Skip to content

Commit 09fb729

Browse files
authored
Merge pull request #201078 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents e27f38b + 6877e31 commit 09fb729

File tree

8 files changed

+34
-22
lines changed

8 files changed

+34
-22
lines changed

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ To collect debug logs for support diagnostics, use the following steps on the NP
109109

110110
```
111111
Mkdir c:\NPS
112-
Cd NPS
112+
Cd c:\NPS
113113
netsh trace start Scenario=NetConnection capture=yes tracefile=c:\NPS\nettrace.etl
114114
logman create trace "NPSExtension" -ow -o c:\NPS\NPSExtension.etl -p {7237ED00-E119-430B-AB0F-C63360C8EE81} 0xffffffffffffffff 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 4096 -ets
115115
logman update trace "NPSExtension" -p {EC2E6D3A-C958-4C76-8EA4-0262520886FF} 0xffffffffffffffff 0xff -ets

articles/azure-app-configuration/howto-integrate-azure-managed-service-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ The following steps describe how to assign the App Configuration Data Reader rol
181181
> options.Connect(new Uri(settings["AppConfig:Endpoint"]), new ManagedIdentityCredential("<your_clientId>"))
182182
> });
183183
>```
184-
>As explained in the [Managed Identities for Azure resources FAQs](../active-directory/managed-identities-azure-resources/known-issues.md), there is a default way to resolve which managed identity is used. In this case, the Azure Identity library enforces you to specify the desired identity to avoid posible runtime issues in the future (for instance, if a new user-assigned managed identity is added or if the system-assigned managed identity is enabled). So, you will need to specify the clientId even if only one user-assigned managed identity is defined, and there is no system-assigned managed identity.
184+
>As explained in the [Managed Identities for Azure resources FAQs](../active-directory/managed-identities-azure-resources/known-issues.md), there is a default way to resolve which managed identity is used. In this case, the Azure Identity library enforces you to specify the desired identity to avoid possible runtime issues in the future (for instance, if a new user-assigned managed identity is added or if the system-assigned managed identity is enabled). So, you will need to specify the clientId even if only one user-assigned managed identity is defined, and there is no system-assigned managed identity.
185185
186186
:::zone-end
187187
@@ -224,4 +224,4 @@ In addition to App Service, many other Azure services support managed identities
224224
In this tutorial, you added an Azure managed identity to streamline access to App Configuration and improve credential management for your app. To learn more about how to use App Configuration, continue to the Azure CLI samples.
225225
226226
> [!div class="nextstepaction"]
227-
> [CLI samples](./cli-samples.md)
227+
> [CLI samples](./cli-samples.md)

articles/cost-management-billing/manage/consumption-api-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: banders
1212

1313
# Azure consumption API overview
1414

15-
The Azure Consumption APIs give you programmatic access to cost and usage data for your Azure resources. These APIs currently only support Enterprise Enrollments and Web Direct Subscriptions (with a few exceptions). The APIs are continually updated to support other types of Azure subscriptions.
15+
The Azure Consumption APIs give you programmatic access to cost and usage data for your Azure resources. These APIs currently only support Enterprise Enrollments, Web Direct Subscriptions (with a few exceptions), and CSP Azure plan subscriptions. The APIs are continually updated to support other types of Azure subscriptions.
1616

1717
Azure Consumption APIs provide access to:
1818
- Enterprise and Web Direct Customers

articles/key-vault/general/rbac-guide.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -247,35 +247,35 @@ For full details, see [Assign Azure roles using Azure PowerShell](../../role-bas
247247
248248
1. Validate adding new secret without "Key Vault Secrets Officer" role on key vault level.
249249

250-
Go to key vault Access control (IAM) tab and remove "Key Vault Secrets Officer" role assignment for this resource.
250+
1. Go to key vault Access control (IAM) tab and remove "Key Vault Secrets Officer" role assignment for this resource.
251251

252-
![Remove assignment - key vault](../media/rbac/image-9.png)
252+
![Remove assignment - key vault](../media/rbac/image-9.png)
253253

254-
Navigate to previously created secret. You can see all secret properties.
254+
1. Navigate to previously created secret. You can see all secret properties.
255255

256-
![Secret view with access](../media/rbac/image-10.png)
256+
![Secret view with access](../media/rbac/image-10.png)
257257

258-
Create new secret ( Secrets \> +Generate/Import) should show below error:
258+
1. Create new secret ( Secrets \> +Generate/Import) should show below error:
259259

260-
![Create new secret](../media/rbac/image-11.png)
260+
![Create new secret](../media/rbac/image-11.png)
261261

262-
2. Validate secret editing without "Key Vault Secret Officer" role on secret level.
262+
1. Validate secret editing without "Key Vault Secret Officer" role on secret level.
263263

264-
- Go to previously created secret Access Control (IAM) tab
264+
1. Go to previously created secret Access Control (IAM) tab
265265
and remove "Key Vault Secrets Officer" role assignment for
266266
this resource.
267267

268-
- Navigate to previously created secret. You can see secret properties.
268+
1. Navigate to previously created secret. You can see secret properties.
269269

270-
![Secret view without access](../media/rbac/image-12.png)
270+
![Secret view without access](../media/rbac/image-12.png)
271271

272-
3. Validate secrets read without reader role on key vault level.
272+
1. Validate secrets read without reader role on key vault level.
273273

274-
- Go to key vault resource group Access control (IAM) tab and remove "Key Vault Reader" role assignment.
274+
1. Go to key vault resource group Access control (IAM) tab and remove "Key Vault Reader" role assignment.
275275

276-
- Navigating to key vault's Secrets tab should show below error:
276+
1. Navigating to key vault's Secrets tab should show below error:
277277

278-
![Secret tab - error](../media/rbac/image-13.png)
278+
![Secret tab - error](../media/rbac/image-13.png)
279279

280280
### Creating custom roles
281281

articles/logic-apps/logic-apps-workflow-actions-triggers.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1900,7 +1900,6 @@ The Logic Apps engine checks access to the trigger you want to call, so make sur
19001900
| <*trigger-name*> | String | The name for the trigger in the nested logic app you want to call |
19011901
| <*Azure-subscription-ID*> | String | The Azure subscription ID for the nested logic app |
19021902
| <*Azure-resource-group*> | String | The Azure resource group name for the nested logic app |
1903-
| <*nested-logic-app-name*> | String | The name for the logic app you want to call |
19041903
||||
19051904

19061905
*Optional*

articles/sentinel/sentinel-solutions-catalog.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ For more information, see [Centrally discover and deploy Microsoft Sentinel out-
2424

2525
|Name |Includes |Categories |Supported by |
2626
|---------|---------|---------|---------|
27-
|**Apache Log4j Vulnerability Detection** | Analytics rules, hunting queries | Application, Security - Threat Protection, Security - Vulnerability Management | Microsoft|
27+
|**Apache Log4j Vulnerability Detection** | Analytics rules, hunting queries, workbooks, playbooks | Application, Security - Threat Protection, Security - Vulnerability Management | Microsoft|
2828
|**Cybersecurity Maturity Model Certification (CMMC)** | [Analytics rules, workbook, playbook](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-cybersecurity-maturity-model-certification-cmmc/ba-p/2111184) | Compliance | Microsoft|
2929
| **IoT/OT Threat Monitoring with Defender for IoT** | [Analytics rules, playbooks, workbook](iot-solution.md) | Internet of Things (IoT), Security - Threat Protection | Microsoft |
3030
|**Maturity Model for Event Log Management M2131** | [Analytics rules, hunting queries, playbooks, workbook](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/modernize-log-management-with-the-maturity-model-for-event-log/ba-p/3072842) | Compliance | Microsoft|

articles/virtual-machines/linux/using-cloud-init.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,8 +163,21 @@ Once the VM has been provisioned, cloud-init will run through all the modules an
163163
> [!NOTE]
164164
> Not every module failure results in a fatal cloud-init overall configuration failure. For example, using the `runcmd` module, if the script fails, cloud-init will still report provisioning succeeded because the runcmd module executed.
165165

166-
For more details of cloud-init logging, refer to the [cloud-init documentation](https://cloudinit.readthedocs.io/en/latest/topics/logging.html)
166+
For more details of cloud-init logging, refer to the [cloud-init documentation](https://cloudinit.readthedocs.io/en/latest/topics/logging.html)
167167

168+
## Telemetry
169+
cloud-init collects usage data and sends it to Microsoft to help improve our products and services. Telemetry is only collected during the provisioning process (first boot of the VM). The data collected helps us investigate provisioning failures and monitor performance and reliability. Data collected does not include any personally identifiable information. Read our [privacy statement](https://go.microsoft.com/fwlink/?LinkId=521839) to learn more. Some examples of telemetry being collected are (this is not an exhaustive list): OS-related information (cloud-init version, distro version, kernel version), performance metrics of essential VM provisioning actions (time to obtain DHCP lease, time to retrieve metadata necessary to configure the VM, etc.), cloud-init log, and dmesg log.
170+
171+
Telemetry collection is currently enabled for a majority of our marketplace images that use cloud-init. It is enabled by specifying KVP telemetry reporter for cloud-init. In a majority of Azure marketplace images, this configuration can be found in the file /etc/cloud/cloud.cfg.d/10-azure-kvp.cfg. Removing this file during image preparation will disable telemetry collection for any VM created from this image.
172+
173+
Sample content of 10-azure-kvp.cfg
174+
```
175+
reporting:
176+
logging:
177+
type: log
178+
telemetry:
179+
type: hyperv
180+
```
168181
## Next steps
169182
170183
[Troubleshoot issues with cloud-init](cloud-init-troubleshooting.md).

includes/api-management-service-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ ms.custom: Include file
3636
| Maximum number of [schemas](../articles/api-management/validation-policies.md#schemas-for-content-validation)<sup>10</sup> | 100 |
3737
| Maximum size of request or response body in [validate-content policy](../articles/api-management/validation-policies.md#validate-content)<sup>10</sup> | 100 KB |
3838
| Maximum number of self-hosted gateways<sup>11</sup> | 25 |
39-
| Maximum number of active WebSocket connections per unit | 200 |
39+
| Maximum number of active WebSocket connections per unit | 100 |
4040
| Maximum number of tags supported by an API Management resource|15|
4141

4242
<sup>1</sup> Scaling limits depend on the pricing tier. For details on the pricing tiers and their scaling limits, see [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/).<br/>

0 commit comments

Comments
 (0)