Skip to content

Commit 03644b0

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-constrained-delegation-ga-release
2 parents 3226e8d + da5a077 commit 03644b0

File tree

15 files changed

+182
-80
lines changed

15 files changed

+182
-80
lines changed

articles/ai-services/document-intelligence/quickstarts/includes/python-sdk.md

Lines changed: 55 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: laujan
66
manager: nitinme
77
ms.service: azure-ai-document-intelligence
88
ms.topic: include
9-
ms.date: 12/18/2023
9+
ms.date: 01/29/2024
1010
ms.author: lajanuar
1111
---
1212
<!-- markdownlint-disable MD025 -->
@@ -135,11 +135,30 @@ Extract text, selection marks, text styles, table structures, and bounding regio
135135
import os
136136
from azure.core.credentials import AzureKeyCredential
137137
from azure.ai.documentintelligence import DocumentIntelligenceClient
138+
from azure.ai.documentintelligence.models import AnalyzeResult
138139

139140
# set `<your-endpoint>` and `<your-key>` variables with the values from the Azure portal
140141
endpoint = "<your-endpoint>"
141142
key = "<your-key>"
142143

144+
# helper functions
145+
146+
def get_words(page, line):
147+
result = []
148+
for word in page.words:
149+
if _in_span(word, line.spans):
150+
result.append(word)
151+
return result
152+
153+
154+
def _in_span(word, spans):
155+
for span in spans:
156+
if word.span.offset >= span.offset and (
157+
word.span.offset + word.span.length
158+
) <= (span.offset + span.length):
159+
return True
160+
return False
161+
143162

144163
def analyze_layout():
145164
# sample document
@@ -152,9 +171,10 @@ def analyze_layout():
152171
poller = document_intelligence_client.begin_analyze_document_from_url(
153172
"prebuilt-layout", formUrl
154173
)
155-
result = poller.result()
156174

157-
if any([style.is_handwritten for style in result.styles]):
175+
result: AnalyzeResult = poller.result()
176+
177+
if result.styles and any([style.is_handwritten for style in result.styles]):
158178
print("Document contains handwritten content")
159179
else:
160180
print("Document does not contain handwritten content")
@@ -165,49 +185,53 @@ def analyze_layout():
165185
f"Page has width: {page.width} and height: {page.height}, measured with unit: {page.unit}"
166186
)
167187

168-
for line_idx, line in enumerate(page.lines):
169-
words = get_words(page, line)
170-
print(
171-
f"...Line # {line_idx} has word count {len(words)} and text '{line.content}' "
172-
f"within bounding polygon '{line.polygon}'"
173-
)
174-
175-
for word in words:
188+
if page.lines:
189+
for line_idx, line in enumerate(page.lines):
190+
words = get_words(page, line)
176191
print(
177-
f"......Word '{word.content}' has a confidence of {word.confidence}"
192+
f"...Line # {line_idx} has word count {len(words)} and text '{line.content}' "
193+
f"within bounding polygon '{line.polygon}'"
178194
)
179195

180-
for selection_mark in page.selection_marks:
181-
print(
182-
f"Selection mark is '{selection_mark.state}' within bounding polygon "
183-
f"'{selection_mark.polygon}' and has a confidence of {selection_mark.confidence}"
184-
)
196+
for word in words:
197+
print(
198+
f"......Word '{word.content}' has a confidence of {word.confidence}"
199+
)
185200

186-
for table_idx, table in enumerate(result.tables):
187-
print(
188-
f"Table # {table_idx} has {table.row_count} rows and "
189-
f"{table.column_count} columns"
190-
)
191-
for region in table.bounding_regions:
192-
print(
193-
f"Table # {table_idx} location on page: {region.page_number} is {region.polygon}"
194-
)
195-
for cell in table.cells:
201+
if page.selection_marks:
202+
for selection_mark in page.selection_marks:
203+
print(
204+
f"Selection mark is '{selection_mark.state}' within bounding polygon "
205+
f"'{selection_mark.polygon}' and has a confidence of {selection_mark.confidence}"
206+
)
207+
208+
if result.tables:
209+
for table_idx, table in enumerate(result.tables):
196210
print(
197-
f"...Cell[{cell.row_index}][{cell.column_index}] has text '{cell.content}'"
211+
f"Table # {table_idx} has {table.row_count} rows and "
212+
f"{table.column_count} columns"
198213
)
199-
for region in cell.bounding_regions:
214+
if table.bounding_regions:
215+
for region in table.bounding_regions:
216+
print(
217+
f"Table # {table_idx} location on page: {region.page_number} is {region.polygon}"
218+
)
219+
for cell in table.cells:
200220
print(
201-
f"...content on page {region.page_number} is within bounding polygon '{region.polygon}'"
221+
f"...Cell[{cell.row_index}][{cell.column_index}] has text '{cell.content}'"
202222
)
223+
if cell.bounding_regions:
224+
for region in cell.bounding_regions:
225+
print(
226+
f"...content on page {region.page_number} is within bounding polygon '{region.polygon}'"
227+
)
203228

204229
print("----------------------------------------")
205230

206231

207232
if __name__ == "__main__":
208233
analyze_layout()
209234

210-
211235
```
212236

213237
**Run the application**

articles/azure-monitor/app/convert-classic-resource.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,12 @@ No. There's no impact to [Live Metrics](live-stream.md#live-metrics-monitor-and-
329329

330330
To continue with automated exports, you will need to migrate to [diagnostic settings](/previous-versions/azure/azure-monitor/app/continuous-export-diagnostic-setting) before migrating to workspace-based resource. The diagnostic setting will carry over in the migration to workspace-based Application Insights.
331331

332+
### How do I ensure a successful migration of my App Insights resource using Terraform?
333+
334+
If you are using Terraform to manage your Azure resources, it is important to use the latest version of the Terraform azurerm provider before attempting to upgrade your App Insights resource. Using an older version of the provider, such as version 3.12, may result in the deletion of the classic component before creating the replacement workspace-based Application Insights resource. This can cause the loss of previous data and require updating the configurations in your monitored apps with new connection string and instrumentation key values.
335+
336+
To avoid this issue, make sure to use the latest version of the Terraform [azurerm provider](https://registry.terraform.io/providers/hashicorp/azurerm/latest), version 3.89 or higher, which performs the proper migration steps by issuing the appropriate ARM call to upgrade the App Insights classic resource to a workspace-based resource while preserving all the old data and connection string/instrumentation key values.
337+
332338
## Troubleshooting
333339

334340
This section offers troubleshooting tips for common issues.

articles/azure-vmware/azure-vmware-solution-known-issues.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides details about the known issues of Azure VMwar
44
ms.topic: reference
55
ms.custom: "engagement-fy23"
66
ms.service: azure-vmware
7-
ms.date: 11/28/2023
7+
ms.date: 1/29/2024
88
---
99

1010
# Known issues: Azure VMware Solution
@@ -23,6 +23,7 @@ Refer to the table to find details about resolution dates or possible workaround
2323
| When I build a VMware HCX Service Mesh with the Enterprise license, the Replication Assisted vMotion Migration option isn't available. | 2023 | The default VMware HCX Compute Profile doesn't have the Replication Assisted vMotion Migration option enabled. From the Azure VMware Solution vSphere Client, select the VMware HCX option and edit the default Compute Profile to enable Replication Assisted vMotion Migration. | 2023 |
2424
| [VMSA-2023-023](https://www.vmware.com/security/advisories/VMSA-2023-0023.html) VMware vCenter Server Out-of-Bounds Write Vulnerability (CVE-2023-34048) publicized in October 2023 | October 2023 | Microsoft is currently working with its security teams and partners to evaluate the risk to Azure VMware Solution and its customers. Initial investigations show that controls in place within Azure VMware Solution reduce the risk of CVE-2023-03048. However Microsoft is working on a plan to roll out security fixes soon to completely remediate the security vulnerability. | October 2023 |
2525
| The AV64 SKU currently supports RAID-1 FTT1, RAID-5 FTT1, and RAID-1 FTT2 vSAN storage policies. For more information, see [AV64 supported RAID configuration](introduction.md#av64-supported-raid-configuration) | Nov 2023 | Use AV36, AV36P, or AV52 SKUs when RAID-6 FTT2 or RAID-1 FTT3 storage policies are needed. | N/A |
26+
| VMware HCX version 4.8.0 Network Extension (NE) Appliance VMs running in High Availability (HA) mode may experience intermittent Standby to Active failover. For more information, see [HCX - NE appliances in HA mode experience intermittent failover (96352)](https://kb.vmware.com/s/article/96352) | Jan 2024 | Avoid upgrading to VMware HCX 4.8.0 if you are using NE appliances in a HA configuration. | N/A |
2627

2728
In this article, you learned about the current known issues with the Azure VMware Solution.
2829

articles/confidential-computing/choose-confidential-containers-offerings.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Choose container offerings for confidential computing
33
description: How to choose the right confidential container offerings to meet your security, isolation and developer needs.
44
author: angarg05
5-
ms.service: container-service
5+
ms.service: virtual-machines
6+
ms.subservice: confidential-computing
67
ms.topic: conceptual
78
ms.date: 11/01/2021
89
ms.author: ananyagarg

articles/container-registry/container-registry-tasks-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ Containers provide new levels of virtualization, isolating application and devel
1616

1717
**ACR Tasks** is a suite of features within Azure Container Registry. It provides cloud-based container image building for [platforms](#image-platforms) including Linux, Windows, and ARM, and can automate [OS and framework patching](#automate-os-and-framework-patching) for your Docker containers. ACR Tasks not only extends your "inner-loop" development cycle to the cloud with on-demand container image builds, but also enables automated builds triggered by source code updates, updates to a container's base image, or timers. For example, with base image update triggers, you can automate your OS and application framework patching workflow, maintaining secure environments while adhering to the principles of immutable containers.
1818

19-
ACR is temporarily pausing ACR Tasks runs from Azure free credits. This may affect existing Tasks runs. If you encounter problems, open a [support case](../azure-portal/supportability/how-to-create-azure-support-request.md) for our team to provide additional guidance. We'll remove this note when this pause is lifted.
19+
>[! IMPORTANT]
20+
> ACR is temporarily pausing ACR Tasks runs from Azure free credits. This may affect existing Tasks runs. If you encounter problems, open a [support case](../azure-portal/supportability/how-to-create-azure-support-request.md) for our team to provide additional guidance. Please note that existing customers will not be affected by this pause. We will update our documentation notice here whenever the pause is lifted.
2021
2122
## Task scenarios
2223

0 commit comments

Comments
 (0)