From f59d5b9a35cf461671007d2b8c5d852fdf675e06 Mon Sep 17 00:00:00 2001 From: Takashi Takebayashi Date: Fri, 24 Oct 2025 16:14:42 +0900 Subject: [PATCH] Fix typo: aggregrated -> aggregated --- includes/network-security-perimeter-limits.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/includes/network-security-perimeter-limits.md b/includes/network-security-perimeter-limits.md index d9b43a943b136..543ad7254da9f 100644 --- a/includes/network-security-perimeter-limits.md +++ b/includes/network-security-perimeter-limits.md @@ -27,7 +27,7 @@ Network security perimeter has other limitations as follows: | **Limitation/Issue** | **Description** | |-----------------|-------------| -| **Missing field in network security perimeter access logs** | Network security perimeter access logs may have been aggregrated. If the fields 'count' and 'timeGeneratedEndTime' are missing, consider the aggregation count as 1. | +| **Missing field in network security perimeter access logs** | Network security perimeter access logs may have been aggregated. If the fields 'count' and 'timeGeneratedEndTime' are missing, consider the aggregation count as 1. | | **Association creations through SDK fails with permission issue** | Status: 403 (Forbidden) ; ErrorCode: AuthorizationFailed, might be received while performing action 'Microsoft.Network/locations/networkSecurityPerimeterOperationStatuses/read' over scope '/subscriptions/xyz/providers/Microsoft.Network/locations/xyz/networkSecurityPerimeterOperationStatuses/xyz'.

Until the fix, use permission 'Microsoft.Network/locations/*/read' or use WaitUntil.Started in CreateOrUpdateAsync SDK API for association creations. | | **Resource names cannot be longer than 44 characters to support network security perimeter** | The network security perimeter resource association created from the Azure portal has the format `{resourceName}-{perimeter-guid}`. To align with the requirement name field can't have more than 80 characters, resources names would have to be limited to 44 characters. | | **Service endpoint traffic is not supported.** | It's recommended to use private endpoints for IaaS to PaaS communication. Currently, service endpoint traffic can be denied even when an inbound rule allows 0.0.0.0/0. |