3cbcf"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-02T16:42:22Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/private-link/availability",
          "meaningful_changes": [
            {
              "text": "Azure Managed Disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure Managed Disks.",
              "type": "removed"
            },
            {
              "text": "Azure managed disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure managed disks.",
              "type": "added"
            }
          ],
          "path": "articles/private-link/availability.md",
          "status": "modified",
          "title": "Availability"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:57a07542e2b8b36d8960983891777524e8b5d317",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Managed Disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure Managed Disks.",
          "type": "removed"
        },
        {
          "text": "Azure managed disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure managed disks.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314166 from roygara/revert-pr-312345-managed-disk-casing",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/availability",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "57a07542e2b8b36d8960983891777524e8b5d317",
      "short_sha": "57a0754",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Private Link: adds \"Azure managed disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure managed disks.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/57a07542e2b8b36d8960983891777524e8b5d317"
    },
    {
      "author": "roygara",
      "date": "2026-04-02T16:28:05Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/private-link/availability",
          "meaningful_changes": [
            {
              "text": "Azure Managed Disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure Managed Disks.",
              "type": "removed"
            },
            {
              "text": "Azure managed disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure managed disks.",
              "type": "added"
            }
          ],
          "path": "articles/private-link/availability.md",
          "status": "modified",
          "title": "Availability"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ad5c1a0ab562fe16ba7862eeef0e4d0c80c43c23",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Managed Disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure Managed Disks.",
          "type": "removed"
        },
        {
          "text": "Azure managed disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure managed disks.",
          "type": "added"
        }
      ],
      "message": "Revert Managed Disk casing from PR #312345",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/availability",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "ad5c1a0ab562fe16ba7862eeef0e4d0c80c43c23",
      "short_sha": "ad5c1a0",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Private Link: adds \"Azure managed disks | All public regions; All Government regions; All China regions | Select for known limitations | GA ; Learn how to create a private endpoint for Azure managed disks.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ad5c1a0ab562fe16ba7862eeef0e4d0c80c43c23"
    },
    {
      "author": "Sergio Figueiredo",
      "date": "2026-04-01T15:17:58Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "What happens to auto-registered DNS records if I disable auto-registration on a virtual network link?",
              "type": "added"
            },
            {
              "text": "Disabling auto-registration on an existing virtual network link immediately deletes all DNS records that were automatically registered through that link. Virtual machines will lose private DNS resolution until records...",
              "type": "added"
            }
          ],
          "path": "articles/dns/dns-faq-private.yml",
          "status": "modified",
          "title": "Dns Faq Private"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:41a1191dae0df239a3549306d622958af9078d73",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "What happens to auto-registered DNS records if I disable auto-registration on a virtual network link?",
          "type": "added"
        },
        {
          "text": "Disabling auto-registration on an existing virtual network link immediately deletes all DNS records that were automatically registered through that link. Virtual machines will lose private DNS resolution until records...",
          "type": "added"
        }
      ],
      "message": "Add FAQ on disabling DNS auto-registration",
      "paths": [
        "articles/dns"
      ],
      "primary_docs_url": null,
      "primary_product": "azure-dns",
      "primary_product_label": "Azure DNS",
      "product_labels": [
        "Azure DNS"
      ],
      "products": [
        "azure-dns"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "41a1191dae0df239a3549306d622958af9078d73",
      "short_sha": "41a1191",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-dns"
      ],
      "sources": [
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 0,
        "total": 5
      },
      "summary": "Azure DNS: adds \"Disabling auto-registration on an existing virtual network link immediately deletes all DNS records that were automatically registered through that link. Virtual machines will lose private DNS resolution until records...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/41a1191dae0df239a3549306d622958af9078d73"
    },
    {
      "author": "Anna Huff",
      "date": "2026-03-31T22:56:21Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/azure-vpn-client-versions",
          "meaningful_changes": [
            {
              "text": "Supported Windows Versions:",
              "type": "removed"
            },
            {
              "text": "Supported Windows Versions",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/azure-vpn-client-versions.md",
          "status": "modified",
          "title": "Azure Vpn Client Versions"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/point-to-site-vpn-client-winget",
          "meaningful_changes": [
            {
              "text": "Install Azure VPN Client Using Windows Package Manager (winget)",
              "type": "removed"
            },
            {
              "text": "Install Azure VPN Client using Windows Package Manager (winget)",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/point-to-site-vpn-client-winget.md",
          "status": "modified",
          "title": "Point To Site Vpn Client Winget"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ecb20e8576be04038dbec78254f76954f3b1997c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Supported Windows Versions:",
          "type": "removed"
        },
        {
          "text": "Supported Windows Versions",
          "type": "added"
        },
        {
          "text": "Install Azure VPN Client Using Windows Package Manager (winget)",
          "type": "removed"
        },
        {
          "text": "Install Azure VPN Client using Windows Package Manager (winget)",
          "type": "added"
        }
      ],
      "message": "Apply suggestions from PR review",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/azure-vpn-client-versions",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "ecb20e8576be04038dbec78254f76954f3b1997c",
      "short_sha": "ecb20e8",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "VPN Gateway: adds \"Supported Windows Versions\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ecb20e8576be04038dbec78254f76954f3b1997c"
    },
    {
      "author": "MSFT-FrankLpnsk",
      "date": "2026-03-31T21:00:29Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/point-to-site-vpn-client-winget",
          "meaningful_changes": [
            {
              "text": "Install Azure VPN Client Using Windows Package Manager (winget)",
              "type": "removed"
            },
            {
              "text": "Install Azure VPN Client Using Windows Package Manager (winget)",
              "type": "added"
            },
            {
              "text": "Supported Platforms",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/point-to-site-vpn-client-winget.md",
          "status": "modified",
          "title": "Point To Site Vpn Client Winget"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:7b84e81ebd0cf96094b8b20bfd1051e2a2869d7d",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Install Azure VPN Client Using Windows Package Manager (winget)",
          "type": "removed"
        },
        {
          "text": "Install Azure VPN Client Using Windows Package Manager (winget)",
          "type": "added"
        },
        {
          "text": "Supported Platforms",
          "type": "removed"
        },
        {
          "text": "Supported Platforms",
          "type": "added"
        },
        {
          "text": "Note: The Azure VPN Client may be released to winget and Download Center on a staggered schedule compared to the Microsoft Store.",
          "type": "removed"
        },
        {
          "text": "The Azure VPN Client may be released to winget and Download Center on a staggered schedule compared to the Microsoft Store.",
          "type": "added"
        }
      ],
      "message": "winget updates for ensuring it is within policy",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/point-to-site-vpn-client-winget",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 46,
      "sha": "7b84e81ebd0cf96094b8b20bfd1051e2a2869d7d",
      "short_sha": "7b84e81",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 6,
        "total": 10
      },
      "summary": "VPN Gateway: adds \"Supported Platforms\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/7b84e81ebd0cf96094b8b20bfd1051e2a2869d7d"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-27T16:26:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/application-gateway-for-containers-components",
          "meaningful_changes": [
            {
              "text": "\"Deny all\" rules are supported on the association subnet, with the following considerations:",
              "type": "removed"
            },
            {
              "text": "\"Deny all\" rules are supported on the association subnet. However, without explicit allow exceptions, these rules can affect both inbound and outbound traffic:",
              "type": "added"
            },
            {
              "text": "Deny all inbound rules will block traffic on ports 80 and 443, preventing access to the frontend.",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/application-gateway-for-containers-components.md",
          "status": "modified",
          "title": "Application Gateway For Containers Components"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:bce2210debbcebffcde78226ecb9abbbab19fe4e",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "\"Deny all\" rules are supported on the association subnet, with the following considerations:",
          "type": "removed"
        },
        {
          "text": "\"Deny all\" rules are supported on the association subnet. However, without explicit allow exceptions, these rules can affect both inbound and outbound traffic:",
          "type": "added"
        },
        {
          "text": "Deny all inbound rules will block traffic on ports 80 and 443, preventing access to the frontend.",
          "type": "removed"
        },
        {
          "text": "Deny all outbound rules may block traffic egressing from the proxy to the AKS cluster.",
          "type": "removed"
        },
        {
          "text": "Deny all inbound rules will block traffic on ports 80 and 443 unless explicit allow rules are defined, preventing access to the frontend.",
          "type": "added"
        },
        {
          "text": "Deny all outbound rules may block traffic egressing from the proxy to the AKS cluster unless required outbound exceptions are configured.",
          "type": "added"
        }
      ],
      "message": "Update application-gateway-for-containers-components.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/application-gateway-for-containers-components",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 44,
      "sha": "bce2210debbcebffcde78226ecb9abbbab19fe4e",
      "short_sha": "bce2210",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Application Gateway: adds \"\"Deny all\" rules are supported on the association subnet. However, without explicit allow exceptions, these rules can affect both inbound and outbound traffic:\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/bce2210debbcebffcde78226ecb9abbbab19fe4e"
    },
    {
      "author": "James Barnett",
      "date": "2026-04-01T23:46:35Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 102,
          "deletions": 122,
          "docs_url": "https://learn.microsoft.com/azure/firewall/rule-processing",
          "meaningful_changes": [
            {
              "text": "You can configure NAT rules, network rules, and applications rules on Azure Firewall using either classic rules or Firewall Policy. Azure Firewall denies all traffic by default, until rules are manually configured to...",
              "type": "removed"
            },
            {
              "text": "Rule processing using classic rules",
              "type": "removed"
            },
            {
              "text": "You can configure Azure Firewall with NAT rules, network rules, and application rules by using either classic rules or a Firewall Policy. By default, Azure Firewall denies all traffic until you manually configure rules...",
              "type": "added"
            }
          ],
          "path": "articles/firewall/rule-processing.md",
          "status": "modified",
          "title": "Rule Processing"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-wan/how-to-routing-policies",
          "meaningful_changes": [
            {
              "text": "Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...",
              "type": "removed"
            },
            {
              "text": "Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...",
              "type": "added"
            }
          ],
          "path": "articles/virtual-wan/how-to-routing-policies.md",
          "status": "modified",
          "title": "How To Routing Policies"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1aa28f39fb61e4b1adb0c7231369f3899e81b923",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "You can configure NAT rules, network rules, and applications rules on Azure Firewall using either classic rules or Firewall Policy. Azure Firewall denies all traffic by default, until rules are manually configured to...",
          "type": "removed"
        },
        {
          "text": "Rule processing using classic rules",
          "type": "removed"
        },
        {
          "text": "You can configure Azure Firewall with NAT rules, network rules, and application rules by using either classic rules or a Firewall Policy. By default, Azure Firewall denies all traffic until you manually configure rules...",
          "type": "added"
        },
        {
          "text": "Rule collections are processed according to the rule type in priority order, lower numbers to higher numbers from 100 to 65,000. A rule collection name can have only letters, numbers, underscores, periods, or hyphens...",
          "type": "removed"
        },
        {
          "text": "Rule processing by using classic rules",
          "type": "added"
        },
        {
          "text": "It's best to initially space your rule collection priority numbers in 100 increments (100, 200, 300, and so on) so you have room to add more rule collections if needed.",
          "type": "removed"
        },
        {
          "text": "Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...",
          "type": "removed"
        },
        {
          "text": "Ensure Azure Firewall processes the rule that allows traffic between the VPN tunnel endpoints (192.168.1.4 and 192.168.1.5 in the example above) first by making the rule have the highest priority in your Azure Firewall...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313585 from duongau/duau/firewall-rule-processing-readability-506715",
      "paths": [
        "articles/firewall",
        "articles/virtual-wan"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/rule-processing",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall",
        "Virtual WAN"
      ],
      "products": [
        "azure-firewall",
        "virtual-wan"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "Touches multiple Azure Networking products"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 44,
      "sha": "1aa28f39fb61e4b1adb0c7231369f3899e81b923",
      "short_sha": "1aa28f3",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall",
        "azure-docs-virtual-wan"
      ],
      "sources": [
        "Azure Firewall docs",
        "Virtual WAN docs"
      ],
      "stats": {
        "additions": 103,
        "deletions": 123,
        "total": 226
      },
      "summary": "Azure Firewall, Virtual WAN: removes \"It's best to initially space your rule collection priority numbers in 100 increments (100, 200, 300, and so on) so you have room to add more rule collections if needed.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1aa28f39fb61e4b1adb0c7231369f3899e81b923"
    },
    {
      "author": "ZarrVenkat",
      "date": "2026-04-08T11:58:14Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/firewall/firewall-known-issues",
          "meaningful_changes": [
            {
              "text": "US Gov Virginia | Premium | - There's zero capacity for Azure Firewall Premium SKU in US Gov Virginia, both zonal and nonzonal deployments are blocked. | Deploy Azure Firewall Standard SKU or deploy Premium SKU to a...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/firewall-known-issues.md",
          "status": "modified",
          "title": "Firewall Known Issues"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:485bb2284f1f6abc1ed0fa2aec3f71d2b401b357",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "US Gov Virginia | Premium | - There's zero capacity for Azure Firewall Premium SKU in US Gov Virginia, both zonal and nonzonal deployments are blocked. | Deploy Azure Firewall Standard SKU or deploy Premium SKU to a...",
          "type": "removed"
        }
      ],
      "message": "Revise firewall known issues and deployment guidance",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/firewall-known-issues",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 42,
      "sha": "485bb2284f1f6abc1ed0fa2aec3f71d2b401b357",
      "short_sha": "485bb22",
      "signal": "Release or version",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 1,
        "total": 1
      },
      "summary": "Azure Firewall: removes \"US Gov Virginia | Premium | - There's zero capacity for Azure Firewall Premium SKU in US Gov Virginia, both zonal and nonzonal deployments are blocked. | Deploy Azure Firewall Standard SKU or deploy Premium SKU to a...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/485bb2284f1f6abc1ed0fa2aec3f71d2b401b357"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T21:23:14Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
          "meaningful_changes": [
            {
              "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/simulation-results.png\" alt-text=\"Screenshot that shows the simulation results of the Rule Impact Analyzer in the Azure portal.\"...",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/simulation-results.png\" alt-text=\"Screenshot that shows the simulation results of the Rule Impact Analyzer in the Azure portal.\"...",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-rule-impact-analyzer.md",
          "status": "modified",
          "title": "Traffic Analytics Rule Impact Analyzer"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:9652817d17f5f46e2a50a670808058ebc289dbea",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/simulation-results.png\" alt-text=\"Screenshot that shows the simulation results of the Rule Impact Analyzer in the Azure portal.\"...",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/simulation-results.png\" alt-text=\"Screenshot that shows the simulation results of the Rule Impact Analyzer in the Azure portal.\"...",
          "type": "added"
        }
      ],
      "message": "fix indentation",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 42,
      "sha": "9652817d17f5f46e2a50a670808058ebc289dbea",
      "short_sha": "9652817",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Network Watcher: adds \":::image type=\"content\" source=\"media/traffic-analytics-rule-impact-analyzer/simulation-results.png\" alt-text=\"Screenshot that shows the simulation results of the Rule Impact Analyzer in the Azure portal.\"...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9652817d17f5f46e2a50a670808058ebc289dbea"
    },
    {
      "author": "duongau",
      "date": "2026-04-02T00:11:47Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 38,
      "files": [
        {
          "additions": 137,
          "deletions": 137,
          "docs_url": "https://learn.microsoft.com/azure/private-link/troubleshoot-private-endpoint-connectivity",
          "meaningful_changes": [
            {
              "text": "Troubleshoot Azure Private Endpoint connectivity problems",
              "type": "removed"
            },
            {
              "text": "This article provides step-by-step guidance to validate and diagnose your Azure Private Endpoint connectivity setup.",
              "type": "removed"
            },
            {
              "text": "Azure Private Endpoint is a network interface that connects you privately and securely to a private link service. This solution helps you secure your workloads in Azure by providing private connectivity to your Azure...",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/troubleshoot-private-endpoint-connectivity.md",
          "status": "modified",
          "title": "Troubleshoot Private Endpoint Connectivity"
        },
        {
          "additions": 113,
          "deletions": 113,
          "docs_url": "https://learn.microsoft.com/azure/private-link/troubleshoot-private-link-connectivity",
          "meaningful_changes": [
            {
              "text": "Troubleshoot Azure Private Link Service connectivity problems",
              "type": "removed"
            },
            {
              "text": "This article provides step-by-step guidance to validate and diagnose connectivity for your Azure Private Link setup.",
              "type": "removed"
            },
            {
              "text": "With Azure Private Link, you can access Azure platform as a service (PaaS) services and Azure hosted customer or partner services over a private endpoint in your virtual network. Traffic between your virtual network...",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/troubleshoot-private-link-connectivity.md",
          "status": "modified",
          "title": "Troubleshoot Private Link Connectivity"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/availability",
          "meaningful_changes": [],
          "path": "articles/private-link/availability.md",
          "status": "modified",
          "title": "Availability"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/configure-asg-private-endpoint",
          "meaningful_changes": [],
          "path": "articles/private-link/configure-asg-private-endpoint.md",
          "status": "modified",
          "title": "Configure Asg Private Endpoint"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-endpoint-bicep",
          "meaningful_changes": [],
          "path": "articles/private-link/create-private-endpoint-bicep.md",
          "status": "modified",
          "title": "Create Private Endpoint Bicep"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-endpoint-cli",
          "meaningful_changes": [],
          "path": "articles/private-link/create-private-endpoint-cli.md",
          "status": "modified",
          "title": "Create Private Endpoint Cli"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-endpoint-portal",
          "meaningful_changes": [],
          "path": "articles/private-link/create-private-endpoint-portal.md",
          "status": "modified",
          "title": "Create Private Endpoint Portal"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-endpoint-powershell",
          "meaningful_changes": [],
          "path": "articles/private-link/create-private-endpoint-powershell.md",
          "status": "modified",
          "title": "Create Private Endpoint Powershell"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-endpoint-template",
          "meaningful_changes": [],
          "path": "articles/private-link/create-private-endpoint-template.md",
          "status": "modified",
          "title": "Create Private Endpoint Template"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-link-service-bicep",
          "meaningful_changes": [],
          "path": "articles/private-link/create-private-link-service-bicep.md",
          "status": "modified",
          "title": "Create Private Link Service Bicep"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:01f2a7e8a8dd7920f88a4e509241eb6f2cbd1187",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Troubleshoot Azure Private Endpoint connectivity problems",
          "type": "removed"
        },
        {
          "text": "This article provides step-by-step guidance to validate and diagnose your Azure Private Endpoint connectivity setup.",
          "type": "removed"
        },
        {
          "text": "Azure Private Endpoint is a network interface that connects you privately and securely to a private link service. This solution helps you secure your workloads in Azure by providing private connectivity to your Azure...",
          "type": "removed"
        },
        {
          "text": "Here are the connectivity scenarios that are available with Private Endpoint:",
          "type": "removed"
        },
        {
          "text": "Virtual network from the same region",
          "type": "removed"
        },
        {
          "text": "Regionally peered virtual networks",
          "type": "removed"
        },
        {
          "text": "Troubleshoot Azure Private Link Service connectivity problems",
          "type": "removed"
        },
        {
          "text": "This article provides step-by-step guidance to validate and diagnose connectivity for your Azure Private Link setup.",
          "type": "removed"
        },
        {
          "text": "With Azure Private Link, you can access Azure platform as a service (PaaS) services and Azure hosted customer or partner services over a private endpoint in your virtual network. Traffic between your virtual network...",
          "type": "removed"
        },
        {
          "text": "You can enable your service that runs behind the Standard tier of Azure Load Balancer for Private Link access. Consumers of your service can create a private endpoint inside their virtual network and map it to this...",
          "type": "removed"
        }
      ],
      "message": "docs: Update author metadata to asudbring/allensu for Private Link articles",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/troubleshoot-private-endpoint-connectivity",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 42,
      "sha": "01f2a7e8a8dd7920f88a4e509241eb6f2cbd1187",
      "short_sha": "01f2a7e",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 322,
        "deletions": 322,
        "total": 644
      },
      "summary": "Private Link: removes \"With Azure Private Link, you can access Azure platform as a service (PaaS) services and Azure hosted customer or partner services over a private endpoint in your virtual network. Traffic between your virtual network...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/01f2a7e8a8dd7920f88a4e509241eb6f2cbd1187"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T18:19:10Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 44,
          "deletions": 53,
          "docs_url": "https://learn.microsoft.com/azure/firewall/premium-deploy",
          "meaningful_changes": [
            {
              "text": "Azure Firewall Premium is a next generation firewall with capabilities that are required for highly sensitive and regulated environments. It includes the following features:",
              "type": "removed"
            },
            {
              "text": "Azure Firewall Premium is a next-generation firewall with capabilities that are required for highly sensitive and regulated environments. It includes the following features:",
              "type": "added"
            },
            {
              "text": "IDPS - A network intrusion detection and prevention system (IDPS) allows you to monitor network activities for malicious activity, log information about this activity, report it, and optionally attempt to block it.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/premium-deploy.md",
          "status": "modified",
          "title": "Premium Deploy"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:20ee2ac35540cd3dfb233b6d5f2e68d6bd3aa087",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Firewall Premium is a next generation firewall with capabilities that are required for highly sensitive and regulated environments. It includes the following features:",
          "type": "removed"
        },
        {
          "text": "Azure Firewall Premium is a next-generation firewall with capabilities that are required for highly sensitive and regulated environments. It includes the following features:",
          "type": "added"
        },
        {
          "text": "IDPS - A network intrusion detection and prevention system (IDPS) allows you to monitor network activities for malicious activity, log information about this activity, report it, and optionally attempt to block it.",
          "type": "removed"
        },
        {
          "text": "IDPS - A network intrusion detection and prevention system (IDPS) that you can use to monitor network activities for malicious activity, log information about this activity, report it, and optionally attempt to block it.",
          "type": "added"
        },
        {
          "text": "You'll use a template to deploy a test environment that has a central VNet (10.0.0.0/16) with three subnets:",
          "type": "removed"
        },
        {
          "text": "a worker subnet (10.0.10.0/24)",
          "type": "removed"
        }
      ],
      "message": "docs: Fix metadata field order and ms.date, replace VNet with 'virtual network', fix alt text, rewrite list items, fix passive voice",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/premium-deploy",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 42,
      "sha": "20ee2ac35540cd3dfb233b6d5f2e68d6bd3aa087",
      "short_sha": "20ee2ac",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 44,
        "deletions": 53,
        "total": 97
      },
      "summary": "Azure Firewall: adds \"IDPS - A network intrusion detection and prevention system (IDPS) that you can use to monitor network activities for malicious activity, log information about this activity, report it, and optionally attempt to block it.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/20ee2ac35540cd3dfb233b6d5f2e68d6bd3aa087"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T18:09:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 192,
          "deletions": 110,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-ps-policy",
          "meaningful_changes": [
            {
              "text": "Deploy and configure Azure Firewall policy using Azure PowerShell",
              "type": "removed"
            },
            {
              "text": "Deploy and configure Azure Firewall policy by using Azure PowerShell",
              "type": "added"
            },
            {
              "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-ps-policy.md",
          "status": "modified",
          "title": "Deploy Ps Policy"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:10130b75902158c35087399045e20321eab161da",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Deploy and configure Azure Firewall policy using Azure PowerShell",
          "type": "removed"
        },
        {
          "text": "Deploy and configure Azure Firewall policy by using Azure PowerShell",
          "type": "added"
        },
        {
          "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
          "type": "removed"
        },
        {
          "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you might want to limit access to websites. Or, you might want to limit the outbound IP addresses and ports...",
          "type": "added"
        },
        {
          "text": "One way you can control outbound network access from an Azure subnet is with Azure Firewall and Firewall Policy. With Azure Firewall, you can configure:",
          "type": "removed"
        },
        {
          "text": "You can control outbound network access from an Azure subnet by using Azure Firewall and Firewall Policy. By using Azure Firewall, you can configure:",
          "type": "added"
        }
      ],
      "message": "docs: Replace VNet with 'virtual network', add New-AzBastion cmdlet link, fix variable casing ($testvnet -> $testVnet), remove trailing periods from list items",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/deploy-ps-policy",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 42,
      "sha": "10130b75902158c35087399045e20321eab161da",
      "short_sha": "10130b7",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 192,
        "deletions": 110,
        "total": 302
      },
      "summary": "Azure Firewall: adds \"You can control outbound network access from an Azure subnet by using Azure Firewall and Firewall Policy. By using Azure Firewall, you can configure:\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/10130b75902158c35087399045e20321eab161da"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-22T20:52:58Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/video-on-demand-live-streaming",
          "meaningful_changes": [
            {
              "text": "Improve performance by compressing files in Azure Front Door.",
              "type": "removed"
            },
            {
              "text": "High-availability implementation guide for using Azure Front Door.",
              "type": "removed"
            },
            {
              "text": "Improve performance by compressing files in Azure Front Door",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/video-on-demand-live-streaming.md",
          "status": "modified",
          "title": "Video On Demand Live Streaming"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5c161b3c33d65ab04c1f9c975d68eb6db93bf196",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Improve performance by compressing files in Azure Front Door.",
          "type": "removed"
        },
        {
          "text": "High-availability implementation guide for using Azure Front Door.",
          "type": "removed"
        },
        {
          "text": "Improve performance by compressing files in Azure Front Door",
          "type": "added"
        },
        {
          "text": "High-availability implementation guide for using Azure Front Door",
          "type": "added"
        },
        {
          "text": "Caching with Azure Front Door",
          "type": "added"
        }
      ],
      "message": "add link to caching in related content section",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/video-on-demand-live-streaming",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "5c161b3c33d65ab04c1f9c975d68eb6db93bf196",
      "short_sha": "5c161b3",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 2,
        "total": 5
      },
      "summary": "Front Door: adds \"High-availability implementation guide for using Azure Front Door\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5c161b3c33d65ab04c1f9c975d68eb6db93bf196"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-22T09:50:56Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/video-on-demand-live-streaming",
          "meaningful_changes": [
            {
              "text": "Improve performance by compressing files in Azure Front Door.",
              "type": "added"
            },
            {
              "text": "High-availability implementation guide for using Azure Front Door.",
              "type": "added"
            },
            {
              "text": "Architecture best practices for Azure Front Door",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/video-on-demand-live-streaming.md",
          "status": "modified",
          "title": "Video On Demand Live Streaming"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b9cc363619e5e8b3d65bc790dc31644149d54fb9",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Improve performance by compressing files in Azure Front Door.",
          "type": "added"
        },
        {
          "text": "High-availability implementation guide for using Azure Front Door.",
          "type": "added"
        },
        {
          "text": "Architecture best practices for Azure Front Door",
          "type": "added"
        }
      ],
      "message": "add related content section",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/video-on-demand-live-streaming",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "b9cc363619e5e8b3d65bc790dc31644149d54fb9",
      "short_sha": "b9cc363",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 0,
        "total": 5
      },
      "summary": "Front Door: adds \"High-availability implementation guide for using Azure Front Door.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b9cc363619e5e8b3d65bc790dc31644149d54fb9"
    },
    {
      "author": "asudbring",
      "date": "2026-04-21T21:16:31Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 12,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/how-to-dhcp-azure",
          "meaningful_changes": [
            {
              "text": "1. Run the following command to enable Forwarding on the primary network adapter:",
              "type": "added"
            },
            {
              "text": "Set-NetIPInterface -InterfaceIndex 6 -Forwarding enable",
              "type": "added"
            },
            {
              "text": "1. Run the following command to enable Forwarding on the loopback adapter:",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/how-to-dhcp-azure.md",
          "status": "modified",
          "title": "How To Dhcp Azure"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:cdf293e3143c470e71a0fa2b7a4993f3cbc1c431",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1. Run the following command to enable Forwarding on the primary network adapter:",
          "type": "added"
        },
        {
          "text": "Set-NetIPInterface -InterfaceIndex 6 -Forwarding enable",
          "type": "added"
        },
        {
          "text": "1. Run the following command to enable Forwarding on the loopback adapter:",
          "type": "added"
        },
        {
          "text": "Set-NetIPInterface -InterfaceIndex 11 -Forwarding enable",
          "type": "added"
        }
      ],
      "message": "docs: Add IP forwarding steps for primary and loopback adapters",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/how-to-dhcp-azure",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "cdf293e3143c470e71a0fa2b7a4993f3cbc1c431",
      "short_sha": "cdf293e",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 12,
        "deletions": 0,
        "total": 12
      },
      "summary": "Virtual Network: adds \"1. Run the following command to enable Forwarding on the primary network adapter:\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/cdf293e3143c470e71a0fa2b7a4993f3cbc1c431"
    },
    {
      "author": "shmallad",
      "date": "2026-04-20T22:41:17Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
          "meaningful_changes": [
            {
              "text": "Azure Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available",
              "type": "added"
            }
          ],
          "path": "articles/private-link/network-security-perimeter-concepts.md",
          "status": "modified",
          "title": "Network Security Perimeter Concepts"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0a27b79b5c7fb6d5818fb8b52f88fc4be3049843",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available",
          "type": "added"
        }
      ],
      "message": "Add Azure Service Bus to network security perimeter list",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "0a27b79b5c7fb6d5818fb8b52f88fc4be3049843",
      "short_sha": "0a27b79",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 0,
        "total": 1
      },
      "summary": "Private Link: adds \"Azure Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0a27b79b5c7fb6d5818fb8b52f88fc4be3049843"
    },
    {
      "author": "Cheryl McGuire",
      "date": "2026-04-10T17:56:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 74,
          "deletions": 31,
          "docs_url": "https://learn.microsoft.com/azure/bastion/session-recording",
          "meaningful_changes": [
            {
              "text": "The following sections outline considerations, limitations, and prerequisites for Bastion session recording.",
              "type": "removed"
            },
            {
              "text": "Bastion graphical session recording supports managed identities to authenticate to your storage account, eliminating the need to manage SAS tokens. You can use either a system-assigned or user-assigned managed...",
              "type": "added"
            },
            {
              "text": "Considerations and limitations",
              "type": "removed"
            }
          ],
          "path": "articles/bastion/session-recording.md",
          "status": "modified",
          "title": "Session Recording"
        },
        {
          "additions": 1,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/bastion/whats-new",
          "meaningful_changes": [
            {
              "text": "Feature|Managed identity support for session recording|Managed identity support for session recording is now in public preview.|Public Preview|April 2026|N/A",
              "type": "added"
            }
          ],
          "path": "articles/bastion/whats-new.md",
          "status": "modified",
          "title": "Whats New"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:31aedddeeb18584cae48cdb93d01d68683937f62",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "The following sections outline considerations, limitations, and prerequisites for Bastion session recording.",
          "type": "removed"
        },
        {
          "text": "Bastion graphical session recording supports managed identities to authenticate to your storage account, eliminating the need to manage SAS tokens. You can use either a system-assigned or user-assigned managed...",
          "type": "added"
        },
        {
          "text": "Considerations and limitations",
          "type": "removed"
        },
        {
          "text": "Entra ID support for RDP sessions in portal cannot be used concurrently with graphical session recording at this time.",
          "type": "removed"
        },
        {
          "text": "Entra ID support for RDP sessions in portal can't be used concurrently with graphical session recording at this time.",
          "type": "added"
        },
        {
          "text": "Immutable storage policies must not be present",
          "type": "removed"
        },
        {
          "text": "Feature|Managed identity support for session recording|Managed identity support for session recording is now in public preview.|Public Preview|April 2026|N/A",
          "type": "added"
        }
      ],
      "message": "Managed Identity preview",
      "paths": [
        "articles/bastion"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/bastion/session-recording",
      "primary_product": "bastion",
      "primary_product_label": "Bastion",
      "product_labels": [
        "Bastion"
      ],
      "products": [
        "bastion"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "31aedddeeb18584cae48cdb93d01d68683937f62",
      "short_sha": "31aeddd",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-bastion"
      ],
      "sources": [
        "Bastion docs"
      ],
      "stats": {
        "additions": 75,
        "deletions": 31,
        "total": 106
      },
      "summary": "Bastion: adds \"Bastion graphical session recording supports managed identities to authenticate to your storage account, eliminating the need to manage SAS tokens. You can use either a system-assigned or user-assigned managed...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/31aedddeeb18584cae48cdb93d01d68683937f62"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T04:50:17Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 70,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/quickstart-create-nat-gateway-v2-templates",
          "meaningful_changes": [
            {
              "text": "Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template) or Bicep template. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for testing NAT...",
              "type": "removed"
            },
            {
              "text": "Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template), Bicep template, or Terraform. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for...",
              "type": "added"
            },
            {
              "text": "An Azure account with an active subscription. Create an account for free.",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/quickstart-create-nat-gateway-v2-templates.md",
          "status": "modified",
          "title": "Quickstart Create Nat Gateway V2 Templates"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2a8e265e63d7e541274fbefa8a5605382830fe95",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template) or Bicep template. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for testing NAT...",
          "type": "removed"
        },
        {
          "text": "Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template), Bicep template, or Terraform. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for...",
          "type": "added"
        },
        {
          "text": "An Azure account with an active subscription. Create an account for free.",
          "type": "added"
        },
        {
          "text": "Install and configure Terraform",
          "type": "added"
        },
        {
          "text": "The sample code for this article is located in the Azure Terraform GitHub repo. You can view the log file containing the test results from current and previous versions of Terraform. See more articles and sample code...",
          "type": "added"
        },
        {
          "text": "The following Azure resources are defined in the Terraform configuration:",
          "type": "added"
        }
      ],
      "message": "docs: Add Terraform tab to NAT Gateway V2 deployment templates quickstart",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/quickstart-create-nat-gateway-v2-templates",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "2a8e265e63d7e541274fbefa8a5605382830fe95",
      "short_sha": "2a8e265",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 70,
        "deletions": 4,
        "total": 74
      },
      "summary": "NAT Gateway: adds \"Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template), Bicep template, or Terraform. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2a8e265e63d7e541274fbefa8a5605382830fe95"
    },
    {
      "author": "Ali Sheriff",
      "date": "2026-04-09T01:21:11Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 11,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/setup-dpdk-mana",
          "meaningful_changes": [
            {
              "text": "Utilizing DPDK on MANA hardware requires the Linux kernel 6.2 or later or a backport of the Ethernet and InfiniBand drivers from the latest Linux kernel. It also requires specific versions of DPDK and user-space drivers.",
              "type": "removed"
            },
            {
              "text": "MANA DPDK requires the following set of drivers:",
              "type": "removed"
            },
            {
              "text": "1. Linux kernel Ethernet driver (5.15 kernel and later)",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/setup-dpdk-mana.md",
          "status": "modified",
          "title": "Setup Dpdk Mana"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:00ffa531e920745bddf7cf3c3cd5c89df668a376",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Utilizing DPDK on MANA hardware requires the Linux kernel 6.2 or later or a backport of the Ethernet and InfiniBand drivers from the latest Linux kernel. It also requires specific versions of DPDK and user-space drivers.",
          "type": "removed"
        },
        {
          "text": "MANA DPDK requires the following set of drivers:",
          "type": "removed"
        },
        {
          "text": "1. Linux kernel Ethernet driver (5.15 kernel and later)",
          "type": "removed"
        },
        {
          "text": "1. Linux kernel InfiniBand driver (6.2 kernel and later)",
          "type": "removed"
        },
        {
          "text": "1. DPDK MANA poll-mode driver (DPDK 22.11 and later)",
          "type": "removed"
        },
        {
          "text": "1. Libmana user-space drivers (rdma-core v44 and later)",
          "type": "removed"
        }
      ],
      "message": "Revise DPDK requirements and add marketplace images",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/setup-dpdk-mana",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "00ffa531e920745bddf7cf3c3cd5c89df668a376",
      "short_sha": "00ffa53",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 11,
        "total": 14
      },
      "summary": "Virtual Network: removes \"Utilizing DPDK on MANA hardware requires the Linux kernel 6.2 or later or a backport of the Ethernet and InfiniBand drivers from the latest Linux kernel. It also requires specific versions of DPDK and user-space drivers.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/00ffa531e920745bddf7cf3c3cd5c89df668a376"
    },
    {
      "author": "asudbring",
      "date": "2026-04-08T23:45:23Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 205,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/manage-nat-gateway-v2",
          "meaningful_changes": [
            {
              "text": "An Azure account with an active subscription. Create an account for free.",
              "type": "added"
            },
            {
              "text": "An existing Azure Virtual Network and subnet. For more information, see Quickstart: Create a virtual network using the Azure portal.",
              "type": "added"
            },
            {
              "text": "The example virtual network that is used in this article is named vnet-1.",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/manage-nat-gateway-v2.md",
          "status": "modified",
          "title": "Manage Nat Gateway V2"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:05e92a5ac222102f5a35732850b4cf99ece2299f",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "An Azure account with an active subscription. Create an account for free.",
          "type": "added"
        },
        {
          "text": "An existing Azure Virtual Network and subnet. For more information, see Quickstart: Create a virtual network using the Azure portal.",
          "type": "added"
        },
        {
          "text": "The example virtual network that is used in this article is named vnet-1.",
          "type": "added"
        },
        {
          "text": "The example subnet is named subnet-1.",
          "type": "added"
        },
        {
          "text": "The example NAT gateway is named nat-gateway.",
          "type": "added"
        },
        {
          "text": "Installation and configuration of Terraform.",
          "type": "added"
        }
      ],
      "message": "Add Terraform tab to manage NAT gateway V2 article",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/manage-nat-gateway-v2",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "05e92a5ac222102f5a35732850b4cf99ece2299f",
      "short_sha": "05e92a5",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 205,
        "deletions": 3,
        "total": 208
      },
      "summary": "NAT Gateway: adds \"An Azure account with an active subscription. Create an account for free.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/05e92a5ac222102f5a35732850b4cf99ece2299f"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-08T15:00:51Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
          "meaningful_changes": [
            {
              "text": "Storage | Microsoft.Storage/storageAccounts | | Generally Available",
              "type": "removed"
            },
            {
              "text": "Storage | Microsoft.Storage/storageAccounts | | Generally Available",
              "type": "added"
            }
          ],
          "path": "articles/private-link/network-security-perimeter-concepts.md",
          "status": "modified",
          "title": "Network Security Perimeter Concepts"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:eb1fff7d3dad1af4c9046c59ca4fd89e5ecfe4ac",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Storage | Microsoft.Storage/storageAccounts | | Generally Available",
          "type": "removed"
        },
        {
          "text": "Storage | Microsoft.Storage/storageAccounts | | Generally Available",
          "type": "added"
        }
      ],
      "message": "Apply suggestion from @Copilot",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "eb1fff7d3dad1af4c9046c59ca4fd89e5ecfe4ac",
      "short_sha": "eb1fff7",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Private Link: adds \"Storage | Microsoft.Storage/storageAccounts | | Generally Available\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/eb1fff7d3dad1af4c9046c59ca4fd89e5ecfe4ac"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T21:48:40Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 18,
          "deletions": 18,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "What is happening with DigiCert\u2019s CNAME Delegation DCV workflow?",
              "type": "removed"
            },
            {
              "text": "What is happening with DigiCert's CNAME Delegation DCV workflow?",
              "type": "added"
            },
            {
              "text": "Effective15 August 2025, DigiCert has transitioned to a new open-source software (OSS) domain control validation (DCV) platform designed to enhance transparency and accountability in domain validation processes...",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:82416117e3124d518a62ba317c7731174f64f9a5",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "What is happening with DigiCert\u2019s CNAME Delegation DCV workflow?",
          "type": "removed"
        },
        {
          "text": "What is happening with DigiCert's CNAME Delegation DCV workflow?",
          "type": "added"
        },
        {
          "text": "Effective15 August 2025, DigiCert has transitioned to a new open-source software (OSS) domain control validation (DCV) platform designed to enhance transparency and accountability in domain validation processes...",
          "type": "removed"
        },
        {
          "text": "Effective August 15, 2025, DigiCert transitioned to a new open-source software (OSS) domain control validation (DCV) platform designed to enhance transparency and accountability in domain validation processes. DigiCert...",
          "type": "added"
        },
        {
          "text": "What\u2019s the current status?",
          "type": "removed"
        },
        {
          "text": "What's the current status?",
          "type": "added"
        }
      ],
      "message": "digicert",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "82416117e3124d518a62ba317c7731174f64f9a5",
      "short_sha": "8241611",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 18,
        "deletions": 18,
        "total": 36
      },
      "summary": "Front Door: adds \"Effective August 15, 2025, DigiCert transitioned to a new open-source software (OSS) domain control validation (DCV) platform designed to enhance transparency and accountability in domain validation processes. DigiCert...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/82416117e3124d518a62ba317c7731174f64f9a5"
    },
    {
      "author": "James Barnett",
      "date": "2026-04-02T21:51:47Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
          "meaningful_changes": [
            {
              "text": "Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available",
              "type": "added"
            }
          ],
          "path": "articles/private-link/network-security-perimeter-concepts.md",
          "status": "modified",
          "title": "Network Security Perimeter Concepts"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a67be14627d0f2282a94abf996524b73668c2a17",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available",
          "type": "added"
        }
      ],
      "message": "Merge pull request #311812 from EldertGrootenboer/nsp",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "a67be14627d0f2282a94abf996524b73668c2a17",
      "short_sha": "a67be14",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 0,
        "total": 1
      },
      "summary": "Private Link: adds \"Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a67be14627d0f2282a94abf996524b73668c2a17"
    },
    {
      "author": "shmallad",
      "date": "2026-04-02T09:50:09Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
          "meaningful_changes": [
            {
              "text": "Azure Backup is not supported for Storage Accounts enabled with network security perimeter. We recommend not associating a storage account with network security perimeter if you have backups enabled or if you plan to...",
              "type": "added"
            }
          ],
          "path": "articles/private-link/network-security-perimeter-concepts.md",
          "status": "modified",
          "title": "Network Security Perimeter Concepts"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f87a5602cad9f5deaeaa5a593d7d16bbb395ad77",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Backup is not supported for Storage Accounts enabled with network security perimeter. We recommend not associating a storage account with network security perimeter if you have backups enabled or if you plan to...",
          "type": "added"
        }
      ],
      "message": "Clarify Azure Backup limitations for Storage Accounts",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "f87a5602cad9f5deaeaa5a593d7d16bbb395ad77",
      "short_sha": "f87a560",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 0,
        "total": 3
      },
      "summary": "Private Link: adds \"Azure Backup is not supported for Storage Accounts enabled with network security perimeter. We recommend not associating a storage account with network security perimeter if you have backups enabled or if you plan to...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f87a5602cad9f5deaeaa5a593d7d16bbb395ad77"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T22:31:05Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "added"
            },
            {
              "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-existing-sizes.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Existing Sizes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d3786b4fba07bd28642d638b4c36c1599b82e760",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "added"
        },
        {
          "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
          "type": "removed"
        }
      ],
      "message": "Update MANA support information for existing VM sizes",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "d3786b4fba07bd28642d638b4c36c1599b82e760",
      "short_sha": "d3786b4",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d3786b4fba07bd28642d638b4c36c1599b82e760"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T22:30:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "added"
            },
            {
              "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
              "type": "removed"
            },
            {
              "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Network Virtual Appliance Opt Out"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fc55822932673939426e8f58c219bc1dca8126c3",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "added"
        },
        {
          "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
          "type": "removed"
        },
        {
          "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "removed"
        }
      ],
      "message": "Simplify MANA support documentation for NVAs",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "fc55822932673939426e8f58c219bc1dca8126c3",
      "short_sha": "fc55822",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 4,
        "total": 7
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fc55822932673939426e8f58c219bc1dca8126c3"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T22:07:53Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
              "type": "added"
            },
            {
              "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "added"
            },
            {
              "text": "Microsoft Azure Network Adapter (MANA) support for existing VM Sizes",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Network Virtual Appliance Opt Out"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:9c8492e9b3ab08451365f01d71945e2a3ee09a56",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
          "type": "added"
        },
        {
          "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "added"
        },
        {
          "text": "Microsoft Azure Network Adapter (MANA) support for existing VM Sizes",
          "type": "removed"
        },
        {
          "text": "Microsoft Azure Network Adapter (MANA) support for existing VM Sizes",
          "type": "added"
        }
      ],
      "message": "Add MANA rollout notice for NVAs",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "9c8492e9b3ab08451365f01d71945e2a3ee09a56",
      "short_sha": "9c8492e",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 1,
        "total": 6
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9c8492e9b3ab08451365f01d71945e2a3ee09a56"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T22:06:47Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
              "type": "added"
            },
            {
              "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-existing-sizes.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Existing Sizes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:3406c592d92cc76a9ae6daa3abc57ce8515ed013",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
          "type": "added"
        },
        {
          "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "added"
        }
      ],
      "message": "Add MANA rollout notice for existing VM sizes",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "3406c592d92cc76a9ae6daa3abc57ce8515ed013",
      "short_sha": "3406c59",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 0,
        "total": 4
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/3406c592d92cc76a9ae6daa3abc57ce8515ed013"
    },
    {
      "author": "Matt McInnes",
      "date": "2026-04-01T20:26:37Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 12,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/setup-dpdk-mana",
          "meaningful_changes": [
            {
              "text": "A nonexhaustive list of images with backported patches for DPDK with MANA:",
              "type": "removed"
            },
            {
              "text": "Red Hat Enterprise Linux 8.9",
              "type": "removed"
            },
            {
              "text": "Red Hat Enterprise Linux 9.4",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/setup-dpdk-mana.md",
          "status": "modified",
          "title": "Setup Dpdk Mana"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:adb0f730569cab98603118de4fae1fb593b8081c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "A nonexhaustive list of images with backported patches for DPDK with MANA:",
          "type": "removed"
        },
        {
          "text": "Red Hat Enterprise Linux 8.9",
          "type": "removed"
        },
        {
          "text": "Red Hat Enterprise Linux 9.4",
          "type": "removed"
        },
        {
          "text": "Canonical Ubuntu Server 20.04 (5.15.0-1045-azure)",
          "type": "removed"
        },
        {
          "text": "Canonical Ubuntu Server 22.04 (5.15.0-1045-azure)",
          "type": "removed"
        },
        {
          "text": "A full list of supported marketplace images can be found in the 'Azure Accelerated Networking overview'.",
          "type": "added"
        }
      ],
      "message": "Update DPDK MANA setup documentation",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/setup-dpdk-mana",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "adb0f730569cab98603118de4fae1fb593b8081c",
      "short_sha": "adb0f73",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 12,
        "deletions": 7,
        "total": 19
      },
      "summary": "Virtual Network: adds \"A full list of supported marketplace images can be found in the 'Azure Accelerated Networking overview'.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/adb0f730569cab98603118de4fae1fb593b8081c"
    },
    {
      "author": "darshils2001",
      "date": "2026-04-01T18:50:04Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/private-link",
          "meaningful_changes": [
            {
              "text": "If your client application connects to App Gateway via a private IP, requires an idle timeout greater than 4 minutes, and the client application does not send TCP keep-alive packets, contact...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/private-link.md",
          "status": "modified",
          "title": "Private Link"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:077956aec05e95c8a52237abf88b650923e46067",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If your client application connects to App Gateway via a private IP, requires an idle timeout greater than 4 minutes, and the client application does not send TCP keep-alive packets, contact...",
          "type": "added"
        }
      ],
      "message": "Add keep alive message",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/private-link",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "077956aec05e95c8a52237abf88b650923e46067",
      "short_sha": "077956a",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 0,
        "total": 3
      },
      "summary": "Application Gateway: adds \"If your client application connects to App Gateway via a private IP, requires an idle timeout greater than 4 minutes, and the client application does not send TCP keep-alive packets, contact...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/077956aec05e95c8a52237abf88b650923e46067"
    },
    {
      "author": "Eldert Grootenboer (from Dev Box)",
      "date": "2026-03-30T23:26:05Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
          "meaningful_changes": [
            {
              "text": "Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available",
              "type": "added"
            }
          ],
          "path": "articles/private-link/network-security-perimeter-concepts.md",
          "status": "modified",
          "title": "Network Security Perimeter Concepts"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e088c0d6070145ec0b1ca60cb1d5c548a2c61620",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available",
          "type": "added"
        }
      ],
      "message": "Update NSP documentation for Service Bus GA",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-concepts",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "e088c0d6070145ec0b1ca60cb1d5c548a2c61620",
      "short_sha": "e088c0d",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 0,
        "total": 1
      },
      "summary": "Private Link: adds \"Service Bus | Microsoft.ServiceBus/namespaces | | Generally Available\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e088c0d6070145ec0b1ca60cb1d5c548a2c61620"
    },
    {
      "author": "Dennis Rea",
      "date": "2026-03-30T16:22:29Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 4,
      "files": [
        {
          "additions": 341,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/site-to-site-ipv6-azure-cli",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure VPN Gateway",
              "type": "added"
            },
            {
              "text": "Create a site-to-site IPv6 VPN connection in dual stack using Azure CLI - Preview",
              "type": "added"
            },
            {
              "text": "This article helps you create a site-to-site VPN gateway connection in IPv4 and IPv6 dual stack from your on-premises network to a virtual network (VNet) using the Azure CLI.",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/site-to-site-ipv6-azure-cli.md",
          "status": "added",
          "title": "Site To Site Ipv6 Azure Cli"
        },
        {
          "additions": 8,
          "deletions": 4,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Preshared key",
              "type": "removed"
            },
            {
              "text": "name: IPv6 configuration settings",
              "type": "removed"
            },
            {
              "text": "href: ipv6-configuration.md",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/TOC.yml",
          "status": "modified",
          "title": "Toc"
        },
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/ipv6-configuration",
          "meaningful_changes": [
            {
              "text": "Configure IPv6 for VPN Gateway - Preview",
              "type": "removed"
            },
            {
              "text": "Configure IPv6 for VPN Gateway using the Azure portal - Preview",
              "type": "added"
            },
            {
              "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell, or CLI for this...",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/ipv6-configuration.md",
          "status": "modified",
          "title": "Ipv6 Configuration"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/vpn-gateway/media/site-to-site-ipv6-azure-cli/site-to-site-connection.png",
          "status": "added",
          "title": "Site To Site Connection"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d71c36f495ef5f7608666f2002b7478d30e4cb77",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Preshared key",
          "type": "removed"
        },
        {
          "text": "name: IPv6 configuration settings",
          "type": "removed"
        },
        {
          "text": "href: ipv6-configuration.md",
          "type": "removed"
        },
        {
          "text": "name: Configure site-to-site connections - preshared key",
          "type": "removed"
        },
        {
          "text": "name: Configure site-to-site connections - shared key",
          "type": "added"
        },
        {
          "text": "name: IPv6 dual stack connections",
          "type": "added"
        },
        {
          "text": "Configure IPv6 for VPN Gateway - Preview",
          "type": "removed"
        },
        {
          "text": "Configure IPv6 for VPN Gateway using the Azure portal - Preview",
          "type": "added"
        },
        {
          "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell, or CLI for this...",
          "type": "removed"
        },
        {
          "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell, or CLI for this...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #312679 from cherylmc/VPNGW-New-IPv6",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/site-to-site-ipv6-azure-cli",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 40,
      "sha": "d71c36f495ef5f7608666f2002b7478d30e4cb77",
      "short_sha": "d71c36f",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 352,
        "deletions": 7,
        "total": 359
      },
      "summary": "VPN Gateway: adds \"Configure IPv6 for VPN Gateway using the Azure portal - Preview\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d71c36f495ef5f7608666f2002b7478d30e4cb77"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-22T09:09:01Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 11,
          "deletions": 23,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
          "meaningful_changes": [
            {
              "text": "The following configuration examples illustrate how Azure Front Door was tuned to optimize delivery of MPEG-DASH video-on-demand (VOD) streaming workloads.",
              "type": "removed"
            },
            {
              "text": "The following configuration examples illustrate how Azure Front Door is tuned to optimize delivery of MPEG-DASH video-on-demand (VOD) streaming workloads.",
              "type": "added"
            },
            {
              "text": "Rules | Cache .m4s segment files for 1 hour (or longer with immutable) | VOD video segments are immutable once encoded and published. They never change. Caching them at the edge for extended durations prevents...",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/deliver-video-demand.md",
          "status": "modified",
          "title": "Deliver Video Demand"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b519a6d8791dbc400f641e9d6c639f85c2a29ffa",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "The following configuration examples illustrate how Azure Front Door was tuned to optimize delivery of MPEG-DASH video-on-demand (VOD) streaming workloads.",
          "type": "removed"
        },
        {
          "text": "The following configuration examples illustrate how Azure Front Door is tuned to optimize delivery of MPEG-DASH video-on-demand (VOD) streaming workloads.",
          "type": "added"
        },
        {
          "text": "Rules | Cache .m4s segment files for 1 hour (or longer with immutable) | VOD video segments are immutable once encoded and published. They never change. Caching them at the edge for extended durations prevents...",
          "type": "removed"
        },
        {
          "text": "Rules | Ignore query string for caching | Some players append transient query parameters (for example: timestamps, client session IDs) to segment requests. Ignoring query strings prevents cache fragmentation and...",
          "type": "removed"
        },
        {
          "text": "Route | Enable caching at the route level | Route-level caching ensures that requests matched by the path are cached by Azure Front Door's edge even if no specific rule explicitly enables caching. This acts as a...",
          "type": "removed"
        },
        {
          "text": "Route | Query string caching behavior: Ignore query string | This reinforces the rule-level configuration and ensures consistent cache behavior for all requests matching the route, including requests that don't match a...",
          "type": "removed"
        }
      ],
      "message": "finalize for publishing",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "b519a6d8791dbc400f641e9d6c639f85c2a29ffa",
      "short_sha": "b519a6d",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 11,
        "deletions": 23,
        "total": 34
      },
      "summary": "Front Door: removes \"Route | Enable caching at the route level | Route-level caching ensures that requests matched by the path are cached by Azure Front Door's edge even if no specific rule explicitly enables caching. This acts as a...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b519a6d8791dbc400f641e9d6c639f85c2a29ffa"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-22T05:53:59Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 3,
      "files": [
        {
          "additions": 3,
          "deletions": 18,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
          "meaningful_changes": [
            {
              "text": "Azure Front Door continues to expand its capabilities for delivering live and on-demand streaming content to viewers around the world with highly reliable performance and low latency. Azure Front Door's architecture is...",
              "type": "removed"
            },
            {
              "text": "Azure Front Door's architecture is designed to optimize global content delivery by leveraging Microsoft's private backbone network together with a large global-edge footprint.",
              "type": "added"
            },
            {
              "text": "Azure Front Door minimizes latency and avoids congested public internet paths by routing traffic across Microsoft's private network between distributed edge locations, providing highly resilient delivery...",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/deliver-video-demand.md",
          "status": "modified",
          "title": "Deliver Video Demand"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/frontdoor/media/deliver-video-demand/global-benchmark-results.png",
          "status": "removed",
          "title": "Global Benchmark Results"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/frontdoor/media/deliver-video-demand/microsoft-backbone-network.png",
          "status": "removed",
          "title": "Microsoft Backbone Network"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:75699db1eaec8f66a819793ebf96dd7b94dc28b4",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Front Door continues to expand its capabilities for delivering live and on-demand streaming content to viewers around the world with highly reliable performance and low latency. Azure Front Door's architecture is...",
          "type": "removed"
        },
        {
          "text": "Azure Front Door's architecture is designed to optimize global content delivery by leveraging Microsoft's private backbone network together with a large global-edge footprint.",
          "type": "added"
        },
        {
          "text": "Azure Front Door minimizes latency and avoids congested public internet paths by routing traffic across Microsoft's private network between distributed edge locations, providing highly resilient delivery...",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"./media/deliver-video-demand/microsoft-backbone-network.png\" alt-text=\"Diagram of Microsoft's private backbone network.\":::",
          "type": "removed"
        },
        {
          "text": "Azure Front Door is used across many Microsoft first-party services to deliver both video-on-demand (VOD) and live streaming content using industry-standard HLS and MPEG-DASH formats. Similar to many large-scale...",
          "type": "removed"
        },
        {
          "text": "Performance benchmark",
          "type": "removed"
        }
      ],
      "message": "remove diagrams",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "75699db1eaec8f66a819793ebf96dd7b94dc28b4",
      "short_sha": "75699db",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 18,
        "total": 21
      },
      "summary": "Front Door: removes \"Azure Front Door minimizes latency and avoids congested public internet paths by routing traffic across Microsoft's private network between distributed edge locations, providing highly resilient delivery...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/75699db1eaec8f66a819793ebf96dd7b94dc28b4"
    },
    {
      "author": "MekaylaMoore",
      "date": "2026-04-15T15:44:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/gateway-migration",
          "meaningful_changes": [
            {
              "text": "Adding multiple prefixes to the GatewaySubnet is currently in Public Preview and supported only via PowerShell. When you add an additional prefix, both prefixes will be used by the migrated gateway, so don't delete the...",
              "type": "removed"
            },
            {
              "text": "Adding multiple prefixes to the GatewaySubnet is available currently via command line (PowerShell, CLI) or Azure Resource Manager Templates. When you add an additional prefix, both prefixes will be used by the migrated...",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/gateway-migration.md",
          "status": "modified",
          "title": "Gateway Migration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:46522b98e04192363cf5dbef0a8a6588e4dd8ff2",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Adding multiple prefixes to the GatewaySubnet is currently in Public Preview and supported only via PowerShell. When you add an additional prefix, both prefixes will be used by the migrated gateway, so don't delete the...",
          "type": "removed"
        },
        {
          "text": "Adding multiple prefixes to the GatewaySubnet is available currently via command line (PowerShell, CLI) or Azure Resource Manager Templates. When you add an additional prefix, both prefixes will be used by the migrated...",
          "type": "added"
        }
      ],
      "message": "Update gateway-migration.md",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/gateway-migration",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "46522b98e04192363cf5dbef0a8a6588e4dd8ff2",
      "short_sha": "46522b9",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "ExpressRoute: adds \"Adding multiple prefixes to the GatewaySubnet is available currently via command line (PowerShell, CLI) or Azure Resource Manager Templates. When you add an additional prefix, both prefixes will be used by the migrated...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/46522b98e04192363cf5dbef0a8a6588e4dd8ff2"
    },
    {
      "author": "MekaylaMoore",
      "date": "2026-04-13T20:40:35Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/gateway-migration",
          "meaningful_changes": [
            {
              "text": "GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. For more information, see Create multiple prefixes for a subnet.",
              "type": "removed"
            },
            {
              "text": "GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. If multiple address prefixes are configured, both the existing and newly added GatewaySubnet...",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/gateway-migration.md",
          "status": "modified",
          "title": "Gateway Migration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:c47a384983b169b8d5e62d793ec912d797563064",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. For more information, see Create multiple prefixes for a subnet.",
          "type": "removed"
        },
        {
          "text": "GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. If multiple address prefixes are configured, both the existing and newly added GatewaySubnet...",
          "type": "added"
        }
      ],
      "message": "Update gateway-migration.md",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/gateway-migration",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "c47a384983b169b8d5e62d793ec912d797563064",
      "short_sha": "c47a384",
      "signal": "New or changed support",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "ExpressRoute: adds \"GatewaySubnet Size: The GatewaySubnet must have a /27 prefix or larger (for example, /26 or /25) to proceed with migration. If multiple address prefixes are configured, both the existing and newly added GatewaySubnet...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/c47a384983b169b8d5e62d793ec912d797563064"
    },
    {
      "author": "Shannon Leavitt",
      "date": "2026-04-13T20:08:51Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 7,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
          "meaningful_changes": [
            {
              "text": "Dual-Stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...",
              "type": "removed"
            },
            {
              "text": "Dual-stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...",
              "type": "added"
            },
            {
              "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/ipv6-ip-planning.md",
          "status": "modified",
          "title": "Ipv6 Ip Planning"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:3ab452ec553e04d612334e7adbaa4424ae8ccc71",
      "is_noise": false,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Dual-Stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...",
          "type": "removed"
        },
        {
          "text": "Dual-stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...",
          "type": "added"
        },
        {
          "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
          "type": "removed"
        },
        {
          "text": "Global unicast addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
          "type": "added"
        },
        {
          "text": "Unique Local Addresses: Local addresses are private IP addresses that are used within a virtual network. You can use IPs in the unique local address range. This address range functions like the IPv4 private address...",
          "type": "removed"
        },
        {
          "text": "Unique local addresses: Local addresses are private IP addresses that are used within a virtual network. You can use IPs in the unique local address range. This address range functions like the IPv4 private address...",
          "type": "added"
        }
      ],
      "message": "Minor edits",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 38,
      "sha": "3ab452ec553e04d612334e7adbaa4424ae8ccc71",
      "short_sha": "3ab452e",
      "signal": "Behavior or limits",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 7,
        "deletions": 7,
        "total": 14
      },
      "summary": "Architecture Center: adds \"Dual-stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/3ab452ec553e04d612334e7adbaa4424ae8ccc71"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T19:21:33Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 4,
      "files": [
        {
          "additions": 0,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
          "meaningful_changes": [
            {
              "text": ":::image type=\"content\" source=\"media/traffic-analytics-what-if/image2.png\" alt-text=\"\":::the security admin rules you plan to deploy",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"media/traffic-analytics-what-if/image3.png\" alt-text=\"\":::",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"media/traffic-analytics-what-if/image4.png\" alt-text=\"\":::After running the simulation, you\u2019ll see a detailed report that lists all traffic paths and how your rules impact them. This...",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-what-if.md",
          "status": "modified",
          "title": "Traffic Analytics What If"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-what-if/image2.png",
          "status": "removed",
          "title": "Image2"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-what-if/image3.png",
          "status": "removed",
          "title": "Image3"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/media/traffic-analytics-what-if/image4.png",
          "status": "removed",
          "title": "Image4"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:9cb2d617ffe88c8577ec95c5a32feb295a94209c",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": ":::image type=\"content\" source=\"media/traffic-analytics-what-if/image2.png\" alt-text=\"\":::the security admin rules you plan to deploy",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"media/traffic-analytics-what-if/image3.png\" alt-text=\"\":::",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"media/traffic-analytics-what-if/image4.png\" alt-text=\"\":::After running the simulation, you\u2019ll see a detailed report that lists all traffic paths and how your rules impact them. This...",
          "type": "removed"
        }
      ],
      "message": "remove image files",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-what-if",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "9cb2d617ffe88c8577ec95c5a32feb295a94209c",
      "short_sha": "9cb2d61",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 4,
        "total": 4
      },
      "summary": "Network Watcher: removes \":::image type=\"content\" source=\"media/traffic-analytics-what-if/image4.png\" alt-text=\"\":::After running the simulation, you\u2019ll see a detailed report that lists all traffic paths and how your rules impact them. This...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9cb2d617ffe88c8577ec95c5a32feb295a94209c"
    },
    {
      "author": "duongau",
      "date": "2026-04-01T20:53:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 102,
          "deletions": 122,
          "docs_url": "https://learn.microsoft.com/azure/firewall/rule-processing",
          "meaningful_changes": [
            {
              "text": "You can configure NAT rules, network rules, and applications rules on Azure Firewall using either classic rules or Firewall Policy. Azure Firewall denies all traffic by default, until rules are manually configured to...",
              "type": "removed"
            },
            {
              "text": "Rule processing using classic rules",
              "type": "removed"
            },
            {
              "text": "You can configure Azure Firewall with NAT rules, network rules, and application rules by using either classic rules or a Firewall Policy. By default, Azure Firewall denies all traffic until you manually configure rules...",
              "type": "added"
            }
          ],
          "path": "articles/firewall/rule-processing.md",
          "status": "modified",
          "title": "Rule Processing"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:07128dafff97dd13db095cc70064fdf5921c18f9",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "You can configure NAT rules, network rules, and applications rules on Azure Firewall using either classic rules or Firewall Policy. Azure Firewall denies all traffic by default, until rules are manually configured to...",
          "type": "removed"
        },
        {
          "text": "Rule processing using classic rules",
          "type": "removed"
        },
        {
          "text": "You can configure Azure Firewall with NAT rules, network rules, and application rules by using either classic rules or a Firewall Policy. By default, Azure Firewall denies all traffic until you manually configure rules...",
          "type": "added"
        },
        {
          "text": "Rule collections are processed according to the rule type in priority order, lower numbers to higher numbers from 100 to 65,000. A rule collection name can have only letters, numbers, underscores, periods, or hyphens...",
          "type": "removed"
        },
        {
          "text": "Rule processing by using classic rules",
          "type": "added"
        },
        {
          "text": "It's best to initially space your rule collection priority numbers in 100 increments (100, 200, 300, and so on) so you have room to add more rule collections if needed.",
          "type": "removed"
        }
      ],
      "message": "docs: Improve readability and style guide compliance",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/rule-processing",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "07128dafff97dd13db095cc70064fdf5921c18f9",
      "short_sha": "07128da",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 102,
        "deletions": 122,
        "total": 224
      },
      "summary": "Azure Firewall: removes \"It's best to initially space your rule collection priority numbers in 100 increments (100, 200, 300, and so on) so you have room to add more rule collections if needed.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/07128dafff97dd13db095cc70064fdf5921c18f9"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:25:27Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 14,
          "deletions": 14,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-template",
          "meaningful_changes": [
            {
              "text": "In this quickstart, you use an Azure Resource Manager template (ARM template) to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection...",
              "type": "removed"
            },
            {
              "text": "In this quickstart, use an Azure Resource Manager template (ARM template) to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection...",
              "type": "added"
            },
            {
              "text": "If your environment meets the prerequisites and you're familiar with using ARM templates, select the Deploy to Azure button. The template will open in the Azure portal.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-multiple-ip-template.md",
          "status": "modified",
          "title": "Quick Create Multiple Ip Template"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:89d308d2da188f50db6d3180d38046ea880321c6",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "In this quickstart, you use an Azure Resource Manager template (ARM template) to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection...",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use an Azure Resource Manager template (ARM template) to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection...",
          "type": "added"
        },
        {
          "text": "If your environment meets the prerequisites and you're familiar with using ARM templates, select the Deploy to Azure button. The template will open in the Azure portal.",
          "type": "removed"
        },
        {
          "text": "If your environment meets the prerequisites and you're familiar with using ARM templates, select the Deploy to Azure button. The template opens in the Azure portal.",
          "type": "added"
        },
        {
          "text": "This template creates an Azure Firewall with two public IP addresses, along with the necessary resources to support the Azure Firewall.",
          "type": "removed"
        },
        {
          "text": "This template creates an Azure Firewall with two public IP addresses, along with the resources needed to support the Azure Firewall.",
          "type": "added"
        }
      ],
      "message": "docs: Fix metadata, fix style guide issues",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-template",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "89d308d2da188f50db6d3180d38046ea880321c6",
      "short_sha": "89d308d",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 14,
        "deletions": 14,
        "total": 28
      },
      "summary": "Azure Firewall: adds \"In this quickstart, use an Azure Resource Manager template (ARM template) to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection...\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/89d308d2da188f50db6d3180d38046ea880321c6"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:07:02Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 124,
          "deletions": 149,
          "docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-protect-firewall-ddos",
          "meaningful_changes": [
            {
              "text": "This article helps you create an Azure Firewall with a DDoS protected virtual network. Azure DDoS Protection enables enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and...",
              "type": "removed"
            },
            {
              "text": "This article helps you create an Azure Firewall with a DDoS protected virtual network. Azure DDoS Protection provides enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and...",
              "type": "added"
            },
            {
              "text": "AzureFirewallSubnet - the firewall is in this subnet.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/tutorial-protect-firewall-ddos.md",
          "status": "modified",
          "title": "Tutorial Protect Firewall Ddos"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fb4d102774469031adc96ccb065f2e4a8b2c20fa",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "This article helps you create an Azure Firewall with a DDoS protected virtual network. Azure DDoS Protection enables enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and...",
          "type": "removed"
        },
        {
          "text": "This article helps you create an Azure Firewall with a DDoS protected virtual network. Azure DDoS Protection provides enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and...",
          "type": "added"
        },
        {
          "text": "AzureFirewallSubnet - the firewall is in this subnet.",
          "type": "removed"
        },
        {
          "text": "Workload-SN - the workload server is in this subnet. This subnet's network traffic goes through the firewall.",
          "type": "removed"
        },
        {
          "text": "AzureFirewallSubnet - the firewall is in this subnet.",
          "type": "added"
        },
        {
          "text": "Workload-SN - the workload server is in this subnet. This subnet's network traffic goes through the firewall.",
          "type": "added"
        }
      ],
      "message": "docs: Fix checklist div, description, replace Internet Explorer, simplify steps, fix style guide issues",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-protect-firewall-ddos",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "fb4d102774469031adc96ccb065f2e4a8b2c20fa",
      "short_sha": "fb4d102",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 124,
        "deletions": 149,
        "total": 273
      },
      "summary": "Azure Firewall: adds \"Workload-SN - the workload server is in this subnet. This subnet's network traffic goes through the firewall.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fb4d102774469031adc96ccb065f2e4a8b2c20fa"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T18:16:06Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 34,
          "deletions": 34,
          "docs_url": "https://learn.microsoft.com/azure/firewall/ftp-support",
          "meaningful_changes": [
            {
              "text": "Client/server location - Internet or intranet",
              "type": "removed"
            },
            {
              "text": "Flow direction - inbound or outbound.",
              "type": "removed"
            },
            {
              "text": "Client and server location - Internet or intranet",
              "type": "added"
            }
          ],
          "path": "articles/firewall/ftp-support.md",
          "status": "modified",
          "title": "Ftp Support"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e542fe20153bd43e1bf631e063dca9b0809e77af",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Client/server location - Internet or intranet",
          "type": "removed"
        },
        {
          "text": "Flow direction - inbound or outbound.",
          "type": "removed"
        },
        {
          "text": "Client and server location - Internet or intranet",
          "type": "added"
        },
        {
          "text": "Flow direction - inbound or outbound",
          "type": "added"
        },
        {
          "text": "Azure Firewall supports both Active and Passive FTP scenarios. For more information about FTP mode, see Active FTP vs. Passive FTP, a Definitive Explanation.",
          "type": "removed"
        },
        {
          "text": "Azure Firewall supports both Active and Passive FTP scenarios. For more information about FTP mode, see Active FTP vs. Passive FTP, a Definitive Explanation.",
          "type": "added"
        }
      ],
      "message": "docs: Fix metadata field order and ms.date, replace VNet with 'virtual network', reformat table, add superscript footnotes, fix passive voice, reformat PS code block to multi-line splatting",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/ftp-support",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 38,
      "sha": "e542fe20153bd43e1bf631e063dca9b0809e77af",
      "short_sha": "e542fe2",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 34,
        "deletions": 34,
        "total": 68
      },
      "summary": "Azure Firewall: adds \"Client and server location - Internet or intranet\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e542fe20153bd43e1bf631e063dca9b0809e77af"
    },
    {
      "author": "Saisang Cai",
      "date": "2026-04-22T18:43:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/firewall/detect-malware-with-sentinel",
          "meaningful_changes": [
            {
              "text": "Learn more about Microsoft Sentinel",
              "type": "removed"
            },
            {
              "text": "Learn more about Microsoft Sentinel",
              "type": "added"
            }
          ],
          "path": "articles/firewall/detect-malware-with-sentinel.md",
          "status": "modified",
          "title": "Detect Malware With Sentinel"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/firewall/firewall-sentinel-overview",
          "meaningful_changes": [
            {
              "text": "Learn more about Microsoft Sentinel.",
              "type": "removed"
            },
            {
              "text": "Learn more about Microsoft Sentinel.",
              "type": "added"
            }
          ],
          "path": "articles/firewall/firewall-sentinel-overview.md",
          "status": "modified",
          "title": "Firewall Sentinel Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:08c8c7318d6b625cefb0b66ac351f61169420516",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Learn more about Microsoft Sentinel",
          "type": "removed"
        },
        {
          "text": "Learn more about Microsoft Sentinel",
          "type": "added"
        },
        {
          "text": "Learn more about Microsoft Sentinel.",
          "type": "removed"
        },
        {
          "text": "Learn more about Microsoft Sentinel.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314958 from MicrosoftDocs/migration-sentinel",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/detect-malware-with-sentinel",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 36,
      "sha": "08c8c7318d6b625cefb0b66ac351f61169420516",
      "short_sha": "08c8c73",
      "signal": "Migration or operations",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Azure Firewall: adds \"Learn more about Microsoft Sentinel.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/08c8c7318d6b625cefb0b66ac351f61169420516"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:35:54Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/overview",
          "meaningful_changes": [
            {
              "text": "Load Aware Routing",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/overview.md",
          "status": "modified",
          "title": "For Containers Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:4510ef0e591db1b5676ce95866e01474c8d0a4c0",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Load Aware Routing",
          "type": "added"
        }
      ],
      "message": "Update overview.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/overview",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 36,
      "sha": "4510ef0e591db1b5676ce95866e01474c8d0a4c0",
      "short_sha": "4510ef0",
      "signal": "Behavior or limits",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 1,
        "total": 3
      },
      "summary": "Application Gateway: adds \"Load Aware Routing\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/4510ef0e591db1b5676ce95866e01474c8d0a4c0"
    },
    {
      "author": "Aimee Littleton",
      "date": "2026-04-16T14:58:41Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/quickstart-create-nat-gateway-v2",
          "meaningful_changes": [
            {
              "text": "Terraform is currently unavailable. Use the Azure portal, CLI, or Azure PowerShell to create a Standard V2 NAT Gateway.",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/quickstart-create-nat-gateway-v2.md",
          "status": "modified",
          "title": "Quickstart Create Nat Gateway V2"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a2f87ff3c2c2fca071e2bc3f0da85810d5909025",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Terraform is currently unavailable. Use the Azure portal, CLI, or Azure PowerShell to create a Standard V2 NAT Gateway.",
          "type": "removed"
        }
      ],
      "message": "Update NAT Gateway quickstart by removing Terraform note",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/quickstart-create-nat-gateway-v2",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Release, version, or SKU detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 36,
      "sha": "a2f87ff3c2c2fca071e2bc3f0da85810d5909025",
      "short_sha": "a2f87ff",
      "signal": "Release or version",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 3,
        "total": 3
      },
      "summary": "NAT Gateway: removes \"Terraform is currently unavailable. Use the Azure portal, CLI, or Azure PowerShell to create a Standard V2 NAT Gateway.\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a2f87ff3c2c2fca071e2bc3f0da85810d5909025"
    },
    {
      "author": "Brian Lehr",
      "date": "2026-04-06T18:35:22Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/create-public-ip-terraform",
          "meaningful_changes": [
            {
              "text": "Zone-Redundant Standard SKU",
              "type": "added"
            },
            {
              "text": "Zonal Standard SKU",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/ip-services/create-public-ip-terraform.md",
          "status": "modified",
          "title": "Create Public Ip Terraform"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5e418d1b96b80210a97524f9cd984b1eac3f77e3",
      "is_noise": false,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Zone-Redundant Standard SKU",
          "type": "added"
        },
        {
          "text": "Zonal Standard SKU",
          "type": "added"
        }
      ],
      "message": "Rename tab labels: Zone-Redundant Standard SKU and Zonal Standard SKU",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/create-public-ip-terraform",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Release, version, or SKU detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 36,
      "sha": "5e418d1b96b80210a97524f9cd984b1eac3f77e3",
      "short_sha": "5e418d1",
      "signal": "Release or version",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Virtual Network: adds \"Zone-Redundant Standard SKU\".",
      "tier": "background",
      "tier_label": "Background",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5e418d1b96b80210a97524f9cd984b1eac3f77e3"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-16T18:13:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 3,
      "files": [
        {
          "additions": 93,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
          "meaningful_changes": [
            {
              "text": "Azure Front Door streaming concepts",
              "type": "added"
            },
            {
              "text": "Azure Front Door continues to expand its capabilities for delivering live and on-demand streaming content to viewers around the world with highly reliable performance and low latency. Azure Front Door's architecture is...",
              "type": "added"
            },
            {
              "text": "By routing traffic across Microsoft's private network between these distributed edge locations, Azure Front Door can minimize latency, avoid congested public internet paths, and provide highly resilient delivery...",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/deliver-video-demand.md",
          "status": "added",
          "title": "Deliver Video Demand"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/frontdoor/media/deliver-video-demand/global-benchmark-results.png",
          "status": "added",
          "title": "Global Benchmark Results"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/frontdoor/media/deliver-video-demand/microsoft-backbone-network.png",
          "status": "added",
          "title": "Microsoft Backbone Network"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:954d8b6766e6f6b046405305b85dd1eacb128558",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Front Door streaming concepts",
          "type": "added"
        },
        {
          "text": "Azure Front Door continues to expand its capabilities for delivering live and on-demand streaming content to viewers around the world with highly reliable performance and low latency. Azure Front Door's architecture is...",
          "type": "added"
        },
        {
          "text": "By routing traffic across Microsoft's private network between these distributed edge locations, Azure Front Door can minimize latency, avoid congested public internet paths, and provide highly resilient delivery...",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"./media/deliver-video-demand/microsoft-backbone-network.png\" alt-text=\"Diagram of Microsoft's private backbone network.\":::",
          "type": "added"
        },
        {
          "text": "Azure Front Door is used across many Microsoft first-party services to deliver both video-on-demand (VOD) and live streaming content using industry-standard HLS and MPEG-DASH formats. Similar to many large-scale...",
          "type": "added"
        },
        {
          "text": "Performance at a glance",
          "type": "added"
        }
      ],
      "message": "draft article",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 34,
      "sha": "954d8b6766e6f6b046405305b85dd1eacb128558",
      "short_sha": "954d8b6",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 93,
        "deletions": 0,
        "total": 93
      },
      "summary": "Front Door: adds \"By routing traffic across Microsoft's private network between these distributed edge locations, Azure Front Door can minimize latency, avoid congested public internet paths, and provide highly resilient delivery...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/954d8b6766e6f6b046405305b85dd1eacb128558"
    },
    {
      "author": "Jessie",
      "date": "2026-04-13T23:53:31Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "What are the locations of the Azure Front Door POPs (points-of-presence)?",
              "type": "removed"
            },
            {
              "text": "What are the locations of the Azure Front Door POPs (points-of-presfence)?",
              "type": "added"
            },
            {
              "text": "After migration to Azure Front Door Standard/Premium, update your DevOps pipeline scripts to deploy and manage the new Front Door Standard/Premium resources.",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:33a671b22a2f0cc81c0df26547ba72b7542ce58b",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "What are the locations of the Azure Front Door POPs (points-of-presence)?",
          "type": "removed"
        },
        {
          "text": "What are the locations of the Azure Front Door POPs (points-of-presfence)?",
          "type": "added"
        },
        {
          "text": "After migration to Azure Front Door Standard/Premium, update your DevOps pipeline scripts to deploy and manage the new Front Door Standard/Premium resources.",
          "type": "added"
        },
        {
          "text": "After migration to Azure Front Door Standard/Premium, update your DevOps pipeline scripts to deploy and manage the new Front Door Standard/Premium resources.",
          "type": "added"
        }
      ],
      "message": "Fix typo in Front Door FAQ and add migration note",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 34,
      "sha": "33a671b22a2f0cc81c0df26547ba72b7542ce58b",
      "short_sha": "33a671b",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 1,
        "total": 6
      },
      "summary": "Front Door: adds \"After migration to Azure Front Door Standard/Premium, update your DevOps pipeline scripts to deploy and manage the new Front Door Standard/Premium resources.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/33a671b22a2f0cc81c0df26547ba72b7542ce58b"
    },
    {
      "author": "Diana Richards",
      "date": "2026-04-13T20:21:01Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
          "meaningful_changes": [
            {
              "text": "Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.",
              "type": "removed"
            },
            {
              "text": "Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.",
              "type": "added"
            },
            {
              "text": "Azure Kubernetes Service (AKS) | For more information, see Use kubenet with dual-stack networking.",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/ipv6-ip-planning.md",
          "status": "modified",
          "title": "Ipv6 Ip Planning"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:f782447831a1f04103a6e359dc6d034321ebeea3",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.",
          "type": "removed"
        },
        {
          "text": "Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.",
          "type": "added"
        },
        {
          "text": "Azure Kubernetes Service (AKS) | For more information, see Use kubenet with dual-stack networking.",
          "type": "removed"
        },
        {
          "text": "Azure Kubernetes Service (AKS) | For more information, see Configure Azure CNI Overlay with dual-stack networking.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #15579 from MicrosoftDocs/repo-deps",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 34,
      "sha": "f782447831a1f04103a6e359dc6d034321ebeea3",
      "short_sha": "f782447",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Architecture Center: adds \"Azure ExpressRoute gateway | To transition ExpressRoute gateways, see Azure ExpressRoute: Add IPv6 support.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/f782447831a1f04103a6e359dc6d034321ebeea3"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T14:24:24Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 67,
          "deletions": 69,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
              "type": "removed"
            },
            {
              "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
              "type": "added"
            },
            {
              "text": "A hub is a regional resource. Organizations that have their workloads in multiple regions should have one hub per region. The hub provides the following features and options:",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        },
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/hub-spoke.yml",
          "status": "modified",
          "title": "Hub Spoke"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:0b45e8476a196ccf36a236a93d6c4e3c007e5fff",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
          "type": "removed"
        },
        {
          "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
          "type": "added"
        },
        {
          "text": "A hub is a regional resource. Organizations that have their workloads in multiple regions should have one hub per region. The hub provides the following features and options:",
          "type": "removed"
        },
        {
          "text": "Cross-premise gateway: The ability to connect and integrate different network environments. This gateway is usually a VPN or an Azure ExpressRoute circuit.",
          "type": "removed"
        },
        {
          "text": "A hub is a regional resource. If your workloads reside in multiple regions, place one hub in each region. The hub provides the following features and options:",
          "type": "added"
        },
        {
          "text": "Cross-premises gateway: The ability to connect and integrate different network environments. This gateway is usually a VPN or an Azure ExpressRoute circuit.",
          "type": "added"
        }
      ],
      "message": "proofread",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 34,
      "sha": "0b45e8476a196ccf36a236a93d6c4e3c007e5fff",
      "short_sha": "0b45e84",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 70,
        "deletions": 72,
        "total": 142
      },
      "summary": "Architecture Center: adds \"Cross-premises gateway: The ability to connect and integrate different network environments. This gateway is usually a VPN or an Azure ExpressRoute circuit.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/0b45e8476a196ccf36a236a93d6c4e3c007e5fff"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 27,
          "deletions": 30,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
              "type": "removed"
            },
            {
              "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
              "type": "added"
            },
            {
              "text": "Cross-premise gateway: The ability to connect and integrate different network environments. This gateway is usually a VPN or an ExpressRoute circuit.",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:4a30c3dd193d15e412d8efea90ef1b5a1368748a",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
          "type": "removed"
        },
        {
          "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
          "type": "added"
        },
        {
          "text": "Cross-premise gateway: The ability to connect and integrate different network environments. This gateway is usually a VPN or an ExpressRoute circuit.",
          "type": "removed"
        },
        {
          "text": "Cross-premise gateway: The ability to connect and integrate different network environments. This gateway is usually a VPN or an Azure ExpressRoute circuit.",
          "type": "added"
        },
        {
          "text": "Azure Virtual Network is the fundamental building block for private networks in Azure. Virtual Network enables many Azure resources, such as VMs, to securely communicate with each other, cross-premises networks, and...",
          "type": "removed"
        },
        {
          "text": "Azure Virtual Network is the fundamental building block for private networks in Azure. Virtual Network enables many Azure resources, such as VMs, to securely communicate with each other, cross-premises networks, and...",
          "type": "added"
        }
      ],
      "message": "branding and links",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 34,
      "sha": "4a30c3dd193d15e412d8efea90ef1b5a1368748a",
      "short_sha": "4a30c3d",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 27,
        "deletions": 30,
        "total": 57
      },
      "summary": "Architecture Center: adds \"Azure Virtual Network is the fundamental building block for private networks in Azure. Virtual Network enables many Azure resources, such as VMs, to securely communicate with each other, cross-premises networks, and...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/4a30c3dd193d15e412d8efea90ef1b5a1368748a"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-02T17:36:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/dns/sharding-private-dns-zones",
          "meaningful_changes": [
            {
              "text": "Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...",
              "type": "removed"
            },
            {
              "text": "Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...",
              "type": "added"
            }
          ],
          "path": "articles/dns/sharding-private-dns-zones.md",
          "status": "modified",
          "title": "Sharding Private Dns Zones"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/json-web-token-overview",
          "meaningful_changes": [],
          "path": "articles/application-gateway/json-web-token-overview.md",
          "status": "modified",
          "title": "Json Web Token Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:4451b0e4a4cff0f10e925a7277606d8917f5a3fe",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...",
          "type": "removed"
        },
        {
          "text": "Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314169 from JasonWHowell/Fix-links-to-docs.azure.cn",
      "paths": [
        "articles/application-gateway",
        "articles/dns"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/dns/sharding-private-dns-zones",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway",
        "Azure DNS"
      ],
      "products": [
        "application-gateway",
        "azure-dns"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "Touches multiple Azure Networking products"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 34,
      "sha": "4451b0e4a4cff0f10e925a7277606d8917f5a3fe",
      "short_sha": "4451b0e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway",
        "azure-docs-dns"
      ],
      "sources": [
        "Application Gateway docs",
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Application Gateway, Azure DNS: adds \"Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/4451b0e4a4cff0f10e925a7277606d8917f5a3fe"
    },
    {
      "author": "Jasonwhowell",
      "date": "2026-04-02T16:30:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/dns/sharding-private-dns-zones",
          "meaningful_changes": [
            {
              "text": "Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...",
              "type": "removed"
            },
            {
              "text": "Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...",
              "type": "added"
            }
          ],
          "path": "articles/dns/sharding-private-dns-zones.md",
          "status": "modified",
          "title": "Sharding Private Dns Zones"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/json-web-token-overview",
          "meaningful_changes": [],
          "path": "articles/application-gateway/json-web-token-overview.md",
          "status": "modified",
          "title": "Json Web Token Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d521ec1cbf3b6e02a77bfdbd2d774b7611a83766",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...",
          "type": "removed"
        },
        {
          "text": "Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...",
          "type": "added"
        }
      ],
      "message": "Replacing docs.azure.cn links with local Azure links",
      "paths": [
        "articles/application-gateway",
        "articles/dns"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/dns/sharding-private-dns-zones",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway",
        "Azure DNS"
      ],
      "products": [
        "application-gateway",
        "azure-dns"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "Touches multiple Azure Networking products"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 34,
      "sha": "d521ec1cbf3b6e02a77bfdbd2d774b7611a83766",
      "short_sha": "d521ec1",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway",
        "azure-docs-dns"
      ],
      "sources": [
        "Application Gateway docs",
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Application Gateway, Azure DNS: adds \"Azure Private DNS enforces service limits on the number of record sets per zone and the number of records per record set. However, operational complexity and resiliency often increase well before these limits are...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d521ec1cbf3b6e02a77bfdbd2d774b7611a83766"
    },
    {
      "author": "Carolyn McSharry",
      "date": "2026-04-24T07:50:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 10,
      "files": [
        {
          "additions": 293,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
          "meaningful_changes": [
            {
              "text": "Load balancing strategies in Application Gateway for Containers",
              "type": "added"
            },
            {
              "text": "In today's dynamic and high-demand environments, efficient load balancing is crucial for maintaining the performance and reliability of applications. Application Gateway for Containers offers multiple load balancing...",
              "type": "added"
            },
            {
              "text": "Why care about changing the load balancing algorithm",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/load-balancing-strategies.md",
          "status": "added",
          "title": "Load Balancing Strategies"
        },
        {
          "additions": 89,
          "deletions": 19,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
          "meaningful_changes": [
            {
              "text": "Application Gateway for Containers Service Mesh Extension is currently in PREVIEW.;",
              "type": "removed"
            },
            {
              "text": "See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.",
              "type": "removed"
            },
            {
              "text": "ALB Controller Service Mesh Extension",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/service-mesh-integration.md",
          "status": "modified",
          "title": "Service Mesh Integration"
        },
        {
          "additions": 101,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/api-specification-kubernetes",
          "meaningful_changes": [
            {
              "text": "Gateway API alpha2.NamespacedPolicyTargetReference",
              "type": "removed"
            },
            {
              "text": "Gateway API .NamespacedPolicyTargetReference",
              "type": "added"
            },
            {
              "text": "By default, health check will use the same protocol as the",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/api-specification-kubernetes.md",
          "status": "modified",
          "title": "API Specification Kubernetes"
        },
        {
          "additions": 10,
          "deletions": 9,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
          "meaningful_changes": [
            {
              "text": "The ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers. It uses both ARM and configuration APIs to propagate configuration to the Application...",
              "type": "removed"
            },
            {
              "text": "The ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers. It uses both Azure Resource Manager and configuration APIs to propagate configuration...",
              "type": "added"
            },
            {
              "text": "Instructions for new or existing deployments of ALB Controller deployed with helm are found in the following links:",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/alb-controller-release-notes.md",
          "status": "modified",
          "title": "Alb Controller Release Notes"
        },
        {
          "additions": 11,
          "deletions": 8,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/migrate-from-agic-to-agc",
          "meaningful_changes": [
            {
              "text": "In the example depicted, Application Gateway for Containers and Application Gateway Ingress Controller both service backend targets using unique frontends. After validation that Application Gateway for Containers is...",
              "type": "removed"
            },
            {
              "text": "In the example depicted, Application Gateway for Containers and Application Gateway Ingress Controller both service backend targets using unique frontends. After validation that Application Gateway for Containers is...",
              "type": "added"
            },
            {
              "text": "Prior to migration, it's important to identify any dependencies on Application Gateway Ingress Controller that may not yet be available in Application Gateway for Containers. Workloads with dependency on these features...",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/migrate-from-agic-to-agc.md",
          "status": "modified",
          "title": "Migrate From Agic To Agc"
        },
        {
          "additions": 9,
          "deletions": 9,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
          "meaningful_changes": [
            {
              "text": "See the instructions for installation for various options of installation. Similarly, if your version of Windows has Windows Package Manager winget installed, you may execute the following command:",
              "type": "removed"
            },
            {
              "text": "See the instructions for installation for various options of installation. Similarly, if your version of Windows has Windows Package Manager winget installed, you can execute the following command:",
              "type": "added"
            },
            {
              "text": "When the helm install command is run, it deploys the helm chart to the default namespace. When alb-controller is deployed, it deploys to the azure-alb-system namespace. Both of these namespaces may be overridden...",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Helm"
        },
        {
          "additions": 10,
          "deletions": 7,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "question: Does Application Gateway for Containers support AKS Automatic?",
              "type": "added"
            },
            {
              "text": "answer: Yes, when using the Application Gateway for Containers ALB Controller AKS add-on, the ALB Controller can be provisioned into AKS Automatic clusters. Helm deployments of the ALB Controller aren't supported with...",
              "type": "added"
            },
            {
              "text": "answer: Application Gateway for Containers frontends resolve to any anycast IP address. Anycast IP addresses are advertised globally, which may lead to the ASN location being different from Application Gateway for...",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/faq.yml",
          "status": "modified",
          "title": "For Containers Faq"
        },
        {
          "additions": 8,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/overview",
          "meaningful_changes": [
            {
              "text": "Application Gateway for Containers offers an elastic and scalable ingress to AKS clusters and comprises a new data plane as well as control plane with new set of ARM APIs, different from existing Application Gateway...",
              "type": "removed"
            },
            {
              "text": "Application Gateway for Containers offers an elastic and scalable ingress to AKS clusters and comprises a new data plane as well as control plane with new set of Azure Resource Manager APIs, different from existing...",
              "type": "added"
            },
            {
              "text": "Flexible load balancing strategies",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/overview.md",
          "status": "modified",
          "title": "For Containers Overview"
        },
        {
          "additions": 4,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon",
          "meaningful_changes": [
            {
              "text": "Enablement of the Application Gateway for Containers AKS add-on on an AKS Automatic cluster isn't currently supported.",
              "type": "removed"
            },
            {
              "text": "Navigate to the MC (node) resource group for your AKS cluster. You should see the following resources automatically created by the add-on:",
              "type": "removed"
            },
            {
              "text": "Navigate to the MC (node) resource group for your AKS cluster. You should see the following resources ally created by the add-on:",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Addon"
        },
        {
          "additions": 2,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Load balancing strategies",
              "type": "added"
            },
            {
              "text": "href: load-balancing-strategies.md",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/toc.yml",
          "status": "modified",
          "title": "For Containers Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1deb63f5e39bbef4e8596ba03ca0962d78c2c94e",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "The ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers. It uses both ARM and configuration APIs to propagate configuration to the Application...",
          "type": "removed"
        },
        {
          "text": "The ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers. It uses both Azure Resource Manager and configuration APIs to propagate configuration...",
          "type": "added"
        },
        {
          "text": "Instructions for new or existing deployments of ALB Controller deployed with helm are found in the following links:",
          "type": "removed"
        },
        {
          "text": "Instructions for new or existing deployments of ALB Controller deployed with Helm are found in the following links:",
          "type": "added"
        },
        {
          "text": "New deployment of ALB Controller with helm",
          "type": "removed"
        },
        {
          "text": "Upgrade existing ALB Controller with helm",
          "type": "removed"
        },
        {
          "text": "Gateway API alpha2.NamespacedPolicyTargetReference",
          "type": "removed"
        },
        {
          "text": "Gateway API .NamespacedPolicyTargetReference",
          "type": "added"
        },
        {
          "text": "By default, health check will use the same protocol as the",
          "type": "removed"
        },
        {
          "text": "By default, health check uses the same protocol as the",
          "type": "added"
        }
      ],
      "message": "Merge pull request #312702 from JackStromberg/patch-48",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Operational or migration guidance",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 32,
      "sha": "1deb63f5e39bbef4e8596ba03ca0962d78c2c94e",
      "short_sha": "1deb63f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 537,
        "deletions": 68,
        "total": 605
      },
      "summary": "Application Gateway: adds \"Instructions for new or existing deployments of ALB Controller deployed with Helm are found in the following links:\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1deb63f5e39bbef4e8596ba03ca0962d78c2c94e"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-24T00:57:01Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/migrate-from-agic-to-agc",
          "meaningful_changes": [
            {
              "text": "Prior to migration, it's important to identify any dependencies on Application Gateway Ingress Controller that can not yet be available in Application Gateway for Containers. Workloads with dependency on these features...",
              "type": "removed"
            },
            {
              "text": "Prior to migration, it's important to identify any dependencies on Application Gateway Ingress Controller that won't be available in Application Gateway for Containers. Workloads with dependency on these features...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/migrate-from-agic-to-agc.md",
          "status": "modified",
          "title": "Migrate From Agic To Agc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1c95b4e8974783111d7c299d1fea8cbf22aaaa68",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Prior to migration, it's important to identify any dependencies on Application Gateway Ingress Controller that can not yet be available in Application Gateway for Containers. Workloads with dependency on these features...",
          "type": "removed"
        },
        {
          "text": "Prior to migration, it's important to identify any dependencies on Application Gateway Ingress Controller that won't be available in Application Gateway for Containers. Workloads with dependency on these features...",
          "type": "added"
        }
      ],
      "message": "Update migrate-from-agic-to-agc.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/migrate-from-agic-to-agc",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 32,
      "sha": "1c95b4e8974783111d7c299d1fea8cbf22aaaa68",
      "short_sha": "1c95b4e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: adds \"Prior to migration, it's important to identify any dependencies on Application Gateway Ingress Controller that won't be available in Application Gateway for Containers. Workloads with dependency on these features...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1c95b4e8974783111d7c299d1fea8cbf22aaaa68"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T22:23:19Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 145,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
          "meaningful_changes": [
            {
              "text": "name: traffic-split-route",
              "type": "removed"
            },
            {
              "text": "name: traffic-split-example",
              "type": "added"
            },
            {
              "text": "name: lbpolicy-example",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/load-balancing-strategies.md",
          "status": "modified",
          "title": "Load Balancing Strategies"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fbc05e16ae52be6c89e3a7a04ed9a35307e4e9b8",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: traffic-split-route",
          "type": "removed"
        },
        {
          "text": "name: traffic-split-example",
          "type": "added"
        },
        {
          "text": "name: lbpolicy-example",
          "type": "removed"
        },
        {
          "text": "name: slow-start-example",
          "type": "added"
        },
        {
          "text": "strategy: \"round-robin\" \"round-robin\", \"least-request\"",
          "type": "removed"
        },
        {
          "text": "slowStart: slow start allowed for only loadBalancing strategy \"round-robin\" and \"least-request\"",
          "type": "removed"
        }
      ],
      "message": "Update load-balancing-strategies.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 32,
      "sha": "fbc05e16ae52be6c89e3a7a04ed9a35307e4e9b8",
      "short_sha": "fbc05e1",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 145,
        "deletions": 5,
        "total": 150
      },
      "summary": "Application Gateway: adds \"name: traffic-split-example\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fbc05e16ae52be6c89e3a7a04ed9a35307e4e9b8"
    },
    {
      "author": "Learn-Build-Service",
      "date": "2026-04-20T18:52:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 6,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/siem-integration-with-sentinel",
          "meaningful_changes": [
            {
              "text": "1. Enable Microsoft Sentinel workspace.",
              "type": "removed"
            },
            {
              "text": "1. Enable Microsoft Sentinel workspace.",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/siem-integration-with-sentinel.md",
          "status": "modified",
          "title": "Siem Integration With Sentinel"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-protection-overview",
          "meaningful_changes": [
            {
              "text": "Get detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to Microsoft Sentinel or an offline security information and event management...",
              "type": "removed"
            },
            {
              "text": "Get detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to Microsoft Sentinel or an offline security information and event management...",
              "type": "added"
            }
          ],
          "path": "articles/ddos-protection/ddos-protection-overview.md",
          "status": "modified",
          "title": "Ddos Protection Overview"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/monitor-ddos-protection",
          "meaningful_changes": [
            {
              "text": "Logging can be further integrated with Microsoft Sentinel, Splunk (Azure Event Hubs), OMS Log Analytics, and Azure Storage for advanced analysis via the Azure Monitor Diagnostics interface.",
              "type": "removed"
            },
            {
              "text": "Logging can be further integrated with Microsoft Sentinel, Splunk (Azure Event Hubs), OMS Log Analytics, and Azure Storage for advanced analysis via the Azure Monitor Diagnostics interface.",
              "type": "added"
            }
          ],
          "path": "articles/ddos-protection/monitor-ddos-protection.md",
          "status": "modified",
          "title": "Monitor Ddos Protection"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/firewall/detect-malware-with-sentinel",
          "meaningful_changes": [
            {
              "text": "Learn more about Microsoft Sentinel",
              "type": "removed"
            },
            {
              "text": "Learn more about Microsoft Sentinel",
              "type": "added"
            }
          ],
          "path": "articles/firewall/detect-malware-with-sentinel.md",
          "status": "modified",
          "title": "Detect Malware With Sentinel"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/firewall/firewall-sentinel-overview",
          "meaningful_changes": [
            {
              "text": "Learn more about Microsoft Sentinel.",
              "type": "removed"
            },
            {
              "text": "Learn more about Microsoft Sentinel.",
              "type": "added"
            }
          ],
          "path": "articles/firewall/firewall-sentinel-overview.md",
          "status": "modified",
          "title": "Firewall Sentinel Overview"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-wan/monitor-virtual-wan",
          "meaningful_changes": [
            {
              "text": "This section of the article focuses on metric-based alerts. Azure Firewall offers a comprehensive list of metrics and logs for monitoring purposes. In addition to configuring the alerts described in the following...",
              "type": "removed"
            },
            {
              "text": "This section of the article focuses on metric-based alerts. Azure Firewall offers a comprehensive list of metrics and logs for monitoring purposes. In addition to configuring the alerts described in the following...",
              "type": "added"
            }
          ],
          "path": "articles/virtual-wan/monitor-virtual-wan.md",
          "status": "modified",
          "title": "Monitor Virtual Wan"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:82b8e4f803342c1a495447ec5f161ceec8e33ea1",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1. Enable Microsoft Sentinel workspace.",
          "type": "removed"
        },
        {
          "text": "1. Enable Microsoft Sentinel workspace.",
          "type": "added"
        },
        {
          "text": "Get detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to Microsoft Sentinel or an offline security information and event management...",
          "type": "removed"
        },
        {
          "text": "Get detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to Microsoft Sentinel or an offline security information and event management...",
          "type": "added"
        },
        {
          "text": "Logging can be further integrated with Microsoft Sentinel, Splunk (Azure Event Hubs), OMS Log Analytics, and Azure Storage for advanced analysis via the Azure Monitor Diagnostics interface.",
          "type": "removed"
        },
        {
          "text": "Logging can be further integrated with Microsoft Sentinel, Splunk (Azure Event Hubs), OMS Log Analytics, and Azure Storage for advanced analysis via the Azure Monitor Diagnostics interface.",
          "type": "added"
        },
        {
          "text": "Learn more about Microsoft Sentinel",
          "type": "removed"
        },
        {
          "text": "Learn more about Microsoft Sentinel",
          "type": "added"
        },
        {
          "text": "Learn more about Microsoft Sentinel.",
          "type": "removed"
        },
        {
          "text": "Learn more about Microsoft Sentinel.",
          "type": "added"
        }
      ],
      "message": "[migrate-content] Fix links",
      "paths": [
        "articles/application-gateway",
        "articles/ddos-protection",
        "articles/firewall",
        "articles/virtual-wan"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/siem-integration-with-sentinel",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway",
        "Azure Firewall",
        "DDoS Protection",
        "Virtual WAN"
      ],
      "products": [
        "application-gateway",
        "azure-firewall",
        "ddos-protection",
        "virtual-wan"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 32,
      "sha": "82b8e4f803342c1a495447ec5f161ceec8e33ea1",
      "short_sha": "82b8e4f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway",
        "azure-docs-ddos",
        "azure-docs-firewall",
        "azure-docs-virtual-wan"
      ],
      "sources": [
        "Application Gateway docs",
        "Azure Firewall docs",
        "DDoS Protection docs",
        "Virtual WAN docs"
      ],
      "stats": {
        "additions": 6,
        "deletions": 6,
        "total": 12
      },
      "summary": "Application Gateway, Azure Firewall +2: adds \"1. Enable Microsoft Sentinel workspace.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/82b8e4f803342c1a495447ec5f161ceec8e33ea1"
    },
    {
      "author": "wtnlee",
      "date": "2026-04-17T16:12:06Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-wan/how-to-routing-policies",
          "meaningful_changes": [
            {
              "text": "Routing intent sends Virtual Network and on-premises traffic to the next hop resource specified in the routing policy. Virtual WAN programs the underlying Azure platform to route your on-premises and Virtual Network...",
              "type": "removed"
            },
            {
              "text": "Routing intent sends Virtual Network and on-premises traffic to the next hop resource specified in the routing policy. Virtual WAN programs the underlying Azure platform to route your on-premises and Virtual Network...",
              "type": "added"
            }
          ],
          "path": "articles/virtual-wan/how-to-routing-policies.md",
          "status": "modified",
          "title": "How To Routing Policies"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:020d1a323a1f1c45e0b93126a9b6a43045e218d5",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Routing intent sends Virtual Network and on-premises traffic to the next hop resource specified in the routing policy. Virtual WAN programs the underlying Azure platform to route your on-premises and Virtual Network...",
          "type": "removed"
        },
        {
          "text": "Routing intent sends Virtual Network and on-premises traffic to the next hop resource specified in the routing policy. Virtual WAN programs the underlying Azure platform to route your on-premises and Virtual Network...",
          "type": "added"
        }
      ],
      "message": "made changes",
      "paths": [
        "articles/virtual-wan"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-wan/how-to-routing-policies",
      "primary_product": "virtual-wan",
      "primary_product_label": "Virtual WAN",
      "product_labels": [
        "Virtual WAN"
      ],
      "products": [
        "virtual-wan"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 32,
      "sha": "020d1a323a1f1c45e0b93126a9b6a43045e218d5",
      "short_sha": "020d1a3",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-wan"
      ],
      "sources": [
        "Virtual WAN docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual WAN: adds \"Routing intent sends Virtual Network and on-premises traffic to the next hop resource specified in the routing policy. Virtual WAN programs the underlying Azure platform to route your on-premises and Virtual Network...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/020d1a323a1f1c45e0b93126a9b6a43045e218d5"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:54:38Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 3,
      "files": [
        {
          "additions": 0,
          "deletions": 353,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/troubleshoot-nat-connectivity",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure NAT Gateway",
              "type": "removed"
            },
            {
              "text": "Troubleshoot Azure NAT Gateway connectivity",
              "type": "removed"
            },
            {
              "text": "This article provides guidance on how to troubleshoot and resolve common outbound connectivity issues with your NAT gateway. This article also provides best practices on how to design applications to use outbound...",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/troubleshoot-nat-connectivity.md",
          "status": "removed",
          "title": "Troubleshoot Nat Connectivity"
        },
        {
          "additions": 0,
          "deletions": 276,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/troubleshoot-nat",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure NAT Gateway",
              "type": "removed"
            },
            {
              "text": "ms.customs: referencesregions",
              "type": "removed"
            },
            {
              "text": "Troubleshoot Azure NAT Gateway",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/troubleshoot-nat.md",
          "status": "removed",
          "title": "Troubleshoot Nat"
        },
        {
          "additions": 0,
          "deletions": 168,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/troubleshoot-nat-and-azure-services",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure NAT Gateway",
              "type": "removed"
            },
            {
              "text": "Troubleshoot outbound connectivity with NAT gateway and Azure services",
              "type": "removed"
            },
            {
              "text": "This article provides guidance on how to troubleshoot connectivity issues when using NAT gateway with other Azure services, including:",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/troubleshoot-nat-and-azure-services.md",
          "status": "removed",
          "title": "Troubleshoot Nat And Azure Services"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a5bcfd4f9b0bdd4139bace82e6ddd3f54dacdb65",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "titleSuffix: Azure NAT Gateway",
          "type": "removed"
        },
        {
          "text": "Troubleshoot outbound connectivity with NAT gateway and Azure services",
          "type": "removed"
        },
        {
          "text": "This article provides guidance on how to troubleshoot connectivity issues when using NAT gateway with other Azure services, including:",
          "type": "removed"
        },
        {
          "text": "Azure App Services",
          "type": "removed"
        },
        {
          "text": "Azure Kubernetes Service",
          "type": "removed"
        },
        {
          "text": "Known limitations with StandardV2 NAT Gateway and VNet injection scenarios",
          "type": "removed"
        },
        {
          "text": "titleSuffix: Azure NAT Gateway",
          "type": "removed"
        },
        {
          "text": "Troubleshoot Azure NAT Gateway connectivity",
          "type": "removed"
        },
        {
          "text": "This article provides guidance on how to troubleshoot and resolve common outbound connectivity issues with your NAT gateway. This article also provides best practices on how to design applications to use outbound...",
          "type": "removed"
        },
        {
          "text": "Datapath availability drop on NAT gateway with connection failures",
          "type": "removed"
        }
      ],
      "message": "Remove NAT Gateway troubleshoot articles for redirect to SupportArticles",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/troubleshoot-nat-connectivity",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 32,
      "sha": "a5bcfd4f9b0bdd4139bace82e6ddd3f54dacdb65",
      "short_sha": "a5bcfd4",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 797,
        "total": 797
      },
      "summary": "NAT Gateway: removes \"Troubleshoot outbound connectivity with NAT gateway and Azure services\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a5bcfd4f9b0bdd4139bace82e6ddd3f54dacdb65"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-08T15:32:31Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 32,
          "deletions": 32,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/connection-troubleshoot-overview",
          "meaningful_changes": [
            {
              "text": "Agentless experience",
              "type": "removed"
            },
            {
              "text": "Agentless experience (preview)",
              "type": "added"
            },
            {
              "text": "Connection troubleshoot now supports an agentless experience (currently in preview). You no longer need to install the Network Watcher agent VM extension on your virtual machines to run connectivity tests. Features and...",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/connection-troubleshoot-overview.md",
          "status": "modified",
          "title": "Connection Troubleshoot Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f9dbf8d20ef77f488d46de45b286c2b2e2556a8e",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Agentless experience",
          "type": "removed"
        },
        {
          "text": "Agentless experience (preview)",
          "type": "added"
        },
        {
          "text": "Connection troubleshoot now supports an agentless experience (currently in preview). You no longer need to install the Network Watcher agent VM extension on your virtual machines to run connectivity tests. Features and...",
          "type": "removed"
        },
        {
          "text": "Connection troubleshoot now supports an agentless experience (currently in preview). You no longer need to install the Network Watcher agent virtual machine extension on your virtual machines to run connectivity tests...",
          "type": "added"
        },
        {
          "text": "With the agentless (preview) update, you can now run connectivity tests between Azure resources without installing any diagnostic agent or VM extension. This simplifies setup, reduces operational overhead, and enables...",
          "type": "removed"
        },
        {
          "text": "With the agentless experience, you can now run connectivity tests between Azure resources without installing any diagnostic agent or VM extension. This simplifies setup, reduces operational overhead, and enables faster...",
          "type": "added"
        }
      ],
      "message": "tweaks",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/connection-troubleshoot-overview",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "New support or availability language",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 32,
      "sha": "f9dbf8d20ef77f488d46de45b286c2b2e2556a8e",
      "short_sha": "f9dbf8d",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 32,
        "deletions": 32,
        "total": 64
      },
      "summary": "Network Watcher: adds \"With the agentless experience, you can now run connectivity tests between Azure resources without installing any diagnostic agent or VM extension. This simplifies setup, reduces operational overhead, and enables faster...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f9dbf8d20ef77f488d46de45b286c2b2e2556a8e"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 32,
          "deletions": 34,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Hub virtual network: The hub virtual network hosts shared Azure services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity for...",
              "type": "removed"
            },
            {
              "text": "Hub virtual network: The hub virtual network hosts shared Azure services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity for...",
              "type": "added"
            },
            {
              "text": "Spoke virtual networks: Spoke virtual networks isolate and manage workloads separately in each spoke. Each workload can include multiple tiers, with multiple subnets connected through Azure load balancers. Spokes can...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:8050d0a9ee68aae8b40d40d586c373d2d7343745",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Hub virtual network: The hub virtual network hosts shared Azure services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity for...",
          "type": "removed"
        },
        {
          "text": "Hub virtual network: The hub virtual network hosts shared Azure services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity for...",
          "type": "added"
        },
        {
          "text": "Spoke virtual networks: Spoke virtual networks isolate and manage workloads separately in each spoke. Each workload can include multiple tiers, with multiple subnets connected through Azure load balancers. Spokes can...",
          "type": "removed"
        },
        {
          "text": "Spoke virtual networks: Spoke virtual networks isolate and manage workloads separately in each spoke. Each workload can include multiple tiers, with multiple subnets connected through Azure load balancers. Spokes can...",
          "type": "added"
        },
        {
          "text": "These spoke networks follow the rules for default outbound access. A core purpose of the hub-spoke network topology is to direct outbound internet traffic through the control mechanisms offered by the hub.",
          "type": "removed"
        },
        {
          "text": "Spoke networks follow the rules for default outbound access. A core purpose of the hub-spoke network topology is to direct outbound internet traffic through the control mechanisms offered by the hub.",
          "type": "added"
        }
      ],
      "message": "edits",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 32,
      "sha": "8050d0a9ee68aae8b40d40d586c373d2d7343745",
      "short_sha": "8050d0a",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 32,
        "deletions": 34,
        "total": 66
      },
      "summary": "Architecture Center: adds \"Spoke networks follow the rules for default outbound access. A core purpose of the hub-spoke network topology is to direct outbound internet traffic through the control mechanisms offered by the hub.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/8050d0a9ee68aae8b40d40d586c373d2d7343745"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 20,
          "deletions": 20,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The",
              "type": "removed"
            },
            {
              "text": "hub-spoke network pattern is one of the network topologies recommended by the Cloud Adoption Framework.",
              "type": "removed"
            },
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is one of the network topologies recommended by the Cloud Adoption...",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:4a1e43da8459c46f43c1a038966e0304cae343b1",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The",
          "type": "removed"
        },
        {
          "text": "hub-spoke network pattern is one of the network topologies recommended by the Cloud Adoption Framework.",
          "type": "removed"
        },
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is one of the network topologies recommended by the Cloud Adoption...",
          "type": "added"
        },
        {
          "text": "Remote spoke access for virtual machines: A cross-organization remote connectivity solution for Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to virtual machines distributed throughout spoke...",
          "type": "removed"
        },
        {
          "text": "Remote spoke access for virtual machines (VMs): A cross-organization remote connectivity solution for Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to VMs distributed throughout spoke networks.",
          "type": "added"
        },
        {
          "text": "These spoke networks follow the rules for default outbound access. A core purpose of the hub-spoke network topology is to direct outbound Internet traffic through the control mechanisms offered by the hub.",
          "type": "removed"
        }
      ],
      "message": "edits",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 32,
      "sha": "4a1e43da8459c46f43c1a038966e0304cae343b1",
      "short_sha": "4a1e43d",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 20,
        "deletions": 20,
        "total": 40
      },
      "summary": "Architecture Center: removes \"These spoke networks follow the rules for default outbound access. A core purpose of the hub-spoke network topology is to direct outbound Internet traffic through the control mechanisms offered by the hub.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/4a1e43da8459c46f43c1a038966e0304cae343b1"
    },
    {
      "author": "Weidong Xu",
      "date": "2026-03-30T11:40:06Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 6,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "ProxyResourceWithReadOnlyID: ProxyResourceAutoGenerated",
              "type": "added"
            },
            {
              "text": "ProxyResourceWithSettableId: SubResourceAutoGenerated",
              "type": "added"
            },
            {
              "text": "ReadOnlySubResourceModel: ProxyResourceAutoGenerated",
              "type": "added"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/tspconfig.yaml",
          "status": "modified",
          "title": "Tspconfig"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "@@alternateType(Microsoft.Network.ApplicationGatewayWebApplicationFirewallConfiguration.exclusions,",
              "type": "removed"
            },
            {
              "text": "@@alternateType(ApplicationGatewayFirewallExclusion,",
              "type": "added"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/client.tsp",
          "status": "modified",
          "title": "Client"
        }
      ],
      "id": "Azure/azure-rest-api-specs:f6e1fbd6268be7712bf96a516ba846f7d42e2baa",
      "is_noise": true,
      "kind": "api",
      "kinds": [
        "api"
      ],
      "meaningful_changes": [
        {
          "text": "@@alternateType(Microsoft.Network.ApplicationGatewayWebApplicationFirewallConfiguration.exclusions,",
          "type": "removed"
        },
        {
          "text": "@@alternateType(ApplicationGatewayFirewallExclusion,",
          "type": "added"
        },
        {
          "text": "ProxyResourceWithReadOnlyID: ProxyResourceAutoGenerated",
          "type": "added"
        },
        {
          "text": "ProxyResourceWithSettableId: SubResourceAutoGenerated",
          "type": "added"
        },
        {
          "text": "ReadOnlySubResourceModel: ProxyResourceAutoGenerated",
          "type": "added"
        },
        {
          "text": "WritableResource: ProxyResourceAutoGenerated",
          "type": "added"
        },
        {
          "text": "TrackedResourceWithEtag: TrackedResourceAutoGenerated",
          "type": "added"
        },
        {
          "text": "TrackedResourceWithSettableName: TrackedResourceAutoGenerated",
          "type": "added"
        }
      ],
      "message": "Java SDK migration fixes for Microsoft.Network (#41899)",
      "paths": [
        "specification/network/resource-manager/Microsoft.Network"
      ],
      "primary_docs_url": null,
      "primary_product": "network-api",
      "primary_product_label": "Microsoft.Network API",
      "product_labels": [
        "Microsoft.Network API"
      ],
      "products": [
        "network-api"
      ],
      "reasons": [
        "API generator/client configuration changed, not an obvious service surface change"
      ],
      "repo": "Azure/azure-rest-api-specs",
      "score": 32,
      "sha": "f6e1fbd6268be7712bf96a516ba846f7d42e2baa",
      "short_sha": "f6e1fbd",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-rest-api-specs-network"
      ],
      "sources": [
        "Microsoft.Network REST/ARM specs"
      ],
      "stats": {
        "additions": 7,
        "deletions": 1,
        "total": 8
      },
      "summary": "Microsoft.Network API: adds \"TrackedResourceWithSettableName: TrackedResourceAutoGenerated\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/Azure/azure-rest-api-specs/commit/f6e1fbd6268be7712bf96a516ba846f7d42e2baa"
    },
    {
      "author": "MekaylaMoore",
      "date": "2026-04-16T21:47:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-about-virtual-network-gateways",
          "meaningful_changes": [
            {
              "text": "Auto-assigned public IP isn't available for Virtual WAN (vWAN) or Extended Zone deployments.",
              "type": "removed"
            },
            {
              "text": "Auto-assigned public IP isn't available for Virtual WAN (vWAN).",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/expressroute-about-virtual-network-gateways.md",
          "status": "modified",
          "title": "Expressroute About Virtual Network Gateways"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:84b9bb54c2d11fe0eec8e1ee82b334f3ccb2cdfc",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Auto-assigned public IP isn't available for Virtual WAN (vWAN) or Extended Zone deployments.",
          "type": "removed"
        },
        {
          "text": "Auto-assigned public IP isn't available for Virtual WAN (vWAN).",
          "type": "added"
        }
      ],
      "message": "Update expressroute-about-virtual-network-gateways.md",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-about-virtual-network-gateways",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "New support or availability language",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 30,
      "sha": "84b9bb54c2d11fe0eec8e1ee82b334f3ccb2cdfc",
      "short_sha": "84b9bb5",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "ExpressRoute: adds \"Auto-assigned public IP isn't available for Virtual WAN (vWAN).\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/84b9bb54c2d11fe0eec8e1ee82b334f3ccb2cdfc"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-14T08:20:19Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 9,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Azure Bastion is a fully managed service that provides secure and seamless RDP and SSH access to VMs without exposing their public IP addresses. In this architecture, Azure Bastion is used as a managed offering to...",
              "type": "removed"
            },
            {
              "text": "Azure Bastion is a fully managed service that provides RDP and SSH access to VMs without exposing their public IP addresses. In this architecture, Azure Bastion is used as a managed offering to support direct VM access...",
              "type": "added"
            },
            {
              "text": "With Virtual Network Manager, you can define network groups to identify and logically segment your virtual networks. You can also use connected groups to provide communication between groups of virtual networks as if...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:004d060511f123e215e6b9b3f74bbd567a1c607b",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Bastion is a fully managed service that provides secure and seamless RDP and SSH access to VMs without exposing their public IP addresses. In this architecture, Azure Bastion is used as a managed offering to...",
          "type": "removed"
        },
        {
          "text": "Azure Bastion is a fully managed service that provides RDP and SSH access to VMs without exposing their public IP addresses. In this architecture, Azure Bastion is used as a managed offering to support direct VM access...",
          "type": "added"
        },
        {
          "text": "With Virtual Network Manager, you can define network groups to identify and logically segment your virtual networks. You can also use connected groups to provide communication between groups of virtual networks as if...",
          "type": "removed"
        },
        {
          "text": "With Virtual Network Manager, you can define network groups to identify and logically segment your virtual networks. You can also use connected groups to provide communication between groups of virtual networks as if...",
          "type": "added"
        },
        {
          "text": "This reference architecture implements a hub-spoke network pattern where the hub virtual network acts as a central point of connectivity to many spoke virtual networks. The spoke virtual networks connect with the hub...",
          "type": "removed"
        },
        {
          "text": "For more information, see Hub-and-spoke network topology.",
          "type": "removed"
        }
      ],
      "message": "edits",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 30,
      "sha": "004d060511f123e215e6b9b3f74bbd567a1c607b",
      "short_sha": "004d060",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 9,
        "deletions": 7,
        "total": 16
      },
      "summary": "Architecture Center: adds \"Azure Bastion is a fully managed service that provides RDP and SSH access to VMs without exposing their public IP addresses. In this architecture, Azure Bastion is used as a managed offering to support direct VM access...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/004d060511f123e215e6b9b3f74bbd567a1c607b"
    },
    {
      "author": "duongau",
      "date": "2026-04-13T22:48:16Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 67,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/firewall/support-help",
          "meaningful_changes": [
            {
              "text": "Support and troubleshooting for Azure Firewall",
              "type": "added"
            },
            {
              "text": "Here are suggestions for where you can get help when developing your Azure Firewall solutions.",
              "type": "added"
            },
            {
              "text": "Self help troubleshooting",
              "type": "added"
            }
          ],
          "path": "articles/firewall/support-help.md",
          "status": "added",
          "title": "Support Help"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0925ca854bad049a4c9790ec20e07454bcfa25d6",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Support and troubleshooting for Azure Firewall",
          "type": "added"
        },
        {
          "text": "Here are suggestions for where you can get help when developing your Azure Firewall solutions.",
          "type": "added"
        },
        {
          "text": "Self help troubleshooting",
          "type": "added"
        },
        {
          "text": "Various articles explain how to determine, diagnose, and fix issues that you might encounter when you use Azure Firewall. Use these articles to troubleshoot connectivity problems, rule configuration, and more.",
          "type": "added"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure Firewall troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Known problems and limitations",
          "type": "added"
        }
      ],
      "message": "Add support-help article for Azure Firewall",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/support-help",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 30,
      "sha": "0925ca854bad049a4c9790ec20e07454bcfa25d6",
      "short_sha": "0925ca8",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 67,
        "deletions": 0,
        "total": 67
      },
      "summary": "Azure Firewall: adds \"Various articles explain how to determine, diagnose, and fix issues that you might encounter when you use Azure Firewall. Use these articles to troubleshoot connectivity problems, rule configuration, and more.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0925ca854bad049a4c9790ec20e07454bcfa25d6"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-13T14:39:46Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 31,
          "deletions": 32,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Between April 10, 2026 and April 14, 2026:",
              "type": "removed"
            },
            {
              "text": "Between April 10 and April 14, 2026:",
              "type": "added"
            },
            {
              "text": "Customers who set the said Feature Flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:7edb8f047a309b3b117f5ac549dea9efde649b80",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Between April 10, 2026 and April 14, 2026:",
          "type": "removed"
        },
        {
          "text": "Between April 10 and April 14, 2026:",
          "type": "added"
        },
        {
          "text": "Customers who set the said Feature Flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.",
          "type": "removed"
        },
        {
          "text": "Customers who set the said feature flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.",
          "type": "added"
        },
        {
          "text": "Between April 10, 2026 and April 14, 2026:",
          "type": "removed"
        },
        {
          "text": "Between April 10 and April 14, 2026:",
          "type": "added"
        }
      ],
      "message": "migration q&a",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 30,
      "sha": "7edb8f047a309b3b117f5ac549dea9efde649b80",
      "short_sha": "7edb8f0",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 31,
        "deletions": 32,
        "total": 63
      },
      "summary": "Front Door: adds \"Customers who set the said feature flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/7edb8f047a309b3b117f5ac549dea9efde649b80"
    },
    {
      "author": "Jessie",
      "date": "2026-04-10T00:40:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 17,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Do I need to take any action to renew my managed certificate after migration?",
              "type": "added"
            },
            {
              "text": "In most cases, no action is required. After your profile is migrated, Azure Front Door automatically attempts to rotate your managed certificate if it is within 45 days of expiry.",
              "type": "added"
            },
            {
              "text": "What happens automatically?",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:aa5b20a5ef26e8d1250176a624171f5c435e4364",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Do I need to take any action to renew my managed certificate after migration?",
          "type": "added"
        },
        {
          "text": "In most cases, no action is required. After your profile is migrated, Azure Front Door automatically attempts to rotate your managed certificate if it is within 45 days of expiry.",
          "type": "added"
        },
        {
          "text": "What happens automatically?",
          "type": "added"
        },
        {
          "text": "If your domain is CNAME\u2011mapped to Azure Front Door and meets CAA record and domain state requirements, the certificate is auto\u2011rotated with no customer action.",
          "type": "added"
        },
        {
          "text": "If autorotation does not meet validation requirements, the certificate state changes to Pending revalidation, and you need to revalidate domain ownership.",
          "type": "added"
        },
        {
          "text": "How do I revalidate domain ownership if needed for renewal?",
          "type": "added"
        }
      ],
      "message": "Update front-door-faq.yml",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "Operational or migration guidance",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 30,
      "sha": "aa5b20a5ef26e8d1250176a624171f5c435e4364",
      "short_sha": "aa5b20a",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 17,
        "deletions": 1,
        "total": 18
      },
      "summary": "Front Door: adds \"Do I need to take any action to renew my managed certificate after migration?\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/aa5b20a5ef26e8d1250176a624171f5c435e4364"
    },
    {
      "author": "mcgallan",
      "date": "2026-04-09T09:52:04Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 176,
      "files": [
        {
          "additions": 436,
          "deletions": 436,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/Common.CloudError\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/loadBalancer.json",
          "status": "modified",
          "title": "Loadbalancer"
        },
        {
          "additions": 258,
          "deletions": 258,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/Common.CloudError\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/applicationGateway.json",
          "status": "modified",
          "title": "Applicationgateway"
        },
        {
          "additions": 243,
          "deletions": 243,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/Common.CloudError\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/expressRoute.json",
          "status": "modified",
          "title": "Expressroute"
        },
        {
          "additions": 205,
          "deletions": 205,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"/definitions/NetworkWatcher\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"/definitions/Common.NetworkWatcher\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"/definitions/NetworkWatcher\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/networkWatcher.json",
          "status": "modified",
          "title": "Networkwatcher"
        },
        {
          "additions": 188,
          "deletions": 188,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/Common.CloudError\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/virtualWan.json",
          "status": "modified",
          "title": "Virtualwan"
        },
        {
          "additions": 156,
          "deletions": 156,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/Common.CloudError\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/networkGateway.json",
          "status": "modified",
          "title": "Networkgateway"
        },
        {
          "additions": 102,
          "deletions": 122,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "import \"./Network/main.tsp\";",
              "type": "removed"
            },
            {
              "text": "\ufeffimport \"./Network/main.tsp\";",
              "type": "added"
            },
            {
              "text": "@@clientName(Microsoft.Network.ProvisioningState,",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/client.tsp",
          "status": "modified",
          "title": "Client"
        },
        {
          "additions": 75,
          "deletions": 75,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/Common.CloudError\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/networkManager.json",
          "status": "modified",
          "title": "Networkmanager"
        },
        {
          "additions": 37,
          "deletions": 37,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/Common.CloudError\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/firewallPolicy.json",
          "status": "modified",
          "title": "Firewallpolicy"
        },
        {
          "additions": 36,
          "deletions": 36,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/Common.CloudError\"",
              "type": "added"
            },
            {
              "text": "\"$ref\": \"./common.json/definitions/CloudError\"",
              "type": "removed"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/stable/2025-05-01/networkSecurityPerimeter.json",
          "status": "modified",
          "title": "Networksecurityperimeter"
        }
      ],
      "id": "Azure/azure-rest-api-specs:14ea458babe962d08b39acbb244bb81bdd3cb999",
      "is_noise": true,
      "kind": "api",
      "kinds": [
        "api"
      ],
      "meaningful_changes": [
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        },
        {
          "text": "namespace Microsoft.Network;",
          "type": "removed"
        }
      ],
      "message": "Replace Network/Common NameSpace (#42225)",
      "paths": [
        "specification/network/resource-manager/Microsoft.Network"
      ],
      "primary_docs_url": null,
      "primary_product": "network-api",
      "primary_product_label": "Microsoft.Network API",
      "product_labels": [
        "Microsoft.Network API"
      ],
      "products": [
        "network-api"
      ],
      "reasons": [
        "API generator/client configuration changed, not an obvious service surface change"
      ],
      "repo": "Azure/azure-rest-api-specs",
      "score": 30,
      "sha": "14ea458babe962d08b39acbb244bb81bdd3cb999",
      "short_sha": "14ea458",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-rest-api-specs-network"
      ],
      "sources": [
        "Microsoft.Network REST/ARM specs"
      ],
      "stats": {
        "additions": 9037,
        "deletions": 8820,
        "total": 17857
      },
      "summary": "Microsoft.Network API: removes \"namespace Microsoft.Network;\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/Azure/azure-rest-api-specs/commit/14ea458babe962d08b39acbb244bb81bdd3cb999"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-04T03:02:51Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "Flows by NSG and rule",
              "type": "removed"
            },
            {
              "text": "Flows by virtual network and rule",
              "type": "added"
            },
            {
              "text": "Flows by network security group and rule",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/flow-logs-power-bi.md",
          "status": "modified",
          "title": "Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6237e015a341fee49539500d2b308307fb28f65d",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Flows by NSG and rule",
          "type": "removed"
        },
        {
          "text": "Flows by virtual network and rule",
          "type": "added"
        },
        {
          "text": "Flows by network security group and rule",
          "type": "added"
        }
      ],
      "message": "h3 title correction",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 30,
      "sha": "6237e015a341fee49539500d2b308307fb28f65d",
      "short_sha": "6237e01",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 2,
        "total": 6
      },
      "summary": "Network Watcher: adds \"Flows by network security group and rule\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6237e015a341fee49539500d2b308307fb28f65d"
    },
    {
      "author": "Vyshnavi-MSFT",
      "date": "2026-04-29T18:15:51Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 6,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/mutual-authentication-arm-template",
          "meaningful_changes": [
            {
              "text": ":::image type=\"content\" source=\"./media/mutual-authentication-arm-template/mtls-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for client...",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"./media/mutual-authentication-arm-template/mutual-authentication-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/mutual-authentication-arm-template.md",
          "status": "modified",
          "title": "Mutual Authentication Arm Template"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/mutual-authentication-overview",
          "meaningful_changes": [
            {
              "text": ":::image type=\"content\" source=\"./media/mutual-authentication-portal/mtls-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for client authentication...",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"./media/mutual-authentication-portal/mutual-authentication-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/mutual-authentication-overview.md",
          "status": "modified",
          "title": "Mutual Authentication Overview"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/media/mutual-authentication-arm-template/mutual-authentication-passthrough.png",
          "status": "renamed",
          "title": "Mutual Authentication Passthrough"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/media/mutual-authentication-portal/create-ssl-profile-passthrough.png",
          "status": "removed",
          "title": "Create Ssl Profile Passthrough"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/media/mutual-authentication-portal/mtls-passthrough.png",
          "status": "removed",
          "title": "Mtls Passthrough"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/media/mutual-authentication-portal/mutual-authentication-passthrough.png",
          "status": "renamed",
          "title": "Mutual Authentication Passthrough"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:3aa856b990e738be30c9c260736060c69815ea62",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": ":::image type=\"content\" source=\"./media/mutual-authentication-arm-template/mtls-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for client...",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"./media/mutual-authentication-arm-template/mutual-authentication-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for...",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"./media/mutual-authentication-portal/mtls-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for client authentication...",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"./media/mutual-authentication-portal/mutual-authentication-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for...",
          "type": "added"
        }
      ],
      "message": "updates image names",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/mutual-authentication-arm-template",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "3aa856b990e738be30c9c260736060c69815ea62",
      "short_sha": "3aa856b",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Application Gateway: adds \":::image type=\"content\" source=\"./media/mutual-authentication-arm-template/mutual-authentication-passthrough.png\" alt-text=\"Screenshot showing the Create SSL profile dialog in Azure portal with Passthrough selected for...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/3aa856b990e738be30c9c260736060c69815ea62"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-29T14:58:47Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations",
          "meaningful_changes": [
            {
              "text": "Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich Metro",
              "type": "removed"
            },
            {
              "text": "Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Stockholm2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich...",
              "type": "added"
            },
            {
              "text": "Equinix | \u2713 | \u2713 | Amsterdam; Amsterdam Metro; Amsterdam2; Atlanta; Atlanta Metro; Berlin; Canberra2; Chicago; Chicago Metro; Dallas; Dubai2; Dublin; Frankfurt; Frankfurt2; Geneva; Hong Kong SAR; Hong Kong2; Kuala...",
              "type": "removed"
            }
          ],
          "path": "articles/expressroute/expressroute-locations.md",
          "status": "modified",
          "title": "Expressroute Locations"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fd430c05fb3bf1bde114f8cf5ae2e568bb066c44",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich Metro",
          "type": "removed"
        },
        {
          "text": "Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Stockholm2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich...",
          "type": "added"
        },
        {
          "text": "Equinix | \u2713 | \u2713 | Amsterdam; Amsterdam Metro; Amsterdam2; Atlanta; Atlanta Metro; Berlin; Canberra2; Chicago; Chicago Metro; Dallas; Dubai2; Dublin; Frankfurt; Frankfurt2; Geneva; Hong Kong SAR; Hong Kong2; Kuala...",
          "type": "removed"
        },
        {
          "text": "Equinix | \u2713 | \u2713 | Amsterdam; Amsterdam Metro; Amsterdam2; Atlanta; Atlanta Metro; Berlin; Canberra2; Chicago; Chicago Metro; Dallas; Dubai2; Dublin; Frankfurt; Frankfurt2; Geneva; Hong Kong SAR; Hong Kong2; Kuala...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #315309 from raghavendermareddy/patch-471187",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "fd430c05fb3bf1bde114f8cf5ae2e568bb066c44",
      "short_sha": "fd430c0",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "ExpressRoute: adds \"Digital Realty | \u2713 | \u2713 | Amsterdam Metro; Amsterdam2; Atlanta2; Brussels; Dallas2; Hong Kong2; London; Phoenix2; Seattle; Seoul; Silicon Valley; Singapore2; Stockholm2; Sydney2; Tokyo2; Vienna; Washington DC; Zurich...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fd430c05fb3bf1bde114f8cf5ae2e568bb066c44"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-17T22:15:31Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-dns",
          "meaningful_changes": [
            {
              "text": "Azure AI Video Indexer (Microsoft.VideoIndexer/accounts) | account | privatelink.api.videoindexer.ai | api.videoindexer.ai",
              "type": "added"
            },
            {
              "text": "Azure Maps (Microsoft.Maps/accounts) | account | privatelink.account.maps.azure.com | account.maps.azure.com",
              "type": "added"
            }
          ],
          "path": "articles/private-link/private-endpoint-dns.md",
          "status": "modified",
          "title": "Private Endpoint Dns"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:185ca87c4f239c15dbdc9cb5ffcd295f6b05c9a9",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure AI Video Indexer (Microsoft.VideoIndexer/accounts) | account | privatelink.api.videoindexer.ai | api.videoindexer.ai",
          "type": "added"
        },
        {
          "text": "Azure Maps (Microsoft.Maps/accounts) | account | privatelink.account.maps.azure.com | account.maps.azure.com",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314891 from duongau/duau/private-link-dns-maps-videoindexer-0417",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-dns",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "185ca87c4f239c15dbdc9cb5ffcd295f6b05c9a9",
      "short_sha": "185ca87",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 1,
        "total": 4
      },
      "summary": "Private Link: adds \"Azure AI Video Indexer (Microsoft.VideoIndexer/accounts) | account | privatelink.api.videoindexer.ai | api.videoindexer.ai\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/185ca87c4f239c15dbdc9cb5ffcd295f6b05c9a9"
    },
    {
      "author": "Chad Kittel",
      "date": "2026-04-13T19:07:47Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/trusted-internet-connections-content",
          "meaningful_changes": [
            {
              "text": "Federal App Innovation - TIC 3.0",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/trusted-internet-connections-content.md",
          "status": "modified",
          "title": "Trusted Internet Connections Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:5a044b5339d6c7349575f1a057c2e752fdbcac9b",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Federal App Innovation - TIC 3.0",
          "type": "removed"
        }
      ],
      "message": "Apply suggestion from @ckittel",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/trusted-internet-connections-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "5a044b5339d6c7349575f1a057c2e752fdbcac9b",
      "short_sha": "5a044b5",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 0,
        "deletions": 1,
        "total": 1
      },
      "summary": "Architecture Center: removes \"Federal App Innovation - TIC 3.0\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/5a044b5339d6c7349575f1a057c2e752fdbcac9b"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-13T15:15:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 5,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Microsoft will automatically migrate eligible profiles on a \"best effort\" basis to Azure Front Door Standard/Premium between April 10, 2026 and April 14, 2026, unless you notify us otherwise. Classic and Azure Front...",
              "type": "removed"
            },
            {
              "text": "Microsoft will automatically migrate eligible profiles on a \"best effort\" basis to Azure Front Door Standard/Premium between April 10 and April 14, 2026, unless you notify us otherwise. Classic and Azure Front Door...",
              "type": "added"
            },
            {
              "text": "Azure CDN from Microsoft (classic)",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:457f604f46cc02b98237e245b2ab2df421bca66f",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Microsoft will automatically migrate eligible profiles on a \"best effort\" basis to Azure Front Door Standard/Premium between April 10, 2026 and April 14, 2026, unless you notify us otherwise. Classic and Azure Front...",
          "type": "removed"
        },
        {
          "text": "Microsoft will automatically migrate eligible profiles on a \"best effort\" basis to Azure Front Door Standard/Premium between April 10 and April 14, 2026, unless you notify us otherwise. Classic and Azure Front Door...",
          "type": "added"
        },
        {
          "text": "Azure CDN from Microsoft (classic)",
          "type": "removed"
        },
        {
          "text": "Azure CDN from Microsoft (classic)",
          "type": "added"
        },
        {
          "text": "Azure Front Door (classic)",
          "type": "removed"
        },
        {
          "text": "Azure Front Door (classic)",
          "type": "added"
        }
      ],
      "message": "tweaks",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "457f604f46cc02b98237e245b2ab2df421bca66f",
      "short_sha": "457f604",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 5,
        "total": 10
      },
      "summary": "Front Door: adds \"Microsoft will automatically migrate eligible profiles on a \"best effort\" basis to Azure Front Door Standard/Premium between April 10 and April 14, 2026, unless you notify us otherwise. Classic and Azure Front Door...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/457f604f46cc02b98237e245b2ab2df421bca66f"
    },
    {
      "author": "Miguel Mateus",
      "date": "2026-04-13T15:06:51Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-dns-integration",
          "meaningful_changes": [
            {
              "text": "Each DNS zone group can include only one private DNS zone per DNS zone name. For example, you can't associate more than one private DNS zone resource for privatelink.blob.core.windows.net to the same DNS zone group.",
              "type": "added"
            }
          ],
          "path": "articles/private-link/private-endpoint-dns-integration.md",
          "status": "modified",
          "title": "Private Endpoint Dns Integration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d7941f4c9d80854f18ed2e7ac83ef938a1161aca",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Each DNS zone group can include only one private DNS zone per DNS zone name. For example, you can't associate more than one private DNS zone resource for privatelink.blob.core.windows.net to the same DNS zone group.",
          "type": "added"
        }
      ],
      "message": "Update DNS zone group limitations in documentation",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-dns-integration",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "d7941f4c9d80854f18ed2e7ac83ef938a1161aca",
      "short_sha": "d7941f4",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 0,
        "total": 1
      },
      "summary": "Private Link: adds \"Each DNS zone group can include only one private DNS zone per DNS zone name. For example, you can't associate more than one private DNS zone resource for privatelink.blob.core.windows.net to the same DNS zone group.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d7941f4c9d80854f18ed2e7ac83ef938a1161aca"
    },
    {
      "author": "Chad Kittel",
      "date": "2026-04-13T13:23:00Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 8,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "Hub virtual network: The hub virtual network hosts shared Azure services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity for...",
              "type": "removed"
            },
            {
              "text": "Hub virtual network: The hub virtual network hosts shared Azure networking services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity...",
              "type": "added"
            },
            {
              "text": "A hub is a regional resource. If your workloads reside in multiple regions, place one hub in each region. The hub provides the following features and options:",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:7f9e3723cce9484d2801edbb05743ff2655520a4",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Hub virtual network: The hub virtual network hosts shared Azure services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity for...",
          "type": "removed"
        },
        {
          "text": "Hub virtual network: The hub virtual network hosts shared Azure networking services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity...",
          "type": "added"
        },
        {
          "text": "A hub is a regional resource. If your workloads reside in multiple regions, place one hub in each region. The hub provides the following features and options:",
          "type": "removed"
        },
        {
          "text": "A hub is a regional resource. If your workloads reside in multiple regions, place one hub in each region. The hub provides the following features and options:",
          "type": "added"
        },
        {
          "text": "In most scenarios, you should peer each spoke to a single hub network in the same region.",
          "type": "removed"
        },
        {
          "text": "In most scenarios, you should peer each spoke to a single hub network in the same region.",
          "type": "added"
        }
      ],
      "message": "Apply suggestions from code review",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "7f9e3723cce9484d2801edbb05743ff2655520a4",
      "short_sha": "7f9e372",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 8,
        "deletions": 6,
        "total": 14
      },
      "summary": "Architecture Center: adds \"Hub virtual network: The hub virtual network hosts shared Azure networking services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/7f9e3723cce9484d2801edbb05743ff2655520a4"
    },
    {
      "author": "Chad Kittel",
      "date": "2026-04-13T13:22:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is a network topology that the Cloud Adoption Framework for Azure...",
              "type": "removed"
            },
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern, also known as hub and spoke, is the network topology that the Cloud...",
              "type": "added"
            },
            {
              "text": "For a Microsoft-managed hub infrastructure solution, see Hub-spoke network topology with Azure Virtual WAN.",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:ec31b19f42bb77bfdd23221d504fb0504a89133a",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is a network topology that the Cloud Adoption Framework for Azure...",
          "type": "removed"
        },
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern, also known as hub and spoke, is the network topology that the Cloud...",
          "type": "added"
        },
        {
          "text": "For a Microsoft-managed hub infrastructure solution, see Hub-spoke network topology with Azure Virtual WAN.",
          "type": "added"
        }
      ],
      "message": "Apply suggestion from @ckittel",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "ec31b19f42bb77bfdd23221d504fb0504a89133a",
      "short_sha": "ec31b19",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 3,
        "deletions": 1,
        "total": 4
      },
      "summary": "Architecture Center: adds \"This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern, also known as hub and spoke, is the network topology that the Cloud...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/ec31b19f42bb77bfdd23221d504fb0504a89133a"
    },
    {
      "author": "Jessie",
      "date": "2026-04-13T10:19:09Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 44,
          "deletions": 15,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "Customers who didn't set the said Feature Flag before April 9, 2026, their profiles will be migrated to Azure Front Door Standard or Premium SKU on a \"best effort\" basis and should watch for an email related to their...",
              "type": "removed"
            },
            {
              "text": "Customers who didn't set the said Feature Flag before April 9, 2026, their profiles will be migrated to Azure Front Door Standard or Premium SKU on a \"best effort\" basis and should watch for an email related to their...",
              "type": "added"
            },
            {
              "text": "For customers who do not set the feature flag by April 9, 2026, Microsoft will migrate their profiles to Azure Front Door Standard or Premium SKU on a \"best effort\" basis. Customers are advised to monitor their email...",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ef26ab342afe3aac52ba4482125076b1d98f9361",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Customers who didn't set the said Feature Flag before April 9, 2026, their profiles will be migrated to Azure Front Door Standard or Premium SKU on a \"best effort\" basis and should watch for an email related to their...",
          "type": "removed"
        },
        {
          "text": "Customers who didn't set the said Feature Flag before April 9, 2026, their profiles will be migrated to Azure Front Door Standard or Premium SKU on a \"best effort\" basis and should watch for an email related to their...",
          "type": "added"
        },
        {
          "text": "For customers who do not set the feature flag by April 9, 2026, Microsoft will migrate their profiles to Azure Front Door Standard or Premium SKU on a \"best effort\" basis. Customers are advised to monitor their email...",
          "type": "removed"
        },
        {
          "text": "For customers who do not set the feature flag by April 9, 2026, Microsoft will migrate their profiles to Azure Front Door Standard or Premium SKU on a \"best effort\" basis. Customers are advised to monitor their email...",
          "type": "added"
        },
        {
          "text": "Customers who have set the said Feature Flag but are still consuming services with classic SKUs will have until April 14, 2026 to complete migration or move to BYOC.",
          "type": "added"
        },
        {
          "text": "How to check the migration status?",
          "type": "added"
        }
      ],
      "message": "Update front-door-faq.yml",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "ef26ab342afe3aac52ba4482125076b1d98f9361",
      "short_sha": "ef26ab3",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 44,
        "deletions": 15,
        "total": 59
      },
      "summary": "Front Door: adds \"For customers who do not set the feature flag by April 9, 2026, Microsoft will migrate their profiles to Azure Front Door Standard or Premium SKU on a \"best effort\" basis. Customers are advised to monitor their email...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ef26ab342afe3aac52ba4482125076b1d98f9361"
    },
    {
      "author": "nleut",
      "date": "2026-04-10T21:22:11Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 8,
          "deletions": 8,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
          "meaningful_changes": [
            {
              "text": "Dual stacking. Azure virtual networks support dual stacking. A network that supports dual stacking can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an...",
              "type": "removed"
            },
            {
              "text": "Dual-Stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...",
              "type": "added"
            },
            {
              "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
              "type": "removed"
            }
          ],
          "path": "docs/networking/guide/ipv6-ip-planning.md",
          "status": "modified",
          "title": "Ipv6 Ip Planning"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:0c1704336f62c63b10d0c9131e883bcc993e6b70",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Dual stacking. Azure virtual networks support dual stacking. A network that supports dual stacking can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an...",
          "type": "removed"
        },
        {
          "text": "Dual-Stack. Azure virtual networks support dual-stack. A network that supports dual-stack can process IPv4 and IPv6 traffic simultaneously. You can assign a new IPv6 address block to a subnet that has an existing IPv4...",
          "type": "added"
        },
        {
          "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
          "type": "removed"
        },
        {
          "text": "The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...",
          "type": "added"
        },
        {
          "text": "Global addresses: Global addresses are public IP addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6 addresses...",
          "type": "removed"
        },
        {
          "text": "Global Unicast Addresses: Global addresses are public IPv6 addresses that are unique across the internet. You can contact a registrar to request a continuous block of general allocation or global addresses. These IPv6...",
          "type": "added"
        }
      ],
      "message": "Freshness update, added references to newer IPAM and subnet peering features",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/guide/ipv6-ip-planning",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "High-impact networking behavior or lifecycle term"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "0c1704336f62c63b10d0c9131e883bcc993e6b70",
      "short_sha": "0c17043",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 8,
        "deletions": 8,
        "total": 16
      },
      "summary": "Architecture Center: adds \"The operating system configuration doesn't show the public IP address, but you can see the public IP address in the Azure portal. You can use public IPv6 addresses for inbound and outbound communication to and from the...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/0c1704336f62c63b10d0c9131e883bcc993e6b70"
    },
    {
      "author": "Shannon Leavitt",
      "date": "2026-04-10T19:39:22Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/spoke-spoke-azure-virtual-network-manager.svg\" alt-text=\"Diagram that shows using Virtual Network Manager for direct connectivity between spokes.\"...",
              "type": "removed"
            },
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/spoke-spoke-azure-virtual-network-manager.svg\" alt-text=\"Diagram that shows using Virtual Network Manager for direct connectivity between spokes.\"...",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/hub-spoke.yml",
          "status": "modified",
          "title": "Hub Spoke"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:f97206ed179f1f5d3b43b98d864d678aff86d8ce",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": ":::image type=\"complex\" border=\"false\" source=\"./images/spoke-spoke-azure-virtual-network-manager.svg\" alt-text=\"Diagram that shows using Virtual Network Manager for direct connectivity between spokes.\"...",
          "type": "removed"
        },
        {
          "text": ":::image type=\"complex\" border=\"false\" source=\"./images/spoke-spoke-azure-virtual-network-manager.svg\" alt-text=\"Diagram that shows using Virtual Network Manager for direct connectivity between spokes.\"...",
          "type": "added"
        }
      ],
      "message": "Apply suggestions from code review",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "f97206ed179f1f5d3b43b98d864d678aff86d8ce",
      "short_sha": "f97206e",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Architecture Center: adds \":::image type=\"complex\" border=\"false\" source=\"./images/spoke-spoke-azure-virtual-network-manager.svg\" alt-text=\"Diagram that shows using Virtual Network Manager for direct connectivity between spokes.\"...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/f97206ed179f1f5d3b43b98d864d678aff86d8ce"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-09T17:18:31Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke-network-topology-architecture.svg\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\" lightbox=\"./images/hub-spoke.png\":::",
              "type": "removed"
            },
            {
              "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke-network-topology-architecture.svg\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\"...",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:c7b6d97308b8d3803750b74244f6f42b6d8167ab",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke-network-topology-architecture.svg\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\" lightbox=\"./images/hub-spoke.png\":::",
          "type": "removed"
        },
        {
          "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke-network-topology-architecture.svg\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\"...",
          "type": "added"
        }
      ],
      "message": "fix warnings",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "c7b6d97308b8d3803750b74244f6f42b6d8167ab",
      "short_sha": "c7b6d97",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Architecture Center: adds \":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke-network-topology-architecture.svg\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\"...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/c7b6d97308b8d3803750b74244f6f42b6d8167ab"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:59:31Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 65,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/traffic-manager/traffic-manager-support-help",
          "meaningful_changes": [
            {
              "text": "Support and troubleshooting for Azure Traffic Manager",
              "type": "added"
            },
            {
              "text": "Here are suggestions for where you can get help when developing your Azure Traffic Manager solutions.",
              "type": "added"
            },
            {
              "text": "Self help troubleshooting",
              "type": "added"
            }
          ],
          "path": "articles/traffic-manager/traffic-manager-support-help.md",
          "status": "added",
          "title": "Traffic Manager Support Help"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:8ad15a61a3a5cc9e2af4ce6866febe600ba2ab9d",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Support and troubleshooting for Azure Traffic Manager",
          "type": "added"
        },
        {
          "text": "Here are suggestions for where you can get help when developing your Azure Traffic Manager solutions.",
          "type": "added"
        },
        {
          "text": "Self help troubleshooting",
          "type": "added"
        },
        {
          "text": "Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure Traffic Manager. Use these articles to troubleshoot degraded status, endpoint health issues, routing...",
          "type": "added"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure Traffic Manager troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Post a question on Microsoft Q&A",
          "type": "added"
        }
      ],
      "message": "Add Traffic Manager support and troubleshooting help article",
      "paths": [
        "articles/traffic-manager"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/traffic-manager/traffic-manager-support-help",
      "primary_product": "traffic-manager",
      "primary_product_label": "Traffic Manager",
      "product_labels": [
        "Traffic Manager"
      ],
      "products": [
        "traffic-manager"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Operational or migration guidance",
        "New scoped article or spec file"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "8ad15a61a3a5cc9e2af4ce6866febe600ba2ab9d",
      "short_sha": "8ad15a6",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-traffic-manager"
      ],
      "sources": [
        "Traffic Manager docs"
      ],
      "stats": {
        "additions": 65,
        "deletions": 0,
        "total": 65
      },
      "summary": "Traffic Manager: adds \"Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure Traffic Manager. Use these articles to troubleshoot degraded status, endpoint health issues, routing...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/8ad15a61a3a5cc9e2af4ce6866febe600ba2ab9d"
    },
    {
      "author": "Stacy Chambers",
      "date": "2026-04-08T19:44:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 6,
      "files": [
        {
          "additions": 299,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/site-to-site-ipv6-azure-powershell",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure VPN Gateway",
              "type": "added"
            },
            {
              "text": "Create a site-to-site VPN connection in dual stack using Azure PowerShell",
              "type": "added"
            },
            {
              "text": "This article helps you create a site-to-site VPN gateway connection in IPv4 and IPv6 dual stack from your on-premises network to a virtual network (VNet) using Azure PowerShell.",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/site-to-site-ipv6-azure-powershell.md",
          "status": "added",
          "title": "Site To Site Ipv6 Azure Powershell"
        },
        {
          "additions": 14,
          "deletions": 11,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/site-to-site-ipv6-azure-cli",
          "meaningful_changes": [
            {
              "text": ":::image type=\"content\" source=\"media/site-to-site-ipv6-azure-cli/site-to-site-connection.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"media/site-to-site-ipv6-dual-stack/site-to-site-connection-dual-stack.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::",
              "type": "added"
            },
            {
              "text": "The steps in this article create two connections between the VPN gateway and the on-premises VPN device using a shared key. For more information about VPN gateways, see About VPN gateway.",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/site-to-site-ipv6-azure-cli.md",
          "status": "modified",
          "title": "Site To Site Ipv6 Azure Cli"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/ipv6-configuration",
          "meaningful_changes": [
            {
              "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell, or CLI for this...",
              "type": "removed"
            },
            {
              "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell or CLI for this configuration...",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/ipv6-configuration.md",
          "status": "modified",
          "title": "Ipv6 Configuration"
        },
        {
          "additions": 2,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Azure PowerShell",
              "type": "added"
            },
            {
              "text": "href: site-to-site-ipv6-azure-powershell.md",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/TOC.yml",
          "status": "modified",
          "title": "Toc"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/vpn-gateway/media/site-to-site-ipv6-azure-cli/site-to-site-connection.png",
          "status": "removed",
          "title": "Site To Site Connection"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/vpn-gateway/media/site-to-site-ipv6-dual-stack/site-to-site-connection-dual-stack.png",
          "status": "added",
          "title": "Site To Site Connection Dual Stack"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:be7e744775617b176097cbc4b2aadadcd599805e",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Azure PowerShell",
          "type": "added"
        },
        {
          "text": "href: site-to-site-ipv6-azure-powershell.md",
          "type": "added"
        },
        {
          "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell, or CLI for this...",
          "type": "removed"
        },
        {
          "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell or CLI for this configuration...",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"media/site-to-site-ipv6-azure-cli/site-to-site-connection.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"media/site-to-site-ipv6-dual-stack/site-to-site-connection-dual-stack.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::",
          "type": "added"
        },
        {
          "text": "The steps in this article create two connections between the VPN gateway and the on-premises VPN device using a shared key. For more information about VPN gateways, see About VPN gateway.",
          "type": "removed"
        },
        {
          "text": "The steps in this article create two connections between the VPN gateway and the on-premises VPN device using a shared key. You can also use PowerShell for this configuration. If you aren't configuring IPv4 addresses...",
          "type": "added"
        },
        {
          "text": "Verify that you have a functioning route-based VPN gateway. To create a VPN gateway, see Create a VPN gateway.",
          "type": "removed"
        },
        {
          "text": "Verify that you have a functioning route-based VPN gateway. To create a VPN gateway, see Create a VPN gateway.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314237 from cherylmc/convert-ps",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/site-to-site-ipv6-azure-powershell",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term",
        "New scoped article or spec file",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "be7e744775617b176097cbc4b2aadadcd599805e",
      "short_sha": "be7e744",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 317,
        "deletions": 13,
        "total": 330
      },
      "summary": "VPN Gateway: adds \":::image type=\"content\" source=\"media/site-to-site-ipv6-dual-stack/site-to-site-connection-dual-stack.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/be7e744775617b176097cbc4b2aadadcd599805e"
    },
    {
      "author": "Cheryl McGuire",
      "date": "2026-04-08T17:31:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 6,
      "files": [
        {
          "additions": 299,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/site-to-site-ipv6-azure-powershell",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure VPN Gateway",
              "type": "added"
            },
            {
              "text": "Create a site-to-site VPN connection in dual stack using Azure PowerShell",
              "type": "added"
            },
            {
              "text": "This article helps you create a site-to-site VPN gateway connection in IPv4 and IPv6 dual stack from your on-premises network to a virtual network (VNet) using Azure PowerShell.",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/site-to-site-ipv6-azure-powershell.md",
          "status": "added",
          "title": "Site To Site Ipv6 Azure Powershell"
        },
        {
          "additions": 14,
          "deletions": 11,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/site-to-site-ipv6-azure-cli",
          "meaningful_changes": [
            {
              "text": ":::image type=\"content\" source=\"media/site-to-site-ipv6-azure-cli/site-to-site-connection.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"media/site-to-site-ipv6-dual-stack/site-to-site-connection-dual-stack.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::",
              "type": "added"
            },
            {
              "text": "The steps in this article create two connections between the VPN gateway and the on-premises VPN device using a shared key. For more information about VPN gateways, see About VPN gateway.",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/site-to-site-ipv6-azure-cli.md",
          "status": "modified",
          "title": "Site To Site Ipv6 Azure Cli"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/ipv6-configuration",
          "meaningful_changes": [
            {
              "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell, or CLI for this...",
              "type": "removed"
            },
            {
              "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell or CLI for this configuration...",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/ipv6-configuration.md",
          "status": "modified",
          "title": "Ipv6 Configuration"
        },
        {
          "additions": 2,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Azure PowerShell",
              "type": "added"
            },
            {
              "text": "href: site-to-site-ipv6-azure-powershell.md",
              "type": "added"
            }
          ],
          "path": "articles/vpn-gateway/TOC.yml",
          "status": "modified",
          "title": "Toc"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/vpn-gateway/media/site-to-site-ipv6-azure-cli/site-to-site-connection.png",
          "status": "removed",
          "title": "Site To Site Connection"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/vpn-gateway/media/site-to-site-ipv6-dual-stack/site-to-site-connection-dual-stack.png",
          "status": "added",
          "title": "Site To Site Connection Dual Stack"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:56cd6663ce1dfccdd957c5045c71f35f27121a41",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Azure PowerShell",
          "type": "added"
        },
        {
          "text": "href: site-to-site-ipv6-azure-powershell.md",
          "type": "added"
        },
        {
          "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell, or CLI for this...",
          "type": "removed"
        },
        {
          "text": "This article helps you configure IPv6 in dual stack for VPN Gateway using the Azure portal. Configuration steps are similar to the existing IPv4 configuration. You can also use PowerShell or CLI for this configuration...",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"media/site-to-site-ipv6-azure-cli/site-to-site-connection.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"media/site-to-site-ipv6-dual-stack/site-to-site-connection-dual-stack.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::",
          "type": "added"
        },
        {
          "text": "The steps in this article create two connections between the VPN gateway and the on-premises VPN device using a shared key. For more information about VPN gateways, see About VPN gateway.",
          "type": "removed"
        },
        {
          "text": "The steps in this article create two connections between the VPN gateway and the on-premises VPN device using a shared key. You can also use PowerShell for this configuration. If you aren't configuring IPv4 addresses...",
          "type": "added"
        },
        {
          "text": "Verify that you have a functioning route-based VPN gateway. To create a VPN gateway, see Create a VPN gateway.",
          "type": "removed"
        },
        {
          "text": "Verify that you have a functioning route-based VPN gateway. To create a VPN gateway, see Create a VPN gateway.",
          "type": "added"
        }
      ],
      "message": "VPN Gateway IPv6 PowerShell article",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/site-to-site-ipv6-azure-powershell",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "High-impact networking behavior or lifecycle term",
        "New scoped article or spec file",
        "Scoped article or spec file removed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "56cd6663ce1dfccdd957c5045c71f35f27121a41",
      "short_sha": "56cd666",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 317,
        "deletions": 13,
        "total": 330
      },
      "summary": "VPN Gateway: adds \":::image type=\"content\" source=\"media/site-to-site-ipv6-dual-stack/site-to-site-connection-dual-stack.png\" alt-text=\"Diagram showing site-to-site VPN gateway connection in dual stack.\":::\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/56cd6663ce1dfccdd957c5045c71f35f27121a41"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T13:54:07Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is one of the network topologies recommended by the Cloud Adoption...",
              "type": "removed"
            },
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is a network topology that the Cloud Adoption Framework for Azure...",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:9b8dd22dccf5782c18c6f700b38ea28705c8353d",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is one of the network topologies recommended by the Cloud Adoption...",
          "type": "removed"
        },
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is a network topology that the Cloud Adoption Framework for Azure...",
          "type": "added"
        }
      ],
      "message": "test",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "9b8dd22dccf5782c18c6f700b38ea28705c8353d",
      "short_sha": "9b8dd22",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Architecture Center: adds \"This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The hub-spoke network pattern is a network topology that the Cloud Adoption Framework for Azure...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/9b8dd22dccf5782c18c6f700b38ea28705c8353d"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 61,
          "deletions": 52,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components.",
              "type": "removed"
            },
            {
              "text": "Hub-spoke is one of the network topologies recommended by the Cloud Adoption Framework. See, Define an Azure network topology to understand why this topology is a best practice for many organizations.",
              "type": "removed"
            },
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:333492e540a63f088ef04e4910270886ea5a3343",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components.",
          "type": "removed"
        },
        {
          "text": "Hub-spoke is one of the network topologies recommended by the Cloud Adoption Framework. See, Define an Azure network topology to understand why this topology is a best practice for many organizations.",
          "type": "removed"
        },
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. The",
          "type": "added"
        },
        {
          "text": "hub-spoke network pattern is one of the network topologies recommended by the Cloud Adoption Framework.",
          "type": "added"
        },
        {
          "text": "Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...",
          "type": "added"
        },
        {
          "text": "Hub virtual network: The hub virtual network hosts shared Azure services. Workloads hosted in the spoke virtual networks can use these services. The hub virtual network is the central point of connectivity for...",
          "type": "removed"
        }
      ],
      "message": "edit",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "333492e540a63f088ef04e4910270886ea5a3343",
      "short_sha": "333492e",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 61,
        "deletions": 52,
        "total": 113
      },
      "summary": "Architecture Center: adds \"Diagram that shows a hub-spoke network layout in Azure. A large outer frame labeled Azure Virtual Network Manager contains a central hub virtual network and four spoke virtual networks around it. On the left, outside...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/333492e540a63f088ef04e4910270886ea5a3343"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 54,
          "deletions": 61,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
          "meaningful_changes": [
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. For a Microsoft-managed hub infrastructure solution, see Hub-spoke network topology with Azure...",
              "type": "removed"
            },
            {
              "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components.",
              "type": "added"
            },
            {
              "text": "Hub-spoke is one of the network topologies recommended by the Cloud Adoption Framework. See, Define an Azure network topology to understand why this topology is considered a best practice for many organizations.",
              "type": "removed"
            }
          ],
          "path": "docs/networking/architecture/hub-spoke-content.md",
          "status": "modified",
          "title": "Hub Spoke Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:62f69ddca84eafeb39730eccb93d456d75d595e8",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components. For a Microsoft-managed hub infrastructure solution, see Hub-spoke network topology with Azure...",
          "type": "removed"
        },
        {
          "text": "This reference architecture implements a hub-spoke network pattern with customer-managed hub infrastructure components.",
          "type": "added"
        },
        {
          "text": "Hub-spoke is one of the network topologies recommended by the Cloud Adoption Framework. See, Define an Azure network topology to understand why this topology is considered a best practice for many organizations.",
          "type": "removed"
        },
        {
          "text": "Hub-spoke is one of the network topologies recommended by the Cloud Adoption Framework. See, Define an Azure network topology to understand why this topology is a best practice for many organizations.",
          "type": "added"
        },
        {
          "text": "![Diagram that shows a hub-spoke virtual network topology in Azure with spoke networks connected through the hub or directly.](./images/hub-spoke.pnglightbox)",
          "type": "removed"
        },
        {
          "text": ":::image type=\"complex\" border=\"false\" source=\"./images/hub-spoke.png\" alt-text=\"Diagram that shows the hub-spoke virtual network topology architecture.\" lightbox=\"./images/hub-spoke.png\":::",
          "type": "added"
        }
      ],
      "message": "edit",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/hub-spoke-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 28,
      "sha": "62f69ddca84eafeb39730eccb93d456d75d595e8",
      "short_sha": "62f69dd",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 54,
        "deletions": 61,
        "total": 115
      },
      "summary": "Architecture Center: adds \"Hub-spoke is one of the network topologies recommended by the Cloud Adoption Framework. See, Define an Azure network topology to understand why this topology is a best practice for many organizations.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/62f69ddca84eafeb39730eccb93d456d75d595e8"
    },
    {
      "author": "jeff-lovette",
      "date": "2026-04-03T19:18:52Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-faqs",
          "meaningful_changes": [
            {
              "text": "Multiple ExpressRoute circuits from different peering locations or up to four connections from the same peering location can be connected to the same virtual network to provide high-availability in the case a single...",
              "type": "removed"
            },
            {
              "text": "All ExpressRoute Circuits include 2 redundant physical links. This design protects against loss of connectivity due to hardware failures, device maintenance, or other causes of downtime. We also recommend multi-site...",
              "type": "added"
            },
            {
              "text": "We recommended when you're using Microsoft peering to access Azure public services like Azure Storage, Azure SQL, or you're using Microsoft peering for Microsoft 365 that you implement multiple circuits in different...",
              "type": "removed"
            }
          ],
          "path": "articles/expressroute/expressroute-faqs.md",
          "status": "modified",
          "title": "Expressroute Faqs"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b536293b936a3d10dbc7eec89ad137c2624ccaab",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Multiple ExpressRoute circuits from different peering locations or up to four connections from the same peering location can be connected to the same virtual network to provide high-availability in the case a single...",
          "type": "removed"
        },
        {
          "text": "All ExpressRoute Circuits include 2 redundant physical links. This design protects against loss of connectivity due to hardware failures, device maintenance, or other causes of downtime. We also recommend multi-site...",
          "type": "added"
        },
        {
          "text": "We recommended when you're using Microsoft peering to access Azure public services like Azure Storage, Azure SQL, or you're using Microsoft peering for Microsoft 365 that you implement multiple circuits in different...",
          "type": "removed"
        },
        {
          "text": "We recommend when you're using Microsoft peering to access Azure public services like Azure Storage, Azure SQL, or you're using Microsoft peering for Microsoft 365 that you implement multiple circuits in different...",
          "type": "added"
        }
      ],
      "message": "Revise redundancy details for ExpressRoute circuits",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-faqs",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "b536293b936a3d10dbc7eec89ad137c2624ccaab",
      "short_sha": "b536293",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "ExpressRoute: adds \"All ExpressRoute Circuits include 2 redundant physical links. This design protects against loss of connectivity due to hardware failures, device maintenance, or other causes of downtime. We also recommend multi-site...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b536293b936a3d10dbc7eec89ad137c2624ccaab"
    },
    {
      "author": "Raghavender Mareddy",
      "date": "2026-04-02T16:42:34Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/cross-connections-api-development",
          "meaningful_changes": [
            {
              "text": "When customer advertises public prefixes over BGP, Microsoft verifies the authority to announce them by validating a signed digital certificate against RIR or IRR records. The prefixes may be owned by the customer, or...",
              "type": "removed"
            },
            {
              "text": "When customer advertises public prefixes over BGP, Microsoft verifies the authority to announce them by validating a signed digital certificate against RIR or IRR records. The prefixes may be owned by the customer, or...",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/cross-connections-api-development.md",
          "status": "modified",
          "title": "Cross Connections API Development"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:926a7cb8f25e005a8077295b8782e88a9dc2d86a",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "When customer advertises public prefixes over BGP, Microsoft verifies the authority to announce them by validating a signed digital certificate against RIR or IRR records. The prefixes may be owned by the customer, or...",
          "type": "removed"
        },
        {
          "text": "When customer advertises public prefixes over BGP, Microsoft verifies the authority to announce them by validating a signed digital certificate against RIR or IRR records. The prefixes may be owned by the customer, or...",
          "type": "added"
        }
      ],
      "message": "Update validation process for public prefixes in BGP",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/cross-connections-api-development",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 28,
      "sha": "926a7cb8f25e005a8077295b8782e88a9dc2d86a",
      "short_sha": "926a7cb",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "ExpressRoute: adds \"When customer advertises public prefixes over BGP, Microsoft verifies the authority to announce them by validating a signed digital certificate against RIR or IRR records. The prefixes may be owned by the customer, or...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/926a7cb8f25e005a8077295b8782e88a9dc2d86a"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-08T15:20:47Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 0,
          "deletions": 56,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/ct-errors",
          "meaningful_changes": [
            {
              "text": "IssueType | Description",
              "type": "removed"
            },
            {
              "text": "AgentStopped | The Network Watcher agent on the source VM has stopped or is unresponsive.",
              "type": "removed"
            },
            {
              "text": "GuestFirewall | Traffic is being blocked by the guest OS firewall on the source or destination VM.",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/ct-errors.md",
          "status": "removed",
          "title": "Ct Errors"
        },
        {
          "additions": 0,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/connection-troubleshoot-overview",
          "meaningful_changes": [],
          "path": "articles/network-watcher/connection-troubleshoot-overview.md",
          "status": "modified",
          "title": "Connection Troubleshoot Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:4b431de8f18c5cf6ebb1380c751eb0401cb61ab2",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "IssueType | Description",
          "type": "removed"
        },
        {
          "text": "AgentStopped | The Network Watcher agent on the source VM has stopped or is unresponsive.",
          "type": "removed"
        },
        {
          "text": "GuestFirewall | Traffic is being blocked by the guest OS firewall on the source or destination VM.",
          "type": "removed"
        },
        {
          "text": "DNSResolution | The DNS lookup for the destination hostname failed on the source agent.",
          "type": "removed"
        },
        {
          "text": "SocketError | The source agent failed to bind or listen on the required local socket (e.g., SocketBindFailed or ListenFailed).",
          "type": "removed"
        },
        {
          "text": "NetworkSecurityRule | An NSG rule is denying inbound or outbound traffic between the source and destination.",
          "type": "removed"
        }
      ],
      "message": "remove temp file",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/ct-errors",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 26,
      "sha": "4b431de8f18c5cf6ebb1380c751eb0401cb61ab2",
      "short_sha": "4b431de",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 57,
        "total": 57
      },
      "summary": "Network Watcher: removes \"NetworkSecurityRule | An NSG rule is denying inbound or outbound traffic between the source and destination.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/4b431de8f18c5cf6ebb1380c751eb0401cb61ab2"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T21:16:45Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
          "meaningful_changes": [
            {
              "text": "Configure the simulation scope",
              "type": "removed"
            },
            {
              "text": "Configure simulation scope",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-rule-impact-analyzer.md",
          "status": "modified",
          "title": "Traffic Analytics Rule Impact Analyzer"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d145941fa4aa84801c9a29250bd6d106bda554b0",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Configure the simulation scope",
          "type": "removed"
        },
        {
          "text": "Configure simulation scope",
          "type": "added"
        }
      ],
      "message": "tweaks",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 26,
      "sha": "d145941fa4aa84801c9a29250bd6d106bda554b0",
      "short_sha": "d145941",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Network Watcher: adds \"Configure simulation scope\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d145941fa4aa84801c9a29250bd6d106bda554b0"
    },
    {
      "author": "Anavi N",
      "date": "2026-04-28T19:05:38Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-transition",
          "meaningful_changes": [
            {
              "text": "[!INCLUDE network-security-perimeter-preview-message]",
              "type": "removed"
            },
            {
              "text": "Operating PaaS resources in Transition (formerly Learning) mode should serve only as a transitional step. Malicious actors may exploit unsecured resources to exfiltrate data. Therefore, it's crucial to transition to a...",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/network-security-perimeter-transition.md",
          "status": "modified",
          "title": "Network Security Perimeter Transition"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e1fd3a3da8b42429d1f89399f458001a1ed4f8bf",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "[!INCLUDE network-security-perimeter-preview-message]",
          "type": "removed"
        },
        {
          "text": "Operating PaaS resources in Transition (formerly Learning) mode should serve only as a transitional step. Malicious actors may exploit unsecured resources to exfiltrate data. Therefore, it's crucial to transition to a...",
          "type": "removed"
        }
      ],
      "message": "Update network-security-perimeter-transition.md",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/network-security-perimeter-transition",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 24,
      "sha": "e1fd3a3da8b42429d1f89399f458001a1ed4f8bf",
      "short_sha": "e1fd3a3",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 6,
        "total": 6
      },
      "summary": "Private Link: removes \"[!INCLUDE network-security-perimeter-preview-message]\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e1fd3a3da8b42429d1f89399f458001a1ed4f8bf"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-22T17:51:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
          "meaningful_changes": [
            {
              "text": "Application Gateway for Containers Service Mesh Extension is currently in PREVIEW.;",
              "type": "removed"
            },
            {
              "text": "See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.",
              "type": "removed"
            },
            {
              "text": "ALB Controller Service Mesh Extension (Preview)",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/for-containers/service-mesh-integration.md",
          "status": "modified",
          "title": "Service Mesh Integration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fff35857c40809b6f553e2bcc0211ebe3c122b00",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Application Gateway for Containers Service Mesh Extension is currently in PREVIEW.;",
          "type": "removed"
        },
        {
          "text": "See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.",
          "type": "removed"
        },
        {
          "text": "ALB Controller Service Mesh Extension (Preview)",
          "type": "removed"
        },
        {
          "text": "ALB Controller Service Mesh Extension",
          "type": "added"
        }
      ],
      "message": "Update service-mesh-integration.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 24,
      "sha": "fff35857c40809b6f553e2bcc0211ebe3c122b00",
      "short_sha": "fff3585",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 5,
        "total": 6
      },
      "summary": "Application Gateway: removes \"See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fff35857c40809b6f553e2bcc0211ebe3c122b00"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-22T16:45:31Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
          "meaningful_changes": [
            {
              "text": "Session affinity requires the Ring Hash load balancing strategy. If session affinity is configured with any other strategy or when slow start is enabled, session affinity will be ignored.",
              "type": "removed"
            },
            {
              "text": "Session affinity requires the Ring Hash load balancing strategy. If session affinity is configured with any other strategy or when slow start is enabled, session affinity will be rejected.",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/load-balancing-strategies.md",
          "status": "modified",
          "title": "Load Balancing Strategies"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:203de42e888a031285f01a215c3ffb27ea0c04d4",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Session affinity requires the Ring Hash load balancing strategy. If session affinity is configured with any other strategy or when slow start is enabled, session affinity will be ignored.",
          "type": "removed"
        },
        {
          "text": "Session affinity requires the Ring Hash load balancing strategy. If session affinity is configured with any other strategy or when slow start is enabled, session affinity will be rejected.",
          "type": "added"
        }
      ],
      "message": "Update load-balancing-strategies.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 24,
      "sha": "203de42e888a031285f01a215c3ffb27ea0c04d4",
      "short_sha": "203de42",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: adds \"Session affinity requires the Ring Hash load balancing strategy. If session affinity is configured with any other strategy or when slow start is enabled, session affinity will be rejected.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/203de42e888a031285f01a215c3ffb27ea0c04d4"
    },
    {
      "author": "Cheryl McGuire",
      "date": "2026-04-13T20:18:23Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 4,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshoot",
              "type": "removed"
            },
            {
              "text": "href: troubleshoot.md",
              "type": "removed"
            },
            {
              "text": "name: Troubleshoot",
              "type": "added"
            }
          ],
          "path": "articles/bastion/TOC.yml",
          "status": "modified",
          "title": "Toc"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-linux-rdp",
          "meaningful_changes": [
            {
              "text": "For troubleshooting tips, see Troubleshooting.",
              "type": "removed"
            },
            {
              "text": "For troubleshooting tips, see Troubleshooting.",
              "type": "added"
            }
          ],
          "path": "articles/bastion/bastion-connect-vm-linux-rdp.md",
          "status": "modified",
          "title": "Bastion Connect Vm Linux Rdp"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-rdp-windows",
          "meaningful_changes": [
            {
              "text": "For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server",
              "type": "removed"
            },
            {
              "text": "For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server",
              "type": "added"
            }
          ],
          "path": "articles/bastion/bastion-connect-vm-rdp-windows.md",
          "status": "modified",
          "title": "Bastion Connect Vm Rdp Windows"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-overview",
          "meaningful_changes": [
            {
              "text": "For information about troubleshooting and frequently asked questions, see the troubleshooting guide and Azure Bastion FAQ.",
              "type": "removed"
            },
            {
              "text": "For information about troubleshooting and frequently asked questions, see the troubleshooting guide and Azure Bastion FAQ.",
              "type": "added"
            }
          ],
          "path": "articles/bastion/bastion-overview.md",
          "status": "modified",
          "title": "Bastion Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ed5012f0ed787378e7b2b00d791e37dc68e22de3",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshoot",
          "type": "removed"
        },
        {
          "text": "href: troubleshoot.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot",
          "type": "added"
        },
        {
          "text": "href: /troubleshoot/azure/bastion/welcome-azure-bastion",
          "type": "added"
        },
        {
          "text": "For troubleshooting tips, see Troubleshooting.",
          "type": "removed"
        },
        {
          "text": "For troubleshooting tips, see Troubleshooting.",
          "type": "added"
        },
        {
          "text": "For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server",
          "type": "removed"
        },
        {
          "text": "For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server",
          "type": "added"
        },
        {
          "text": "For information about troubleshooting and frequently asked questions, see the troubleshooting guide and Azure Bastion FAQ.",
          "type": "removed"
        },
        {
          "text": "For information about troubleshooting and frequently asked questions, see the troubleshooting guide and Azure Bastion FAQ.",
          "type": "added"
        }
      ],
      "message": "update links",
      "paths": [
        "articles/bastion"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-linux-rdp",
      "primary_product": "bastion",
      "primary_product_label": "Bastion",
      "product_labels": [
        "Bastion"
      ],
      "products": [
        "bastion"
      ],
      "reasons": [
        "New support or availability language",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 24,
      "sha": "ed5012f0ed787378e7b2b00d791e37dc68e22de3",
      "short_sha": "ed5012f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-bastion"
      ],
      "sources": [
        "Bastion docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 5,
        "total": 10
      },
      "summary": "Bastion: adds \"For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ed5012f0ed787378e7b2b00d791e37dc68e22de3"
    },
    {
      "author": "Weidong Xu",
      "date": "2026-04-01T02:55:59Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 17,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "@@clientName(CommonTypes.ProxyResource, \"ProxyResourceAutoGenerated\", \"java\");",
              "type": "added"
            },
            {
              "text": "@@clientName(CommonTypes.Resource, \"ResourceAutoGenerated\", \"java\");",
              "type": "added"
            },
            {
              "text": "suppress \"@azure-tools/typespec-azure-core/no-legacy-usage\" \"Legacy decorator required for Python SDK compatibility\"",
              "type": "added"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/client.tsp",
          "status": "modified",
          "title": "Client"
        }
      ],
      "id": "Azure/azure-rest-api-specs:a6de97d4e9caec8fb976c9c4b430fd01a15d2e8e",
      "is_noise": true,
      "kind": "api",
      "kinds": [
        "api"
      ],
      "meaningful_changes": [
        {
          "text": "@@clientName(CommonTypes.ProxyResource, \"ProxyResourceAutoGenerated\", \"java\");",
          "type": "added"
        },
        {
          "text": "@@clientName(CommonTypes.Resource, \"ResourceAutoGenerated\", \"java\");",
          "type": "added"
        },
        {
          "text": "suppress \"@azure-tools/typespec-azure-core/no-legacy-usage\" \"Legacy decorator required for Python SDK compatibility\"",
          "type": "added"
        },
        {
          "text": "@@Azure.ClientGenerator.Core.Legacy.hierarchyBuilding(ChildResource,",
          "type": "added"
        },
        {
          "text": "Microsoft.Network.ProxyResource,",
          "type": "added"
        },
        {
          "text": "suppress \"@azure-tools/typespec-azure-core/no-legacy-usage\" \"Legacy decorator required for Python SDK compatibility\"",
          "type": "added"
        }
      ],
      "message": "mgmt, java, update network client.tsp (#41954)",
      "paths": [
        "specification/network/resource-manager/Microsoft.Network"
      ],
      "primary_docs_url": null,
      "primary_product": "network-api",
      "primary_product_label": "Microsoft.Network API",
      "product_labels": [
        "Microsoft.Network API"
      ],
      "products": [
        "network-api"
      ],
      "reasons": [
        "API generator/client configuration changed, not an obvious service surface change"
      ],
      "repo": "Azure/azure-rest-api-specs",
      "score": 24,
      "sha": "a6de97d4e9caec8fb976c9c4b430fd01a15d2e8e",
      "short_sha": "a6de97d",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-rest-api-specs-network"
      ],
      "sources": [
        "Microsoft.Network REST/ARM specs"
      ],
      "stats": {
        "additions": 17,
        "deletions": 0,
        "total": 17
      },
      "summary": "Microsoft.Network API: adds \"suppress \"@azure-tools/typespec-azure-core/no-legacy-usage\" \"Legacy decorator required for Python SDK compatibility\"\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/Azure/azure-rest-api-specs/commit/a6de97d4e9caec8fb976c9c4b430fd01a15d2e8e"
    },
    {
      "author": "Christoher Fields",
      "date": "2026-04-27T17:35:49Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-wan/about-nva-hub",
          "meaningful_changes": [
            {
              "text": "Europe | France Central, France South, Germany North, Germany West Central, North Europe, Norway East, Norway West, Switzerland North, Switzerland West, UK South, UK West, West Europe, Sweden Central, Italy North...",
              "type": "removed"
            },
            {
              "text": "Europe | France Central, France South, Germany North, Germany West Central, North Europe, Norway East, Norway West, Switzerland North, Switzerland West, UK South, UK West, West Europe, Sweden Central, Italy North...",
              "type": "added"
            }
          ],
          "path": "articles/virtual-wan/about-nva-hub.md",
          "status": "modified",
          "title": "About Nva Hub"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e74d55a7d747ba553cd9a2dce6a2248d5e5216fa",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Europe | France Central, France South, Germany North, Germany West Central, North Europe, Norway East, Norway West, Switzerland North, Switzerland West, UK South, UK West, West Europe, Sweden Central, Italy North...",
          "type": "removed"
        },
        {
          "text": "Europe | France Central, France South, Germany North, Germany West Central, North Europe, Norway East, Norway West, Switzerland North, Switzerland West, UK South, UK West, West Europe, Sweden Central, Italy North...",
          "type": "added"
        }
      ],
      "message": "Update Azure regions for Europe",
      "paths": [
        "articles/virtual-wan"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-wan/about-nva-hub",
      "primary_product": "virtual-wan",
      "primary_product_label": "Virtual WAN",
      "product_labels": [
        "Virtual WAN"
      ],
      "products": [
        "virtual-wan"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "e74d55a7d747ba553cd9a2dce6a2248d5e5216fa",
      "short_sha": "e74d55a",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-wan"
      ],
      "sources": [
        "Virtual WAN docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual WAN: adds \"Europe | France Central, France South, Germany North, Germany West Central, North Europe, Norway East, Norway West, Switzerland North, Switzerland West, UK South, UK West, West Europe, Sweden Central, Italy North...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e74d55a7d747ba553cd9a2dce6a2248d5e5216fa"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-22T17:19:20Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/how-to-configure-subnet-peering",
          "meaningful_changes": [
            {
              "text": "1. The participating subnets must be unique and must belong to unique address spaces.",
              "type": "removed"
            },
            {
              "text": "1. The participating subnets must be unique and must belong to unique address spaces across all peering links.",
              "type": "added"
            },
            {
              "text": "With the subnet peering configuration in the diagram above, virtual network B's subnet 3 (10.2.3.0./24) can't subnet peer over Subnet 1 in virtual network C, because the latter overlaps with subnet 1 in virtual network...",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/how-to-configure-subnet-peering.md",
          "status": "modified",
          "title": "How To Configure Subnet Peering"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:388c19b64b6af522031b6ad9ea511c914ed74761",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1. The participating subnets must be unique and must belong to unique address spaces.",
          "type": "removed"
        },
        {
          "text": "1. The participating subnets must be unique and must belong to unique address spaces across all peering links.",
          "type": "added"
        },
        {
          "text": "With the subnet peering configuration in the diagram above, virtual network B's subnet 3 (10.2.3.0./24) can't subnet peer over Subnet 1 in virtual network C, because the latter overlaps with subnet 1 in virtual network...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314384 from juanandmsft/patch-21",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/how-to-configure-subnet-peering",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "388c19b64b6af522031b6ad9ea511c914ed74761",
      "short_sha": "388c19b",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 1,
        "total": 3
      },
      "summary": "Virtual Network: adds \"With the subnet peering configuration in the diagram above, virtual network B's subnet 3 (10.2.3.0./24) can't subnet peer over Subnet 1 in virtual network C, because the latter overlaps with subnet 1 in virtual network...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/388c19b64b6af522031b6ad9ea511c914ed74761"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-22T16:39:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 70,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/quickstart-create-nat-gateway-v2-templates",
          "meaningful_changes": [
            {
              "text": "Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template) or Bicep template. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for testing NAT...",
              "type": "removed"
            },
            {
              "text": "Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template), Bicep template, or Terraform. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for...",
              "type": "added"
            },
            {
              "text": "An Azure account with an active subscription. Create an account for free.",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/quickstart-create-nat-gateway-v2-templates.md",
          "status": "modified",
          "title": "Quickstart Create Nat Gateway V2 Templates"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:502c363d09a1c297c922352ebe79974a76753eb5",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template) or Bicep template. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for testing NAT...",
          "type": "removed"
        },
        {
          "text": "Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template), Bicep template, or Terraform. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for...",
          "type": "added"
        },
        {
          "text": "An Azure account with an active subscription. Create an account for free.",
          "type": "added"
        },
        {
          "text": "Install and configure Terraform",
          "type": "added"
        },
        {
          "text": "The sample code for this article is located in the Azure Terraform GitHub repo. You can view the log file containing the test results from current and previous versions of Terraform. See more articles and sample code...",
          "type": "added"
        },
        {
          "text": "The following Azure resources are defined in the Terraform configuration:",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314502 from asudbring/us568272-nat-terraform",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/quickstart-create-nat-gateway-v2-templates",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "502c363d09a1c297c922352ebe79974a76753eb5",
      "short_sha": "502c363",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 70,
        "deletions": 4,
        "total": 74
      },
      "summary": "NAT Gateway: adds \"Get started with NAT Gateway V2 by using an Azure Resource Manager template (ARM template), Bicep template, or Terraform. The templates deploy a NAT gateway, virtual network, subnet, and Ubuntu virtual machine for...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/502c363d09a1c297c922352ebe79974a76753eb5"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-22T16:14:41Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 34,
          "deletions": 11,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
          "meaningful_changes": [
            {
              "text": "Strategy compatibility",
              "type": "added"
            },
            {
              "text": "The following table summarizes the compatibility between load balancing strategies and other features:",
              "type": "added"
            },
            {
              "text": "Strategy | Slow Start | Session Affinity | ORCA Load Reports",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/load-balancing-strategies.md",
          "status": "modified",
          "title": "Load Balancing Strategies"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:56d8af48953a4085cca9c6acaa6fbae8698c3537",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Strategy compatibility",
          "type": "added"
        },
        {
          "text": "The following table summarizes the compatibility between load balancing strategies and other features:",
          "type": "added"
        },
        {
          "text": "Strategy | Slow Start | Session Affinity | ORCA Load Reports",
          "type": "added"
        },
        {
          "text": "Round Robin / Weighted Round Robin | Yes | No | No",
          "type": "added"
        },
        {
          "text": "Least Request | Yes | No | No",
          "type": "added"
        },
        {
          "text": "Ring Hash | No | Yes | No",
          "type": "added"
        }
      ],
      "message": "Enhance load balancing strategies documentation",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/load-balancing-strategies",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "56d8af48953a4085cca9c6acaa6fbae8698c3537",
      "short_sha": "56d8af4",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 34,
        "deletions": 11,
        "total": 45
      },
      "summary": "Application Gateway: adds \"The following table summarizes the compatibility between load balancing strategies and other features:\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/56d8af48953a4085cca9c6acaa6fbae8698c3537"
    },
    {
      "author": "Cheryl McGuire",
      "date": "2026-04-15T19:58:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 9,
          "deletions": 9,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/whats-new",
          "meaningful_changes": [
            {
              "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
              "type": "removed"
            },
            {
              "text": "Basic SKU public IP address - For Basic SKU Gateway | - IP address unchanged.; - No connectivity interruption. | - Available March'2026 ; | - Removing Basic public IP reference from VNG gateway. FAQ | Remove Basic...",
              "type": "removed"
            },
            {
              "text": "Non-AZ gateway SKU retirement |- New AZ SKUs pricing applied since Jan 2025.; - No downtime expected.; - New Non-AZ SKU creates blocked in 2025. |- Jan 2025: New pricing activated.; - May 2025 - Sep 2026: Non-AZ SKU...",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/whats-new.md",
          "status": "modified",
          "title": "Whats New"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:84596aa1128f445da9a9c59405d5eb1741117087",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU Gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Active-Passive gateways generally...",
          "type": "removed"
        },
        {
          "text": "Basic SKU public IP address - For Basic SKU Gateway | - IP address unchanged.; - No connectivity interruption. | - Available March'2026 ; | - Removing Basic public IP reference from VNG gateway. FAQ | Remove Basic...",
          "type": "removed"
        },
        {
          "text": "Non-AZ gateway SKU retirement |- New AZ SKUs pricing applied since Jan 2025.; - No downtime expected.; - New Non-AZ SKU creates blocked in 2025. |- Jan 2025: New pricing activated.; - May 2025 - Sep 2026: Non-AZ SKU...",
          "type": "removed"
        },
        {
          "text": "Legacy SKU retirement: Standard and High Performance SKUs.|- New creations blocked in 2024.; - Up to 10 minutes of downtime.|- May 2025 - Jun 2026: Migration.; - Jun 2026: Legacy SKU retirement.| - Nov 2025 Migrate...",
          "type": "removed"
        },
        {
          "text": "Classic VPN gateways retired|- Classic VPN gateways will be decommissioned.|- Aug 2024: Retirement; - By Aug 2025: Decommission|- Migrate your classic VPN gateway to an Azure Resource Manager gateway|VPN Gateway...",
          "type": "removed"
        },
        {
          "text": "Basic SKU public IP address migration - For all VPN SKUs except Basic SKU gateway |- New pricing changes.; - Up to 10 min downtime during migration.; - IP address un-changed.|- Jan 2026: General Availability for...",
          "type": "added"
        }
      ],
      "message": "Update formatting",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/whats-new",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "84596aa1128f445da9a9c59405d5eb1741117087",
      "short_sha": "84596aa",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 9,
        "deletions": 9,
        "total": 18
      },
      "summary": "VPN Gateway: removes \"Legacy SKU retirement: Standard and High Performance SKUs.|- New creations blocked in 2024.; - Up to 10 minutes of downtime.|- May 2025 - Jun 2026: Migration.; - Jun 2026: Legacy SKU retirement.| - Nov 2025 Migrate...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/84596aa1128f445da9a9c59405d5eb1741117087"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-14T18:49:53Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 11,
          "deletions": 14,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/setup-dpdk-mana",
          "meaningful_changes": [
            {
              "text": "Utilizing DPDK on MANA hardware requires the Linux kernel 6.2 or later or a backport of the Ethernet and InfiniBand drivers from the latest Linux kernel. It also requires specific versions of DPDK and user-space drivers.",
              "type": "removed"
            },
            {
              "text": "Running DPDK on MANA hardware requires the Linux kernel 6.14 or later or a backport of the Ethernet and InfiniBand drivers from the Linux kernel 6.14 or later. It also requires specific versions of DPDK and user-space...",
              "type": "added"
            },
            {
              "text": "1. Linux kernel Ethernet driver (5.15 kernel and later)",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/setup-dpdk-mana.md",
          "status": "modified",
          "title": "Setup Dpdk Mana"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2b24ca3f4a0907ed56cc197ee2db177ae118a7db",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Utilizing DPDK on MANA hardware requires the Linux kernel 6.2 or later or a backport of the Ethernet and InfiniBand drivers from the latest Linux kernel. It also requires specific versions of DPDK and user-space drivers.",
          "type": "removed"
        },
        {
          "text": "Running DPDK on MANA hardware requires the Linux kernel 6.14 or later or a backport of the Ethernet and InfiniBand drivers from the Linux kernel 6.14 or later. It also requires specific versions of DPDK and user-space...",
          "type": "added"
        },
        {
          "text": "1. Linux kernel Ethernet driver (5.15 kernel and later)",
          "type": "removed"
        },
        {
          "text": "1. Linux kernel InfiniBand driver (6.2 kernel and later)",
          "type": "removed"
        },
        {
          "text": "1. DPDK MANA poll-mode driver (DPDK 22.11 and later)",
          "type": "removed"
        },
        {
          "text": "1. Libmana user-space drivers (rdma-core v44 and later)",
          "type": "removed"
        }
      ],
      "message": "Merge pull request #314104 from mattmcinnes/patch-589232",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/setup-dpdk-mana",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "2b24ca3f4a0907ed56cc197ee2db177ae118a7db",
      "short_sha": "2b24ca3",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 11,
        "deletions": 14,
        "total": 25
      },
      "summary": "Virtual Network: adds \"Running DPDK on MANA hardware requires the Linux kernel 6.14 or later or a backport of the Ethernet and InfiniBand drivers from the Linux kernel 6.14 or later. It also requires specific versions of DPDK and user-space...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2b24ca3f4a0907ed56cc197ee2db177ae118a7db"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-13T14:42:51Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "You can manually revalidate domain ownership for renewal by:",
              "type": "removed"
            },
            {
              "text": "You can manually revalidate domain ownership for renewal by:",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e403533631586d2bea494f0984b6a714d440e5af",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "You can manually revalidate domain ownership for renewal by:",
          "type": "removed"
        },
        {
          "text": "You can manually revalidate domain ownership for renewal by:",
          "type": "added"
        }
      ],
      "message": "fix indentation",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "e403533631586d2bea494f0984b6a714d440e5af",
      "short_sha": "e403533",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Front Door: adds \"You can manually revalidate domain ownership for renewal by:\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e403533631586d2bea494f0984b6a714d440e5af"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:58:28Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 3,
      "files": [
        {
          "additions": 0,
          "deletions": 91,
          "docs_url": "https://learn.microsoft.com/azure/traffic-manager/traffic-manager-troubleshooting-degraded",
          "meaningful_changes": [
            {
              "text": "Troubleshooting degraded state on Azure Traffic Manager",
              "type": "removed"
            },
            {
              "text": "This article describes how to troubleshoot an Azure Traffic Manager profile that is showing a degraded status. As a first step in troubleshooting an Azure Traffic Manager degraded state is to enable logging. Refer to...",
              "type": "removed"
            },
            {
              "text": "!degraded endpoint status",
              "type": "removed"
            }
          ],
          "path": "articles/traffic-manager/traffic-manager-troubleshooting-degraded.md",
          "status": "removed",
          "title": "Traffic Manager Troubleshooting Degraded"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/traffic-manager/media/traffic-manager-troubleshooting-degraded/traffic-manager-degradedifonedegraded.png",
          "status": "removed",
          "title": "Traffic Manager Degradedifonedegraded"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/traffic-manager/media/traffic-manager-troubleshooting-degraded/traffic-manager-inactive.png",
          "status": "removed",
          "title": "Traffic Manager Inactive"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:7b09d2ecf41a0bb3dc3e0fc532f5e57df0f42821",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Troubleshooting degraded state on Azure Traffic Manager",
          "type": "removed"
        },
        {
          "text": "This article describes how to troubleshoot an Azure Traffic Manager profile that is showing a degraded status. As a first step in troubleshooting an Azure Traffic Manager degraded state is to enable logging. Refer to...",
          "type": "removed"
        },
        {
          "text": "!degraded endpoint status",
          "type": "removed"
        },
        {
          "text": "If the health of your Traffic Manager displays an Inactive status, then both end points may be Disabled:",
          "type": "removed"
        },
        {
          "text": "!Inactive Traffic Manager status",
          "type": "removed"
        },
        {
          "text": "Understanding Traffic Manager probes",
          "type": "removed"
        }
      ],
      "message": "Remove Traffic Manager troubleshoot article and media for redirect to SupportArticles",
      "paths": [
        "articles/traffic-manager"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/traffic-manager/traffic-manager-troubleshooting-degraded",
      "primary_product": "traffic-manager",
      "primary_product_label": "Traffic Manager",
      "product_labels": [
        "Traffic Manager"
      ],
      "products": [
        "traffic-manager"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "7b09d2ecf41a0bb3dc3e0fc532f5e57df0f42821",
      "short_sha": "7b09d2e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-traffic-manager"
      ],
      "sources": [
        "Traffic Manager docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 91,
        "total": 91
      },
      "summary": "Traffic Manager: removes \"This article describes how to troubleshoot an Azure Traffic Manager profile that is showing a degraded status. As a first step in troubleshooting an Azure Traffic Manager degraded state is to enable logging. Refer to...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/7b09d2ecf41a0bb3dc3e0fc532f5e57df0f42821"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:56:28Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 0,
          "deletions": 137,
          "docs_url": "https://learn.microsoft.com/azure/private-link/troubleshoot-private-endpoint-connectivity",
          "meaningful_changes": [
            {
              "text": "Troubleshoot Azure Private Endpoint connectivity problems",
              "type": "removed"
            },
            {
              "text": "This article provides step-by-step guidance to validate and diagnose your Azure Private Endpoint connectivity setup.",
              "type": "removed"
            },
            {
              "text": "Azure Private Endpoint is a network interface that connects you privately and securely to a private link service. This solution helps you secure your workloads in Azure by providing private connectivity to your Azure...",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/troubleshoot-private-endpoint-connectivity.md",
          "status": "removed",
          "title": "Troubleshoot Private Endpoint Connectivity"
        },
        {
          "additions": 0,
          "deletions": 113,
          "docs_url": "https://learn.microsoft.com/azure/private-link/troubleshoot-private-link-connectivity",
          "meaningful_changes": [
            {
              "text": "Troubleshoot Azure Private Link Service connectivity problems",
              "type": "removed"
            },
            {
              "text": "This article provides step-by-step guidance to validate and diagnose connectivity for your Azure Private Link setup.",
              "type": "removed"
            },
            {
              "text": "With Azure Private Link, you can access Azure platform as a service (PaaS) services and Azure hosted customer or partner services over a private endpoint in your virtual network. Traffic between your virtual network...",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/troubleshoot-private-link-connectivity.md",
          "status": "removed",
          "title": "Troubleshoot Private Link Connectivity"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b7371bb580a15b5fe84352076d44ca33f4dfdd41",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Troubleshoot Azure Private Endpoint connectivity problems",
          "type": "removed"
        },
        {
          "text": "This article provides step-by-step guidance to validate and diagnose your Azure Private Endpoint connectivity setup.",
          "type": "removed"
        },
        {
          "text": "Azure Private Endpoint is a network interface that connects you privately and securely to a private link service. This solution helps you secure your workloads in Azure by providing private connectivity to your Azure...",
          "type": "removed"
        },
        {
          "text": "Here are the connectivity scenarios that are available with Private Endpoint:",
          "type": "removed"
        },
        {
          "text": "Virtual network from the same region",
          "type": "removed"
        },
        {
          "text": "Regionally peered virtual networks",
          "type": "removed"
        },
        {
          "text": "Troubleshoot Azure Private Link Service connectivity problems",
          "type": "removed"
        },
        {
          "text": "This article provides step-by-step guidance to validate and diagnose connectivity for your Azure Private Link setup.",
          "type": "removed"
        },
        {
          "text": "With Azure Private Link, you can access Azure platform as a service (PaaS) services and Azure hosted customer or partner services over a private endpoint in your virtual network. Traffic between your virtual network...",
          "type": "removed"
        },
        {
          "text": "You can enable your service that runs behind the Standard tier of Azure Load Balancer for Private Link access. Consumers of your service can create a private endpoint inside their virtual network and map it to this...",
          "type": "removed"
        }
      ],
      "message": "Remove Private Link troubleshoot articles for redirect to SupportArticles",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/troubleshoot-private-endpoint-connectivity",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "b7371bb580a15b5fe84352076d44ca33f4dfdd41",
      "short_sha": "b7371bb",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 250,
        "total": 250
      },
      "summary": "Private Link: removes \"With Azure Private Link, you can access Azure platform as a service (PaaS) services and Azure hosted customer or partner services over a private endpoint in your virtual network. Traffic between your virtual network...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b7371bb580a15b5fe84352076d44ca33f4dfdd41"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:53:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 82,
          "docs_url": "https://learn.microsoft.com/azure/dns/dns-troubleshoot",
          "meaningful_changes": [
            {
              "text": "Azure DNS troubleshooting guide",
              "type": "removed"
            },
            {
              "text": "This article provides troubleshooting information for common Azure DNS questions.",
              "type": "removed"
            },
            {
              "text": "If these steps don't resolve your issue, you can also search for or post your issue on our Microsoft Q&A question page for community support. Or, you can open an Azure support request.",
              "type": "removed"
            }
          ],
          "path": "articles/dns/dns-troubleshoot.md",
          "status": "removed",
          "title": "Dns Troubleshoot"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:edc76ee0a9540a59aa40a3b2b3021f3be0f06cff",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure DNS troubleshooting guide",
          "type": "removed"
        },
        {
          "text": "This article provides troubleshooting information for common Azure DNS questions.",
          "type": "removed"
        },
        {
          "text": "If these steps don't resolve your issue, you can also search for or post your issue on our Microsoft Q&A question page for community support. Or, you can open an Azure support request.",
          "type": "removed"
        },
        {
          "text": "I can't create a DNS zone",
          "type": "removed"
        },
        {
          "text": "To resolve common issues, try one or more of the following steps:",
          "type": "removed"
        },
        {
          "text": "1. Review the Azure DNS audit logs to determine the failure reason.",
          "type": "removed"
        }
      ],
      "message": "Remove dns-troubleshoot.md for redirect to SupportArticles",
      "paths": [
        "articles/dns"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/dns/dns-troubleshoot",
      "primary_product": "azure-dns",
      "primary_product_label": "Azure DNS",
      "product_labels": [
        "Azure DNS"
      ],
      "products": [
        "azure-dns"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "edc76ee0a9540a59aa40a3b2b3021f3be0f06cff",
      "short_sha": "edc76ee",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-dns"
      ],
      "sources": [
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 82,
        "total": 82
      },
      "summary": "Azure DNS: removes \"If these steps don't resolve your issue, you can also search for or post your issue on our Microsoft Q&A question page for community support. Or, you can open an Azure support request.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/edc76ee0a9540a59aa40a3b2b3021f3be0f06cff"
    },
    {
      "author": "juanandmsft",
      "date": "2026-04-07T09:56:09Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/how-to-configure-subnet-peering",
          "meaningful_changes": [
            {
              "text": "1. The participating subnets must be unique and must belong to unique address spaces.",
              "type": "removed"
            },
            {
              "text": "1. The participating subnets must be unique and must belong to unique address spaces across all peering links.",
              "type": "added"
            },
            {
              "text": "With the subnet peering configuration in the diagram above, virtual network B's subnet 3 (10.2.3.0./24) can't subnet peer over Subnet 1 in virtual network C, because the latter overlaps with subnet 1 in virtual network...",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/how-to-configure-subnet-peering.md",
          "status": "modified",
          "title": "How To Configure Subnet Peering"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f748b58241fd45cfdc1256d4974cfd14283b9a10",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1. The participating subnets must be unique and must belong to unique address spaces.",
          "type": "removed"
        },
        {
          "text": "1. The participating subnets must be unique and must belong to unique address spaces across all peering links.",
          "type": "added"
        },
        {
          "text": "With the subnet peering configuration in the diagram above, virtual network B's subnet 3 (10.2.3.0./24) can't subnet peer over Subnet 1 in virtual network C, because the latter overlaps with subnet 1 in virtual network...",
          "type": "added"
        }
      ],
      "message": "Update subnet peering requirements for clarity",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/how-to-configure-subnet-peering",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "f748b58241fd45cfdc1256d4974cfd14283b9a10",
      "short_sha": "f748b58",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 1,
        "total": 3
      },
      "summary": "Virtual Network: adds \"With the subnet peering configuration in the diagram above, virtual network B's subnet 3 (10.2.3.0./24) can't subnet peer over Subnet 1 in virtual network C, because the latter overlaps with subnet 1 in virtual network...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f748b58241fd45cfdc1256d4974cfd14283b9a10"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-06T17:35:41Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-networks-faq",
          "meaningful_changes": [
            {
              "text": "Azure Cache for Redis",
              "type": "removed"
            },
            {
              "text": "Azure Managed Redis",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/virtual-networks-faq.md",
          "status": "modified",
          "title": "Virtual Networks Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:8a1512d3b8afcd6ce04b70d557a0ae89cfe8254d",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Cache for Redis",
          "type": "removed"
        },
        {
          "text": "Azure Managed Redis",
          "type": "added"
        }
      ],
      "message": "Merge pull request #311460 from v-albemi/azr-14",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-networks-faq",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "8a1512d3b8afcd6ce04b70d557a0ae89cfe8254d",
      "short_sha": "8a1512d",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"Azure Managed Redis\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/8a1512d3b8afcd6ce04b70d557a0ae89cfe8254d"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-02T17:13:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
              "type": "removed"
            },
            {
              "text": "For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Network Virtual Appliance Opt Out"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:89132f4532d2375571a0685487401f995fc2d33f",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
          "type": "removed"
        },
        {
          "text": "For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.",
          "type": "added"
        }
      ],
      "message": "Update MANA announcement link for clarity",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "89132f4532d2375571a0685487401f995fc2d33f",
      "short_sha": "89132f4",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/89132f4532d2375571a0685487401f995fc2d33f"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-02T17:12:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
              "type": "removed"
            },
            {
              "text": "For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-existing-sizes.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Existing Sizes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:75f78dcc0679e67ce39309ce3d66ac1197cbb21a",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
          "type": "removed"
        },
        {
          "text": "For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.",
          "type": "added"
        }
      ],
      "message": "Revise MANA announcement link for VM sizes",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "75f78dcc0679e67ce39309ce3d66ac1197cbb21a",
      "short_sha": "75f78dc",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/75f78dcc0679e67ce39309ce3d66ac1197cbb21a"
    },
    {
      "author": "Raghavender Mareddy",
      "date": "2026-04-02T16:29:19Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 89,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/cross-connections-api-development",
          "meaningful_changes": [
            {
              "text": "7. (Optional) PUT expressRouteCrossConnection to validate Microsoft Peering advertised prefixes If you allow customers to advertise your public IP addresses over Microsoft Peering, you can configure the signature to...",
              "type": "removed"
            },
            {
              "text": "PUT /subscriptions/ /resourceGroups/CrossConnection-EUAPTest/providers/Microsoft.Network/expressRouteCrossConnections/bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f/peerings/MicrosoftPeering?api-version=2018-02-01 HTTP/1.1",
              "type": "removed"
            },
            {
              "text": "Host: management.azure.com",
              "type": "removed"
            }
          ],
          "path": "articles/expressroute/cross-connections-api-development.md",
          "status": "modified",
          "title": "Cross Connections API Development"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:447910bb2c199b7b592f6dd65775e96db4699e33",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "7. (Optional) PUT expressRouteCrossConnection to validate Microsoft Peering advertised prefixes If you allow customers to advertise your public IP addresses over Microsoft Peering, you can configure the signature to...",
          "type": "removed"
        },
        {
          "text": "PUT /subscriptions/ /resourceGroups/CrossConnection-EUAPTest/providers/Microsoft.Network/expressRouteCrossConnections/bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f/peerings/MicrosoftPeering?api-version=2018-02-01 HTTP/1.1",
          "type": "removed"
        },
        {
          "text": "Host: management.azure.com",
          "type": "removed"
        },
        {
          "text": "Authorization: Bearer eyJ0eXAiOiJKV...",
          "type": "removed"
        },
        {
          "text": "User-Agent: ARMClient/1.2.0.0",
          "type": "removed"
        },
        {
          "text": "Accept: application/json",
          "type": "removed"
        }
      ],
      "message": "Update date and remove optional PUT request details",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/cross-connections-api-development",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "447910bb2c199b7b592f6dd65775e96db4699e33",
      "short_sha": "447910b",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 89,
        "total": 91
      },
      "summary": "ExpressRoute: removes \"7. (Optional) PUT expressRouteCrossConnection to validate Microsoft Peering advertised prefixes If you allow customers to advertise your public IP addresses over Microsoft Peering, you can configure the signature to...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/447910bb2c199b7b592f6dd65775e96db4699e33"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T23:02:07Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "removed"
            },
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-existing-sizes.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Existing Sizes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:4c6f29d58688cebe7dac599a8353c41ea534454b",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "removed"
        },
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
          "type": "added"
        }
      ],
      "message": "Revise MANA rollout information in documentation",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "4c6f29d58688cebe7dac599a8353c41ea534454b",
      "short_sha": "4c6f29d",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines, see the MANA announcement.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/4c6f29d58688cebe7dac599a8353c41ea534454b"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T23:01:53Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
          "meaningful_changes": [
            {
              "text": "For the latest MANA rollout timelines and announcements, see the [MANA announcement].",
              "type": "removed"
            },
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-overview.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b8fb9e9892f07a6086fd46a712569f926a13de1c",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest MANA rollout timelines and announcements, see the [MANA announcement].",
          "type": "removed"
        },
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
          "type": "added"
        }
      ],
      "message": "Improve MANA announcement link in documentation",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "b8fb9e9892f07a6086fd46a712569f926a13de1c",
      "short_sha": "b8fb9e9",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines, see the MANA announcement.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b8fb9e9892f07a6086fd46a712569f926a13de1c"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T23:01:43Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "removed"
            },
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Network Virtual Appliance Opt Out"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:874f7dc2749e3557d56517fe4da712e527d43ee8",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "removed"
        },
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
          "type": "added"
        }
      ],
      "message": "Clarify MANA rollout information in NVA documentation",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-network-virtual-appliance-opt-out",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "874f7dc2749e3557d56517fe4da712e527d43ee8",
      "short_sha": "874f7dc",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines, see the MANA announcement.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/874f7dc2749e3557d56517fe4da712e527d43ee8"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T22:57:07Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
          "meaningful_changes": [
            {
              "text": "Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...",
              "type": "added"
            },
            {
              "text": "Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-overview.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:177f9845a30b3afca6709f049f3580e46c92808d",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...",
          "type": "added"
        },
        {
          "text": "Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...",
          "type": "removed"
        }
      ],
      "message": "Eliminate duplicate MANA overview content",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "177f9845a30b3afca6709f049f3580e46c92808d",
      "short_sha": "177f984",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Virtual Network: adds \"Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/177f9845a30b3afca6709f049f3580e46c92808d"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T22:29:59Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
          "meaningful_changes": [
            {
              "text": "Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...",
              "type": "removed"
            },
            {
              "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
              "type": "removed"
            },
            {
              "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "removed"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-overview.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fad173e8a3a3ade55538cbedfd113c4870ee95b5",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...",
          "type": "removed"
        },
        {
          "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
          "type": "removed"
        },
        {
          "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "removed"
        },
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "added"
        },
        {
          "text": "Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...",
          "type": "added"
        }
      ],
      "message": "Simplify MANA overview by removing duplicate note",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "fad173e8a3a3ade55538cbedfd113c4870ee95b5",
      "short_sha": "fad173e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 5,
        "total": 8
      },
      "summary": "Virtual Network: adds \"Learn how to use the Microsoft Azure Network Adapter (MANA) component of Azure Boost to improve the performance and availability of virtual machines (VMs) in Azure. MANA is a next-generation network interface that...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fad173e8a3a3ade55538cbedfd113c4870ee95b5"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T22:12:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
              "type": "removed"
            },
            {
              "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "removed"
            },
            {
              "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-existing-sizes.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Existing Sizes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ed26ce25b823f2fd54d5adc019df8f66836463b4",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
          "type": "removed"
        },
        {
          "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "removed"
        },
        {
          "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
          "type": "added"
        }
      ],
      "message": "Change note to important note for MANA information",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-existing-sizes",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "ed26ce25b823f2fd54d5adc019df8f66836463b4",
      "short_sha": "ed26ce2",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 3,
        "total": 5
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ed26ce25b823f2fd54d5adc019df8f66836463b4"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-01T22:01:10Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/private-link",
          "meaningful_changes": [
            {
              "text": "If your client application connects to App Gateway via a private IP, requires an idle timeout greater than 4 minutes, and the client application does not send TCP keep-alive packets, contact...",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/private-link.md",
          "status": "modified",
          "title": "Private Link"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:3a5d888dfd23f3461f6b9527f161c615c305b408",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If your client application connects to App Gateway via a private IP, requires an idle timeout greater than 4 minutes, and the client application does not send TCP keep-alive packets, contact...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314091 from darshils2001/keep-alive-update",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/private-link",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "3a5d888dfd23f3461f6b9527f161c615c305b408",
      "short_sha": "3a5d888",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 0,
        "total": 3
      },
      "summary": "Application Gateway: adds \"If your client application connects to App Gateway via a private IP, requires an idle timeout greater than 4 minutes, and the client application does not send TCP keep-alive packets, contact...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/3a5d888dfd23f3461f6b9527f161c615c305b408"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T21:59:46Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
              "type": "added"
            },
            {
              "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-overview.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:8ff6afbc6013b2f38b3d4b13e52b85ea5a3ba8d5",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.",
          "type": "added"
        },
        {
          "text": "This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "added"
        }
      ],
      "message": "Update MANA overview with rollout information",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "8ff6afbc6013b2f38b3d4b13e52b85ea5a3ba8d5",
      "short_sha": "8ff6afb",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 0,
        "total": 5
      },
      "summary": "Virtual Network: adds \"For the latest information on MANA rollout timelines and regional availability, see the official update in the MANA announcement.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/8ff6afbc6013b2f38b3d4b13e52b85ea5a3ba8d5"
    },
    {
      "author": "Shilpa Sharma",
      "date": "2026-03-30T21:41:03Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 8,
      "files": [
        {
          "additions": 205,
          "deletions": 183,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-firewall-basic-portal-policy",
          "meaningful_changes": [
            {
              "text": "Deploy and configure Azure Firewall Basic and policy using the Azure portal",
              "type": "removed"
            },
            {
              "text": "Deploy and configure Azure Firewall Basic and policy by using the Azure portal",
              "type": "added"
            },
            {
              "text": "Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. It is...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-firewall-basic-portal-policy.md",
          "status": "modified",
          "title": "Deploy Firewall Basic Portal Policy"
        },
        {
          "additions": 192,
          "deletions": 110,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-ps-policy",
          "meaningful_changes": [
            {
              "text": "Deploy and configure Azure Firewall policy using Azure PowerShell",
              "type": "removed"
            },
            {
              "text": "Deploy and configure Azure Firewall policy by using Azure PowerShell",
              "type": "added"
            },
            {
              "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-ps-policy.md",
          "status": "modified",
          "title": "Deploy Ps Policy"
        },
        {
          "additions": 153,
          "deletions": 97,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-ps",
          "meaningful_changes": [
            {
              "text": "Deploy and configure Azure Firewall using Azure PowerShell",
              "type": "removed"
            },
            {
              "text": "Deploy and configure Azure Firewall by using Azure PowerShell",
              "type": "added"
            },
            {
              "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-ps.md",
          "status": "modified",
          "title": "Deploy Ps"
        },
        {
          "additions": 44,
          "deletions": 53,
          "docs_url": "https://learn.microsoft.com/azure/firewall/premium-deploy",
          "meaningful_changes": [
            {
              "text": "Azure Firewall Premium is a next generation firewall with capabilities that are required for highly sensitive and regulated environments. It includes the following features:",
              "type": "removed"
            },
            {
              "text": "Azure Firewall Premium is a next-generation firewall with capabilities that are required for highly sensitive and regulated environments. It includes the following features:",
              "type": "added"
            },
            {
              "text": "IDPS - A network intrusion detection and prevention system (IDPS) allows you to monitor network activities for malicious activity, log information about this activity, report it, and optionally attempt to block it.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/premium-deploy.md",
          "status": "modified",
          "title": "Premium Deploy"
        },
        {
          "additions": 38,
          "deletions": 38,
          "docs_url": "https://learn.microsoft.com/azure/firewall/sql-fqdn-filtering",
          "meaningful_changes": [
            {
              "text": "You can now configure Azure Firewall application rules with SQL FQDNs. This allows you to limit access from your virtual networks to only the specified SQL server instances.",
              "type": "removed"
            },
            {
              "text": "You can configure Azure Firewall application rules with SQL FQDNs. This configuration limits access from your virtual networks to only the specified SQL server instances.",
              "type": "added"
            },
            {
              "text": "With SQL FQDNs, you can filter traffic:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/sql-fqdn-filtering.md",
          "status": "modified",
          "title": "Sql Fqdn Filtering"
        },
        {
          "additions": 34,
          "deletions": 34,
          "docs_url": "https://learn.microsoft.com/azure/firewall/ftp-support",
          "meaningful_changes": [
            {
              "text": "Client/server location - Internet or intranet",
              "type": "removed"
            },
            {
              "text": "Flow direction - inbound or outbound.",
              "type": "removed"
            },
            {
              "text": "Client and server location - Internet or intranet",
              "type": "added"
            }
          ],
          "path": "articles/firewall/ftp-support.md",
          "status": "modified",
          "title": "Ftp Support"
        },
        {
          "additions": 19,
          "deletions": 19,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-multi-public-ip-powershell",
          "meaningful_changes": [
            {
              "text": "Deploy an Azure Firewall with multiple public IP addresses using Azure PowerShell",
              "type": "removed"
            },
            {
              "text": "Deploy an Azure Firewall with multiple public IP addresses by using Azure PowerShell",
              "type": "added"
            },
            {
              "text": "SNAT - Additional ports are available for outbound SNAT connections, reducing the potential for SNAT port exhaustion. Azure Firewall randomly selects the first source public IP address to use for a connection and...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-multi-public-ip-powershell.md",
          "status": "modified",
          "title": "Deploy Multi Public Ip Powershell"
        },
        {
          "additions": 12,
          "deletions": 13,
          "docs_url": "https://learn.microsoft.com/azure/firewall/create-ip-group",
          "meaningful_changes": [
            {
              "text": "IP Groups allow you to group and manage IP addresses for Azure Firewall rules. They can have a single IP address, multiple IP addresses, or one or more IP address ranges.",
              "type": "removed"
            },
            {
              "text": "IP Groups help you group and manage IP addresses for Azure Firewall rules. They can include a single IP address, multiple IP addresses, or one or more IP address ranges.",
              "type": "added"
            },
            {
              "text": "There are two ways to enter IP addresses:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/create-ip-group.md",
          "status": "modified",
          "title": "Create Ip Group"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f361ec7352bf53f5366e4ad7d53d57c33c289b0e",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "IP Groups allow you to group and manage IP addresses for Azure Firewall rules. They can have a single IP address, multiple IP addresses, or one or more IP address ranges.",
          "type": "removed"
        },
        {
          "text": "IP Groups help you group and manage IP addresses for Azure Firewall rules. They can include a single IP address, multiple IP addresses, or one or more IP address ranges.",
          "type": "added"
        },
        {
          "text": "There are two ways to enter IP addresses:",
          "type": "removed"
        },
        {
          "text": "You can manually enter them",
          "type": "removed"
        },
        {
          "text": "You can import them from a file",
          "type": "removed"
        },
        {
          "text": "Enter IP addresses in one of two ways:",
          "type": "added"
        },
        {
          "text": "Deploy and configure Azure Firewall Basic and policy using the Azure portal",
          "type": "removed"
        },
        {
          "text": "Deploy and configure Azure Firewall Basic and policy by using the Azure portal",
          "type": "added"
        },
        {
          "text": "Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. It is...",
          "type": "removed"
        },
        {
          "text": "Azure Firewall Basic provides the essential protection SMB customers need at an affordable price point. This solution is recommended for SMB customer environments with less than 250 Mbps throughput requirements. Deploy...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313839 from duongau/firewall-freshness-review-564969-P2a",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/deploy-firewall-basic-portal-policy",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "f361ec7352bf53f5366e4ad7d53d57c33c289b0e",
      "short_sha": "f361ec7",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 697,
        "deletions": 547,
        "total": 1244
      },
      "summary": "Azure Firewall: adds \"IP Groups help you group and manage IP addresses for Azure Firewall rules. They can include a single IP address, multiple IP addresses, or one or more IP address ranges.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f361ec7352bf53f5366e4ad7d53d57c33c289b0e"
    },
    {
      "author": "Stacy Chambers",
      "date": "2026-03-30T21:37:50Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 25,
      "files": [
        {
          "additions": 8,
          "deletions": 12,
          "docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-export-dns",
          "meaningful_changes": [
            {
              "text": "A private endpoint in Azure requires DNS records for name resolution of the endpoint. The DNS record resolves the private IP address of the endpoint for the configured resource. To export the DNS records of the...",
              "type": "removed"
            },
            {
              "text": "A private endpoint in Azure requires DNS records for name resolution of the endpoint. The DNS record resolves the private IP address of the endpoint for the configured resource. To export the DNS records of the...",
              "type": "added"
            },
            {
              "text": "A private endpoint configured in your subscription. For the example in this article, a private endpoint to an Azure web app is used. For more information on how to create a private endpoint for a web app, see Tutorial...",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/private-endpoint-export-dns.md",
          "status": "modified",
          "title": "Private Endpoint Export Dns"
        },
        {
          "additions": 6,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/private-link/increase-private-endpoint-vnet-limits",
          "meaningful_changes": [
            {
              "text": "vnetName = \"myVirtualNetwork\"",
              "type": "removed"
            },
            {
              "text": "vnetName=\"myVirtualNetwork\"",
              "type": "added"
            },
            {
              "text": "azurepowershell-interactive",
              "type": "added"
            }
          ],
          "path": "articles/private-link/increase-private-endpoint-vnet-limits.md",
          "status": "modified",
          "title": "Increase Private Endpoint Vnet Limits"
        },
        {
          "additions": 3,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/private-link/troubleshoot-private-link-connectivity",
          "meaningful_changes": [
            {
              "text": "a. Go to Private Link Center.",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"./media/private-link-tsg/private-link-center.png\" alt-text=\"Screenshot of Private Link Center.\":::",
              "type": "removed"
            },
            {
              "text": "a. In the Azure portal, search for and select Private Link.",
              "type": "added"
            }
          ],
          "path": "articles/private-link/troubleshoot-private-link-connectivity.md",
          "status": "modified",
          "title": "Troubleshoot Private Link Connectivity"
        },
        {
          "additions": 4,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/private-link/tutorial-private-endpoint-sql-cli",
          "meaningful_changes": [
            {
              "text": "disable-private-endpoint-network-policies true",
              "type": "removed"
            },
            {
              "text": "private-endpoint-network-policies Disabled",
              "type": "added"
            },
            {
              "text": "Server image Win2019Datacenter.",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/tutorial-private-endpoint-sql-cli.md",
          "status": "modified",
          "title": "Tutorial Private Endpoint Sql Cli"
        },
        {
          "additions": 3,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-link-service-cli",
          "meaningful_changes": [
            {
              "text": "This quickstart requires version 2.0.28 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.",
              "type": "removed"
            },
            {
              "text": "This quickstart requires version 2.62.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.",
              "type": "added"
            },
            {
              "text": "disable-private-link-service-network-policies yes",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/create-private-link-service-cli.md",
          "status": "modified",
          "title": "Create Private Link Service Cli"
        },
        {
          "additions": 3,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/private-link/disable-private-link-service-network-policy",
          "meaningful_changes": [
            {
              "text": "disable-private-link-service-network-policies yes",
              "type": "removed"
            },
            {
              "text": "private-link-service-network-policies Disabled",
              "type": "added"
            },
            {
              "text": "\"apiVersion\": \"2019-04-01\",",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/disable-private-link-service-network-policy.md",
          "status": "modified",
          "title": "Disable Private Link Service Network Policy"
        },
        {
          "additions": 3,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/private-link/manage-private-endpoint",
          "meaningful_changes": [
            {
              "text": "1. In the search box at the top of the portal, enter Private Link. In the search results, select Private link.",
              "type": "removed"
            },
            {
              "text": "1. In the search box at the top of the portal, enter Private Link. In the search results, select Private Link.",
              "type": "added"
            },
            {
              "text": "1. In the Private Link Center, select Private endpoints or Private link services.",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/manage-private-endpoint.md",
          "status": "modified",
          "title": "Manage Private Endpoint"
        },
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/private-link/how-to-approve-private-link-cross-subscription",
          "meaningful_changes": [
            {
              "text": "1. In the search box at the top of the portal, enter Private endpoint. Select Private endpoints.",
              "type": "removed"
            },
            {
              "text": "1. In the search box at the top of the portal, enter Private Link. Select Private Link from the search results.",
              "type": "added"
            },
            {
              "text": "1. Select Pending connections.",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/how-to-approve-private-link-cross-subscription.md",
          "status": "modified",
          "title": "How To Approve Private Link Cross Subscription"
        },
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/private-link/inspect-traffic-with-azure-firewall",
          "meaningful_changes": [
            {
              "text": "FQDN in application rules for HTTP, HTTPS, and MSSQL.",
              "type": "removed"
            },
            {
              "text": "FQDN in application rules for HTTP, HTTPS, and MSSQL.",
              "type": "added"
            }
          ],
          "path": "articles/private-link/inspect-traffic-with-azure-firewall.md",
          "status": "modified",
          "title": "Inspect Traffic With Azure Firewall"
        },
        {
          "additions": 1,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-link-service-bicep",
          "meaningful_changes": [],
          "path": "articles/private-link/create-private-link-service-bicep.md",
          "status": "modified",
          "title": "Create Private Link Service Bicep"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:650a69130bb2ad4213851b973c8ac47488a05854",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "This quickstart requires version 2.0.28 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.",
          "type": "removed"
        },
        {
          "text": "This quickstart requires version 2.62.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.",
          "type": "added"
        },
        {
          "text": "disable-private-link-service-network-policies yes",
          "type": "removed"
        },
        {
          "text": "private-link-service-network-policies Disabled",
          "type": "added"
        },
        {
          "text": "disable-private-link-service-network-policies yes",
          "type": "removed"
        },
        {
          "text": "private-link-service-network-policies Disabled",
          "type": "added"
        },
        {
          "text": "\"apiVersion\": \"2019-04-01\",",
          "type": "removed"
        },
        {
          "text": "\"apiVersion\": \"2024-05-01\",",
          "type": "added"
        },
        {
          "text": "1. In the search box at the top of the portal, enter Private endpoint. Select Private endpoints.",
          "type": "removed"
        },
        {
          "text": "1. In the search box at the top of the portal, enter Private Link. Select Private Link from the search results.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313921 from AbdullahBell/private-link-freshness",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-export-dns",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "650a69130bb2ad4213851b973c8ac47488a05854",
      "short_sha": "650a691",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 49,
        "deletions": 64,
        "total": 113
      },
      "summary": "Private Link: adds \"This quickstart requires version 2.62.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/650a69130bb2ad4213851b973c8ac47488a05854"
    },
    {
      "author": "abdullahbell",
      "date": "2026-03-30T18:41:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/private-link/inspect-traffic-with-azure-firewall",
          "meaningful_changes": [
            {
              "text": "FQDN in application rules for HTTP, HTTPS, and MSSQL.",
              "type": "removed"
            },
            {
              "text": "FQDN in application rules for HTTP, HTTPS, and MSSQL.",
              "type": "added"
            }
          ],
          "path": "articles/private-link/inspect-traffic-with-azure-firewall.md",
          "status": "modified",
          "title": "Inspect Traffic With Azure Firewall"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:66646cbf126c5d655d4de658f192459592131db9",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "FQDN in application rules for HTTP, HTTPS, and MSSQL.",
          "type": "removed"
        },
        {
          "text": "FQDN in application rules for HTTP, HTTPS, and MSSQL.",
          "type": "added"
        }
      ],
      "message": "Fix bookmark-not-found warning - remove invalid anchor from features-by-sku.md link",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/inspect-traffic-with-azure-firewall",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Removal, deprecation, or unsupported guidance",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "66646cbf126c5d655d4de658f192459592131db9",
      "short_sha": "66646cb",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Private Link: adds \"FQDN in application rules for HTTP, HTTPS, and MSSQL.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/66646cbf126c5d655d4de658f192459592131db9"
    },
    {
      "author": "abdullahbell",
      "date": "2026-03-30T18:26:29Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 25,
      "files": [
        {
          "additions": 8,
          "deletions": 12,
          "docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-export-dns",
          "meaningful_changes": [
            {
              "text": "A private endpoint in Azure requires DNS records for name resolution of the endpoint. The DNS record resolves the private IP address of the endpoint for the configured resource. To export the DNS records of the...",
              "type": "removed"
            },
            {
              "text": "A private endpoint in Azure requires DNS records for name resolution of the endpoint. The DNS record resolves the private IP address of the endpoint for the configured resource. To export the DNS records of the...",
              "type": "added"
            },
            {
              "text": "A private endpoint configured in your subscription. For the example in this article, a private endpoint to an Azure web app is used. For more information on how to create a private endpoint for a web app, see Tutorial...",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/private-endpoint-export-dns.md",
          "status": "modified",
          "title": "Private Endpoint Export Dns"
        },
        {
          "additions": 6,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/private-link/increase-private-endpoint-vnet-limits",
          "meaningful_changes": [
            {
              "text": "vnetName = \"myVirtualNetwork\"",
              "type": "removed"
            },
            {
              "text": "vnetName=\"myVirtualNetwork\"",
              "type": "added"
            },
            {
              "text": "azurepowershell-interactive",
              "type": "added"
            }
          ],
          "path": "articles/private-link/increase-private-endpoint-vnet-limits.md",
          "status": "modified",
          "title": "Increase Private Endpoint Vnet Limits"
        },
        {
          "additions": 3,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/private-link/troubleshoot-private-link-connectivity",
          "meaningful_changes": [
            {
              "text": "a. Go to Private Link Center.",
              "type": "removed"
            },
            {
              "text": ":::image type=\"content\" source=\"./media/private-link-tsg/private-link-center.png\" alt-text=\"Screenshot of Private Link Center.\":::",
              "type": "removed"
            },
            {
              "text": "a. In the Azure portal, search for and select Private Link.",
              "type": "added"
            }
          ],
          "path": "articles/private-link/troubleshoot-private-link-connectivity.md",
          "status": "modified",
          "title": "Troubleshoot Private Link Connectivity"
        },
        {
          "additions": 4,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/private-link/tutorial-private-endpoint-sql-cli",
          "meaningful_changes": [
            {
              "text": "disable-private-endpoint-network-policies true",
              "type": "removed"
            },
            {
              "text": "private-endpoint-network-policies Disabled",
              "type": "added"
            },
            {
              "text": "Server image Win2019Datacenter.",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/tutorial-private-endpoint-sql-cli.md",
          "status": "modified",
          "title": "Tutorial Private Endpoint Sql Cli"
        },
        {
          "additions": 3,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-link-service-cli",
          "meaningful_changes": [
            {
              "text": "This quickstart requires version 2.0.28 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.",
              "type": "removed"
            },
            {
              "text": "This quickstart requires version 2.62.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.",
              "type": "added"
            },
            {
              "text": "disable-private-link-service-network-policies yes",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/create-private-link-service-cli.md",
          "status": "modified",
          "title": "Create Private Link Service Cli"
        },
        {
          "additions": 3,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/private-link/disable-private-link-service-network-policy",
          "meaningful_changes": [
            {
              "text": "disable-private-link-service-network-policies yes",
              "type": "removed"
            },
            {
              "text": "private-link-service-network-policies Disabled",
              "type": "added"
            },
            {
              "text": "\"apiVersion\": \"2019-04-01\",",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/disable-private-link-service-network-policy.md",
          "status": "modified",
          "title": "Disable Private Link Service Network Policy"
        },
        {
          "additions": 3,
          "deletions": 4,
          "docs_url": "https://learn.microsoft.com/azure/private-link/manage-private-endpoint",
          "meaningful_changes": [
            {
              "text": "1. In the search box at the top of the portal, enter Private Link. In the search results, select Private link.",
              "type": "removed"
            },
            {
              "text": "1. In the search box at the top of the portal, enter Private Link. In the search results, select Private Link.",
              "type": "added"
            },
            {
              "text": "1. In the Private Link Center, select Private endpoints or Private link services.",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/manage-private-endpoint.md",
          "status": "modified",
          "title": "Manage Private Endpoint"
        },
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/private-link/how-to-approve-private-link-cross-subscription",
          "meaningful_changes": [
            {
              "text": "1. In the search box at the top of the portal, enter Private endpoint. Select Private endpoints.",
              "type": "removed"
            },
            {
              "text": "1. In the search box at the top of the portal, enter Private Link. Select Private Link from the search results.",
              "type": "added"
            },
            {
              "text": "1. Select Pending connections.",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/how-to-approve-private-link-cross-subscription.md",
          "status": "modified",
          "title": "How To Approve Private Link Cross Subscription"
        },
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/private-link/inspect-traffic-with-azure-firewall",
          "meaningful_changes": [
            {
              "text": "FQDN in application rules for HTTP, HTTPS, and MSSQL.",
              "type": "removed"
            },
            {
              "text": "FQDN in application rules for HTTP, HTTPS, and MSSQL.",
              "type": "added"
            }
          ],
          "path": "articles/private-link/inspect-traffic-with-azure-firewall.md",
          "status": "modified",
          "title": "Inspect Traffic With Azure Firewall"
        },
        {
          "additions": 1,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/create-private-link-service-bicep",
          "meaningful_changes": [],
          "path": "articles/private-link/create-private-link-service-bicep.md",
          "status": "modified",
          "title": "Create Private Link Service Bicep"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:49bad20572006eecb78b5015cf0a107fec0adf56",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "This quickstart requires version 2.0.28 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.",
          "type": "removed"
        },
        {
          "text": "This quickstart requires version 2.62.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.",
          "type": "added"
        },
        {
          "text": "disable-private-link-service-network-policies yes",
          "type": "removed"
        },
        {
          "text": "private-link-service-network-policies Disabled",
          "type": "added"
        },
        {
          "text": "disable-private-link-service-network-policies yes",
          "type": "removed"
        },
        {
          "text": "private-link-service-network-policies Disabled",
          "type": "added"
        },
        {
          "text": "\"apiVersion\": \"2019-04-01\",",
          "type": "removed"
        },
        {
          "text": "\"apiVersion\": \"2024-05-01\",",
          "type": "added"
        },
        {
          "text": "1. In the search box at the top of the portal, enter Private endpoint. Select Private endpoints.",
          "type": "removed"
        },
        {
          "text": "1. In the search box at the top of the portal, enter Private Link. Select Private Link from the search results.",
          "type": "added"
        }
      ],
      "message": "Private Link freshness review - update portal steps, fix broken links, update CLI flags",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/private-endpoint-export-dns",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 22,
      "sha": "49bad20572006eecb78b5015cf0a107fec0adf56",
      "short_sha": "49bad20",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 49,
        "deletions": 64,
        "total": 113
      },
      "summary": "Private Link: adds \"This quickstart requires version 2.62.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/49bad20572006eecb78b5015cf0a107fec0adf56"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-29T16:08:37Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
          "meaningful_changes": [
            {
              "text": "1.10.23 | v1.2.1 | v1.27 | security patches",
              "type": "removed"
            },
            {
              "text": "1.10.26 | v1.2.1 | v1.27 | Istio service mesh integration fix, security patches",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/alb-controller-release-notes.md",
          "status": "modified",
          "title": "Alb Controller Release Notes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:591fe71941a3a79b4acc24ce6f7b575303013220",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1.10.23 | v1.2.1 | v1.27 | security patches",
          "type": "removed"
        },
        {
          "text": "1.10.26 | v1.2.1 | v1.27 | Istio service mesh integration fix, security patches",
          "type": "added"
        }
      ],
      "message": "Update alb-controller-release-notes.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Release, version, or SKU detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "591fe71941a3a79b4acc24ce6f7b575303013220",
      "short_sha": "591fe71",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: adds \"1.10.26 | v1.2.1 | v1.27 | Istio service mesh integration fix, security patches\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/591fe71941a3a79b4acc24ce6f7b575303013220"
    },
    {
      "author": "Cheryl McGuire",
      "date": "2026-04-24T16:45:57Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 19,
          "deletions": 19,
          "docs_url": "https://learn.microsoft.com/azure/vpn-gateway/basic-public-ip-migrate-about",
          "meaningful_changes": [
            {
              "text": "For VPN Gateway SKUs VpnGw1-5 and Legacy SKU's which include High-Performance SKU and Standard SKU:",
              "type": "removed"
            },
            {
              "text": "For VPN Gateway SKUs VpnGw1-5 and Legacy SKUs (High-Performance SKU and Standard SKU):",
              "type": "added"
            },
            {
              "text": "If your current gateway subnet is /28 or smaller, the migration tool may error out. You can use this to add multiple prefixes for subnet to /27 or larger before you can proceed with migration.",
              "type": "removed"
            }
          ],
          "path": "articles/vpn-gateway/basic-public-ip-migrate-about.md",
          "status": "modified",
          "title": "Basic Public Ip Migrate About"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:9f6ad9ec46ba2574911e46d25844d70717cba76c",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For VPN Gateway SKUs VpnGw1-5 and Legacy SKU's which include High-Performance SKU and Standard SKU:",
          "type": "removed"
        },
        {
          "text": "For VPN Gateway SKUs VpnGw1-5 and Legacy SKUs (High-Performance SKU and Standard SKU):",
          "type": "added"
        },
        {
          "text": "If your current gateway subnet is /28 or smaller, the migration tool may error out. You can use this to add multiple prefixes for subnet to /27 or larger before you can proceed with migration.",
          "type": "removed"
        },
        {
          "text": "If your current gateway subnet is /28 or smaller, the migration tool might error out. You can use this to add multiple prefixes for subnet to /27 or larger before you can proceed with migration.",
          "type": "added"
        },
        {
          "text": "Depending on your current VPN gateway SKU, you might have different questions about the migration process. Here are some frequently asked questions to help you understand the migration better.",
          "type": "removed"
        },
        {
          "text": "Depending on your current VPN Gateway SKU, you might have different questions about the migration process. Here are some frequently asked questions to help you understand the migration better.",
          "type": "added"
        }
      ],
      "message": "Refine language and formatting in migration article",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/vpn-gateway/basic-public-ip-migrate-about",
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "9f6ad9ec46ba2574911e46d25844d70717cba76c",
      "short_sha": "9f6ad9e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 19,
        "deletions": 19,
        "total": 38
      },
      "summary": "VPN Gateway: adds \"Depending on your current VPN Gateway SKU, you might have different questions about the migration process. Here are some frequently asked questions to help you understand the migration better.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9f6ad9ec46ba2574911e46d25844d70717cba76c"
    },
    {
      "author": "mbender-ms",
      "date": "2026-04-14T21:03:37Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "url: /troubleshoot/azure/load-balancer/",
              "type": "removed"
            },
            {
              "text": "url: /troubleshoot/azure/load-balancer/welcome-azure-load-balancer",
              "type": "added"
            }
          ],
          "path": "articles/load-balancer/index.yml",
          "status": "modified",
          "title": "Load Balancer Index"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-support-help",
          "meaningful_changes": [
            {
              "text": "For a full list of self help troubleshooting content, see Azure Load Balancer troubleshooting documentation.",
              "type": "removed"
            },
            {
              "text": "For a full list of self help troubleshooting content, see Azure Load Balancer troubleshooting documentation.",
              "type": "added"
            }
          ],
          "path": "articles/load-balancer/load-balancer-support-help.md",
          "status": "modified",
          "title": "Load Balancer Support Help"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b8a21125e0c1b9d26ebd3406cc3c76bbd57c8247",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "url: /troubleshoot/azure/load-balancer/",
          "type": "removed"
        },
        {
          "text": "url: /troubleshoot/azure/load-balancer/welcome-azure-load-balancer",
          "type": "added"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure Load Balancer troubleshooting documentation.",
          "type": "removed"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure Load Balancer troubleshooting documentation.",
          "type": "added"
        }
      ],
      "message": "updated broken links to Troubleshooting dashboard",
      "paths": [
        "articles/load-balancer"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/load-balancer/load-balancer-support-help",
      "primary_product": "load-balancer",
      "primary_product_label": "Load Balancer",
      "product_labels": [
        "Load Balancer"
      ],
      "products": [
        "load-balancer"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "b8a21125e0c1b9d26ebd3406cc3c76bbd57c8247",
      "short_sha": "b8a2112",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-load-balancer"
      ],
      "sources": [
        "Load Balancer docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Load Balancer: adds \"url: /troubleshoot/azure/load-balancer/welcome-azure-load-balancer\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b8a21125e0c1b9d26ebd3406cc3c76bbd57c8247"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:25:27Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 23,
          "deletions": 25,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-terraform",
          "meaningful_changes": [
            {
              "text": "contentwellnotification:",
              "type": "removed"
            },
            {
              "text": "contentwellnotification:",
              "type": "added"
            },
            {
              "text": "In this quickstart, you use Terraform to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-multiple-ip-terraform.md",
          "status": "modified",
          "title": "Quick Create Multiple Ip Terraform"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:9b9a17e6d9ff5b5e44dcba1468b33473fcaaa6e7",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "contentwellnotification:",
          "type": "removed"
        },
        {
          "text": "contentwellnotification:",
          "type": "added"
        },
        {
          "text": "In this quickstart, you use Terraform to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use Terraform to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...",
          "type": "added"
        },
        {
          "text": "Create a random value (to be used in the resource group name) using randompet",
          "type": "removed"
        },
        {
          "text": "Create a random password for the Windows VM using randompassword",
          "type": "removed"
        }
      ],
      "message": "docs: Fix metadata, fix style guide issues, fix stray dash in checklist, fix incorrect verification step",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-terraform",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "9b9a17e6d9ff5b5e44dcba1468b33473fcaaa6e7",
      "short_sha": "9b9a17e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 23,
        "deletions": 25,
        "total": 48
      },
      "summary": "Azure Firewall: adds \"In this quickstart, use Terraform to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9b9a17e6d9ff5b5e44dcba1468b33473fcaaa6e7"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:25:27Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 11,
          "deletions": 14,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-bicep",
          "meaningful_changes": [
            {
              "text": "In this quickstart, you use a Bicep file to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to...",
              "type": "removed"
            },
            {
              "text": "In this quickstart, use a Bicep file to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...",
              "type": "added"
            },
            {
              "text": "Multiple Azure resources are defined in the template:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-multiple-ip-bicep.md",
          "status": "modified",
          "title": "Quick Create Multiple Ip Bicep"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:692f7a58f82b138e0e7294ce2e1dcd01d8c38b04",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "In this quickstart, you use a Bicep file to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to...",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use a Bicep file to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...",
          "type": "added"
        },
        {
          "text": "Multiple Azure resources are defined in the template:",
          "type": "removed"
        },
        {
          "text": "The template defines multiple Azure resources:",
          "type": "added"
        },
        {
          "text": "1. Save the Bicep file as main.bicep to your local computer.",
          "type": "removed"
        },
        {
          "text": "1. Deploy the Bicep file using either Azure CLI or Azure PowerShell.",
          "type": "removed"
        }
      ],
      "message": "docs: Fix metadata, fix style guide issues",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-bicep",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "692f7a58f82b138e0e7294ce2e1dcd01d8c38b04",
      "short_sha": "692f7a5",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 11,
        "deletions": 14,
        "total": 25
      },
      "summary": "Azure Firewall: adds \"In this quickstart, use a Bicep file to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/692f7a58f82b138e0e7294ce2e1dcd01d8c38b04"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:25:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 24,
          "deletions": 25,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-ipgroup-terraform",
          "meaningful_changes": [
            {
              "text": "contentwellnotification:",
              "type": "removed"
            },
            {
              "text": "contentwellnotification:",
              "type": "added"
            },
            {
              "text": "In this quickstart, you use Terraform to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that allows you to define and group IP addresses...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-ipgroup-terraform.md",
          "status": "modified",
          "title": "Quick Create Ipgroup Terraform"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b80e0c778b42b52ddd7110998aaf9fa982e32e97",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "contentwellnotification:",
          "type": "removed"
        },
        {
          "text": "contentwellnotification:",
          "type": "added"
        },
        {
          "text": "In this quickstart, you use Terraform to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that allows you to define and group IP addresses...",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use Terraform to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that you use to define and group IP addresses...",
          "type": "added"
        },
        {
          "text": "Create a random value (to be used in the resource group name) using randompet",
          "type": "removed"
        },
        {
          "text": "Create an Azure resource group using azurermresourcegroup",
          "type": "removed"
        }
      ],
      "message": "docs: Fix metadata, fix style guide issues, fix stray dash in checklist links",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-ipgroup-terraform",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "b80e0c778b42b52ddd7110998aaf9fa982e32e97",
      "short_sha": "b80e0c7",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 24,
        "deletions": 25,
        "total": 49
      },
      "summary": "Azure Firewall: adds \"In this quickstart, use Terraform to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that you use to define and group IP addresses...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b80e0c778b42b52ddd7110998aaf9fa982e32e97"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:25:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 12,
          "deletions": 12,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-ipgroup-bicep",
          "meaningful_changes": [
            {
              "text": "In this quickstart, you use a Bicep file to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that allows you to define and group IP...",
              "type": "removed"
            },
            {
              "text": "In this quickstart, use a Bicep file to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that you use to define and group IP addresses...",
              "type": "added"
            },
            {
              "text": "Multiple Azure resources are defined in the Bicep file:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-ipgroup-bicep.md",
          "status": "modified",
          "title": "Quick Create Ipgroup Bicep"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:070c03371d5c7cc311de499936a53f1670a08177",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "In this quickstart, you use a Bicep file to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that allows you to define and group IP...",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use a Bicep file to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that you use to define and group IP addresses...",
          "type": "added"
        },
        {
          "text": "Multiple Azure resources are defined in the Bicep file:",
          "type": "removed"
        },
        {
          "text": "The Bicep file defines multiple Azure resources:",
          "type": "added"
        },
        {
          "text": "1. Save the Bicep file as main.bicep to your local computer.",
          "type": "removed"
        },
        {
          "text": "1. Deploy the Bicep file using either Azure CLI or Azure PowerShell.",
          "type": "removed"
        }
      ],
      "message": "docs: Fix metadata, fix style guide issues",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-ipgroup-bicep",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "070c03371d5c7cc311de499936a53f1670a08177",
      "short_sha": "070c033",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 12,
        "deletions": 12,
        "total": 24
      },
      "summary": "Azure Firewall: adds \"In this quickstart, use a Bicep file to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that you use to define and group IP addresses...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/070c03371d5c7cc311de499936a53f1670a08177"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:06:55Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 143,
          "deletions": 160,
          "docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-firewall-deploy-portal-policy",
          "meaningful_changes": [
            {
              "text": "Tutorial: Deploy and configure Azure Firewall and policy using the Azure portal",
              "type": "removed"
            },
            {
              "text": "Tutorial: Deploy and configure Azure Firewall and policy by using the Azure portal",
              "type": "added"
            },
            {
              "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/tutorial-firewall-deploy-portal-policy.md",
          "status": "modified",
          "title": "Tutorial Firewall Deploy Portal Policy"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b21287f88c62c9033a9236dd3709e882af318741",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Tutorial: Deploy and configure Azure Firewall and policy using the Azure portal",
          "type": "removed"
        },
        {
          "text": "Tutorial: Deploy and configure Azure Firewall and policy by using the Azure portal",
          "type": "added"
        },
        {
          "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
          "type": "removed"
        },
        {
          "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you might want to limit access to websites. Or, you might want to limit the outbound IP addresses and ports...",
          "type": "added"
        },
        {
          "text": "One way you can control outbound network access from an Azure subnet is with Azure Firewall and Firewall Policy. With Azure Firewall and Firewall Policy, you can configure:",
          "type": "removed"
        },
        {
          "text": "You can control outbound network access from an Azure subnet by using Azure Firewall and Firewall Policy. By using Azure Firewall and Firewall Policy, you can configure:",
          "type": "added"
        }
      ],
      "message": "docs: Fix description, simplify steps, fix style guide issues",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-firewall-deploy-portal-policy",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "b21287f88c62c9033a9236dd3709e882af318741",
      "short_sha": "b21287f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 143,
        "deletions": 160,
        "total": 303
      },
      "summary": "Azure Firewall: adds \"You can control outbound network access from an Azure subnet by using Azure Firewall and Firewall Policy. By using Azure Firewall and Firewall Policy, you can configure:\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b21287f88c62c9033a9236dd3709e882af318741"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:06:47Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 314,
          "deletions": 181,
          "docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-hybrid-ps",
          "meaningful_changes": [
            {
              "text": "This article requires that you run PowerShell locally. You must have the Azure PowerShell module installed. Run Get-Module -ListAvailable Az to find the version. If you need to upgrade, see Install the Azure PowerShell...",
              "type": "removed"
            },
            {
              "text": "This article requires that you run PowerShell locally. You must have the Azure PowerShell module installed. Run Get-Module -ListAvailable Az to find the version. If you need to upgrade, see Install the Azure PowerShell...",
              "type": "added"
            },
            {
              "text": "There are three key requirements for this scenario to work correctly:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/tutorial-hybrid-ps.md",
          "status": "modified",
          "title": "Tutorial Hybrid Ps"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ddcad83f84bc08ccf7a852056c731493d3f813c3",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "This article requires that you run PowerShell locally. You must have the Azure PowerShell module installed. Run Get-Module -ListAvailable Az to find the version. If you need to upgrade, see Install the Azure PowerShell...",
          "type": "removed"
        },
        {
          "text": "This article requires that you run PowerShell locally. You must have the Azure PowerShell module installed. Run Get-Module -ListAvailable Az to find the version. If you need to upgrade, see Install the Azure PowerShell...",
          "type": "added"
        },
        {
          "text": "There are three key requirements for this scenario to work correctly:",
          "type": "removed"
        },
        {
          "text": "Three key requirements ensure this scenario works correctly:",
          "type": "added"
        },
        {
          "text": "A user-defined route (UDR) on the spoke subnet that points to the Azure Firewall IP address as the default gateway. Virtual network gateway route propagation must be disabled on this route table.",
          "type": "removed"
        },
        {
          "text": "A UDR on the hub gateway subnet must point to the firewall IP address as the next hop to the spoke networks.",
          "type": "removed"
        }
      ],
      "message": "docs: Add cmdlet links, simplify steps, fix PS formatting and code bugs",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-hybrid-ps",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "ddcad83f84bc08ccf7a852056c731493d3f813c3",
      "short_sha": "ddcad83",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 314,
        "deletions": 181,
        "total": 495
      },
      "summary": "Azure Firewall: adds \"This article requires that you run PowerShell locally. You must have the Azure PowerShell module installed. Run Get-Module -ListAvailable Az to find the version. If you need to upgrade, see Install the Azure PowerShell...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ddcad83f84bc08ccf7a852056c731493d3f813c3"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T19:21:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 38,
          "deletions": 38,
          "docs_url": "https://learn.microsoft.com/azure/firewall/sql-fqdn-filtering",
          "meaningful_changes": [
            {
              "text": "You can now configure Azure Firewall application rules with SQL FQDNs. This allows you to limit access from your virtual networks to only the specified SQL server instances.",
              "type": "removed"
            },
            {
              "text": "You can configure Azure Firewall application rules with SQL FQDNs. This configuration limits access from your virtual networks to only the specified SQL server instances.",
              "type": "added"
            },
            {
              "text": "With SQL FQDNs, you can filter traffic:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/sql-fqdn-filtering.md",
          "status": "modified",
          "title": "Sql Fqdn Filtering"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:53fb29cc25c7be83d2dff58d78f98d71016bff8f",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "You can now configure Azure Firewall application rules with SQL FQDNs. This allows you to limit access from your virtual networks to only the specified SQL server instances.",
          "type": "removed"
        },
        {
          "text": "You can configure Azure Firewall application rules with SQL FQDNs. This configuration limits access from your virtual networks to only the specified SQL server instances.",
          "type": "added"
        },
        {
          "text": "With SQL FQDNs, you can filter traffic:",
          "type": "removed"
        },
        {
          "text": "By using SQL FQDNs, you can filter traffic:",
          "type": "added"
        },
        {
          "text": "From your VNets to an Azure SQL Database or Azure Synapse Analytics. For example: Only allow access to sql-server1.database.windows.NET.",
          "type": "removed"
        },
        {
          "text": "From on-premises to Azure SQL Managed Instances or SQL IaaS running in your VNets.",
          "type": "removed"
        }
      ],
      "message": "docs: Fix metadata field order and ms.date, fix description, replace 'using' with 'by using', rewrite sentences for clarity",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/sql-fqdn-filtering",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "53fb29cc25c7be83d2dff58d78f98d71016bff8f",
      "short_sha": "53fb29c",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 38,
        "deletions": 38,
        "total": 76
      },
      "summary": "Azure Firewall: adds \"You can configure Azure Firewall application rules with SQL FQDNs. This configuration limits access from your virtual networks to only the specified SQL server instances.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/53fb29cc25c7be83d2dff58d78f98d71016bff8f"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T18:06:54Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 12,
          "deletions": 13,
          "docs_url": "https://learn.microsoft.com/azure/firewall/create-ip-group",
          "meaningful_changes": [
            {
              "text": "IP Groups allow you to group and manage IP addresses for Azure Firewall rules. They can have a single IP address, multiple IP addresses, or one or more IP address ranges.",
              "type": "removed"
            },
            {
              "text": "IP Groups help you group and manage IP addresses for Azure Firewall rules. They can include a single IP address, multiple IP addresses, or one or more IP address ranges.",
              "type": "added"
            },
            {
              "text": "There are two ways to enter IP addresses:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/create-ip-group.md",
          "status": "modified",
          "title": "Create Ip Group"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0afa7a1365029e85a37bb19720b0a1f15df473ba",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "IP Groups allow you to group and manage IP addresses for Azure Firewall rules. They can have a single IP address, multiple IP addresses, or one or more IP address ranges.",
          "type": "removed"
        },
        {
          "text": "IP Groups help you group and manage IP addresses for Azure Firewall rules. They can include a single IP address, multiple IP addresses, or one or more IP address ranges.",
          "type": "added"
        },
        {
          "text": "There are two ways to enter IP addresses:",
          "type": "removed"
        },
        {
          "text": "You can manually enter them",
          "type": "removed"
        },
        {
          "text": "You can import them from a file",
          "type": "removed"
        },
        {
          "text": "Enter IP addresses in one of two ways:",
          "type": "added"
        }
      ],
      "message": "docs: Fix metadata, broken links, and style guide issues",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/create-ip-group",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 20,
      "sha": "0afa7a1365029e85a37bb19720b0a1f15df473ba",
      "short_sha": "0afa7a1",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 12,
        "deletions": 13,
        "total": 25
      },
      "summary": "Azure Firewall: adds \"IP Groups help you group and manage IP addresses for Azure Firewall rules. They can include a single IP address, multiple IP addresses, or one or more IP address ranges.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0afa7a1365029e85a37bb19720b0a1f15df473ba"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-22T09:14:00Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/video-on-demand-live-streaming",
          "meaningful_changes": [
            {
              "text": "Rules | Enable compression for manifest and playlist files (.mpd and .m3u8) | DASH and HLS manifests are small text-based XML or plain-text files that compress very efficiently (often 70\u201380% size reduction). Enabling...",
              "type": "removed"
            },
            {
              "text": "Rules | Enable compression for manifest and playlist files (.mpd and .m3u8) | DASH and HLS manifests are small text-based XML or plain-text files that compress efficiently (often 70\u201380% size reduction). Enabling...",
              "type": "added"
            },
            {
              "text": "Content protection: Azure Front Door's WAF provides baseline geo-filtering and rate limiting at the policy level. Native cryptographic URL request signing at the edge is on the Azure Front Door roadmap but isn't...",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/video-on-demand-live-streaming.md",
          "status": "modified",
          "title": "Video On Demand Live Streaming"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e0346de430181835966dc539190521f613270211",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Rules | Enable compression for manifest and playlist files (.mpd and .m3u8) | DASH and HLS manifests are small text-based XML or plain-text files that compress very efficiently (often 70\u201380% size reduction). Enabling...",
          "type": "removed"
        },
        {
          "text": "Rules | Enable compression for manifest and playlist files (.mpd and .m3u8) | DASH and HLS manifests are small text-based XML or plain-text files that compress efficiently (often 70\u201380% size reduction). Enabling...",
          "type": "added"
        },
        {
          "text": "Content protection: Azure Front Door's WAF provides baseline geo-filtering and rate limiting at the policy level. Native cryptographic URL request signing at the edge is on the Azure Front Door roadmap but isn't...",
          "type": "removed"
        },
        {
          "text": "Content protection: Azure Front Door's WAF provides baseline geo-filtering and rate limiting at the policy level. Native cryptographic URL request signing at the edge is on the Azure Front Door roadmap but isn't...",
          "type": "added"
        }
      ],
      "message": "acrolinx tweaks",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/video-on-demand-live-streaming",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 18,
      "sha": "e0346de430181835966dc539190521f613270211",
      "short_sha": "e0346de",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Front Door: adds \"Rules | Enable compression for manifest and playlist files (.mpd and .m3u8) | DASH and HLS manifests are small text-based XML or plain-text files that compress efficiently (often 70\u201380% size reduction). Enabling...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e0346de430181835966dc539190521f613270211"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T18:09:49Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 153,
          "deletions": 97,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-ps",
          "meaningful_changes": [
            {
              "text": "Deploy and configure Azure Firewall using Azure PowerShell",
              "type": "removed"
            },
            {
              "text": "Deploy and configure Azure Firewall by using Azure PowerShell",
              "type": "added"
            },
            {
              "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-ps.md",
          "status": "modified",
          "title": "Deploy Ps"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:dd339bc68fc1d4aa53311a6f1068bbae02cbb279",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Deploy and configure Azure Firewall using Azure PowerShell",
          "type": "removed"
        },
        {
          "text": "Deploy and configure Azure Firewall by using Azure PowerShell",
          "type": "added"
        },
        {
          "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
          "type": "removed"
        },
        {
          "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you might want to limit access to websites. Or, you might want to limit the outbound IP addresses and ports...",
          "type": "added"
        },
        {
          "text": "One way you can control outbound network access from an Azure subnet is with Azure Firewall. With Azure Firewall, you can configure:",
          "type": "removed"
        },
        {
          "text": "You can control outbound network access from an Azure subnet by using Azure Firewall. By using Azure Firewall, you can configure:",
          "type": "added"
        }
      ],
      "message": "docs: Add cmdlet links, replace VNet with 'virtual network', reformat PS code blocks to multi-line splatting, fix variable casing, fix route table pipe formatting, fix broken infrastructure-fqdns link, fix duplicate Invoke-WebRequest line, fix step numbering",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/deploy-ps",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 18,
      "sha": "dd339bc68fc1d4aa53311a6f1068bbae02cbb279",
      "short_sha": "dd339bc",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 153,
        "deletions": 97,
        "total": 250
      },
      "summary": "Azure Firewall: adds \"Controlling outbound network access is an important part of an overall network security plan. For example, you might want to limit access to websites. Or, you might want to limit the outbound IP addresses and ports...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/dd339bc68fc1d4aa53311a6f1068bbae02cbb279"
    },
    {
      "author": "mbender-ms",
      "date": "2026-04-14T21:09:43Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 6,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Testing inbound frontend IP address reachability",
              "type": "added"
            },
            {
              "text": "href: load-balancer-test-frontend-reachability.md",
              "type": "added"
            },
            {
              "text": "name: Troubleshoot",
              "type": "removed"
            }
          ],
          "path": "articles/load-balancer/TOC.yml",
          "status": "modified",
          "title": "Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1a3a2535edd2a63b4cce82cb3800db374695b285",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Testing inbound frontend IP address reachability",
          "type": "added"
        },
        {
          "text": "href: load-balancer-test-frontend-reachability.md",
          "type": "added"
        },
        {
          "text": "name: Troubleshoot",
          "type": "removed"
        },
        {
          "text": "name: Support and troubleshooting for Azure Load Balancer",
          "type": "removed"
        },
        {
          "text": "href: load-balancer-support-help.md",
          "type": "removed"
        },
        {
          "text": "name: Testing inbound frontend IP address reachability",
          "type": "removed"
        }
      ],
      "message": "updated broken links to Troubleshooting dashboard",
      "paths": [
        "articles/load-balancer"
      ],
      "primary_docs_url": null,
      "primary_product": "load-balancer",
      "primary_product_label": "Load Balancer",
      "product_labels": [
        "Load Balancer"
      ],
      "products": [
        "load-balancer"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 16,
      "sha": "1a3a2535edd2a63b4cce82cb3800db374695b285",
      "short_sha": "1a3a253",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-load-balancer"
      ],
      "sources": [
        "Load Balancer docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 6,
        "total": 10
      },
      "summary": "Load Balancer: adds \"name: Testing inbound frontend IP address reachability\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1a3a2535edd2a63b4cce82cb3800db374695b285"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T17:20:55Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/traffic-manager/traffic-manager-support-help",
          "meaningful_changes": [
            {
              "text": "For a full list of self help troubleshooting content, see Azure Traffic Manager troubleshooting documentation.",
              "type": "removed"
            },
            {
              "text": "For a full list of self help troubleshooting content, see Azure Traffic Manager troubleshooting documentation.",
              "type": "added"
            },
            {
              "text": "Azure Traffic Manager | azure-traffic-manager",
              "type": "removed"
            }
          ],
          "path": "articles/traffic-manager/traffic-manager-support-help.md",
          "status": "modified",
          "title": "Traffic Manager Support Help"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "href: https://learn.microsoft.com/troubleshoot/azure/traffic-manager/welcome-azure-traffic-manager?toc=/azure/traffic-manager/TOC.json",
              "type": "removed"
            },
            {
              "text": "href: /troubleshoot/azure/traffic-manager/welcome-azure-traffic-manager?toc=/azure/traffic-manager/TOC.json",
              "type": "added"
            }
          ],
          "path": "articles/traffic-manager/toc.yml",
          "status": "modified",
          "title": "Traffic Manager Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:4bbb4dc8dbddc5ada088fddf186ae9eb77c4c3ff",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/traffic-manager/welcome-azure-traffic-manager?toc=/azure/traffic-manager/TOC.json",
          "type": "removed"
        },
        {
          "text": "href: /troubleshoot/azure/traffic-manager/welcome-azure-traffic-manager?toc=/azure/traffic-manager/TOC.json",
          "type": "added"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure Traffic Manager troubleshooting documentation.",
          "type": "removed"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure Traffic Manager troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Azure Traffic Manager | azure-traffic-manager",
          "type": "removed"
        },
        {
          "text": "Azure Traffic Manager | azure-traffic-manager",
          "type": "added"
        }
      ],
      "message": "Fix absolute links to relative links in Traffic Manager support-help and TOC",
      "paths": [
        "articles/traffic-manager"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/traffic-manager/traffic-manager-support-help",
      "primary_product": "traffic-manager",
      "primary_product_label": "Traffic Manager",
      "product_labels": [
        "Traffic Manager"
      ],
      "products": [
        "traffic-manager"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 16,
      "sha": "4bbb4dc8dbddc5ada088fddf186ae9eb77c4c3ff",
      "short_sha": "4bbb4dc",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-traffic-manager"
      ],
      "sources": [
        "Traffic Manager docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Traffic Manager: adds \"href: /troubleshoot/azure/traffic-manager/welcome-azure-traffic-manager?toc=/azure/traffic-manager/TOC.json\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/4bbb4dc8dbddc5ada088fddf186ae9eb77c4c3ff"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:59:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshoot degraded state on Azure Traffic Manager",
              "type": "removed"
            },
            {
              "text": "href: traffic-manager-troubleshooting-degraded.md",
              "type": "removed"
            },
            {
              "text": "name: Troubleshoot Azure Traffic Manager",
              "type": "added"
            }
          ],
          "path": "articles/traffic-manager/toc.yml",
          "status": "modified",
          "title": "Traffic Manager Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f21242276050b3709b47f74e1168d63aed561cfd",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshoot degraded state on Azure Traffic Manager",
          "type": "removed"
        },
        {
          "text": "href: traffic-manager-troubleshooting-degraded.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot Azure Traffic Manager",
          "type": "added"
        },
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/traffic-manager/welcome-azure-traffic-manager?toc=/azure/traffic-manager/TOC.json",
          "type": "added"
        },
        {
          "text": "name: Support and troubleshooting",
          "type": "added"
        },
        {
          "text": "href: traffic-manager-support-help.md",
          "type": "added"
        }
      ],
      "message": "Update Traffic Manager TOC troubleshoot entry to point to SupportArticles",
      "paths": [
        "articles/traffic-manager"
      ],
      "primary_docs_url": null,
      "primary_product": "traffic-manager",
      "primary_product_label": "Traffic Manager",
      "product_labels": [
        "Traffic Manager"
      ],
      "products": [
        "traffic-manager"
      ],
      "reasons": [
        "New support or availability language",
        "Behavior, limits, or traffic handling changed",
        "Operational or migration guidance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 16,
      "sha": "f21242276050b3709b47f74e1168d63aed561cfd",
      "short_sha": "f212422",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-traffic-manager"
      ],
      "sources": [
        "Traffic Manager docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 2,
        "total": 6
      },
      "summary": "Traffic Manager: adds \"href: traffic-manager-support-help.md\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f21242276050b3709b47f74e1168d63aed561cfd"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:57:27Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 65,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/private-link/private-link-support-help",
          "meaningful_changes": [
            {
              "text": "Support and troubleshooting for Azure Private Link",
              "type": "added"
            },
            {
              "text": "Here are suggestions for where you can get help when developing your Azure Private Link solutions.",
              "type": "added"
            },
            {
              "text": "Self help troubleshooting",
              "type": "added"
            }
          ],
          "path": "articles/private-link/private-link-support-help.md",
          "status": "added",
          "title": "Private Link Support Help"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:461aa31f225069b9302b19a9500bc03ad3a32213",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Support and troubleshooting for Azure Private Link",
          "type": "added"
        },
        {
          "text": "Here are suggestions for where you can get help when developing your Azure Private Link solutions.",
          "type": "added"
        },
        {
          "text": "Self help troubleshooting",
          "type": "added"
        },
        {
          "text": "Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure Private Link. Use these articles to troubleshoot private endpoint connectivity problems, Private Link...",
          "type": "added"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure Private Link troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Post a question on Microsoft Q&A",
          "type": "added"
        }
      ],
      "message": "Add Private Link support and troubleshooting help article",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/private-link-support-help",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 14,
      "sha": "461aa31f225069b9302b19a9500bc03ad3a32213",
      "short_sha": "461aa31",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 65,
        "deletions": 0,
        "total": 65
      },
      "summary": "Private Link: adds \"Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure Private Link. Use these articles to troubleshoot private endpoint connectivity problems, Private Link...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/461aa31f225069b9302b19a9500bc03ad3a32213"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:53:44Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 65,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/dns/dns-support-help",
          "meaningful_changes": [
            {
              "text": "Support and troubleshooting for Azure DNS",
              "type": "added"
            },
            {
              "text": "Here are suggestions for where you can get help when developing your Azure DNS solutions.",
              "type": "added"
            },
            {
              "text": "Self help troubleshooting",
              "type": "added"
            }
          ],
          "path": "articles/dns/dns-support-help.md",
          "status": "added",
          "title": "Dns Support Help"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b719e07d5a62cd9ba1256231b43063e86f99d293",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Support and troubleshooting for Azure DNS",
          "type": "added"
        },
        {
          "text": "Here are suggestions for where you can get help when developing your Azure DNS solutions.",
          "type": "added"
        },
        {
          "text": "Self help troubleshooting",
          "type": "added"
        },
        {
          "text": "Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure DNS. Use these articles to troubleshoot deployment failures, configuration issues, name resolution problems...",
          "type": "added"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure DNS troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Post a question on Microsoft Q&A",
          "type": "added"
        }
      ],
      "message": "Add DNS support and troubleshooting help article",
      "paths": [
        "articles/dns"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/dns/dns-support-help",
      "primary_product": "azure-dns",
      "primary_product_label": "Azure DNS",
      "product_labels": [
        "Azure DNS"
      ],
      "products": [
        "azure-dns"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 14,
      "sha": "b719e07d5a62cd9ba1256231b43063e86f99d293",
      "short_sha": "b719e07",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-dns"
      ],
      "sources": [
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 65,
        "deletions": 0,
        "total": 65
      },
      "summary": "Azure DNS: adds \"Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure DNS. Use these articles to troubleshoot deployment failures, configuration issues, name resolution problems...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b719e07d5a62cd9ba1256231b43063e86f99d293"
    },
    {
      "author": "Jiao Di (MSFT)",
      "date": "2026-03-31T08:39:15Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 1,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "treat-unknown-as-record: true",
              "type": "added"
            }
          ],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/tspconfig.yaml",
          "status": "modified",
          "title": "Tspconfig"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "specification/network/resource-manager/Microsoft.Network/Network/client.tsp",
          "status": "modified",
          "title": "Client"
        }
      ],
      "id": "Azure/azure-rest-api-specs:0ef0d1d139e1aa50b3ce39c6f785f4ca40f602ee",
      "is_noise": true,
      "kind": "api",
      "kinds": [
        "api"
      ],
      "meaningful_changes": [
        {
          "text": "treat-unknown-as-record: true",
          "type": "added"
        }
      ],
      "message": "[JS] Enable treat-unknown-as-record for JS config (#41938)",
      "paths": [
        "specification/network/resource-manager/Microsoft.Network"
      ],
      "primary_docs_url": null,
      "primary_product": "network-api",
      "primary_product_label": "Microsoft.Network API",
      "product_labels": [
        "Microsoft.Network API"
      ],
      "products": [
        "network-api"
      ],
      "reasons": [
        "API generator/client configuration changed, not an obvious service surface change"
      ],
      "repo": "Azure/azure-rest-api-specs",
      "score": 14,
      "sha": "0ef0d1d139e1aa50b3ce39c6f785f4ca40f602ee",
      "short_sha": "0ef0d1d",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-rest-api-specs-network"
      ],
      "sources": [
        "Microsoft.Network REST/ARM specs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 1,
        "total": 3
      },
      "summary": "Microsoft.Network API: adds \"treat-unknown-as-record: true\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/Azure/azure-rest-api-specs/commit/0ef0d1d139e1aa50b3ce39c6f785f4ca40f602ee"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-27T15:57:37Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 9,
          "deletions": 9,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain",
          "meaningful_changes": [
            {
              "text": "If you have your own domain, and the domain isn't already associated with another Azure service that prevalidates domains for Azure Front Door, follow these steps:",
              "type": "removed"
            },
            {
              "text": "If you have your own domain and the domain isn't already associated with another Azure service that prevalidates domains for Azure Front Door, follow these steps:",
              "type": "added"
            },
            {
              "text": "1. On the Add a domain pane, enter or select the following information. Then select Add to onboard the custom domain.",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/standard-premium/how-to-configure-https-custom-domain.md",
          "status": "modified",
          "title": "How To Configure Https Custom Domain"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:64fee1e04e42d389ef98e16f3ed53d4197687172",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If you have your own domain, and the domain isn't already associated with another Azure service that prevalidates domains for Azure Front Door, follow these steps:",
          "type": "removed"
        },
        {
          "text": "If you have your own domain and the domain isn't already associated with another Azure service that prevalidates domains for Azure Front Door, follow these steps:",
          "type": "added"
        },
        {
          "text": "1. On the Add a domain pane, enter or select the following information. Then select Add to onboard the custom domain.",
          "type": "removed"
        },
        {
          "text": "1. On Add a domain, enter or select the following information. Then select Add to onboard the custom domain.",
          "type": "added"
        },
        {
          "text": "1. After the custom domain is successfully associated with an endpoint, Azure Front Door generates a certificate and deploys it. This process might take from several minutes to an hour to finish.",
          "type": "removed"
        },
        {
          "text": "1. After you associate the custom domain with an endpoint, Azure Front Door generates a certificate and deploys it. This process might take several minutes to an hour.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #315216 from halkazwini/afd-freshness-02",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 12,
      "sha": "64fee1e04e42d389ef98e16f3ed53d4197687172",
      "short_sha": "64fee1e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 9,
        "deletions": 9,
        "total": 18
      },
      "summary": "Front Door: adds \"1. On Add a domain, enter or select the following information. Then select Add to onboard the custom domain.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/64fee1e04e42d389ef98e16f3ed53d4197687172"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-28T15:32:20Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
          "meaningful_changes": [],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Helm"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:baf7f0646336d3bb761b1e558597b026a2b9d8d8",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Upgrade ALB Controller Helm chart version to 1.10.23",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "Operational or migration guidance",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 8,
      "sha": "baf7f0646336d3bb761b1e558597b026a2b9d8d8",
      "short_sha": "baf7f06",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 5,
        "total": 10
      },
      "summary": "Application Gateway: Upgrade ALB Controller Helm chart version to 1.10.23.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/baf7f0646336d3bb761b1e558597b026a2b9d8d8"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:55:37Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 65,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-gateway-support-help",
          "meaningful_changes": [
            {
              "text": "Support and troubleshooting for Azure NAT Gateway",
              "type": "added"
            },
            {
              "text": "Here are suggestions for where you can get help when developing your Azure NAT Gateway solutions.",
              "type": "added"
            },
            {
              "text": "Self help troubleshooting",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/nat-gateway-support-help.md",
          "status": "added",
          "title": "Nat Gateway Support Help"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6d1979e65f349bde40412403d55770a146cea0d9",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Support and troubleshooting for Azure NAT Gateway",
          "type": "added"
        },
        {
          "text": "Here are suggestions for where you can get help when developing your Azure NAT Gateway solutions.",
          "type": "added"
        },
        {
          "text": "Self help troubleshooting",
          "type": "added"
        },
        {
          "text": "Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure NAT Gateway. Use these articles to troubleshoot connectivity failures, SNAT port exhaustion, configuration...",
          "type": "added"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure NAT Gateway troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Post a question on Microsoft Q&A",
          "type": "added"
        }
      ],
      "message": "Add NAT Gateway support and troubleshooting help article",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-gateway-support-help",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 8,
      "sha": "6d1979e65f349bde40412403d55770a146cea0d9",
      "short_sha": "6d1979e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 65,
        "deletions": 0,
        "total": 65
      },
      "summary": "NAT Gateway: adds \"Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure NAT Gateway. Use these articles to troubleshoot connectivity failures, SNAT port exhaustion, configuration...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6d1979e65f349bde40412403d55770a146cea0d9"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-29T17:19:24Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 26,
          "deletions": 26,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon",
          "meaningful_changes": [
            {
              "text": "You should see that the GatewayClass has a condition that reads Valid GatewayClass. This condition indicates that a default GatewayClass is set up and that any gateway resources that reference this GatewayClass is...",
              "type": "added"
            },
            {
              "text": "apiVersion: gateway.networking.k8s.io/v1beta1",
              "type": "added"
            },
            {
              "text": "kind: GatewayClass",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Addon"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5a63b753dffbf028f37a7facce53d57fef06c6e8",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "You should see that the GatewayClass has a condition that reads Valid GatewayClass. This condition indicates that a default GatewayClass is set up and that any gateway resources that reference this GatewayClass is...",
          "type": "added"
        },
        {
          "text": "apiVersion: gateway.networking.k8s.io/v1beta1",
          "type": "added"
        },
        {
          "text": "kind: GatewayClass",
          "type": "added"
        },
        {
          "text": "creationTimestamp: \"2023-07-31T13:07:00Z\"",
          "type": "added"
        },
        {
          "text": "name: azure-alb-external",
          "type": "added"
        },
        {
          "text": "resourceVersion: \"64270\"",
          "type": "added"
        }
      ],
      "message": "Update quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-addon",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 6,
      "sha": "5a63b753dffbf028f37a7facce53d57fef06c6e8",
      "short_sha": "5a63b75",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 26,
        "deletions": 26,
        "total": 52
      },
      "summary": "Application Gateway: adds \"You should see that the GatewayClass has a condition that reads Valid GatewayClass. This condition indicates that a default GatewayClass is set up and that any gateway resources that reference this GatewayClass is...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5a63b753dffbf028f37a7facce53d57fef06c6e8"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-22T09:09:09Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 11,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/apex-domain",
          "meaningful_changes": [],
          "path": "articles/frontdoor/apex-domain.md",
          "status": "modified",
          "title": "Apex Domain"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/best-practices",
          "meaningful_changes": [],
          "path": "articles/frontdoor/best-practices.md",
          "status": "modified",
          "title": "Best Practices"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/billing",
          "meaningful_changes": [],
          "path": "articles/frontdoor/billing.md",
          "status": "modified",
          "title": "Billing"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/create-front-door-terraform",
          "meaningful_changes": [],
          "path": "articles/frontdoor/create-front-door-terraform.md",
          "status": "modified",
          "title": "Create Front Door Terraform"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/domain",
          "meaningful_changes": [],
          "path": "articles/frontdoor/domain.md",
          "status": "modified",
          "title": "Domain"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/front-door-traffic-acceleration",
          "meaningful_changes": [],
          "path": "articles/frontdoor/front-door-traffic-acceleration.md",
          "status": "modified",
          "title": "Front Door Traffic Acceleration"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/origin-security",
          "meaningful_changes": [],
          "path": "articles/frontdoor/origin-security.md",
          "status": "modified",
          "title": "Origin Security"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/scenarios",
          "meaningful_changes": [],
          "path": "articles/frontdoor/scenarios.md",
          "status": "modified",
          "title": "Scenarios"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/terraform-samples",
          "meaningful_changes": [],
          "path": "articles/frontdoor/terraform-samples.md",
          "status": "modified",
          "title": "Terraform Samples"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/front-door-routing-limits",
          "meaningful_changes": [],
          "path": "articles/frontdoor/front-door-routing-limits.md",
          "status": "modified",
          "title": "Front Door Routing Limits"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:04898b8ad099efdaf37c175b591800868d9200ac",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afd-vod",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/apex-domain",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Behavior, limits, or traffic handling changed",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 6,
      "sha": "04898b8ad099efdaf37c175b591800868d9200ac",
      "short_sha": "04898b8",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 20,
        "deletions": 20,
        "total": 40
      },
      "summary": "Front Door: Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afd-vod.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/04898b8ad099efdaf37c175b591800868d9200ac"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-05T18:47:12Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "Modify the queries if other data exists in another directory.",
              "type": "removed"
            },
            {
              "text": "Modify the queries if your data exists in a different directory.",
              "type": "added"
            },
            {
              "text": "Modify the queries if other data exists in another directory.",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/flow-logs-power-bi.md",
          "status": "modified",
          "title": "Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a5ebf7f3f869f58957820f2489c64ed262a35719",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Modify the queries if other data exists in another directory.",
          "type": "removed"
        },
        {
          "text": "Modify the queries if your data exists in a different directory.",
          "type": "added"
        },
        {
          "text": "Modify the queries if other data exists in another directory.",
          "type": "removed"
        },
        {
          "text": "Modify the queries if your data exists in a different directory.",
          "type": "added"
        }
      ],
      "message": "tweaks",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 6,
      "sha": "a5ebf7f3f869f58957820f2489c64ed262a35719",
      "short_sha": "a5ebf7f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Network Watcher: adds \"Modify the queries if your data exists in a different directory.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a5ebf7f3f869f58957820f2489c64ed262a35719"
    },
    {
      "author": "v-thepet",
      "date": "2026-04-03T01:23:15Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-protection-partner-onboarding",
          "meaningful_changes": [
            {
              "text": "If you have questions about application, service, or product integrations with Azure DDoS Protection, reach out to the Azure security community.",
              "type": "removed"
            },
            {
              "text": "If you have questions about application, service, or product integrations with Azure DDoS Protection, reach out to the Azure security community.",
              "type": "added"
            }
          ],
          "path": "articles/ddos-protection/ddos-protection-partner-onboarding.md",
          "status": "modified",
          "title": "Ddos Protection Partner Onboarding"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations-providers",
          "meaningful_changes": [
            {
              "text": "Campinas | Ascenty | 3 | Brazil South | \u2713 | Ascenty;",
              "type": "removed"
            },
            {
              "text": "Campinas | Ascenty | 3 | Brazil South | \u2713 | Ascenty;",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/expressroute-locations-providers.md",
          "status": "modified",
          "title": "Expressroute Locations Providers"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6f97b462fc3c07afb102b7a353214aa418734ada",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If you have questions about application, service, or product integrations with Azure DDoS Protection, reach out to the Azure security community.",
          "type": "removed"
        },
        {
          "text": "If you have questions about application, service, or product integrations with Azure DDoS Protection, reach out to the Azure security community.",
          "type": "added"
        },
        {
          "text": "Campinas | Ascenty | 3 | Brazil South | \u2713 | Ascenty;",
          "type": "removed"
        },
        {
          "text": "Campinas | Ascenty | 3 | Brazil South | \u2713 | Ascenty;",
          "type": "added"
        }
      ],
      "message": "fix broken links",
      "paths": [
        "articles/ddos-protection",
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-protection-partner-onboarding",
      "primary_product": "ddos-protection",
      "primary_product_label": "DDoS Protection",
      "product_labels": [
        "DDoS Protection",
        "ExpressRoute"
      ],
      "products": [
        "ddos-protection",
        "expressroute"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 6,
      "sha": "6f97b462fc3c07afb102b7a353214aa418734ada",
      "short_sha": "6f97b46",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-ddos",
        "azure-docs-expressroute"
      ],
      "sources": [
        "DDoS Protection docs",
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "DDoS Protection, ExpressRoute: adds \"If you have questions about application, service, or product integrations with Azure DDoS Protection, reach out to the Azure security community.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6f97b462fc3c07afb102b7a353214aa418734ada"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-02T17:13:55Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
              "type": "removed"
            },
            {
              "text": "For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-overview.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:067441965b63c21f620a0e6e70c4017f639a806f",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement.",
          "type": "removed"
        },
        {
          "text": "For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.",
          "type": "added"
        }
      ],
      "message": "Update accelerated-networking-mana-overview.md",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 6,
      "sha": "067441965b63c21f620a0e6e70c4017f639a806f",
      "short_sha": "0674419",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"For timelines pertaining to VM families running on MANA-capable hardware, see the announcement.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/067441965b63c21f620a0e6e70c4017f639a806f"
    },
    {
      "author": "Brianna Li",
      "date": "2026-04-01T23:01:12Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
          "meaningful_changes": [
            {
              "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
              "type": "removed"
            },
            {
              "text": "For the latest MANA rollout timelines and announcements, see the [MANA announcement].",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/accelerated-networking-mana-overview.md",
          "status": "modified",
          "title": "Accelerated Networking Mana Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2d99fd298c862b4170969063d0c3c712c6cec42e",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For the latest information on MANA rollout timelines, see the MANA announcement. This page provides general MANA concepts and guidance, while rollout details may change over time.",
          "type": "removed"
        },
        {
          "text": "For the latest MANA rollout timelines and announcements, see the [MANA announcement].",
          "type": "added"
        }
      ],
      "message": "Update accelerated-networking-mana-overview.md",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/accelerated-networking-mana-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 6,
      "sha": "2d99fd298c862b4170969063d0c3c712c6cec42e",
      "short_sha": "2d99fd2",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"For the latest MANA rollout timelines and announcements, see the [MANA announcement].\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2d99fd298c862b4170969063d0c3c712c6cec42e"
    },
    {
      "author": "Sarabeth Reingold",
      "date": "2026-04-20T10:16:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 0,
      "files": [],
      "id": "MicrosoftDocs/azure-docs:e08e4e73132ad449b8f86e2ad289d6f603f1ce45",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge branch 'main' into wi-515918-nsp-not-supported-sentinel",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": null,
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "New support or availability language",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 4,
      "sha": "e08e4e73132ad449b8f86e2ad289d6f603f1ce45",
      "short_sha": "e08e4e7",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 0,
        "total": 0
      },
      "summary": "Private Link: Merge branch 'main' into wi-515918-nsp-not-supported-sentinel.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e08e4e73132ad449b8f86e2ad289d6f603f1ce45"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T21:28:52Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
          "meaningful_changes": [
            {
              "text": "You can use Resource Impact table to list all impacted virtual networks (when you have multiple virtual networks selected for the simulation).",
              "type": "removed"
            },
            {
              "text": "You can use Resource Impact tab to list all impacted virtual networks (when you have multiple virtual networks selected for the simulation).",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/traffic-analytics-rule-impact-analyzer.md",
          "status": "modified",
          "title": "Traffic Analytics Rule Impact Analyzer"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5419316294abfd5627b4af262cb00997876cd5d4",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "You can use Resource Impact table to list all impacted virtual networks (when you have multiple virtual networks selected for the simulation).",
          "type": "removed"
        },
        {
          "text": "You can use Resource Impact tab to list all impacted virtual networks (when you have multiple virtual networks selected for the simulation).",
          "type": "added"
        }
      ],
      "message": "correction",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/traffic-analytics-rule-impact-analyzer",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 4,
      "sha": "5419316294abfd5627b4af262cb00997876cd5d4",
      "short_sha": "5419316",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Network Watcher: adds \"You can use Resource Impact tab to list all impacted virtual networks (when you have multiple virtual networks selected for the simulation).\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5419316294abfd5627b4af262cb00997876cd5d4"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-01T12:58:20Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/tutorial-ingress-controller-add-on-new",
          "meaningful_changes": [],
          "path": "articles/application-gateway/tutorial-ingress-controller-add-on-new.md",
          "status": "modified",
          "title": "Tutorial Ingress Controller Add On New"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5cc9a97babbcc827effb5d9a977ebec444479d15",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge pull request #313664 from jaewonparkalexander/patch-1",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/tutorial-ingress-controller-add-on-new",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "New support or availability language",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 4,
      "sha": "5cc9a97babbcc827effb5d9a977ebec444479d15",
      "short_sha": "5cc9a97",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 0,
        "total": 2
      },
      "summary": "Application Gateway: Merge pull request #313664 from jaewonparkalexander/patch-1.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5cc9a97babbcc827effb5d9a977ebec444479d15"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-27T15:40:48Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 9,
          "deletions": 9,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain",
          "meaningful_changes": [
            {
              "text": "If you have your own domain, and the domain isn't already associated with another Azure service that prevalidates domains for Azure Front Door, follow these steps:",
              "type": "removed"
            },
            {
              "text": "If you have your own domain and the domain isn't already associated with another Azure service that prevalidates domains for Azure Front Door, follow these steps:",
              "type": "added"
            },
            {
              "text": "1. On the Add a domain pane, enter or select the following information. Then select Add to onboard the custom domain.",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/standard-premium/how-to-configure-https-custom-domain.md",
          "status": "modified",
          "title": "How To Configure Https Custom Domain"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5eba5d84071a5febb40a20c11102a7f7ea9f6cde",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "If you have your own domain, and the domain isn't already associated with another Azure service that prevalidates domains for Azure Front Door, follow these steps:",
          "type": "removed"
        },
        {
          "text": "If you have your own domain and the domain isn't already associated with another Azure service that prevalidates domains for Azure Front Door, follow these steps:",
          "type": "added"
        },
        {
          "text": "1. On the Add a domain pane, enter or select the following information. Then select Add to onboard the custom domain.",
          "type": "removed"
        },
        {
          "text": "1. On Add a domain, enter or select the following information. Then select Add to onboard the custom domain.",
          "type": "added"
        },
        {
          "text": "1. After the custom domain is successfully associated with an endpoint, Azure Front Door generates a certificate and deploys it. This process might take from several minutes to an hour to finish.",
          "type": "removed"
        },
        {
          "text": "1. After you associate the custom domain with an endpoint, Azure Front Door generates a certificate and deploys it. This process might take several minutes to an hour.",
          "type": "added"
        }
      ],
      "message": "freshness",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "New support or availability language",
        "Release, version, or SKU detail",
        "Networking/security configuration detail"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 2,
      "sha": "5eba5d84071a5febb40a20c11102a7f7ea9f6cde",
      "short_sha": "5eba5d8",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 9,
        "deletions": 9,
        "total": 18
      },
      "summary": "Front Door: adds \"1. On Add a domain, enter or select the following information. Then select Add to onboard the custom domain.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5eba5d84071a5febb40a20c11102a7f7ea9f6cde"
    },
    {
      "author": "duongau",
      "date": "2026-04-13T22:34:46Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 4,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshooting",
              "type": "removed"
            },
            {
              "text": "name: Known issues and limitations",
              "type": "removed"
            },
            {
              "text": "href: https://learn.microsoft.com/troubleshoot/azure/firewall/firewall-known-issues",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/toc.yml",
          "status": "modified",
          "title": "Firewall Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1335a7c428716479e059ed7dd9d57ce9060e2abb",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshooting",
          "type": "removed"
        },
        {
          "text": "name: Known issues and limitations",
          "type": "removed"
        },
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/firewall/firewall-known-issues",
          "type": "removed"
        },
        {
          "text": "name: Support and troubleshooting",
          "type": "added"
        },
        {
          "text": "href: support-help.md",
          "type": "added"
        }
      ],
      "message": "Update TOC: replace Troubleshooting node with Support and troubleshooting",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": null,
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 2,
      "sha": "1335a7c428716479e059ed7dd9d57ce9060e2abb",
      "short_sha": "1335a7c",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 4,
        "total": 6
      },
      "summary": "Azure Firewall: removes \"href: https://learn.microsoft.com/troubleshoot/azure/firewall/firewall-known-issues\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1335a7c428716479e059ed7dd9d57ce9060e2abb"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T17:20:22Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/private-link/private-link-support-help",
          "meaningful_changes": [
            {
              "text": "For a full list of self help troubleshooting content, see Azure Private Link troubleshooting documentation.",
              "type": "removed"
            },
            {
              "text": "For a full list of self help troubleshooting content, see Azure Private Link troubleshooting documentation.",
              "type": "added"
            },
            {
              "text": "Azure Private Link | azure-private-link",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/private-link-support-help.md",
          "status": "modified",
          "title": "Private Link Support Help"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "href: https://learn.microsoft.com/troubleshoot/azure/private-link/welcome-azure-private-link?toc=/azure/private-link/TOC.json",
              "type": "removed"
            },
            {
              "text": "href: /troubleshoot/azure/private-link/welcome-azure-private-link?toc=/azure/private-link/TOC.json",
              "type": "added"
            }
          ],
          "path": "articles/private-link/toc.yml",
          "status": "modified",
          "title": "Private Link Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:c3d90e0c704196c5eccd959272869c15e5fd0302",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For a full list of self help troubleshooting content, see Azure Private Link troubleshooting documentation.",
          "type": "removed"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure Private Link troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Azure Private Link | azure-private-link",
          "type": "removed"
        },
        {
          "text": "Azure Private Link | azure-private-link",
          "type": "added"
        },
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/private-link/welcome-azure-private-link?toc=/azure/private-link/TOC.json",
          "type": "removed"
        },
        {
          "text": "href: /troubleshoot/azure/private-link/welcome-azure-private-link?toc=/azure/private-link/TOC.json",
          "type": "added"
        }
      ],
      "message": "Fix absolute links to relative links in Private Link support-help and TOC",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/private-link-support-help",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 2,
      "sha": "c3d90e0c704196c5eccd959272869c15e5fd0302",
      "short_sha": "c3d90e0",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Private Link: adds \"href: /troubleshoot/azure/private-link/welcome-azure-private-link?toc=/azure/private-link/TOC.json\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/c3d90e0c704196c5eccd959272869c15e5fd0302"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T17:17:44Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/dns/dns-support-help",
          "meaningful_changes": [
            {
              "text": "For a full list of self help troubleshooting content, see Azure DNS troubleshooting documentation.",
              "type": "removed"
            },
            {
              "text": "For a full list of self help troubleshooting content, see Azure DNS troubleshooting documentation.",
              "type": "added"
            },
            {
              "text": "Azure DNS | azure-dns",
              "type": "removed"
            }
          ],
          "path": "articles/dns/dns-support-help.md",
          "status": "modified",
          "title": "Dns Support Help"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "href: https://learn.microsoft.com/troubleshoot/azure/dns/welcome-azure-dns?toc=/azure/dns/TOC.json",
              "type": "removed"
            },
            {
              "text": "href: /troubleshoot/azure/dns/welcome-azure-dns?toc=/azure/dns/TOC.json",
              "type": "added"
            }
          ],
          "path": "articles/dns/TOC.yml",
          "status": "modified",
          "title": "Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:4740a26f2463de6a765741097d08d8c800981d17",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/dns/welcome-azure-dns?toc=/azure/dns/TOC.json",
          "type": "removed"
        },
        {
          "text": "href: /troubleshoot/azure/dns/welcome-azure-dns?toc=/azure/dns/TOC.json",
          "type": "added"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure DNS troubleshooting documentation.",
          "type": "removed"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure DNS troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Azure DNS | azure-dns",
          "type": "removed"
        },
        {
          "text": "Azure DNS | azure-dns",
          "type": "added"
        }
      ],
      "message": "Fix absolute links to relative links in DNS support-help and TOC",
      "paths": [
        "articles/dns"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/dns/dns-support-help",
      "primary_product": "azure-dns",
      "primary_product_label": "Azure DNS",
      "product_labels": [
        "Azure DNS"
      ],
      "products": [
        "azure-dns"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 2,
      "sha": "4740a26f2463de6a765741097d08d8c800981d17",
      "short_sha": "4740a26",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-dns"
      ],
      "sources": [
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Azure DNS: adds \"href: /troubleshoot/azure/dns/welcome-azure-dns?toc=/azure/dns/TOC.json\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/4740a26f2463de6a765741097d08d8c800981d17"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:53:39Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshoot public DNS",
              "type": "removed"
            },
            {
              "text": "href: dns-troubleshoot.md",
              "type": "removed"
            },
            {
              "text": "name: Troubleshoot Azure DNS",
              "type": "added"
            }
          ],
          "path": "articles/dns/TOC.yml",
          "status": "modified",
          "title": "Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:4c9261c24ce010dba0fd82ed84f0424d04fcee19",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshoot public DNS",
          "type": "removed"
        },
        {
          "text": "href: dns-troubleshoot.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot Azure DNS",
          "type": "added"
        },
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/dns/welcome-azure-dns?toc=/azure/dns/TOC.json",
          "type": "added"
        },
        {
          "text": "name: Support and troubleshooting",
          "type": "added"
        },
        {
          "text": "href: dns-support-help.md",
          "type": "added"
        }
      ],
      "message": "Update DNS TOC troubleshoot entry to point to SupportArticles",
      "paths": [
        "articles/dns"
      ],
      "primary_docs_url": null,
      "primary_product": "azure-dns",
      "primary_product_label": "Azure DNS",
      "product_labels": [
        "Azure DNS"
      ],
      "products": [
        "azure-dns"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 2,
      "sha": "4c9261c24ce010dba0fd82ed84f0424d04fcee19",
      "short_sha": "4c9261c",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-dns"
      ],
      "sources": [
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 2,
        "total": 6
      },
      "summary": "Azure DNS: adds \"name: Support and troubleshooting\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/4c9261c24ce010dba0fd82ed84f0424d04fcee19"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-29T17:06:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
          "meaningful_changes": [],
          "path": "articles/application-gateway/for-containers/service-mesh-integration.md",
          "status": "modified",
          "title": "Service Mesh Integration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d8f0b21b481c1beed0cf066f8cb4bc27227a4c9d",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update service-mesh-integration.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "d8f0b21b481c1beed0cf066f8cb4bc27227a4c9d",
      "short_sha": "d8f0b21",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Application Gateway: Mostly maintenance in Service Mesh Integration.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d8f0b21b481c1beed0cf066f8cb4bc27227a4c9d"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-29T16:08:48Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
          "meaningful_changes": [],
          "path": "articles/application-gateway/for-containers/alb-controller-release-notes.md",
          "status": "modified",
          "title": "Alb Controller Release Notes"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d89732e165c9d353717c9f15a56eb4cc2853bea5",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update alb-controller-release-notes.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/alb-controller-release-notes",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "d89732e165c9d353717c9f15a56eb4cc2853bea5",
      "short_sha": "d89732e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: Mostly maintenance in Alb Controller Release Notes.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d89732e165c9d353717c9f15a56eb4cc2853bea5"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-29T16:06:53Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
          "meaningful_changes": [],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Helm"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2a406d30600f65ea2e70fdf2ebf20c1175109990",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update ALB Controller Helm chart version to 1.10.26",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "2a406d30600f65ea2e70fdf2ebf20c1175109990",
      "short_sha": "2a406d3",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 5,
        "total": 10
      },
      "summary": "Application Gateway: Update ALB Controller Helm chart version to 1.10.26.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2a406d30600f65ea2e70fdf2ebf20c1175109990"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-28T19:26:43Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/frontdoor/index.yml",
          "status": "modified",
          "title": "Frontdoor Index"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:c4eec20e1f00b64d93d422c051c2bf98bcb05939",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge pull request #315217 from halkazwini/afd-freshness-03",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "c4eec20e1f00b64d93d422c051c2bf98bcb05939",
      "short_sha": "c4eec20",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Front Door: Merge pull request #315217 from halkazwini/afd-freshness-03.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/c4eec20e1f00b64d93d422c051c2bf98bcb05939"
    },
    {
      "author": "prmerger-automator[bot]",
      "date": "2026-04-27T16:44:33Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-tap-overview",
          "meaningful_changes": [],
          "path": "articles/virtual-network/virtual-network-tap-overview.md",
          "status": "modified",
          "title": "Virtual Network Tap Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:157022a03f50d377e9c51d5984247b80c79425fd",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge pull request #315021 from Albertyang0/2026_04-Monthly-broken-links-fix-153",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-tap-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "157022a03f50d377e9c51d5984247b80c79425fd",
      "short_sha": "157022a",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: Merge pull request #315021 from Albertyang0/2026_04-Monthly-broken-links-fix-153.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/157022a03f50d377e9c51d5984247b80c79425fd"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-27T15:44:15Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/front-door-overview",
          "meaningful_changes": [
            {
              "text": "Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...",
              "type": "removed"
            },
            {
              "text": "Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...",
              "type": "added"
            },
            {
              "text": "Scale out and improve performance of your applications and content by using Microsoft's global cloud CDN and wide area network (WAN):",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-overview.md",
          "status": "modified",
          "title": "Front Door Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:54d7aabb398e09c6ff666c3bb688a6367fe7ebd6",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...",
          "type": "removed"
        },
        {
          "text": "Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...",
          "type": "added"
        },
        {
          "text": "Scale out and improve performance of your applications and content by using Microsoft's global cloud CDN and wide area network (WAN):",
          "type": "removed"
        },
        {
          "text": "Scale out and improve the performance of your applications and content by using Microsoft's global cloud CDN and wide area network (WAN):",
          "type": "added"
        }
      ],
      "message": "Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afd-freshness-03",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/front-door-overview",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "54d7aabb398e09c6ff666c3bb688a6367fe7ebd6",
      "short_sha": "54d7aab",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Front Door: adds \"Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/54d7aabb398e09c6ff666c3bb688a6367fe7ebd6"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-27T15:44:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/frontdoor/index.yml",
          "status": "modified",
          "title": "Frontdoor Index"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1178f0a5abf2c9af40b60f4b9bf60c8b70278be2",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "freshness",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "1178f0a5abf2c9af40b60f4b9bf60c8b70278be2",
      "short_sha": "1178f0a",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Front Door: Mostly maintenance in Frontdoor Index.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1178f0a5abf2c9af40b60f4b9bf60c8b70278be2"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-27T15:28:21Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 3,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/front-door-overview",
          "meaningful_changes": [
            {
              "text": "Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...",
              "type": "removed"
            },
            {
              "text": "Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...",
              "type": "added"
            },
            {
              "text": "Scale out and improve performance of your applications and content by using Microsoft's global cloud CDN and wide area network (WAN):",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/front-door-overview.md",
          "status": "modified",
          "title": "Front Door Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ac4a886056c66378bb0e5515cd6f50bcbc1680c5",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...",
          "type": "removed"
        },
        {
          "text": "Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...",
          "type": "added"
        },
        {
          "text": "Scale out and improve performance of your applications and content by using Microsoft's global cloud CDN and wide area network (WAN):",
          "type": "removed"
        },
        {
          "text": "Scale out and improve the performance of your applications and content by using Microsoft's global cloud CDN and wide area network (WAN):",
          "type": "added"
        }
      ],
      "message": "freshness",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/front-door-overview",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "ac4a886056c66378bb0e5515cd6f50bcbc1680c5",
      "short_sha": "ac4a886",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "Front Door: adds \"Azure Front Door is one of the services in the category of load-balancing and content delivery services in Azure. Other services in this category include Azure Load Balancer and Azure Application Gateway. Each service...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ac4a886056c66378bb0e5515cd6f50bcbc1680c5"
    },
    {
      "author": "Tracey Torble",
      "date": "2026-04-27T14:24:13Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 0,
      "files": [],
      "id": "MicrosoftDocs/azure-docs:9157ed696556f45873d870c176bcfc043b7d182a",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge branch 'main' into patch-8",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": null,
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "9157ed696556f45873d870c176bcfc043b7d182a",
      "short_sha": "9157ed6",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 0,
        "total": 0
      },
      "summary": "ExpressRoute: Merge branch 'main' into patch-8.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/9157ed696556f45873d870c176bcfc043b7d182a"
    },
    {
      "author": "v-thepet",
      "date": "2026-04-23T23:57:03Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations",
          "meaningful_changes": [
            {
              "text": "Deutsche Telekom AG IntraSelect | \u2713 |\u2713 | Frankfurt",
              "type": "removed"
            },
            {
              "text": "Deutsche Telekom AG IntraSelect | \u2713 |\u2713 | Frankfurt",
              "type": "added"
            },
            {
              "text": "T-Systems | \u2713 | \u2713 | Frankfurt",
              "type": "removed"
            }
          ],
          "path": "articles/expressroute/expressroute-locations.md",
          "status": "modified",
          "title": "Expressroute Locations"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations-providers",
          "meaningful_changes": [
            {
              "text": "Dubai2 | du datamena | 3 | UAE North | \u2717 | DE-CIX; du datamena; Equinix; GBI; Lightstorm; Megaport; Orange; Orixcom",
              "type": "removed"
            },
            {
              "text": "Dubai2 | du datamena | 3 | UAE North | \u2717 | DE-CIX; du datamena; Equinix; GBI; Lightstorm; Megaport; Orange; Orixcom",
              "type": "added"
            }
          ],
          "path": "articles/expressroute/expressroute-locations-providers.md",
          "status": "modified",
          "title": "Expressroute Locations Providers"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:361d3affe1ffb1433b63e14b123b6b251d08f8f0",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Dubai2 | du datamena | 3 | UAE North | \u2717 | DE-CIX; du datamena; Equinix; GBI; Lightstorm; Megaport; Orange; Orixcom",
          "type": "removed"
        },
        {
          "text": "Dubai2 | du datamena | 3 | UAE North | \u2717 | DE-CIX; du datamena; Equinix; GBI; Lightstorm; Megaport; Orange; Orixcom",
          "type": "added"
        },
        {
          "text": "Deutsche Telekom AG IntraSelect | \u2713 |\u2713 | Frankfurt",
          "type": "removed"
        },
        {
          "text": "Deutsche Telekom AG IntraSelect | \u2713 |\u2713 | Frankfurt",
          "type": "added"
        },
        {
          "text": "T-Systems | \u2713 | \u2713 | Frankfurt",
          "type": "removed"
        },
        {
          "text": "T-Systems | \u2713 | \u2713 | Frankfurt",
          "type": "added"
        }
      ],
      "message": "fix links",
      "paths": [
        "articles/expressroute"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/expressroute/expressroute-locations",
      "primary_product": "expressroute",
      "primary_product_label": "ExpressRoute",
      "product_labels": [
        "ExpressRoute"
      ],
      "products": [
        "expressroute"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "361d3affe1ffb1433b63e14b123b6b251d08f8f0",
      "short_sha": "361d3af",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-expressroute"
      ],
      "sources": [
        "ExpressRoute docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "ExpressRoute: adds \"Dubai2 | du datamena | 3 | UAE North | \u2717 | DE-CIX; du datamena; Equinix; GBI; Lightstorm; Megaport; Orange; Orixcom\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/361d3affe1ffb1433b63e14b123b6b251d08f8f0"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-23T22:03:57Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
          "meaningful_changes": [
            {
              "text": "3. Uninstall ALB Controller and its resources from your cluster run the following commands:",
              "type": "removed"
            },
            {
              "text": "2. Uninstall ALB Controller and its resources from your cluster run the following commands:",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Helm"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:308d2764c279de6bf39e082e3a514423736bf6be",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "3. Uninstall ALB Controller and its resources from your cluster run the following commands:",
          "type": "removed"
        },
        {
          "text": "2. Uninstall ALB Controller and its resources from your cluster run the following commands:",
          "type": "added"
        }
      ],
      "message": "Fix numbering for ALB Controller uninstallation steps",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "308d2764c279de6bf39e082e3a514423736bf6be",
      "short_sha": "308d276",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: adds \"2. Uninstall ALB Controller and its resources from your cluster run the following commands:\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/308d2764c279de6bf39e082e3a514423736bf6be"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-23T22:03:33Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
          "meaningful_changes": [],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Helm"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1909271af335ae54cdedc09c00b71ed9f894b59c",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Fix formatting in quickstart guide for ALB Controller",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "1909271af335ae54cdedc09c00b71ed9f894b59c",
      "short_sha": "1909271",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: Fix formatting in quickstart guide for ALB Controller.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1909271af335ae54cdedc09c00b71ed9f894b59c"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-22T09:47:29Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: video on-demand and live streaming",
              "type": "removed"
            },
            {
              "text": "name: Video on-demand and live streaming",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/TOC.yml",
          "status": "modified",
          "title": "Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2b9c9b5532383bd64098185069f94c6066a8686c",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: video on-demand and live streaming",
          "type": "removed"
        },
        {
          "text": "name: Video on-demand and live streaming",
          "type": "added"
        }
      ],
      "message": "correction",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "2b9c9b5532383bd64098185069f94c6066a8686c",
      "short_sha": "2b9c9b5",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Front Door: adds \"name: Video on-demand and live streaming\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2b9c9b5532383bd64098185069f94c6066a8686c"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-22T09:10:56Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 2,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: video on-demand and live streaming",
              "type": "added"
            },
            {
              "text": "href: video-on-demand-live-streaming.md",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/TOC.yml",
          "status": "modified",
          "title": "Toc"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/video-on-demand-live-streaming",
          "meaningful_changes": [],
          "path": "articles/frontdoor/video-on-demand-live-streaming.md",
          "status": "renamed",
          "title": "Video On Demand Live Streaming"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:20ef252675e9fff448ed79f86ce8b41d111632c6",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: video on-demand and live streaming",
          "type": "added"
        },
        {
          "text": "href: video-on-demand-live-streaming.md",
          "type": "added"
        }
      ],
      "message": "update toc",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/video-on-demand-live-streaming",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "20ef252675e9fff448ed79f86ce8b41d111632c6",
      "short_sha": "20ef252",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 0,
        "total": 2
      },
      "summary": "Front Door: adds \"name: video on-demand and live streaming\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/20ef252675e9fff448ed79f86ce8b41d111632c6"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T20:27:12Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Load balancing algorithms",
              "type": "removed"
            },
            {
              "text": "href: load-balancing-algorithms.md",
              "type": "removed"
            },
            {
              "text": "name: Load balancing strategies",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/toc.yml",
          "status": "modified",
          "title": "For Containers Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f39aaad449987e3a20f6c8d87de5b01010733bcc",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Load balancing algorithms",
          "type": "removed"
        },
        {
          "text": "href: load-balancing-algorithms.md",
          "type": "removed"
        },
        {
          "text": "name: Load balancing strategies",
          "type": "added"
        },
        {
          "text": "href: load-balancing-strategies.md",
          "type": "added"
        }
      ],
      "message": "Rename load balancing algorithms to strategies",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Low-signal maintenance change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "f39aaad449987e3a20f6c8d87de5b01010733bcc",
      "short_sha": "f39aaad",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Application Gateway: adds \"href: load-balancing-strategies.md\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f39aaad449987e3a20f6c8d87de5b01010733bcc"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T20:26:36Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Load balancing algorithms",
              "type": "added"
            },
            {
              "text": "href: load-balancing-algorithms.md",
              "type": "added"
            }
          ],
          "path": "articles/application-gateway/for-containers/toc.yml",
          "status": "modified",
          "title": "For Containers Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:da4b52ef29afa87c59242ec674375758d0a38b9f",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Load balancing algorithms",
          "type": "added"
        },
        {
          "text": "href: load-balancing-algorithms.md",
          "type": "added"
        }
      ],
      "message": "Add Load balancing algorithms section to toc.yml",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "da4b52ef29afa87c59242ec674375758d0a38b9f",
      "short_sha": "da4b52e",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 0,
        "total": 2
      },
      "summary": "Application Gateway: adds \"href: load-balancing-algorithms.md\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/da4b52ef29afa87c59242ec674375758d0a38b9f"
    },
    {
      "author": "albert",
      "date": "2026-04-21T20:08:06Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-tap-overview",
          "meaningful_changes": [],
          "path": "articles/virtual-network/virtual-network-tap-overview.md",
          "status": "modified",
          "title": "Virtual Network Tap Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b55285f0c3bfb598a6b951afa1c095485a53e450",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "2026_04 - Fix monthly broken links",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/virtual-network-tap-overview",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "b55285f0c3bfb598a6b951afa1c095485a53e450",
      "short_sha": "b55285f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: 202604 - Fix monthly broken links.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b55285f0c3bfb598a6b951afa1c095485a53e450"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:36:34Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 5,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
          "meaningful_changes": [],
          "path": "articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md",
          "status": "modified",
          "title": "Quickstart Deploy Application Gateway For Containers Alb Controller Helm"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:fe831bccb1894c0b7f793125ab2093f2166d38d8",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller-helm",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "fe831bccb1894c0b7f793125ab2093f2166d38d8",
      "short_sha": "fe831bc",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 5,
        "total": 10
      },
      "summary": "Application Gateway: Mostly maintenance in Quickstart Deploy Application Gateway For Containers Alb Controller Helm.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/fe831bccb1894c0b7f793125ab2093f2166d38d8"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:33:33Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
          "meaningful_changes": [],
          "path": "articles/application-gateway/for-containers/service-mesh-integration.md",
          "status": "modified",
          "title": "Service Mesh Integration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:297a9a003d376ded10e4eabc3918803a09ec630c",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update ALB Controller version in documentation",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Release, version, or SKU detail",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "297a9a003d376ded10e4eabc3918803a09ec630c",
      "short_sha": "297a9a0",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: Update ALB Controller version in documentation.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/297a9a003d376ded10e4eabc3918803a09ec630c"
    },
    {
      "author": "Jack Stromberg",
      "date": "2026-04-21T19:31:52Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
          "meaningful_changes": [],
          "path": "articles/application-gateway/for-containers/service-mesh-integration.md",
          "status": "modified",
          "title": "Service Mesh Integration"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a37d9d766ec4763ac93bf67de5915f4d16e537e8",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update date for service mesh integration article",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/for-containers/service-mesh-integration",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "a37d9d766ec4763ac93bf67de5915f4d16e537e8",
      "short_sha": "a37d9d7",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: Update date for service mesh integration article.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a37d9d766ec4763ac93bf67de5915f4d16e537e8"
    },
    {
      "author": "John Downs",
      "date": "2026-04-21T01:35:03Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 11,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/apex-domain",
          "meaningful_changes": [],
          "path": "articles/frontdoor/apex-domain.md",
          "status": "modified",
          "title": "Apex Domain"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/best-practices",
          "meaningful_changes": [],
          "path": "articles/frontdoor/best-practices.md",
          "status": "modified",
          "title": "Best Practices"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/billing",
          "meaningful_changes": [],
          "path": "articles/frontdoor/billing.md",
          "status": "modified",
          "title": "Billing"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/create-front-door-terraform",
          "meaningful_changes": [],
          "path": "articles/frontdoor/create-front-door-terraform.md",
          "status": "modified",
          "title": "Create Front Door Terraform"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/domain",
          "meaningful_changes": [],
          "path": "articles/frontdoor/domain.md",
          "status": "modified",
          "title": "Domain"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/front-door-traffic-acceleration",
          "meaningful_changes": [],
          "path": "articles/frontdoor/front-door-traffic-acceleration.md",
          "status": "modified",
          "title": "Front Door Traffic Acceleration"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/origin-security",
          "meaningful_changes": [],
          "path": "articles/frontdoor/origin-security.md",
          "status": "modified",
          "title": "Origin Security"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/scenarios",
          "meaningful_changes": [],
          "path": "articles/frontdoor/scenarios.md",
          "status": "modified",
          "title": "Scenarios"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/terraform-samples",
          "meaningful_changes": [],
          "path": "articles/frontdoor/terraform-samples.md",
          "status": "modified",
          "title": "Terraform Samples"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/front-door-routing-limits",
          "meaningful_changes": [],
          "path": "articles/frontdoor/front-door-routing-limits.md",
          "status": "modified",
          "title": "Front Door Routing Limits"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:5c413010f321bfa6758b7c00157c61c6622a1a98",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update author (owner) metadata",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/apex-domain",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "5c413010f321bfa6758b7c00157c61c6622a1a98",
      "short_sha": "5c41301",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 20,
        "deletions": 20,
        "total": 40
      },
      "summary": "Front Door: Update author (owner) metadata.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/5c413010f321bfa6758b7c00157c61c6622a1a98"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-20T04:33:22Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/frontdoor/media/deliver-video-demand/microsoft-backbone-network.png",
          "status": "modified",
          "title": "Microsoft Backbone Network"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6734fc2b0e813091c735ee17ed76ce006e8924a3",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "update diagram",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "6734fc2b0e813091c735ee17ed76ce006e8924a3",
      "short_sha": "6734fc2",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 0,
        "total": 0
      },
      "summary": "Front Door: update diagram.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6734fc2b0e813091c735ee17ed76ce006e8924a3"
    },
    {
      "author": "MJyot",
      "date": "2026-04-17T07:41:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/configuration-http-settings",
          "meaningful_changes": [],
          "path": "articles/application-gateway/configuration-http-settings.md",
          "status": "modified",
          "title": "Configuration Http Settings"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:8d3bb7f3c19f436980522a8171fb2a30bec5b4a9",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update HTTP settings documentation with legacy client note",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/configuration-http-settings",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "8d3bb7f3c19f436980522a8171fb2a30bec5b4a9",
      "short_sha": "8d3bb7f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 0,
        "total": 3
      },
      "summary": "Application Gateway: Update HTTP settings documentation with legacy client note.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/8d3bb7f3c19f436980522a8171fb2a30bec5b4a9"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-16T20:47:15Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
          "meaningful_changes": [
            {
              "text": "titleSuffix: Azure Front Door",
              "type": "added"
            },
            {
              "text": "Azure Front Door streaming concepts",
              "type": "removed"
            },
            {
              "text": "Delivering video on-demand and live streaming with Azure Front Door",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/deliver-video-demand.md",
          "status": "modified",
          "title": "Deliver Video Demand"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6b8b074d4a9039caed94da8572cee72c8f41c953",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "titleSuffix: Azure Front Door",
          "type": "added"
        },
        {
          "text": "Azure Front Door streaming concepts",
          "type": "removed"
        },
        {
          "text": "Delivering video on-demand and live streaming with Azure Front Door",
          "type": "added"
        }
      ],
      "message": "title correction",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "6b8b074d4a9039caed94da8572cee72c8f41c953",
      "short_sha": "6b8b074",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 2,
        "total": 5
      },
      "summary": "Front Door: adds \"Delivering video on-demand and live streaming with Azure Front Door\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6b8b074d4a9039caed94da8572cee72c8f41c953"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-16T20:18:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 20,
          "deletions": 23,
          "docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
          "meaningful_changes": [
            {
              "text": "By routing traffic across Microsoft's private network between these distributed edge locations, Azure Front Door can minimize latency, avoid congested public internet paths, and provide highly resilient delivery...",
              "type": "removed"
            },
            {
              "text": "Azure Front Door minimizes latency and avoids congested public internet paths by routing traffic across Microsoft's private network between distributed edge locations, providing highly resilient delivery...",
              "type": "added"
            },
            {
              "text": "Performance at a glance",
              "type": "removed"
            }
          ],
          "path": "articles/frontdoor/deliver-video-demand.md",
          "status": "modified",
          "title": "Deliver Video Demand"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:aadd32a410f20a92dbc94d3defe1ba50921244e8",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "By routing traffic across Microsoft's private network between these distributed edge locations, Azure Front Door can minimize latency, avoid congested public internet paths, and provide highly resilient delivery...",
          "type": "removed"
        },
        {
          "text": "Azure Front Door minimizes latency and avoids congested public internet paths by routing traffic across Microsoft's private network between distributed edge locations, providing highly resilient delivery...",
          "type": "added"
        },
        {
          "text": "Performance at a glance",
          "type": "removed"
        },
        {
          "text": "Performance benchmark",
          "type": "added"
        },
        {
          "text": "Both CDNs were tested against the same MPEG-DASH on-demand reference stream: six video representations from 512\u00d7288 (~360 kbps) to 1920\u00d71080 (~4,500 kbps), alongside three AAC-LC audio tracks (96\u2013160 kbps, 48 kHz...",
          "type": "removed"
        },
        {
          "text": "Both CDNs were tested against the same MPEG-DASH on-demand reference stream: six video representations from 512\u00d7288 (~360 kbps) to 1920\u00d71080 (~4,500 kbps), alongside three AAC-LC audio tracks (96\u2013160 kbps, 48-kHz...",
          "type": "added"
        }
      ],
      "message": "acrolinx tweaks",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/frontdoor/deliver-video-demand",
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "aadd32a410f20a92dbc94d3defe1ba50921244e8",
      "short_sha": "aadd32a",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 20,
        "deletions": 23,
        "total": 43
      },
      "summary": "Front Door: adds \"Azure Front Door minimizes latency and avoids congested public internet paths by routing traffic across Microsoft's private network between distributed edge locations, providing highly resilient delivery...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/aadd32a410f20a92dbc94d3defe1ba50921244e8"
    },
    {
      "author": "Hussein Al Kazwini",
      "date": "2026-04-14T20:19:03Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "What are the locations of the Azure Front Door POPs (points-of-presfence)?",
              "type": "removed"
            },
            {
              "text": "What are the locations of the Azure Front Door POPs (points-of-presence)?",
              "type": "added"
            }
          ],
          "path": "articles/frontdoor/front-door-faq.yml",
          "status": "modified",
          "title": "Front Door Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2b853df572c5b4a7d48dafbbe45f5c8432026d31",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "What are the locations of the Azure Front Door POPs (points-of-presfence)?",
          "type": "removed"
        },
        {
          "text": "What are the locations of the Azure Front Door POPs (points-of-presence)?",
          "type": "added"
        }
      ],
      "message": "Fix typo in Azure Front Door FAQ question",
      "paths": [
        "articles/frontdoor"
      ],
      "primary_docs_url": null,
      "primary_product": "front-door",
      "primary_product_label": "Front Door",
      "product_labels": [
        "Front Door"
      ],
      "products": [
        "front-door"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "2b853df572c5b4a7d48dafbbe45f5c8432026d31",
      "short_sha": "2b853df",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-front-door"
      ],
      "sources": [
        "Front Door docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Front Door: adds \"What are the locations of the Azure Front Door POPs (points-of-presence)?\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2b853df572c5b4a7d48dafbbe45f5c8432026d31"
    },
    {
      "author": "mbender-ms",
      "date": "2026-04-14T15:04:11Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/toc.yml",
          "status": "modified",
          "title": "Application Gateway Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e1044382b29e312c25a65ba8bf2d1d517f3ff698",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Updated TOC",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "e1044382b29e312c25a65ba8bf2d1d517f3ff698",
      "short_sha": "e104438",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: Updated TOC.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e1044382b29e312c25a65ba8bf2d1d517f3ff698"
    },
    {
      "author": "duongau",
      "date": "2026-04-13T23:13:38Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 0,
          "deletions": 100,
          "docs_url": "https://learn.microsoft.com/azure/firewall/firewall-known-issues",
          "meaningful_changes": [
            {
              "text": "Azure Firewall known issues and limitations",
              "type": "removed"
            },
            {
              "text": "This article helps you understand the current known issues and limitations in Azure Firewall. We update this information as issues are resolved, so check back regularly for the latest status.",
              "type": "removed"
            },
            {
              "text": "Before you deploy Azure Firewall or troubleshoot existing deployments, review these known issues to avoid common problems and plan appropriate workarounds.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/firewall-known-issues.md",
          "status": "removed",
          "title": "Firewall Known Issues"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:43eb9db6a2648f666245cfb1ac8b0a0783e21d6f",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Azure Firewall known issues and limitations",
          "type": "removed"
        },
        {
          "text": "This article helps you understand the current known issues and limitations in Azure Firewall. We update this information as issues are resolved, so check back regularly for the latest status.",
          "type": "removed"
        },
        {
          "text": "Before you deploy Azure Firewall or troubleshoot existing deployments, review these known issues to avoid common problems and plan appropriate workarounds.",
          "type": "removed"
        },
        {
          "text": "For Azure Firewall service limits, see Azure subscription and service limits, quotas, and constraints.",
          "type": "removed"
        },
        {
          "text": "Current capacity constraints",
          "type": "removed"
        },
        {
          "text": "The following zones are currently experiencing capacity constraints:",
          "type": "removed"
        }
      ],
      "message": "Delete firewall-known-issues.md \u2014 replaced by redirect to SupportArticles",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/firewall-known-issues",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "43eb9db6a2648f666245cfb1ac8b0a0783e21d6f",
      "short_sha": "43eb9db",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 100,
        "total": 100
      },
      "summary": "Azure Firewall: removes \"Before you deploy Azure Firewall or troubleshoot existing deployments, review these known issues to avoid common problems and plan appropriate workarounds.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/43eb9db6a2648f666245cfb1ac8b0a0783e21d6f"
    },
    {
      "author": "duongau",
      "date": "2026-04-13T22:27:49Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "href: firewall-known-issues.md",
              "type": "removed"
            },
            {
              "text": "href: https://learn.microsoft.com/troubleshoot/azure/firewall/firewall-known-issues",
              "type": "added"
            }
          ],
          "path": "articles/firewall/toc.yml",
          "status": "modified",
          "title": "Firewall Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:6877cdb2471b23a24c8c809219f7e36d261fd759",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "href: firewall-known-issues.md",
          "type": "removed"
        },
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/firewall/firewall-known-issues",
          "type": "added"
        }
      ],
      "message": "Update TOC to point Known issues to troubleshoot repo",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": null,
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "6877cdb2471b23a24c8c809219f7e36d261fd759",
      "short_sha": "6877cdb",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Azure Firewall: adds \"href: https://learn.microsoft.com/troubleshoot/azure/firewall/firewall-known-issues\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/6877cdb2471b23a24c8c809219f7e36d261fd759"
    },
    {
      "author": "Diana Richards",
      "date": "2026-04-13T21:57:00Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 4,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshoot",
              "type": "removed"
            },
            {
              "text": "href: troubleshoot.md",
              "type": "removed"
            },
            {
              "text": "name: Troubleshoot",
              "type": "added"
            }
          ],
          "path": "articles/bastion/TOC.yml",
          "status": "modified",
          "title": "Toc"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-linux-rdp",
          "meaningful_changes": [
            {
              "text": "For troubleshooting tips, see Troubleshooting.",
              "type": "removed"
            },
            {
              "text": "For troubleshooting tips, see Troubleshooting.",
              "type": "added"
            }
          ],
          "path": "articles/bastion/bastion-connect-vm-linux-rdp.md",
          "status": "modified",
          "title": "Bastion Connect Vm Linux Rdp"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-rdp-windows",
          "meaningful_changes": [
            {
              "text": "For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server",
              "type": "removed"
            },
            {
              "text": "For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server",
              "type": "added"
            }
          ],
          "path": "articles/bastion/bastion-connect-vm-rdp-windows.md",
          "status": "modified",
          "title": "Bastion Connect Vm Rdp Windows"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-overview",
          "meaningful_changes": [
            {
              "text": "For information about troubleshooting and frequently asked questions, see the troubleshooting guide and Azure Bastion FAQ.",
              "type": "removed"
            },
            {
              "text": "For information about troubleshooting and frequently asked questions, see the troubleshooting guide and Azure Bastion FAQ.",
              "type": "added"
            }
          ],
          "path": "articles/bastion/bastion-overview.md",
          "status": "modified",
          "title": "Bastion Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2b9cb3601ec40c130b776713fb0f0367c75517c3",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshoot",
          "type": "removed"
        },
        {
          "text": "href: troubleshoot.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot",
          "type": "added"
        },
        {
          "text": "href: /troubleshoot/azure/bastion/welcome-azure-bastion",
          "type": "added"
        },
        {
          "text": "For troubleshooting tips, see Troubleshooting.",
          "type": "removed"
        },
        {
          "text": "For troubleshooting tips, see Troubleshooting.",
          "type": "added"
        },
        {
          "text": "For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server",
          "type": "removed"
        },
        {
          "text": "For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server",
          "type": "added"
        },
        {
          "text": "For information about troubleshooting and frequently asked questions, see the troubleshooting guide and Azure Bastion FAQ.",
          "type": "removed"
        },
        {
          "text": "For information about troubleshooting and frequently asked questions, see the troubleshooting guide and Azure Bastion FAQ.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314657 from cherylmc/Bastion-redirect",
      "paths": [
        "articles/bastion"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-linux-rdp",
      "primary_product": "bastion",
      "primary_product_label": "Bastion",
      "product_labels": [
        "Bastion"
      ],
      "products": [
        "bastion"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "2b9cb3601ec40c130b776713fb0f0367c75517c3",
      "short_sha": "2b9cb36",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-bastion"
      ],
      "sources": [
        "Bastion docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 5,
        "total": 10
      },
      "summary": "Bastion: adds \"For troubleshooting tips, see Troubleshooting RDP connections and Troubleshoot Microsoft Entra sign in for a Windows virtual machine in Azure or Arc-enabled Windows Server\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2b9cb3601ec40c130b776713fb0f0367c75517c3"
    },
    {
      "author": "mbender-ms",
      "date": "2026-04-13T19:06:23Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 40,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/load-balancer/.openpublishing.redirection.load-balancer.json",
          "status": "modified",
          "title": ".Openpublishing.Redirection.Load Balancer"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:726afb02ed5c03da4f31f0bb181a184186304579",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Add redirects for retired LB troubleshoot articles",
      "paths": [
        "articles/load-balancer"
      ],
      "primary_docs_url": null,
      "primary_product": "load-balancer",
      "primary_product_label": "Load Balancer",
      "product_labels": [
        "Load Balancer"
      ],
      "products": [
        "load-balancer"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "726afb02ed5c03da4f31f0bb181a184186304579",
      "short_sha": "726afb0",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-load-balancer"
      ],
      "sources": [
        "Load Balancer docs"
      ],
      "stats": {
        "additions": 40,
        "deletions": 0,
        "total": 40
      },
      "summary": "Load Balancer: Add redirects for retired LB troubleshoot articles.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/726afb02ed5c03da4f31f0bb181a184186304579"
    },
    {
      "author": "Bo wen Yang",
      "date": "2026-04-13T19:02:12Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/trusted-internet-connections-content",
          "meaningful_changes": [
            {
              "text": "Federal App Innovation - TIC 3.0",
              "type": "removed"
            },
            {
              "text": "Federal App Innovation - TIC 3.0",
              "type": "added"
            }
          ],
          "path": "docs/networking/architecture/trusted-internet-connections-content.md",
          "status": "modified",
          "title": "Trusted Internet Connections Content"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:ded4c1e5a6f9e291e7f7ac10ddef62ce37286c7c",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [
        {
          "text": "Federal App Innovation - TIC 3.0",
          "type": "removed"
        },
        {
          "text": "Federal App Innovation - TIC 3.0",
          "type": "added"
        }
      ],
      "message": "2026_04 - Fix monthly broken links",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/architecture/networking/architecture/trusted-internet-connections-content",
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 0,
      "sha": "ded4c1e5a6f9e291e7f7ac10ddef62ce37286c7c",
      "short_sha": "ded4c1e",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Architecture Center: adds \"Federal App Innovation - TIC 3.0\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/ded4c1e5a6f9e291e7f7ac10ddef62ce37286c7c"
    },
    {
      "author": "aybatra",
      "date": "2026-04-10T23:21:45Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/virtual-wan/monitor-point-to-site-connections",
          "meaningful_changes": [],
          "path": "articles/virtual-wan/monitor-point-to-site-connections.md",
          "status": "modified",
          "title": "Monitor Point To Site Connections"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:af5562d3b8546ba54d99f557d98bac535b21651f",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Change author from siddomala to cherylmc",
      "paths": [
        "articles/virtual-wan"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-wan/monitor-point-to-site-connections",
      "primary_product": "virtual-wan",
      "primary_product_label": "Virtual WAN",
      "product_labels": [
        "Virtual WAN"
      ],
      "products": [
        "virtual-wan"
      ],
      "reasons": [
        "Operational or migration guidance",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "af5562d3b8546ba54d99f557d98bac535b21651f",
      "short_sha": "af5562d",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-wan"
      ],
      "sources": [
        "Virtual WAN docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Virtual WAN: Change author from siddomala to cherylmc.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/af5562d3b8546ba54d99f557d98bac535b21651f"
    },
    {
      "author": "aybatra",
      "date": "2026-04-10T23:19:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/route-server/route-server-capacity",
          "meaningful_changes": [],
          "path": "articles/route-server/route-server-capacity.md",
          "status": "modified",
          "title": "Route Server Capacity"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:03abc1641ba0806554e32ed9d4b9af4885569443",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update author information in route-server-capacity.md",
      "paths": [
        "articles/route-server"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/route-server/route-server-capacity",
      "primary_product": "route-server",
      "primary_product_label": "Route Server",
      "product_labels": [
        "Route Server"
      ],
      "products": [
        "route-server"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "03abc1641ba0806554e32ed9d4b9af4885569443",
      "short_sha": "03abc16",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-route-server"
      ],
      "sources": [
        "Route Server docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 2,
        "total": 4
      },
      "summary": "Route Server: Mostly maintenance in Route Server Capacity.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/03abc1641ba0806554e32ed9d4b9af4885569443"
    },
    {
      "author": "v-thepet",
      "date": "2026-04-09T23:07:57Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/application-gateway/application-gateway-faq.yml",
          "status": "modified",
          "title": "Application Gateway Faq"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:e90dd2cd9106e12ee0b9e1743cc3b29e79422434",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "fix links",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "e90dd2cd9106e12ee0b9e1743cc3b29e79422434",
      "short_sha": "e90dd2c",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Application Gateway: fix links.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/e90dd2cd9106e12ee0b9e1743cc3b29e79422434"
    },
    {
      "author": "Regan Downer",
      "date": "2026-04-09T19:02:55Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 4,
      "files": [
        {
          "additions": 0,
          "deletions": 82,
          "docs_url": "https://learn.microsoft.com/azure/dns/dns-troubleshoot",
          "meaningful_changes": [
            {
              "text": "Azure DNS troubleshooting guide",
              "type": "removed"
            },
            {
              "text": "This article provides troubleshooting information for common Azure DNS questions.",
              "type": "removed"
            },
            {
              "text": "If these steps don't resolve your issue, you can also search for or post your issue on our Microsoft Q&A question page for community support. Or, you can open an Azure support request.",
              "type": "removed"
            }
          ],
          "path": "articles/dns/dns-troubleshoot.md",
          "status": "removed",
          "title": "Dns Troubleshoot"
        },
        {
          "additions": 65,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/dns/dns-support-help",
          "meaningful_changes": [
            {
              "text": "Support and troubleshooting for Azure DNS",
              "type": "added"
            },
            {
              "text": "Here are suggestions for where you can get help when developing your Azure DNS solutions.",
              "type": "added"
            },
            {
              "text": "Self help troubleshooting",
              "type": "added"
            }
          ],
          "path": "articles/dns/dns-support-help.md",
          "status": "added",
          "title": "Dns Support Help"
        },
        {
          "additions": 4,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshoot public DNS",
              "type": "removed"
            },
            {
              "text": "href: dns-troubleshoot.md",
              "type": "removed"
            },
            {
              "text": "name: Troubleshoot Azure DNS",
              "type": "added"
            }
          ],
          "path": "articles/dns/TOC.yml",
          "status": "modified",
          "title": "Toc"
        },
        {
          "additions": 9,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/dns/.openpublishing.redirection.dns.json",
          "status": "added",
          "title": ".Openpublishing.Redirection.Dns"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:cda557b0255be10d6aaae60637cc6bef03ab6909",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshoot public DNS",
          "type": "removed"
        },
        {
          "text": "href: dns-troubleshoot.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot Azure DNS",
          "type": "added"
        },
        {
          "text": "href: /troubleshoot/azure/dns/welcome-azure-dns?toc=/azure/dns/TOC.json",
          "type": "added"
        },
        {
          "text": "name: Support and troubleshooting",
          "type": "added"
        },
        {
          "text": "href: dns-support-help.md",
          "type": "added"
        },
        {
          "text": "Support and troubleshooting for Azure DNS",
          "type": "added"
        },
        {
          "text": "Here are suggestions for where you can get help when developing your Azure DNS solutions.",
          "type": "added"
        },
        {
          "text": "Self help troubleshooting",
          "type": "added"
        },
        {
          "text": "Various articles explain how to determine, diagnose, and fix issues that you might encounter when using Azure DNS. Use these articles to troubleshoot deployment failures, configuration issues, name resolution problems...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #314523 from asudbring/us568604-ts-redirect",
      "paths": [
        "articles/dns"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/dns/dns-troubleshoot",
      "primary_product": "azure-dns",
      "primary_product_label": "Azure DNS",
      "product_labels": [
        "Azure DNS"
      ],
      "products": [
        "azure-dns"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "cda557b0255be10d6aaae60637cc6bef03ab6909",
      "short_sha": "cda557b",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-dns"
      ],
      "sources": [
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 78,
        "deletions": 84,
        "total": 162
      },
      "summary": "Azure DNS: adds \"Support and troubleshooting for Azure DNS\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/cda557b0255be10d6aaae60637cc6bef03ab6909"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T17:19:53Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-gateway-support-help",
          "meaningful_changes": [
            {
              "text": "For a full list of self help troubleshooting content, see Azure NAT Gateway troubleshooting documentation.",
              "type": "removed"
            },
            {
              "text": "For a full list of self help troubleshooting content, see Azure NAT Gateway troubleshooting documentation.",
              "type": "added"
            },
            {
              "text": "Azure NAT Gateway | azure-nat-gateway",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/nat-gateway-support-help.md",
          "status": "modified",
          "title": "Nat Gateway Support Help"
        },
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "href: https://learn.microsoft.com/troubleshoot/azure/nat-gateway/welcome-azure-nat-gateway?toc=/azure/nat-gateway/TOC.json",
              "type": "removed"
            },
            {
              "text": "href: /troubleshoot/azure/nat-gateway/welcome-azure-nat-gateway?toc=/azure/nat-gateway/TOC.json",
              "type": "added"
            }
          ],
          "path": "articles/nat-gateway/toc.yml",
          "status": "modified",
          "title": "Nat Gateway Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:c6d5e1c1b5e8a230f624b46d4f5d05860e508c07",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "For a full list of self help troubleshooting content, see Azure NAT Gateway troubleshooting documentation.",
          "type": "removed"
        },
        {
          "text": "For a full list of self help troubleshooting content, see Azure NAT Gateway troubleshooting documentation.",
          "type": "added"
        },
        {
          "text": "Azure NAT Gateway | azure-nat-gateway",
          "type": "removed"
        },
        {
          "text": "Azure NAT Gateway | azure-nat-gateway",
          "type": "added"
        },
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/nat-gateway/welcome-azure-nat-gateway?toc=/azure/nat-gateway/TOC.json",
          "type": "removed"
        },
        {
          "text": "href: /troubleshoot/azure/nat-gateway/welcome-azure-nat-gateway?toc=/azure/nat-gateway/TOC.json",
          "type": "added"
        }
      ],
      "message": "Fix absolute links to relative links in NAT Gateway support-help and TOC",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/nat-gateway/nat-gateway-support-help",
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "c6d5e1c1b5e8a230f624b46d4f5d05860e508c07",
      "short_sha": "c6d5e1c",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 3,
        "total": 6
      },
      "summary": "NAT Gateway: adds \"href: /troubleshoot/azure/nat-gateway/welcome-azure-nat-gateway?toc=/azure/nat-gateway/TOC.json\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/c6d5e1c1b5e8a230f624b46d4f5d05860e508c07"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:59:19Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 9,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/traffic-manager/.openpublishing.redirection.traffic-manager.json",
          "status": "added",
          "title": ".Openpublishing.Redirection.Traffic Manager"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b3bd57264a81ba6532dfeb3676160c83eb09163a",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Add redirect for Traffic Manager troubleshoot article to SupportArticles",
      "paths": [
        "articles/traffic-manager"
      ],
      "primary_docs_url": null,
      "primary_product": "traffic-manager",
      "primary_product_label": "Traffic Manager",
      "product_labels": [
        "Traffic Manager"
      ],
      "products": [
        "traffic-manager"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "b3bd57264a81ba6532dfeb3676160c83eb09163a",
      "short_sha": "b3bd572",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-traffic-manager"
      ],
      "sources": [
        "Traffic Manager docs"
      ],
      "stats": {
        "additions": 9,
        "deletions": 0,
        "total": 9
      },
      "summary": "Traffic Manager: Add redirect for Traffic Manager troubleshoot article to SupportArticles.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b3bd57264a81ba6532dfeb3676160c83eb09163a"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:57:22Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 4,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshoot private endpoint connectivity problems",
              "type": "removed"
            },
            {
              "text": "href: troubleshoot-private-endpoint-connectivity.md",
              "type": "removed"
            },
            {
              "text": "name: Troubleshoot Private Link service connectivity problems",
              "type": "removed"
            }
          ],
          "path": "articles/private-link/toc.yml",
          "status": "modified",
          "title": "Private Link Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:1468c3381ae119e3693feb67bda89296bd6b8572",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshoot private endpoint connectivity problems",
          "type": "removed"
        },
        {
          "text": "href: troubleshoot-private-endpoint-connectivity.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot Private Link service connectivity problems",
          "type": "removed"
        },
        {
          "text": "href: troubleshoot-private-link-connectivity.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot Azure Private Link",
          "type": "added"
        },
        {
          "text": "href: https://learn.microsoft.com/troubleshoot/azure/private-link/welcome-azure-private-link?toc=/azure/private-link/TOC.json",
          "type": "added"
        }
      ],
      "message": "Update Private Link TOC troubleshoot entries to point to SupportArticles",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": null,
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "1468c3381ae119e3693feb67bda89296bd6b8572",
      "short_sha": "1468c33",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 4,
        "total": 8
      },
      "summary": "Private Link: adds \"href: https://learn.microsoft.com/troubleshoot/azure/private-link/welcome-azure-private-link?toc=/azure/private-link/TOC.json\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/1468c3381ae119e3693feb67bda89296bd6b8572"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:57:13Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 14,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/private-link/.openpublishing.redirection.private-link.json",
          "status": "added",
          "title": ".Openpublishing.Redirection.Private Link"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:35b3a25e8fab72424e1fd4fa6037256842c0facc",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Add redirects for Private Link troubleshoot articles to SupportArticles",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": null,
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "35b3a25e8fab72424e1fd4fa6037256842c0facc",
      "short_sha": "35b3a25",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 14,
        "deletions": 0,
        "total": 14
      },
      "summary": "Private Link: Add redirects for Private Link troubleshoot articles to SupportArticles.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/35b3a25e8fab72424e1fd4fa6037256842c0facc"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:55:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 4,
          "deletions": 6,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Troubleshoot NAT gateway",
              "type": "removed"
            },
            {
              "text": "href: troubleshoot-nat.md",
              "type": "removed"
            },
            {
              "text": "name: Troubleshoot NAT gateway connectivity",
              "type": "removed"
            }
          ],
          "path": "articles/nat-gateway/toc.yml",
          "status": "modified",
          "title": "Nat Gateway Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:52dec84ce6f8aa10e304ebeec8eddac39cb8f058",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Troubleshoot NAT gateway",
          "type": "removed"
        },
        {
          "text": "href: troubleshoot-nat.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot NAT gateway connectivity",
          "type": "removed"
        },
        {
          "text": "href: troubleshoot-nat-connectivity.md",
          "type": "removed"
        },
        {
          "text": "name: Troubleshoot NAT gateway and Azure services",
          "type": "removed"
        },
        {
          "text": "href: troubleshoot-nat-and-azure-services.md",
          "type": "removed"
        }
      ],
      "message": "Update NAT Gateway TOC troubleshoot entries to point to SupportArticles",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "52dec84ce6f8aa10e304ebeec8eddac39cb8f058",
      "short_sha": "52dec84",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 4,
        "deletions": 6,
        "total": 10
      },
      "summary": "NAT Gateway: removes \"name: Troubleshoot NAT gateway and Azure services\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/52dec84ce6f8aa10e304ebeec8eddac39cb8f058"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:55:24Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 19,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/nat-gateway/.openpublishing.redirection.nat-gateway.json",
          "status": "added",
          "title": ".Openpublishing.Redirection.Nat Gateway"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:74d9a4adafe1b63c76fb76b622246a7bcb69486e",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Add redirects for NAT Gateway troubleshoot articles to SupportArticles",
      "paths": [
        "articles/nat-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "nat-gateway",
      "primary_product_label": "NAT Gateway",
      "product_labels": [
        "NAT Gateway"
      ],
      "products": [
        "nat-gateway"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "74d9a4adafe1b63c76fb76b622246a7bcb69486e",
      "short_sha": "74d9a4a",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-nat-gateway"
      ],
      "sources": [
        "NAT Gateway docs"
      ],
      "stats": {
        "additions": 19,
        "deletions": 0,
        "total": 19
      },
      "summary": "NAT Gateway: Add redirects for NAT Gateway troubleshoot articles to SupportArticles.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/74d9a4adafe1b63c76fb76b622246a7bcb69486e"
    },
    {
      "author": "asudbring",
      "date": "2026-04-09T16:53:33Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 9,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/dns/.openpublishing.redirection.dns.json",
          "status": "added",
          "title": ".Openpublishing.Redirection.Dns"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f512551f1ed1f5f58e49ed1c8607bd6a5889f54b",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Add redirect for dns-troubleshoot.md to SupportArticles",
      "paths": [
        "articles/dns"
      ],
      "primary_docs_url": null,
      "primary_product": "azure-dns",
      "primary_product_label": "Azure DNS",
      "product_labels": [
        "Azure DNS"
      ],
      "products": [
        "azure-dns"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "f512551f1ed1f5f58e49ed1c8607bd6a5889f54b",
      "short_sha": "f512551",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-dns"
      ],
      "sources": [
        "Azure DNS docs"
      ],
      "stats": {
        "additions": 9,
        "deletions": 0,
        "total": 9
      },
      "summary": "Azure DNS: Add redirect for dns-troubleshoot.md to SupportArticles.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f512551f1ed1f5f58e49ed1c8607bd6a5889f54b"
    },
    {
      "author": "Simon Painter",
      "date": "2026-04-09T08:13:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 0,
      "files": [],
      "id": "MicrosoftDocs/azure-docs:f2ebdfc8eb0023a96503267f378f684c3051e539",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge branch 'main' into update/network-virtual-appliance-docs",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": null,
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "f2ebdfc8eb0023a96503267f378f684c3051e539",
      "short_sha": "f2ebdfc",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 0,
        "total": 0
      },
      "summary": "Virtual Network: Merge branch 'main' into update/network-virtual-appliance-docs.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f2ebdfc8eb0023a96503267f378f684c3051e539"
    },
    {
      "author": "Cheryl McGuire",
      "date": "2026-04-08T21:17:43Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 2,
      "files": [
        {
          "additions": 0,
          "deletions": 151,
          "docs_url": "https://learn.microsoft.com/azure/bastion/troubleshoot",
          "meaningful_changes": [
            {
              "text": "Troubleshoot Azure Bastion",
              "type": "removed"
            },
            {
              "text": "This article helps you diagnose and resolve common issues with Azure Bastion.",
              "type": "removed"
            },
            {
              "text": "Review these common problems and solutions before you contact support. We update this information regularly as new solutions become available.",
              "type": "removed"
            }
          ],
          "path": "articles/bastion/troubleshoot.md",
          "status": "removed",
          "title": "Troubleshoot"
        },
        {
          "additions": 5,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/bastion/.openpublishing.redirection.bastion.json",
          "status": "modified",
          "title": ".Openpublishing.Redirection.Bastion"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:86fdcc65250afe23d2f7e0b514b7b51727e40a55",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Troubleshoot Azure Bastion",
          "type": "removed"
        },
        {
          "text": "This article helps you diagnose and resolve common issues with Azure Bastion.",
          "type": "removed"
        },
        {
          "text": "Review these common problems and solutions before you contact support. We update this information regularly as new solutions become available.",
          "type": "removed"
        },
        {
          "text": "Deployment and configuration issues",
          "type": "removed"
        },
        {
          "text": "This section describes common deployment and configuration issues and their resolutions.",
          "type": "removed"
        },
        {
          "text": "Issue |Description |Resolution",
          "type": "removed"
        }
      ],
      "message": "Redirect to Troubleshooting repo",
      "paths": [
        "articles/bastion"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/bastion/troubleshoot",
      "primary_product": "bastion",
      "primary_product_label": "Bastion",
      "product_labels": [
        "Bastion"
      ],
      "products": [
        "bastion"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "86fdcc65250afe23d2f7e0b514b7b51727e40a55",
      "short_sha": "86fdcc6",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-bastion"
      ],
      "sources": [
        "Bastion docs"
      ],
      "stats": {
        "additions": 5,
        "deletions": 151,
        "total": 156
      },
      "summary": "Bastion: removes \"Review these common problems and solutions before you contact support. We update this information regularly as new solutions become available.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/86fdcc65250afe23d2f7e0b514b7b51727e40a55"
    },
    {
      "author": "v-ccolin",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/hub-spoke.yml",
          "status": "modified",
          "title": "Hub Spoke"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:80073016e9015879da60fb3da6e083851368871a",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [],
      "message": "edit",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": null,
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 0,
      "sha": "80073016e9015879da60fb3da6e083851368871a",
      "short_sha": "8007301",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Architecture Center: edit.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/80073016e9015879da60fb3da6e083851368871a"
    },
    {
      "author": "Jose Moreno",
      "date": "2026-04-08T13:00:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "docs/networking/architecture/hub-spoke.yml",
          "status": "modified",
          "title": "Hub Spoke"
        }
      ],
      "id": "MicrosoftDocs/architecture-center:b8319a2f413b77fa083d80cf55b2751167930db9",
      "is_noise": true,
      "kind": "architecture",
      "kinds": [
        "architecture"
      ],
      "meaningful_changes": [],
      "message": "Update publication date for hub-spoke topology document",
      "paths": [
        "docs/networking"
      ],
      "primary_docs_url": null,
      "primary_product": "architecture-center",
      "primary_product_label": "Architecture Center",
      "product_labels": [
        "Architecture Center"
      ],
      "products": [
        "architecture-center"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/architecture-center",
      "score": 0,
      "sha": "b8319a2f413b77fa083d80cf55b2751167930db9",
      "short_sha": "b8319a2",
      "signal": "Housekeeping",
      "source_ids": [
        "architecture-center-networking"
      ],
      "sources": [
        "Architecture Center networking"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Architecture Center: Update publication date for hub-spoke topology document.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/architecture-center/commit/b8319a2f413b77fa083d80cf55b2751167930db9"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-07T21:14:59Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 2,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Rules impact analyzer",
              "type": "added"
            },
            {
              "text": "href: traffic-analytics-rule-impact-analyzer.md",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/toc.yml",
          "status": "modified",
          "title": "Network Watcher Toc"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:8e33b31c75d1526a681ceba7f6cfc8d88f0498e7",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Rules impact analyzer",
          "type": "added"
        },
        {
          "text": "href: traffic-analytics-rule-impact-analyzer.md",
          "type": "added"
        }
      ],
      "message": "update toc",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": null,
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "8e33b31c75d1526a681ceba7f6cfc8d88f0498e7",
      "short_sha": "8e33b31",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 2,
        "deletions": 0,
        "total": 2
      },
      "summary": "Network Watcher: adds \"href: traffic-analytics-rule-impact-analyzer.md\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/8e33b31c75d1526a681ceba7f6cfc8d88f0498e7"
    },
    {
      "author": "Brian Lehr",
      "date": "2026-04-06T18:19:04Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/create-public-ip-terraform",
          "meaningful_changes": [
            {
              "text": "Zone-Redundant Standardv2 SKU",
              "type": "removed"
            },
            {
              "text": "Zone-Redundant Standardv2 SKU",
              "type": "added"
            }
          ],
          "path": "articles/virtual-network/ip-services/create-public-ip-terraform.md",
          "status": "modified",
          "title": "Create Public Ip Terraform"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:57dfda33e01146a52473ebfa383c889f80d7bb2e",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Zone-Redundant Standardv2 SKU",
          "type": "removed"
        },
        {
          "text": "Zone-Redundant Standardv2 SKU",
          "type": "added"
        }
      ],
      "message": "Fix tab header formatting for Standardv2 SKU tab",
      "paths": [
        "articles/virtual-network"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/virtual-network/ip-services/create-public-ip-terraform",
      "primary_product": "virtual-network",
      "primary_product_label": "Virtual Network",
      "product_labels": [
        "Virtual Network"
      ],
      "products": [
        "virtual-network"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "57dfda33e01146a52473ebfa383c889f80d7bb2e",
      "short_sha": "57dfda3",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-virtual-network"
      ],
      "sources": [
        "Virtual Network docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Virtual Network: adds \"Zone-Redundant Standardv2 SKU\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/57dfda33e01146a52473ebfa383c889f80d7bb2e"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T21:42:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 3,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "::: zone pivot=\"virtual-network\"",
              "type": "added"
            },
            {
              "text": "::: zone pivot=\"virtual-network\"",
              "type": "removed"
            },
            {
              "text": "2. Enter the required query parameters:",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/flow-logs-power-bi.md",
          "status": "modified",
          "title": "Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:13c2514c480ced88195ec2338f0726f78f858e92",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "::: zone pivot=\"virtual-network\"",
          "type": "added"
        },
        {
          "text": "::: zone pivot=\"virtual-network\"",
          "type": "removed"
        },
        {
          "text": "2. Enter the required query parameters:",
          "type": "added"
        }
      ],
      "message": "correction",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "13c2514c480ced88195ec2338f0726f78f858e92",
      "short_sha": "13c2514",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 3,
        "deletions": 1,
        "total": 4
      },
      "summary": "Network Watcher: adds \"2. Enter the required query parameters:\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/13c2514c480ced88195ec2338f0726f78f858e92"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T21:33:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 7,
          "deletions": 5,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "1. Enter the required query parameters:",
              "type": "removed"
            },
            {
              "text": "2. Enter the required query parameters:",
              "type": "added"
            },
            {
              "text": "::: zone pivot=\"virtual-network\"",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/flow-logs-power-bi.md",
          "status": "modified",
          "title": "Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a99d416e3ab90bc908b03836c465edb59aae1016",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "1. Enter the required query parameters:",
          "type": "removed"
        },
        {
          "text": "2. Enter the required query parameters:",
          "type": "added"
        },
        {
          "text": "::: zone pivot=\"virtual-network\"",
          "type": "added"
        },
        {
          "text": "::: zone pivot=\"virtual-network\"",
          "type": "removed"
        },
        {
          "text": "StorageAccountName: the name of the storage account containing the flow logs that you want to load and visualize.",
          "type": "added"
        },
        {
          "text": "1. Enter the access key for your storage account. You can find valid access keys by going to your storage account in the Azure portal and selecting Access keys under Security + networking.",
          "type": "removed"
        }
      ],
      "message": "fix indentation and numbering",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "a99d416e3ab90bc908b03836c465edb59aae1016",
      "short_sha": "a99d416",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 7,
        "deletions": 5,
        "total": 12
      },
      "summary": "Network Watcher: adds \"StorageAccountName: the name of the storage account containing the flow logs that you want to load and visualize.\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a99d416e3ab90bc908b03836c465edb59aae1016"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T21:17:06Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "Virtual Network flow logs allow you to view information about ingress and egress IP traffic on Virtual Networks. These flow logs show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple...",
              "type": "removed"
            },
            {
              "text": "Virtual Network flow logs allow you to view information about ingress and egress IP traffic on Virtual Networks. These flow logs show outbound and inbound flows on a per rule basis, the network interface (NIC) the flow...",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/flow-logs-power-bi.md",
          "status": "modified",
          "title": "Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:a3f0631167e59ac8efabc49ca5f1a9d4d693bced",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Virtual Network flow logs allow you to view information about ingress and egress IP traffic on Virtual Networks. These flow logs show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple...",
          "type": "removed"
        },
        {
          "text": "Virtual Network flow logs allow you to view information about ingress and egress IP traffic on Virtual Networks. These flow logs show outbound and inbound flows on a per rule basis, the network interface (NIC) the flow...",
          "type": "added"
        }
      ],
      "message": "acrolinx tweaks",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "a3f0631167e59ac8efabc49ca5f1a9d4d693bced",
      "short_sha": "a3f0631",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Network Watcher: adds \"Virtual Network flow logs allow you to view information about ingress and egress IP traffic on Virtual Networks. These flow logs show outbound and inbound flows on a per rule basis, the network interface (NIC) the flow...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/a3f0631167e59ac8efabc49ca5f1a9d4d693bced"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T21:16:07Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 7,
          "deletions": 7,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
          "meaningful_changes": [
            {
              "text": "In the following scenario, you connect Power BI desktop to your storage account configured as the sink for your flow logging data. After you connect to the storage account, Power BI downloads and parses the logs to...",
              "type": "removed"
            },
            {
              "text": "In the following scenario, you connect Power BI desktop to your storage account configured as the sink for your flow logging data. After you connect to the storage account, Power BI downloads and parses the logs to...",
              "type": "added"
            },
            {
              "text": "1. Download and open the following Power BI template in your Power BI Desktop Network Watcher PowerBI flow logs template",
              "type": "removed"
            }
          ],
          "path": "articles/network-watcher/flow-logs-power-bi.md",
          "status": "modified",
          "title": "Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:89b640a673568189f4bcc0df1f0b4e65e75378a0",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "In the following scenario, you connect Power BI desktop to your storage account configured as the sink for your flow logging data. After you connect to the storage account, Power BI downloads and parses the logs to...",
          "type": "removed"
        },
        {
          "text": "In the following scenario, you connect Power BI desktop to your storage account configured as the sink for your flow logging data. After you connect to the storage account, Power BI downloads and parses the logs to...",
          "type": "added"
        },
        {
          "text": "1. Download and open the following Power BI template in your Power BI Desktop Network Watcher PowerBI flow logs template",
          "type": "removed"
        },
        {
          "text": "1. Download and open the following Power BI template in your Power BI Desktop Network Watcher Power BI flow logs template",
          "type": "added"
        },
        {
          "text": "NumberOfLogFiles: the number of log files that you want to download and visualize in Power BI. For example, if you enter 50, then you can view the latest 50 log files. If you have 2 virtual networks enabled and...",
          "type": "removed"
        },
        {
          "text": "NumberOfLogFiles: the number of log files that you want to download and visualize in Power BI. For example, if you enter 50, then you can view the latest 50 log files. If you have two virtual networks enabled and...",
          "type": "added"
        }
      ],
      "message": "acrolinx tweaks",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "89b640a673568189f4bcc0df1f0b4e65e75378a0",
      "short_sha": "89b640a",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 7,
        "deletions": 7,
        "total": 14
      },
      "summary": "Network Watcher: adds \"NumberOfLogFiles: the number of log files that you want to download and visualize in Power BI. For example, if you enter 50, then you can view the latest 50 log files. If you have two virtual networks enabled and...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/89b640a673568189f4bcc0df1f0b4e65e75378a0"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T21:13:30Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 3,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [
            {
              "text": "name: Use Power BI",
              "type": "removed"
            },
            {
              "text": "href: network-watcher-visualize-nsg-flow-logs-power-bi.md",
              "type": "removed"
            },
            {
              "text": "name: Visualize flow logs with Power BI",
              "type": "added"
            }
          ],
          "path": "articles/network-watcher/toc.yml",
          "status": "modified",
          "title": "Network Watcher Toc"
        },
        {
          "additions": 5,
          "deletions": 0,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/network-watcher/.openpublishing.redirection.network-watcher.json",
          "status": "modified",
          "title": ".Openpublishing.Redirection.Network Watcher"
        },
        {
          "additions": 0,
          "deletions": 0,
          "docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
          "meaningful_changes": [],
          "path": "articles/network-watcher/flow-logs-power-bi.md",
          "status": "renamed",
          "title": "Flow Logs Power Bi"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0733163fe0146ad27fd5d4b89b35b5296c887a18",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "name: Use Power BI",
          "type": "removed"
        },
        {
          "text": "href: network-watcher-visualize-nsg-flow-logs-power-bi.md",
          "type": "removed"
        },
        {
          "text": "name: Visualize flow logs with Power BI",
          "type": "added"
        },
        {
          "text": "href: flow-logs-power-bi.md",
          "type": "added"
        }
      ],
      "message": "rename md file",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/network-watcher/flow-logs-power-bi",
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "Troubleshooting article redirect or publishing maintenance"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "0733163fe0146ad27fd5d4b89b35b5296c887a18",
      "short_sha": "0733163",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 7,
        "deletions": 2,
        "total": 9
      },
      "summary": "Network Watcher: adds \"name: Visualize flow logs with Power BI\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0733163fe0146ad27fd5d4b89b35b5296c887a18"
    },
    {
      "author": "halkazwini",
      "date": "2026-04-03T19:25:18Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 0,
      "files": [],
      "id": "MicrosoftDocs/azure-docs:0e67adf06ea184b7a5490cf32cbae26061b69fc9",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-powerbi",
      "paths": [
        "articles/network-watcher"
      ],
      "primary_docs_url": null,
      "primary_product": "network-watcher",
      "primary_product_label": "Network Watcher",
      "product_labels": [
        "Network Watcher"
      ],
      "products": [
        "network-watcher"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "0e67adf06ea184b7a5490cf32cbae26061b69fc9",
      "short_sha": "0e67adf",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-network-watcher"
      ],
      "sources": [
        "Network Watcher docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 0,
        "total": 0
      },
      "summary": "Network Watcher: Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-powerbi.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0e67adf06ea184b7a5490cf32cbae26061b69fc9"
    },
    {
      "author": "duongau",
      "date": "2026-04-02T00:13:03Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 41,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-to-aks-private-cluster",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-connect-to-aks-private-cluster.md",
          "status": "modified",
          "title": "Bastion Connect To Aks Private Cluster"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-linux-rdp",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-connect-vm-linux-rdp.md",
          "status": "modified",
          "title": "Bastion Connect Vm Linux Rdp"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-rdp-windows",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-connect-vm-rdp-windows.md",
          "status": "modified",
          "title": "Bastion Connect Vm Rdp Windows"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-scale-set",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-connect-vm-scale-set.md",
          "status": "modified",
          "title": "Bastion Connect Vm Scale Set"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-ssh-linux",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-connect-vm-ssh-linux.md",
          "status": "modified",
          "title": "Bastion Connect Vm Ssh Linux"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-vm-ssh-windows",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-connect-vm-ssh-windows.md",
          "status": "modified",
          "title": "Bastion Connect Vm Ssh Windows"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-create-host-powershell",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-create-host-powershell.md",
          "status": "modified",
          "title": "Bastion Create Host Powershell"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-entra-id-authentication",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-entra-id-authentication.md",
          "status": "modified",
          "title": "Bastion Entra Id Authentication"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-faq",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-faq.md",
          "status": "modified",
          "title": "Bastion Faq"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/bastion/bastion-nsg",
          "meaningful_changes": [],
          "path": "articles/bastion/bastion-nsg.md",
          "status": "modified",
          "title": "Bastion NSG"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:f71dba80c7ff69806547762ff88515a2e404dcab",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "docs: Update author metadata to cherylmc for Bastion articles",
      "paths": [
        "articles/bastion"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/bastion/bastion-connect-to-aks-private-cluster",
      "primary_product": "bastion",
      "primary_product_label": "Bastion",
      "product_labels": [
        "Bastion"
      ],
      "products": [
        "bastion"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "f71dba80c7ff69806547762ff88515a2e404dcab",
      "short_sha": "f71dba8",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-bastion"
      ],
      "sources": [
        "Bastion docs"
      ],
      "stats": {
        "additions": 82,
        "deletions": 82,
        "total": 164
      },
      "summary": "Bastion: docs: Update author metadata to cherylmc for Bastion articles.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/f71dba80c7ff69806547762ff88515a2e404dcab"
    },
    {
      "author": "duongau",
      "date": "2026-04-02T00:10:02Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 33,
      "files": [
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/alerts",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/alerts.md",
          "status": "modified",
          "title": "Alerts"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-diagnostic-alert-templates",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-diagnostic-alert-templates.md",
          "status": "modified",
          "title": "Ddos Diagnostic Alert Templates"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": null,
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-faq.yml",
          "status": "modified",
          "title": "Ddos Faq"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-optimization-guide",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-optimization-guide.md",
          "status": "modified",
          "title": "Ddos Optimization Guide"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-pricing-guide",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-pricing-guide.md",
          "status": "modified",
          "title": "Ddos Pricing Guide"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-protection-features",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-protection-features.md",
          "status": "modified",
          "title": "Ddos Protection Features"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-protection-overview",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-protection-overview.md",
          "status": "modified",
          "title": "Ddos Protection Overview"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-protection-partner-onboarding",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-protection-partner-onboarding.md",
          "status": "modified",
          "title": "Ddos Protection Partner Onboarding"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-protection-reference-architectures",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-protection-reference-architectures.md",
          "status": "modified",
          "title": "Ddos Protection Reference Architectures"
        },
        {
          "additions": 2,
          "deletions": 2,
          "docs_url": "https://learn.microsoft.com/azure/ddos-protection/ddos-protection-sku-comparison",
          "meaningful_changes": [],
          "path": "articles/ddos-protection/ddos-protection-sku-comparison.md",
          "status": "modified",
          "title": "Ddos Protection Sku Comparison"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:74d618cd9a1e3f0b7cc3c9eda25fee82794a67ed",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "docs: Update author metadata to duongau/duau for DDoS Protection articles",
      "paths": [
        "articles/ddos-protection"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/ddos-protection/alerts",
      "primary_product": "ddos-protection",
      "primary_product_label": "DDoS Protection",
      "product_labels": [
        "DDoS Protection"
      ],
      "products": [
        "ddos-protection"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "74d618cd9a1e3f0b7cc3c9eda25fee82794a67ed",
      "short_sha": "74d618c",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-ddos"
      ],
      "sources": [
        "DDoS Protection docs"
      ],
      "stats": {
        "additions": 66,
        "deletions": 66,
        "total": 132
      },
      "summary": "DDoS Protection: docs: Update author metadata to duongau/duau for DDoS Protection articles.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/74d618cd9a1e3f0b7cc3c9eda25fee82794a67ed"
    },
    {
      "author": "MJyot",
      "date": "2026-03-31T04:32:26Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 6,
          "deletions": 6,
          "docs_url": "https://learn.microsoft.com/azure/application-gateway/configuration-infrastructure",
          "meaningful_changes": [
            {
              "text": "Subnet | Create new | Microsoft.Network/virtualNetworks/subnets/write ; 'Microsoft.Network/virtualNetworks/subnets/join/action",
              "type": "removed"
            },
            {
              "text": "Subnet | Use existing | Microsoft.Network/virtualNetworks/subnets/read ; Microsoft.Network/virtualNetworks/subnets/join/action",
              "type": "removed"
            },
            {
              "text": "IP addresses | Create new | Microsoft.Network/publicIPAddresses/write ; Microsoft.Network/publicIPAddresses/join/action",
              "type": "removed"
            }
          ],
          "path": "articles/application-gateway/configuration-infrastructure.md",
          "status": "modified",
          "title": "Configuration Infrastructure"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:0d6026fee9af324ddccfe94d4763a6718af7b360",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Subnet | Create new | Microsoft.Network/virtualNetworks/subnets/write ; 'Microsoft.Network/virtualNetworks/subnets/join/action",
          "type": "removed"
        },
        {
          "text": "Subnet | Use existing | Microsoft.Network/virtualNetworks/subnets/read ; Microsoft.Network/virtualNetworks/subnets/join/action",
          "type": "removed"
        },
        {
          "text": "IP addresses | Create new | Microsoft.Network/publicIPAddresses/write ; Microsoft.Network/publicIPAddresses/join/action",
          "type": "removed"
        },
        {
          "text": "IP addresses | Use existing | Microsoft.Network/publicIPAddresses/read ; Microsoft.Network/publicIPAddresses/join/action",
          "type": "removed"
        },
        {
          "text": "ApplicationGatewayWebApplicationFirewallPolicies | Create new / Update existing | Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies/write...",
          "type": "removed"
        },
        {
          "text": "Subnet | Create new | - Microsoft.Network/virtualNetworks/subnets/write; - Microsoft.Network/virtualNetworks/subnets/join/action",
          "type": "added"
        }
      ],
      "message": "Fix formatting of Azure permissions in documentation",
      "paths": [
        "articles/application-gateway"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/application-gateway/configuration-infrastructure",
      "primary_product": "application-gateway",
      "primary_product_label": "Application Gateway",
      "product_labels": [
        "Application Gateway"
      ],
      "products": [
        "application-gateway"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "0d6026fee9af324ddccfe94d4763a6718af7b360",
      "short_sha": "0d6026f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-app-gateway"
      ],
      "sources": [
        "Application Gateway docs"
      ],
      "stats": {
        "additions": 6,
        "deletions": 6,
        "total": 12
      },
      "summary": "Application Gateway: adds \"Subnet | Create new | - Microsoft.Network/virtualNetworks/subnets/write; - Microsoft.Network/virtualNetworks/subnets/join/action\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0d6026fee9af324ddccfe94d4763a6718af7b360"
    },
    {
      "author": "James Barnett",
      "date": "2026-03-30T23:58:20Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 4,
      "files": [
        {
          "additions": 314,
          "deletions": 181,
          "docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-hybrid-ps",
          "meaningful_changes": [
            {
              "text": "This article requires that you run PowerShell locally. You must have the Azure PowerShell module installed. Run Get-Module -ListAvailable Az to find the version. If you need to upgrade, see Install the Azure PowerShell...",
              "type": "removed"
            },
            {
              "text": "This article requires that you run PowerShell locally. You must have the Azure PowerShell module installed. Run Get-Module -ListAvailable Az to find the version. If you need to upgrade, see Install the Azure PowerShell...",
              "type": "added"
            },
            {
              "text": "There are three key requirements for this scenario to work correctly:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/tutorial-hybrid-ps.md",
          "status": "modified",
          "title": "Tutorial Hybrid Ps"
        },
        {
          "additions": 143,
          "deletions": 160,
          "docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-firewall-deploy-portal-policy",
          "meaningful_changes": [
            {
              "text": "Tutorial: Deploy and configure Azure Firewall and policy using the Azure portal",
              "type": "removed"
            },
            {
              "text": "Tutorial: Deploy and configure Azure Firewall and policy by using the Azure portal",
              "type": "added"
            },
            {
              "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/tutorial-firewall-deploy-portal-policy.md",
          "status": "modified",
          "title": "Tutorial Firewall Deploy Portal Policy"
        },
        {
          "additions": 124,
          "deletions": 149,
          "docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-protect-firewall-ddos",
          "meaningful_changes": [
            {
              "text": "This article helps you create an Azure Firewall with a DDoS protected virtual network. Azure DDoS Protection enables enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and...",
              "type": "removed"
            },
            {
              "text": "This article helps you create an Azure Firewall with a DDoS protected virtual network. Azure DDoS Protection provides enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and...",
              "type": "added"
            },
            {
              "text": "AzureFirewallSubnet - the firewall is in this subnet.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/tutorial-protect-firewall-ddos.md",
          "status": "modified",
          "title": "Tutorial Protect Firewall Ddos"
        },
        {
          "additions": 94,
          "deletions": 54,
          "docs_url": "https://learn.microsoft.com/azure/firewall/firewall-sftp",
          "meaningful_changes": [
            {
              "text": "Access a storage account using SFTP over an Azure Firewall static public IP address",
              "type": "removed"
            },
            {
              "text": "Access a storage account by using SFTP over an Azure Firewall static public IP address",
              "type": "added"
            },
            {
              "text": "You can use Azure Firewall to access a storage account container via SFTP. Azure PowerShell is used to deploy a firewall in a virtual network and configured with DNAT rules to translate the SFTP traffic to the storage...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/firewall-sftp.md",
          "status": "modified",
          "title": "Firewall Sftp"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:d8614af11391d04df25fb56e4ff96b732a7798c8",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Access a storage account using SFTP over an Azure Firewall static public IP address",
          "type": "removed"
        },
        {
          "text": "Access a storage account by using SFTP over an Azure Firewall static public IP address",
          "type": "added"
        },
        {
          "text": "You can use Azure Firewall to access a storage account container via SFTP. Azure PowerShell is used to deploy a firewall in a virtual network and configured with DNAT rules to translate the SFTP traffic to the storage...",
          "type": "removed"
        },
        {
          "text": "Use Azure Firewall to access a storage account container through SFTP. Use Azure PowerShell to deploy a firewall in a virtual network and configure it with DNAT rules to translate the SFTP traffic to the storage...",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"media/firewall-sftp/accessing-storage-using-sftp.png\" alt-text=\"Diagram showing SFTP to firewall to access a storage account container.\"...",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"media/firewall-sftp/accessing-storage-using-sftp.png\" alt-text=\"Diagram that shows a customer connecting via SFTP to Azure Firewall, which routes traffic through a private endpoint to a...",
          "type": "added"
        },
        {
          "text": "Tutorial: Deploy and configure Azure Firewall and policy using the Azure portal",
          "type": "removed"
        },
        {
          "text": "Tutorial: Deploy and configure Azure Firewall and policy by using the Azure portal",
          "type": "added"
        },
        {
          "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you may want to limit access to web sites. Or, you may want to limit the outbound IP addresses and ports that...",
          "type": "removed"
        },
        {
          "text": "Controlling outbound network access is an important part of an overall network security plan. For example, you might want to limit access to websites. Or, you might want to limit the outbound IP addresses and ports...",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313840 from duongau/firewall-freshness-review-564969-P2b",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/tutorial-hybrid-ps",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "d8614af11391d04df25fb56e4ff96b732a7798c8",
      "short_sha": "d8614af",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 675,
        "deletions": 544,
        "total": 1219
      },
      "summary": "Azure Firewall: adds \":::image type=\"content\" source=\"media/firewall-sftp/accessing-storage-using-sftp.png\" alt-text=\"Diagram that shows a customer connecting via SFTP to Azure Firewall, which routes traffic through a private endpoint to a...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/d8614af11391d04df25fb56e4ff96b732a7798c8"
    },
    {
      "author": "Dennis Rea",
      "date": "2026-03-30T22:42:08Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 7,
      "files": [
        {
          "additions": 27,
          "deletions": 26,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-terraform",
          "meaningful_changes": [
            {
              "text": "contentwellnotification:",
              "type": "removed"
            },
            {
              "text": "contentwellnotification:",
              "type": "added"
            },
            {
              "text": "In this quickstart, you use Terraform to deploy an Azure Firewall in three Availability Zones.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-terraform.md",
          "status": "modified",
          "title": "Deploy Terraform"
        },
        {
          "additions": 24,
          "deletions": 25,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-ipgroup-terraform",
          "meaningful_changes": [
            {
              "text": "contentwellnotification:",
              "type": "removed"
            },
            {
              "text": "contentwellnotification:",
              "type": "added"
            },
            {
              "text": "In this quickstart, you use Terraform to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that allows you to define and group IP addresses...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-ipgroup-terraform.md",
          "status": "modified",
          "title": "Quick Create Ipgroup Terraform"
        },
        {
          "additions": 23,
          "deletions": 25,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-terraform",
          "meaningful_changes": [
            {
              "text": "contentwellnotification:",
              "type": "removed"
            },
            {
              "text": "contentwellnotification:",
              "type": "added"
            },
            {
              "text": "In this quickstart, you use Terraform to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-multiple-ip-terraform.md",
          "status": "modified",
          "title": "Quick Create Multiple Ip Terraform"
        },
        {
          "additions": 14,
          "deletions": 14,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-template",
          "meaningful_changes": [
            {
              "text": "In this quickstart, you use an Azure Resource Manager template (ARM template) to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection...",
              "type": "removed"
            },
            {
              "text": "In this quickstart, use an Azure Resource Manager template (ARM template) to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection...",
              "type": "added"
            },
            {
              "text": "If your environment meets the prerequisites and you're familiar with using ARM templates, select the Deploy to Azure button. The template will open in the Azure portal.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-multiple-ip-template.md",
          "status": "modified",
          "title": "Quick Create Multiple Ip Template"
        },
        {
          "additions": 12,
          "deletions": 13,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-bicep",
          "meaningful_changes": [
            {
              "text": "In this quickstart, you use Bicep to deploy an Azure Firewall in three Availability Zones.",
              "type": "removed"
            },
            {
              "text": "In this quickstart, use Bicep to deploy an Azure Firewall in three Availability Zones.",
              "type": "added"
            },
            {
              "text": "The Bicep file creates a test network environment with a firewall. The network has one virtual network (VNet) with three subnets: AzureFirewallSubnet, ServersSubnet, and JumpboxSubnet. The ServersSubnet and...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-bicep.md",
          "status": "modified",
          "title": "Deploy Bicep"
        },
        {
          "additions": 11,
          "deletions": 14,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-multiple-ip-bicep",
          "meaningful_changes": [
            {
              "text": "In this quickstart, you use a Bicep file to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to...",
              "type": "removed"
            },
            {
              "text": "In this quickstart, use a Bicep file to deploy an Azure Firewall with multiple public IP addresses from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two...",
              "type": "added"
            },
            {
              "text": "Multiple Azure resources are defined in the template:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-multiple-ip-bicep.md",
          "status": "modified",
          "title": "Quick Create Multiple Ip Bicep"
        },
        {
          "additions": 12,
          "deletions": 12,
          "docs_url": "https://learn.microsoft.com/azure/firewall/quick-create-ipgroup-bicep",
          "meaningful_changes": [
            {
              "text": "In this quickstart, you use a Bicep file to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that allows you to define and group IP...",
              "type": "removed"
            },
            {
              "text": "In this quickstart, use a Bicep file to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that you use to define and group IP addresses...",
              "type": "added"
            },
            {
              "text": "Multiple Azure resources are defined in the Bicep file:",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/quick-create-ipgroup-bicep.md",
          "status": "modified",
          "title": "Quick Create Ipgroup Bicep"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:2daec3f9f448e8db996340e20bf2160f0e4d0993",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "In this quickstart, you use Bicep to deploy an Azure Firewall in three Availability Zones.",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use Bicep to deploy an Azure Firewall in three Availability Zones.",
          "type": "added"
        },
        {
          "text": "The Bicep file creates a test network environment with a firewall. The network has one virtual network (VNet) with three subnets: AzureFirewallSubnet, ServersSubnet, and JumpboxSubnet. The ServersSubnet and...",
          "type": "removed"
        },
        {
          "text": "The Bicep file creates a test network environment with a firewall. The network has one virtual network with three subnets: AzureFirewallSubnet, ServersSubnet, and JumpboxSubnet. The ServersSubnet and JumpboxSubnet...",
          "type": "added"
        },
        {
          "text": "Multiple Azure resources are defined in the Bicep file:",
          "type": "removed"
        },
        {
          "text": "The Bicep file defines multiple Azure resources, including:",
          "type": "added"
        },
        {
          "text": "contentwellnotification:",
          "type": "removed"
        },
        {
          "text": "contentwellnotification:",
          "type": "added"
        },
        {
          "text": "In this quickstart, you use Terraform to deploy an Azure Firewall in three Availability Zones.",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use Terraform to deploy an Azure Firewall in three Availability Zones.",
          "type": "added"
        }
      ],
      "message": "Merge pull request #313842 from duongau/firewall-freshness-review-564969-P3",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/deploy-terraform",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "2daec3f9f448e8db996340e20bf2160f0e4d0993",
      "short_sha": "2daec3f",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 123,
        "deletions": 129,
        "total": 252
      },
      "summary": "Azure Firewall: adds \"The Bicep file creates a test network environment with a firewall. The network has one virtual network with three subnets: AzureFirewallSubnet, ServersSubnet, and JumpboxSubnet. The ServersSubnet and JumpboxSubnet...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/2daec3f9f448e8db996340e20bf2160f0e4d0993"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:25:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 27,
          "deletions": 26,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-terraform",
          "meaningful_changes": [
            {
              "text": "contentwellnotification:",
              "type": "removed"
            },
            {
              "text": "contentwellnotification:",
              "type": "added"
            },
            {
              "text": "In this quickstart, you use Terraform to deploy an Azure Firewall in three Availability Zones.",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-terraform.md",
          "status": "modified",
          "title": "Deploy Terraform"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:c8658805bda0f3d3bfe8c7abe3b92a1cf29858e4",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "contentwellnotification:",
          "type": "removed"
        },
        {
          "text": "contentwellnotification:",
          "type": "added"
        },
        {
          "text": "In this quickstart, you use Terraform to deploy an Azure Firewall in three Availability Zones.",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use Terraform to deploy an Azure Firewall in three Availability Zones.",
          "type": "added"
        },
        {
          "text": "The Terraform configuration creates a test network environment with a firewall. The network has one virtual network (VNet) with three subnets: AzureFirewallSubnet, subnet-server, and subnet-jump. The subnet-server and...",
          "type": "removed"
        },
        {
          "text": "The Terraform configuration creates a test network environment with a firewall. The network has one virtual network with three subnets: AzureFirewallSubnet, subnet-server, and subnet-jump. The subnet-server and...",
          "type": "added"
        }
      ],
      "message": "docs: Fix metadata, replace VNet with 'virtual network', fix style guide issues, fix broken Next steps link",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/deploy-terraform",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "c8658805bda0f3d3bfe8c7abe3b92a1cf29858e4",
      "short_sha": "c865880",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 27,
        "deletions": 26,
        "total": 53
      },
      "summary": "Azure Firewall: adds \"The Terraform configuration creates a test network environment with a firewall. The network has one virtual network with three subnets: AzureFirewallSubnet, subnet-server, and subnet-jump. The subnet-server and...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/c8658805bda0f3d3bfe8c7abe3b92a1cf29858e4"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:25:25Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 12,
          "deletions": 13,
          "docs_url": "https://learn.microsoft.com/azure/firewall/deploy-bicep",
          "meaningful_changes": [
            {
              "text": "In this quickstart, you use Bicep to deploy an Azure Firewall in three Availability Zones.",
              "type": "removed"
            },
            {
              "text": "In this quickstart, use Bicep to deploy an Azure Firewall in three Availability Zones.",
              "type": "added"
            },
            {
              "text": "The Bicep file creates a test network environment with a firewall. The network has one virtual network (VNet) with three subnets: AzureFirewallSubnet, ServersSubnet, and JumpboxSubnet. The ServersSubnet and...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/deploy-bicep.md",
          "status": "modified",
          "title": "Deploy Bicep"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:bb391fa8e27f0d841408680ab280f12cba6040e0",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "In this quickstart, you use Bicep to deploy an Azure Firewall in three Availability Zones.",
          "type": "removed"
        },
        {
          "text": "In this quickstart, use Bicep to deploy an Azure Firewall in three Availability Zones.",
          "type": "added"
        },
        {
          "text": "The Bicep file creates a test network environment with a firewall. The network has one virtual network (VNet) with three subnets: AzureFirewallSubnet, ServersSubnet, and JumpboxSubnet. The ServersSubnet and...",
          "type": "removed"
        },
        {
          "text": "The Bicep file creates a test network environment with a firewall. The network has one virtual network with three subnets: AzureFirewallSubnet, ServersSubnet, and JumpboxSubnet. The ServersSubnet and JumpboxSubnet...",
          "type": "added"
        },
        {
          "text": "Multiple Azure resources are defined in the Bicep file:",
          "type": "removed"
        },
        {
          "text": "The Bicep file defines multiple Azure resources, including:",
          "type": "added"
        }
      ],
      "message": "docs: Fix metadata, replace VNet with 'virtual network', fix style guide issues, fix broken Next steps link",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/deploy-bicep",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "bb391fa8e27f0d841408680ab280f12cba6040e0",
      "short_sha": "bb391fa",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 12,
        "deletions": 13,
        "total": 25
      },
      "summary": "Azure Firewall: adds \"The Bicep file creates a test network environment with a firewall. The network has one virtual network with three subnets: AzureFirewallSubnet, ServersSubnet, and JumpboxSubnet. The ServersSubnet and JumpboxSubnet...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/bb391fa8e27f0d841408680ab280f12cba6040e0"
    },
    {
      "author": "duongau",
      "date": "2026-03-30T20:07:09Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 94,
          "deletions": 54,
          "docs_url": "https://learn.microsoft.com/azure/firewall/firewall-sftp",
          "meaningful_changes": [
            {
              "text": "Access a storage account using SFTP over an Azure Firewall static public IP address",
              "type": "removed"
            },
            {
              "text": "Access a storage account by using SFTP over an Azure Firewall static public IP address",
              "type": "added"
            },
            {
              "text": "You can use Azure Firewall to access a storage account container via SFTP. Azure PowerShell is used to deploy a firewall in a virtual network and configured with DNAT rules to translate the SFTP traffic to the storage...",
              "type": "removed"
            }
          ],
          "path": "articles/firewall/firewall-sftp.md",
          "status": "modified",
          "title": "Firewall Sftp"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:b3f771884677b972aad7ccf84f981fa3d722046d",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [
        {
          "text": "Access a storage account using SFTP over an Azure Firewall static public IP address",
          "type": "removed"
        },
        {
          "text": "Access a storage account by using SFTP over an Azure Firewall static public IP address",
          "type": "added"
        },
        {
          "text": "You can use Azure Firewall to access a storage account container via SFTP. Azure PowerShell is used to deploy a firewall in a virtual network and configured with DNAT rules to translate the SFTP traffic to the storage...",
          "type": "removed"
        },
        {
          "text": "Use Azure Firewall to access a storage account container through SFTP. Use Azure PowerShell to deploy a firewall in a virtual network and configure it with DNAT rules to translate the SFTP traffic to the storage...",
          "type": "added"
        },
        {
          "text": ":::image type=\"content\" source=\"media/firewall-sftp/accessing-storage-using-sftp.png\" alt-text=\"Diagram showing SFTP to firewall to access a storage account container.\"...",
          "type": "removed"
        },
        {
          "text": ":::image type=\"content\" source=\"media/firewall-sftp/accessing-storage-using-sftp.png\" alt-text=\"Diagram that shows a customer connecting via SFTP to Azure Firewall, which routes traffic through a private endpoint to a...",
          "type": "added"
        }
      ],
      "message": "docs: Fix PS formatting, code bugs, fix style guide issues",
      "paths": [
        "articles/firewall"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/firewall/firewall-sftp",
      "primary_product": "azure-firewall",
      "primary_product_label": "Azure Firewall",
      "product_labels": [
        "Azure Firewall"
      ],
      "products": [
        "azure-firewall"
      ],
      "reasons": [
        "Likely link, metadata, formatting, freshness, or redirect change"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "b3f771884677b972aad7ccf84f981fa3d722046d",
      "short_sha": "b3f7718",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-firewall"
      ],
      "sources": [
        "Azure Firewall docs"
      ],
      "stats": {
        "additions": 94,
        "deletions": 54,
        "total": 148
      },
      "summary": "Azure Firewall: adds \":::image type=\"content\" source=\"media/firewall-sftp/accessing-storage-using-sftp.png\" alt-text=\"Diagram that shows a customer connecting via SFTP to Azure Firewall, which routes traffic through a private endpoint to a...\".",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/b3f771884677b972aad7ccf84f981fa3d722046d"
    },
    {
      "author": "Abdullah Bell",
      "date": "2026-03-30T17:09:46Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 1,
      "files": [
        {
          "additions": 1,
          "deletions": 1,
          "docs_url": "https://learn.microsoft.com/azure/private-link/private-link-service-overview",
          "meaningful_changes": [],
          "path": "articles/private-link/private-link-service-overview.md",
          "status": "modified",
          "title": "Private Link Service Overview"
        }
      ],
      "id": "MicrosoftDocs/azure-docs:ded47d410d2b529e855ce66246b7e27caf9cb213",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Update publication date for private link service overview",
      "paths": [
        "articles/private-link"
      ],
      "primary_docs_url": "https://learn.microsoft.com/azure/private-link/private-link-service-overview",
      "primary_product": "private-link",
      "primary_product_label": "Private Link",
      "product_labels": [
        "Private Link"
      ],
      "products": [
        "private-link"
      ],
      "reasons": [
        "Networking/security configuration detail",
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "ded47d410d2b529e855ce66246b7e27caf9cb213",
      "short_sha": "ded47d4",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-private-link"
      ],
      "sources": [
        "Private Link docs"
      ],
      "stats": {
        "additions": 1,
        "deletions": 1,
        "total": 2
      },
      "summary": "Private Link: Update publication date for private link service overview.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/ded47d410d2b529e855ce66246b7e27caf9cb213"
    },
    {
      "author": "MSFT-FrankLpnsk",
      "date": "2026-03-30T16:31:42Z",
      "detail_available": true,
      "detail_model_version": 6,
      "file_count": 0,
      "files": [],
      "id": "MicrosoftDocs/azure-docs:0d0c5992539d183d12e18279ef8bc844fb8eb066",
      "is_noise": true,
      "kind": "docs",
      "kinds": [
        "docs"
      ],
      "meaningful_changes": [],
      "message": "Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into winget-v0",
      "paths": [
        "articles/vpn-gateway"
      ],
      "primary_docs_url": null,
      "primary_product": "vpn-gateway",
      "primary_product_label": "VPN Gateway",
      "product_labels": [
        "VPN Gateway"
      ],
      "products": [
        "vpn-gateway"
      ],
      "reasons": [
        "No meaningful content lines detected in scoped diff"
      ],
      "repo": "MicrosoftDocs/azure-docs",
      "score": 0,
      "sha": "0d0c5992539d183d12e18279ef8bc844fb8eb066",
      "short_sha": "0d0c599",
      "signal": "Housekeeping",
      "source_ids": [
        "azure-docs-vpn-gateway"
      ],
      "sources": [
        "VPN Gateway docs"
      ],
      "stats": {
        "additions": 0,
        "deletions": 0,
        "total": 0
      },
      "summary": "VPN Gateway: Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into winget-v0.",
      "tier": "noise",
      "tier_label": "Probably skip",
      "url": "https://github.com/MicrosoftDocs/azure-docs/commit/0d0c5992539d183d12e18279ef8bc844fb8eb066"
    }
  ],
  "generated_at": "2026-04-30T08:36:31Z",
  "products": [
    {
      "click_count": 3,
      "event_count": 33,
      "id": "network-watcher",
      "label": "Network Watcher",
      "noise_count": 13,
      "priority_count": 12
    },
    {
      "click_count": 3,
      "event_count": 41,
      "id": "azure-firewall",
      "label": "Azure Firewall",
      "noise_count": 20,
      "priority_count": 9
    },
    {
      "click_count": 4,
      "event_count": 17,
      "id": "vpn-gateway",
      "label": "VPN Gateway",
      "noise_count": 5,
      "priority_count": 9
    },
    {
      "click_count": 3,
      "event_count": 48,
      "id": "application-gateway",
      "label": "Application Gateway",
      "noise_count": 29,
      "priority_count": 8
    },
    {
      "click_count": 0,
      "event_count": 32,
      "id": "architecture-center",
      "label": "Architecture Center",
      "noise_count": 18,
      "priority_count": 7
    },
    {
      "click_count": 2,
      "event_count": 20,
      "id": "nat-gateway",
      "label": "NAT Gateway",
      "noise_count": 6,
      "priority_count": 7
    },
    {
      "click_count": 1,
      "event_count": 34,
      "id": "front-door",
      "label": "Front Door",
      "noise_count": 22,
      "priority_count": 6
    },
    {
      "click_count": 1,
      "event_count": 33,
      "id": "virtual-network",
      "label": "Virtual Network",
      "noise_count": 19,
      "priority_count": 5
    },
    {
      "click_count": 0,
      "event_count": 23,
      "id": "private-link",
      "label": "Private Link",
      "noise_count": 13,
      "priority_count": 1
    },
    {
      "click_count": 1,
      "event_count": 16,
      "id": "expressroute",
      "label": "ExpressRoute",
      "noise_count": 8,
      "priority_count": 1
    },
    {
      "click_count": 0,
      "event_count": 4,
      "id": "load-balancer",
      "label": "Load Balancer",
      "noise_count": 3,
      "priority_count": 1
    },
    {
      "click_count": 0,
      "event_count": 10,
      "id": "azure-dns",
      "label": "Azure DNS",
      "noise_count": 8,
      "priority_count": 0
    },
    {
      "click_count": 0,
      "event_count": 6,
      "id": "virtual-wan",
      "label": "Virtual WAN",
      "noise_count": 4,
      "priority_count": 0
    },
    {
      "click_count": 0,
      "event_count": 5,
      "id": "traffic-manager",
      "label": "Traffic Manager",
      "noise_count": 5,
      "priority_count": 0
    },
    {
      "click_count": 0,
      "event_count": 5,
      "id": "bastion",
      "label": "Bastion",
      "noise_count": 4,
      "priority_count": 0
    },
    {
      "click_count": 0,
      "event_count": 4,
      "id": "network-api",
      "label": "Microsoft.Network API",
      "noise_count": 4,
      "priority_count": 0
    },
    {
      "click_count": 0,
      "event_count": 3,
      "id": "ddos-protection",
      "label": "DDoS Protection",
      "noise_count": 3,
      "priority_count": 0
    },
    {
      "click_count": 0,
      "event_count": 1,
      "id": "route-server",
      "label": "Route Server",
      "noise_count": 1,
      "priority_count": 0
    }
  ],
  "raw_event_count": 335,
  "schema_version": 2,
  "since": "2026-03-30T08:36:24Z",
  "source_count": 18,
  "window_days": 31
}
