Skip to content

Commit 7b39d3e

Browse files
authored
Merge pull request #3257 from MicrosoftDocs/main
2/28/2025 AM Publish
2 parents 0893317 + 6b1a585 commit 7b39d3e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+139
-126
lines changed

articles/ai-services/agents/how-to/tools/file-search.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The maximum file size is 512 MB. Each file should contain no more than 5,000,000
8787

8888
We highly recommend that you ensure all files in a vector_store are fully processed before you create a run. This ensures that all the data in your vector store is searchable. You can check for vector store readiness by using the polling helpers in the SDKs, or by manually polling the vector store object to ensure the status is completed.
8989

90-
As a fallback, there's a 60-second maximum wait in the run object when the thread's vector store contains files that are still being processed. This is to ensure that any files your users upload in a thread a fully searchable before the run proceeds. This fallback wait does not apply to the agent's vector store.
90+
As a fallback, there's a 60-second maximum wait in the run object when the thread's vector store contains files that are still being processed. This is to ensure that any files your users upload in a thread are fully searchable before the run proceeds. This fallback wait does not apply to the agent's vector store.
9191

9292
## Add file search to an agent using the Azure AI Foundry portal
9393

articles/ai-services/agents/includes/azure-search/code-examples.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -85,13 +85,19 @@ Get the connection ID of the Azure AI Search connection in the project. You can
8585

8686
```python
8787
# AI Search resource connection ID
88-
# This code prints out the connection ID of all the Azure AI Search connections in the project
89-
# If you have more than one AI search connection, make sure to select the correct one that contains the index you want to use.
90-
conn_list = project_client.connections.list()
88+
# This code looks for the AI Search Connection ID and saves it as variable conn_id
89+
90+
# If you have more than one AI search connection, try to establish the value in your .env file.
91+
# Extract the connection list.
92+
conn_list = project_client.connections._list_connections()["value"]
9193
conn_id = ""
94+
95+
# Search in the metadata field of each connection in the list for the azure_ai_search type and get the id value to establish the variable
9296
for conn in conn_list:
93-
if conn.connection_type == "AZURE_AI_SEARCH":
94-
print(f"Connection ID: {conn.id}")
97+
metadata = conn["properties"].get("metadata", {})
98+
if metadata.get("type", "").upper() == "AZURE_AI_SEARCH":
99+
conn_id = conn["id"]
100+
break
95101
```
96102
# [C#](#tab/csharp)
97103
```csharp
@@ -429,4 +435,4 @@ curl $AZURE_AI_AGENTS_ENDPOINT/threads/thread_abc123/messages?api-version=2024-1
429435
-H "Authorization: Bearer $AZURE_AI_AGENTS_TOKEN"
430436
```
431437
432-
---
438+
---

articles/ai-services/containers/disconnected-container-faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.custom:
1111
- ignite-2023
1212
ms.topic: faq
13-
ms.date: 07/26/2024
13+
ms.date: 02/27/2025
1414
ms.author: aahi
1515
title: FAQ for Azure AI services disconnected containers
1616
summary: |
@@ -43,11 +43,11 @@ sections:
4343
Fill out and submit the [request form](https://aka.ms/csdisconnectedcontainers) to request access to the container. Access is limited to customers that meet the following requirements:
4444
4545
* Your organization must have an enterprise agreement or an equivalent agreement and should be identified as strategic customer or partner with Microsoft.
46-
* Valid business scenario/use case - Disconnected containers are expected to run fully offline hence, your use cases must meet one of below or similar requirements:
46+
* Valid business scenario/use case - Disconnected containers are expected to run fully offline. Your use cases must meet one of below or similar requirements:
4747
* Environment or devices with zero connectivity to internet.
4848
* Remote location that occasionally has internet access.
4949
* Organization under strict regulation of not sending any kind of data back to cloud.
50-
* Application completed as instructed - Please pay close attention to guidance provided throughout the application to ensure you provide all the necessary information required for approval.
50+
* Application completed as instructed - pay close attention to guidance provided throughout the application to ensure you provide all the necessary information required for approval.
5151
- question: What if my use case can't satisfy the requirements listed above?
5252
answer: |
5353
If your use case can't satisfy above requirements but you're interested in running containers on premises, you might be able to use [connected containers](../cognitive-services-container-support.md).

articles/ai-services/speech-service/fast-transcription-create.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: eric-urban
77
ms.author: eur
88
ms.service: azure-ai-speech
99
ms.topic: how-to
10-
ms.date: 11/12/2024
10+
ms.date: 2/28/2025
1111
# Customer intent: As a user who implements audio transcription, I want create transcriptions as quickly as possible.
1212
---
1313

@@ -24,7 +24,7 @@ Unlike the batch transcription API, fast transcription API only produces transcr
2424

2525
- An Azure AI Speech resource in one of the regions where the fast transcription API is available. The supported regions are: **Australia East**, **Brazil South**, **Central India**, **East US**, **East US 2**, **French Central**, **Japan East**, **North Central US**, **North Europe**, **South Central US**, **Southeast Asia**, **Sweden Central**, **UK South**, **West Europe**, **West US**, **West US 2**, **West US 3**. For more information about regions supported for other Speech service features, see [Speech service regions](./regions.md).
2626

27-
- An audio file (less than 2 hours long and less than 200 MB in size) in one of the formats and codecs supported by the batch transcription API. For more information about supported audio formats, see [supported audio formats](./batch-transcription-audio-data.md#supported-audio-formats-and-codecs).
27+
- An audio file (less than 2 hours long and less than 200 MB in size) in one of the formats and codecs supported by the batch transcription API: WAV, MP3, OPUS/OGG, FLAC, WMA, AAC, ALAW in WAV container, MULAW in WAV container, AMR, WebM, M4A, and SPEEX. For more information about supported audio formats, see [supported audio formats](./batch-transcription-audio-data.md#supported-audio-formats-and-codecs).
2828

2929
## Use the fast transcription API
3030

articles/ai-services/use-key-vault.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aahi
66
ms.service: azure-ai-services
77
ms.custom: devx-track-extended-java, devx-track-js, devx-track-python
88
ms.topic: how-to
9-
ms.date: 8/11/2024
9+
ms.date: 02/27/2025
1010
zone_pivot_groups: programming-languages-set-twenty-eight
1111
---
1212

@@ -89,7 +89,7 @@ Repeat these steps to generate a secret for each required resource credential. F
8989

9090
|Name | Value |
9191
|---------|---------|
92-
|Upload options | Manual |
92+
|Upload options | Generate |
9393
|Name | A secret name for your key or endpoint. For example: "CognitiveServicesKey" or "CognitiveServicesEndpoint" |
9494
|Value | Your Azure AI services resource key or endpoint. |
9595

articles/ai-studio/how-to/access-on-premises-resources.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ description: Learn how to configure an Azure AI Foundry managed network to secur
55
manager: scottpolly
66
ms.service: azure-ai-foundry
77
ms.topic: how-to
8-
ms.date: 02/20/2025
8+
ms.date: 02/27/2025
99
ms.reviewer: meerakurup
1010
ms.author: larryfr
1111
author: Blackmist
1212
# Customer intent: As an admin, I want to allow my developers to securely access on-premises resources from Azure AI Foundry.
1313
---
1414

15-
# Access on-premises resources from your Azure AI Foundry's managed network (preview)
15+
# Access on-premises resources from your Azure AI Foundry's managed network
1616

1717
To access your non-Azure resources located in a different virtual network or located entirely on-premises from your [Azure AI Foundry](https://ai.azure.com)'s managed virtual network, an Application Gateway must be configured. Through this Application Gateway, full end to end access can be configured to your resources.
1818

@@ -80,10 +80,10 @@ Follow the [Quickstart: Direct web traffic using the portal](/azure/application-
8080
- FQDNs: These FQDNs are the aliases that you want to use inside the Azure AI Foundry portal. They're resolved to the managed private endpoint's private IP address targeting Application Gateway. You might include multiple FQDNs depending on how many resources you would like to connect to with the Application Gateway.
8181

8282
> [!NOTE]
83-
> - If you are using HTTPS listener with certificate uploaded, make sure the FQDN alias matches with the certificate's CN (Common Name) or SAN (Subject Alternative Name) otherwise HTTPS call will fail with SNI (Server Name Indication).
84-
> - The provided FQDNs must have at least three labels in the name to properly create the private DNS zone of thee private endpoint for Application Gateway.
85-
> - The FQDNs field is editable after the private endpoint creation through SDK or CLI. The field is not editable in the Azure portal.
86-
> - Dynamic sub-resource naming is not supported for the private Frontend IP configuration. The Frontend IP name must be `appGwPrivateFrontendIpIPv4`.
83+
> - If you're using HTTPS listener with certificate uploaded, make sure the FQDN alias matches with the certificate's CN (Common Name) or SAN (Subject Alternative Name) otherwise HTTPS call fails with SNI (Server Name Indication).
84+
> - The provided FQDNs must have at least three labels in the name to properly create the private DNS zone of the private endpoint for Application Gateway.
85+
> - The FQDNs field is editable after the private endpoint creation through SDK or CLI. The field isn't editable in the Azure portal.
86+
> - Dynamic sub-resource naming isn't supported for the private Frontend IP configuration. The Frontend IP name must be `appGwPrivateFrontendIpIPv4`.
8787
8888
### Configure using Python SDK and Azure CLI
8989

@@ -96,6 +96,7 @@ To create a private endpoint to Application Gateway with the Azure CLI, use the
9696
- Application Gateway supports only HTTP(s) endpoints in the Backend pool. There's no support for non-HTTP(s) network traffic. Ensure your resources support HTTP(S) protocol.
9797
- To connect to Snowflake using the Application Gateway, you should add your own FQDN outbound rules to enable package/driver download and OCSP validation.
9898
- The Snowflake JDBC driver uses HTTPS calls, but different drivers might have different implementations. Check if your resource uses HTTP(S) protocol or not.
99+
- Application Gateway isn't supported for Spark scenarios, such as Spark compute or serverless Spark compute. DNS resolution (for example, nslookup) fails when trying to resolve an FQDN from the Spark compute.
99100
- For more information on limitations, see [Frequently asked questions about Application Gateway](/azure/application-gateway/application-gateway-faq).
100101

101102
## Application Gateway Errors

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: scottpolly
66
ms.service: azure-ai-foundry
77
ms.custom: ignite-2023, build-2024, devx-track-azurecli, ignite-2024
88
ms.topic: how-to
9-
ms.date: 02/24/2025
9+
ms.date: 02/27/2025
1010
ms.reviewer: meerakurup
1111
ms.author: larryfr
1212
author: Blackmist
@@ -155,7 +155,7 @@ Before following the steps in this article, make sure you have the following pre
155155
## Configure a managed virtual network to allow internet outbound
156156

157157
> [!TIP]
158-
> The creation of the managed virtual network is deferred until a compute resource is created or provisioning is manually started. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network.
158+
> The creation of the managed VNet is deferred until a compute resource is created or provisioning is manually started. When you allow automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network.
159159

160160
# [Azure portal](#tab/portal)
161161

@@ -338,7 +338,7 @@ To configure a managed virtual network that allows internet outbound communicati
338338
## Configure a managed virtual network to allow only approved outbound
339339

340340
> [!TIP]
341-
> The managed virtual network is automatically provisioned when you create a compute resource. When allowing automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network. If you configured FQDN outbound rules, the first FQDN rule adds around __10 minutes__ to the provisioning time.
341+
> The managed VNet is automatically provisioned when you create a compute resource. When you allow automatic creation, it can take around __30 minutes__ to create the first compute resource as it is also provisioning the network. If you configured FQDN outbound rules, the first FQDN rule adds around __10 minutes__ to the provisioning time.
342342

343343
# [Azure portal](#tab/portal)
344344

@@ -627,18 +627,18 @@ The managed virtual network is automatically provisioned when you create a compu
627627

628628
To reduce the wait time and avoid potential timeout errors, we recommend manually provisioning the managed network. Then wait until the provisioning completes before you create a compute instance.
629629

630-
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation. This flag is in preview.
630+
Alternatively, you can use the `provision_network_now` flag to provision the managed network as part of hub creation.
631631

632632
> [!NOTE]
633633
> To create an online deployment, you must manually provision the managed network, or create a compute instance first. Creating a compute instance automatically provision it.
634634

635635
# [Azure portal](#tab/portal)
636636

637-
During hub creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation, and is in preview.
637+
During hub creation, select __Provision managed network proactively at creation__ to provision the managed network. Charges are incurred from network resources, such as private endpoints, once the virtual network is provisioned. This configuration option is only available during workspace creation.
638638

639639
# [Azure CLI](#tab/azure-cli)
640640

641-
The following example shows how to provision a managed virtual network during hub creation. The `--provision-network-now` flag is in preview.
641+
The following example shows how to provision a managed virtual network during hub creation.
642642

643643
```azurecli
644644
az ml workspace create -n myworkspace -g my_resource_group --kind hub --managed-network AllowInternetOutbound --provision-network-now true
@@ -658,7 +658,7 @@ az ml workspace show -n my_ai_hub_name -g my_resource_group --query managed_netw
658658

659659
# [Python SDK](#tab/python)
660660

661-
The following example shows how to provision a managed virtual network during hub creation. The `--provision-network-now` flag is in preview.
661+
The following example shows how to provision a managed virtual network during hub creation.
662662

663663
```azurecli
664664
az ml workspace create -n myworkspace -g my_resource_group --managed-network AllowInternetOutbound --provision-network-now true
@@ -853,9 +853,9 @@ When you create a private endpoint for hub dependency resources, such as Azure S
853853
A private endpoint is automatically created for a connection if the target resource is an Azure resource listed previously. A valid target ID is expected for the private endpoint. A valid target ID for the connection can be the Azure Resource Manager ID of a parent resource. The target ID is also expected in the target of the connection or in `metadata.resourceid`. For more on connections, see [How to add a new connection in Azure AI Foundry portal](connections-add.md).
854854

855855
> [!IMPORTANT]
856-
> As of March 31st 2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, please ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
856+
> As of March 31st 2025, the Azure AI Enterprise Network Connection Approver role must be assigned to the Azure AI Foundry hub's managed identity to approve private endpoints to securely access your Azure resources from the managed virtual network. This doesn't impact existing resources with approved private endpoints as the role is correctly assigned by the service. For new resources, ensure the role is assigned to the hub's managed identity. For Azure Data Factory, Azure Databricks, and Azure Function Apps, the Contributor role should instead be assigned to your hub's managed identity. This role assignment is applicable to both User-assigned identity and System-assigned identity workspaces.
857857

858-
## Select an Azure Firewall version for allowed only approved outbound (Preview)
858+
## Select an Azure Firewall version for allowed only approved outbound
859859

860860
An Azure Firewall is deployed if an FQDN outbound rule is created while in the _allow only approved outbound_ mode. Charges for the Azure Firewall are included in your billing. By default, a __Standard__ version of AzureFirewall is created. Optionally, you can select to use a __Basic__ version. You can change the firewall version used as needed. To figure out which version is best for you, visit [Choose the right Azure Firewall version](/azure/firewall/choose-firewall-sku).
861861

@@ -902,11 +902,12 @@ network = ManagedNetwork(isolation_mode=IsolationMode.ALLOW_INTERNET_OUTBOUND,
902902
The hub managed virtual network feature is free. However, you're charged for the following resources that are used by the managed virtual network:
903903

904904
* Azure Private Link - Private endpoints used to secure communications between the managed virtual network and Azure resources relies on Azure Private Link. For more information on pricing, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
905-
* FQDN outbound rules - FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound-preview). Azure Firewall is provisioned per hub.
905+
* FQDN outbound rules - FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. A standard version of Azure Firewall is used by default. For information on selecting the basic version, see [Select an Azure Firewall version](#select-an-azure-firewall-version-for-allowed-only-approved-outbound). Azure Firewall is provisioned per hub.
906906

907907
> [!IMPORTANT]
908908
> The firewall isn't created until you add an outbound FQDN rule. If you don't use FQDN rules, you won't be charged for Azure Firewall. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
909909

910910
## Related content
911911

912912
- [Create Azure AI Foundry hub and project using the SDK](./develop/create-hub-project-sdk.md)
913+
- [Access on-premises resources from Azure AI Foundry](access-on-premises-resources.md)

0 commit comments

Comments
 (0)