Skip to content

Commit 084b1e4

Browse files
authored
Merge branch 'MicrosoftDocs:main' into cosmos-nosql-mirroring-fabric
2 parents 3d56ea9 + 5632eeb commit 084b1e4

File tree

84 files changed

+1091
-672
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+1091
-672
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4195,6 +4195,12 @@
41954195
},
41964196
{
41974197

4198+
"source_path_from_root": "/articles/cosmos-db/how-to-move-regions.md",
4199+
"redirect_url": "/azure/operational-excellence/relocation-cosmos-db",
4200+
"redirect_document_id": false
4201+
4202+
},
4203+
{
41984204
"source_path_from_root": "/articles/site-recovery/move-vaults-across-regions.md",
41994205
"redirect_url": "/azure/operational-excellence/relocation-site-recovery",
42004206
"redirect_document_id": false

articles/active-directory-b2c/faq.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -274,6 +274,12 @@ sections:
274274
275275
* API connectors
276276
* Conditional Access
277+
278+
- question: |
279+
I am using rolling refresh tokens for my application and I am getting an invalid_grant error on redeeming newly acquired refresh tokens well within their set validity period. Why does this happen?
280+
answer: |
281+
While determining validity for rolling refresh tokens, B2C will consider the initial login time of the user in the application also to calculate the token validity skew. If the user haven't logged out of the application for a very long time, this skew value will exceed the validity period of the token and hence for security reasons the tokens will be considered as invalid. Hence the error. Inform the user to perform a proper logout and login back into the application and this should reset the skew. This scenario is not applicable if refresh token rolling is set as infinite rolling.
282+
277283
278284
- question: |
279285
I've revoked the refresh token using Microsoft Graph invalidateAllRefreshTokens, or Microsoft Graph PowerShell, Revoke-MgUserSignInSession. Why is Azure AD B2C still accepting the old refresh token?
@@ -286,6 +292,9 @@ sections:
286292
1. Wait for 10 minutes.
287293
288294
1. Retrieve the `RefreshToken` again.
295+
296+
> [!TIP]
297+
> With Azure AD B2C [custom policy](custom-policy-overview.md), you can reduce the above mentioned skew time of 5 minutes (300000 milliseconds) by adjusting the value for InputParameter "TreatAsEqualIfWithinMillseconds" under claim transformation Id "AssertRefreshTokenIssuedLaterThanValidFromDate". This claim transformation can be found in the TrustFrameworkBase.xml file under latest custom policy [stater-pack](https://learn.microsoft.com/en-us/azure/active-directory-b2c/tutorial-create-user-flows?pivots=b2c-custom-policy#get-the-starter-pack).
289298
290299
- question: |
291300
I use multiple tabs in a web browser to sign in to multiple applications that I registered in the same Azure AD B2C tenant. When I try to perform a single sign-out, not all of the applications are signed out. Why does this happen?

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ zone_pivot_groups: b2c-policy-type
2323

2424
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2525

26-
With Azure Active Directory B2C (Azure AD B2C) [HTML templates](customize-ui-with-html.md), you can craft your users' identity experiences. Your HTML templates can contain only certain HTML tags and attributes. Basic HTML tags, such as &lt;b&gt;, &lt;i&gt;, &lt;u&gt;, &lt;h1&gt;, and &lt;hr&gt; are allowed. More advanced tags such as &lt;script&gt;, and &lt;iframe&gt; are removed for security reasons but the `<script>` tag should be added in the `<head>` tag.
26+
With Azure Active Directory B2C (Azure AD B2C) [HTML templates](customize-ui-with-html.md), you can craft your users' identity experiences. Your HTML templates can contain only certain HTML tags and attributes. Basic HTML tags, such as &lt;b&gt;, &lt;i&gt;, &lt;u&gt;, &lt;h1&gt;, and &lt;hr&gt; are allowed. More advanced tags such as &lt;script&gt;, and &lt;iframe&gt; are removed for security reasons but the `<script>` tag should be added in the `<head>` tag. From selfasserted page layout version 2.1.21 / unifiedssp version 2.1.10 / multifactor version 1.2.10 onwards B2C doesn't support adding scripts in `<body>` tag (as this can pose a risk for cross site scripting attack). Migrating existing scripts from `<body>` to `<head>` may at-times require rewriting existing scripts with mutation observers for proper working.
2727

2828
The `<script>` tag should be added in the `<head>` tag in two ways:
2929

articles/ai-services/computer-vision/concept-model-customization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,8 @@ The following table describes the limits on the scale of your custom model proje
8080
| Max # training images | 1,000,000 | 200,000 |
8181
| Max # evaluation images | 100,000 | 100,000 |
8282
| Min # training images per category | 2 | 2 |
83-
| Max # tags per image | multiclass: 1 | NA |
84-
| Max # regions per image | NA | 1,000 |
83+
| Max # tags per image | 1 | N/A |
84+
| Max # regions per image | N/A | 1,000 |
8585
| Max # categories | 2,500 | 1,000 |
8686
| Min # categories | 2 | 1 |
8787
| Max image size (Training) | 20 MB | 20 MB |

articles/ai-services/content-safety/overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ This documentation contains the following article types:
3030

3131
The following are a few scenarios in which a software developer or team would require a content moderation service:
3232

33+
- User prompts submitted to a generative AI service.
34+
- Content produced by generative AI models.
3335
- Online marketplaces that moderate product catalogs and other user-generated content.
3436
- Gaming companies that moderate user-generated game artifacts and chat rooms.
3537
- Social messaging platforms that moderate images and text added by their users.

articles/ai-services/openai/how-to/gpt-with-vision.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The following command shows the most basic way to use the GPT-4 Turbo with Visio
3030

3131
#### [REST](#tab/rest)
3232

33-
Send a POST request to `https://{RESOURCE_NAME}.openai.azure.com/openai/deployments/{DEPLOYMENT_NAME}/chat/completions?api-version=2023-12-01-preview` where
33+
Send a POST request to `https://{RESOURCE_NAME}.openai.azure.com/openai/deployments/{DEPLOYMENT_NAME}/chat/completions?api-version=2024-02-15-preview` where
3434

3535
- RESOURCE_NAME is the name of your Azure OpenAI resource
3636
- DEPLOYMENT_NAME is the name of your GPT-4 Turbo with Vision model deployment
@@ -88,12 +88,12 @@ The following is a sample request body. The format is the same as the chat compl
8888
api_base = '<your_azure_openai_endpoint>' # your endpoint should look like the following https://YOUR_RESOURCE_NAME.openai.azure.com/
8989
api_key="<your_azure_openai_key>"
9090
deployment_name = '<your_deployment_name>'
91-
api_version = '2023-12-01-preview' # this might change in the future
91+
api_version = '2024-02-15-preview' # this might change in the future
9292

9393
client = AzureOpenAI(
9494
api_key=api_key,
9595
api_version=api_version,
96-
base_url=f"{api_base}openai/deployments/{deployment_name}/extensions",
96+
base_url=f"{api_base}openai/deployments/{deployment_name}",
9797
)
9898
```
9999

@@ -265,7 +265,7 @@ The **object grounding** integration brings a new layer to data analysis and use
265265
266266
#### [REST](#tab/rest)
267267

268-
Send a POST request to `https://{RESOURCE_NAME}.openai.azure.com/openai/deployments/{DEPLOYMENT_NAME}/extensions/chat/completions?api-version=2023-12-01-preview` where
268+
Send a POST request to `https://{RESOURCE_NAME}.openai.azure.com/openai/deployments/{DEPLOYMENT_NAME}/chat/completions?api-version=2024-02-15-preview` where
269269

270270
- RESOURCE_NAME is the name of your Azure OpenAI resource
271271
- DEPLOYMENT_NAME is the name of your GPT-4 Turbo with Vision model deployment
@@ -577,7 +577,7 @@ To use a User assigned identity on your Azure AI Services resource, follow these
577577
578578
#### [REST](#tab/rest)
579579
580-
1. Prepare a POST request to `https://{RESOURCE_NAME}.openai.azure.com/openai/deployments/{DEPLOYMENT_NAME}/extensions/chat/completions?api-version=2023-12-01-preview` where
580+
1. Prepare a POST request to `https://{RESOURCE_NAME}.openai.azure.com/openai/deployments/{DEPLOYMENT_NAME}/chat/completions?api-version=2024-02-15-preview` where
581581
582582
- RESOURCE_NAME is the name of your Azure OpenAI resource
583583
- DEPLOYMENT_NAME is the name of your GPT-4 Vision model deployment

articles/ai-studio/how-to/deploy-models-timegen-1.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,42 @@ You can deploy TimeGEN-1 as a serverless API with pay-as-you-go billing. Nixtla
4747
- An [Azure AI Studio project](../how-to/create-projects.md).
4848
- Azure role-based access controls (Azure RBAC) are used to grant access to operations in Azure AI Studio. To perform the steps in this article, your user account must be assigned the __Azure AI Developer role__ on the resource group. For more information on permissions, visit [Role-based access control in Azure AI Studio](../concepts/rbac-ai-studio.md).
4949

50+
### Pricing information
51+
52+
#### Estimate the number of tokens needed
53+
54+
Before you create a deployment, it's useful to estimate the number of tokens that you plan to use and be billed for.
55+
One token corresponds to one data point in your input dataset or output dataset.
56+
57+
Suppose you have the following input time series dataset:
58+
59+
| Unique_id | Timestamp | Target Variable | Exogenous Variable 1 | Exogenous Variable 2 |
60+
|:---------:|:-------------------:|:---------------:|:--------------------:|:--------------------:|
61+
| BE | 2016-10-22 00:00:00 | 70.00 | 49593.0 | 57253.0 |
62+
| BE | 2016-10-22 01:00:00 | 37.10 | 46073.0 | 51887.0 |
63+
64+
To determine the number of tokens, multiply the number of rows (in this example, two) and the number of columns used for forecasting—not counting the unique_id and timestamp columns (in this example, three) to get a total of six tokens.
65+
66+
Given the following output dataset:
67+
68+
| Unique_id | Timestamp | Forecasted Target Variable |
69+
|:---------:|:-------------------:|:--------------------------:|
70+
| BE | 2016-10-22 02:00:00 | 46.57 |
71+
| BE | 2016-10-22 03:00:00 | 48.57 |
72+
73+
You can also determine the number of tokens by counting the number of data points returned after data forecasting. In this example, the number of tokens is two.
74+
75+
#### Estimate the pricing
76+
77+
There are four pricing meters, as described in the following table:
78+
79+
| Pricing Meter | Description |
80+
|-----------------------------------------------|-----------------------------------------------------------------------------------------|
81+
| paygo-inference-input-tokens | Costs associated with the tokens used as input for inference when *finetune_steps* = 0 |
82+
| paygo-inference-output-tokens | Costs associated with the tokens used as output for inference when *finetune_steps* = 0 |
83+
| paygo-finetuned-model-inference-input-tokens | Costs associated with the tokens used as input for inference when *finetune_steps* > 0 |
84+
| paygo-finetuned-model-inference-output-tokens | Costs associated with the tokens used as output for inference when *finetune_steps* > 0 |
85+
5086
### Create a new deployment
5187

5288
These steps demonstrate the deployment of TimeGEN-1. To create a deployment:

articles/aks/create-node-pools.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This article shows you how to create one or more node pools in an AKS cluster.
3131
The following limitations apply when you create AKS clusters that support multiple node pools:
3232

3333
* See [Quotas, virtual machine size restrictions, and region availability in Azure Kubernetes Service (AKS)](quotas-skus-regions.md).
34-
* You can delete system node pools if you have another system node pool to take its place in the AKS cluster. Otherwise, you cannot delete the system node pool.
34+
* You can delete the system node pool if you have another system node pool to take its place in the AKS cluster. Otherwise, you cannot delete the system node pool.
3535
* System pools must contain at least one node, and user node pools may contain zero or more nodes.
3636
* The AKS cluster must use the Standard SKU load balancer to use multiple node pools. This feature isn't supported with Basic SKU load balancers.
3737
* The AKS cluster must use Virtual Machine Scale Sets for the nodes.
@@ -60,7 +60,7 @@ The following limitations apply when you create AKS clusters that support multip
6060
--name $CLUSTER_NAME \
6161
--vm-set-type VirtualMachineScaleSets \
6262
--node-count 2 \
63-
--generate-ssh-keys \
63+
--location $LOCATION \
6464
--load-balancer-sku standard \
6565
--generate-ssh-keys
6666
```

articles/aks/istio-deploy-ingress.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,10 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP
4040
aks-istio-ingressgateway-external LoadBalancer 10.0.10.249 <EXTERNAL_IP> 15021:30705/TCP,80:32444/TCP,443:31728/TCP 4m21s
4141
```
4242

43+
> [!NOTE]
44+
> Customizations to IP address on internal and external gateways aren't supported yet. IP address customizations on the ingress are reverted back by the Istio add-on.
45+
It's planned to allow these customizations in Gateway API Istio implementation as part of the Istio add-on in future.
46+
4347
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
4448

4549
```bash

articles/aks/istio-plugin-ca.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The add-on requires Azure CLI version 2.57.0 or later installed. You can run `az
3535
az keyvault secret set --vault-name $AKV_NAME --name root-cert --file <path-to-folder/root-cert.pem>
3636
az keyvault secret set --vault-name $AKV_NAME --name ca-cert --file <path-to-folder/ca-cert.pem>
3737
az keyvault secret set --vault-name $AKV_NAME --name ca-key --file <path-to-folder/ca-key.pem>
38-
az keyvault secret set --vault-name $AKV_NAME --name cert-chain --file <path/cert-chain.pem>
38+
az keyvault secret set --vault-name $AKV_NAME --name cert-chain --file <path-to-folder/cert-chain.pem>
3939
```
4040

4141
1. Enable [Azure Key Vault provider for Secret Store CSI Driver for your cluster][akv-addon]:

0 commit comments

Comments
 (0)