Skip to content

Commit 1de8b91

Browse files
authored
Merge pull request #78983 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 83b80f9 + 219c783 commit 1de8b91

File tree

12 files changed

+21
-18
lines changed

12 files changed

+21
-18
lines changed

articles/app-service/operating-system-functionality.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ It is important to monitor your disk utilization as your application grows. If t
6161

6262
- The app may throw an error indicating not enough space on the disk.
6363
- You may see disk errors when browsing to the Kudu console.
64-
- Deployment from VSTS or Visual Studio may fail with `ERROR_NOT_ENOUGH_DISK_SPACE: Web deployment task failed. (Web Deploy detected insufficient space on disk)`.
64+
- Deployment from Azure DevOps or Visual Studio may fail with `ERROR_NOT_ENOUGH_DISK_SPACE: Web deployment task failed. (Web Deploy detected insufficient space on disk)`.
6565
- Your app may suffer slow performance.
6666

6767
<a id="NetworkDrives"></a>

articles/azure-cache-for-redis/cache-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,7 @@ You can use any of the commands listed at [Redis commands](https://redis.io/comm
247247
* `redis-cli -h <Azure Cache for Redis name>.redis.cache.windows.net -a <key>`
248248

249249
> [!NOTE]
250-
> The Redis command-line tools do not work with the SSL port, but you can use a utility such as `stunnel` to securely connect the tools to the SSL port by following the directions in the [Announcing ASP.NET Session State Provider for Redis Preview Release](https://blogs.msdn.com/b/webdev/archive/2014/05/12/announcing-asp-net-session-state-provider-for-redis-preview-release.aspx) blog post.
250+
> The Redis command-line tools do not work with the SSL port, but you can use a utility such as `stunnel` to securely connect the tools to the SSL port by following the directions in the [How to use the Redis command-line tool with Azure Cache for Redis](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-how-to-redis-cli-tool) article.
251251
>
252252
>
253253

articles/azure-monitor/platform/activity-logs-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ There is a single Activity Log for each Azure subscription. It provides data abo
2424

2525

2626
> [!NOTE]
27-
> The Azure Activity Log is primarily for activities that occur in Azure Resource Manager. It does not track ugresources using the Classic/RDFE model. Some Classic resource types have a proxy resource provider in Azure Resource Manager (for example, Microsoft.ClassicCompute). If you interact with a Classic resource type through Azure Resource Manager using these proxy resource providers, the operations appear in the Activity Log. If you interact with a Classic resource type outside of the Azure Resource Manager proxies, your actions are only recorded in the Operation Log. The Operation Log can be browsed in a separate section of the portal.
27+
> The Azure Activity Log is primarily for activities that occur in Azure Resource Manager. It does not track resources using the Classic/RDFE model. Some Classic resource types have a proxy resource provider in Azure Resource Manager (for example, Microsoft.ClassicCompute). If you interact with a Classic resource type through Azure Resource Manager using these proxy resource providers, the operations appear in the Activity Log. If you interact with a Classic resource type outside of the Azure Resource Manager proxies, your actions are only recorded in the Operation Log. The Operation Log can be browsed in a separate section of the portal.
2828
2929
## Activity Log retention
3030
Activity Log events are stored for 90 days. To store this data for longer periods, [collect it in Azure Monitor](activity-log-collect.md) or [export it to storage or Event Hubs](activity-log-export.md).

articles/cognitive-services/Anomaly-Detector/tutorials/anomaly-detection-streaming-databricks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.author: aahi
1414

1515
# Tutorial: Anomaly detection on streaming data using Azure Databricks
1616

17-
[Azure Databricks](https://azure.microsoft.com/en-us/services/databricks/) is a fast, easy, and collaborative Apache Spark–based analytics service. The Anomaly Detector API, part of Azure Cognitive Services, provides a way of monitoring your time series data. Use this tutorial to run anomaly detection on a stream of data in near real-time using Azure Databricks. You'll ingest twitter data using Azure Event Hubs, and import them into Azure Databricks using the Spark Event Hubs connector. Afterwards, you'll use the API to detect anomalies on the streamed data.
17+
[Azure Databricks](https://azure.microsoft.com/services/databricks/) is a fast, easy, and collaborative Apache Spark–based analytics service. The Anomaly Detector API, part of Azure Cognitive Services, provides a way of monitoring your time series data. Use this tutorial to run anomaly detection on a stream of data in near real-time using Azure Databricks. You'll ingest twitter data using Azure Event Hubs, and import them into Azure Databricks using the Spark Event Hubs connector. Afterwards, you'll use the API to detect anomalies on the streamed data.
1818

1919
The following illustration shows the application flow:
2020

articles/cognitive-services/Speech-Service/ship-application.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ The Cognitive Services Speech SDK is tested on Windows 10 and on Windows Server
2525

2626
The Cognitive Services Speech SDK requires the [Microsoft Visual C++ Redistributable for Visual Studio 2019](https://support.microsoft.com/help/2977003/the-latest-supported-visual-c-downloads) on the system. You can download installers for the latest version of the `Microsoft Visual C++ Redistributable for Visual Studio 2019` here:
2727

28-
- [Win32](https://aka.ms/vs/15/release/vc_redist.x86.exe)
29-
- [x64](https://aka.ms/vs/15/release/vc_redist.x64.exe)
28+
- [Win32](https://aka.ms/vs/16/release/vc_redist.x86.exe)
29+
- [x64](https://aka.ms/vs/16/release/vc_redist.x64.exe)
3030

3131
If your application uses managed code, the `.NET Framework 4.6.1` or later is required on the target machine.
3232

articles/digital-twins/how-to-diagnose-user-defined-functions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ A variety of logging, analytics, and diagnostic tools are provided to that end.
2929
Azure Digital Twins supports robust logging, monitoring, and analytics. Solutions developers can use Azure Monitor logs, diagnostic logs, activity logs, and other services to support the complex monitoring needs of an IoT app. Logging options can be combined to query or display records across several services and to provide granular logging coverage for many services.
3030

3131
* For logging configuration specific to Azure Digital Twins, read [How to configure monitoring and logging](./how-to-configure-monitoring.md).
32-
* Consult the the [Azure Monitor](../azure-monitor/overview.md) overview to learn about powerful log settings enabled through Azure Monitor.
32+
* Consult the [Azure Monitor](../azure-monitor/overview.md) overview to learn about powerful log settings enabled through Azure Monitor.
3333
* Review the article [Collect and consume log data from your Azure resources](../azure-monitor/platform/diagnostic-logs-overview.md) for configuring diagnostic log settings in Azure Digital Twins through the Azure Portal, Azure CLI, or PowerShell.
3434

3535
Once configured, you'll be able to select all log categories, metrics, and use powerful Azure Monitor log analytics workspaces to support your debugging efforts.

articles/frontdoor/waf-front-door-configure-ip-restriction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ az network waf-policy custom-rule create \
5858
--name IPAllowListRule \
5959
--priority 1 \
6060
--rule-type MatchRule \
61-
--match-condition RemoteAddr IPMatch "<ip-address-range-1>","<ip-address-range-2>" \
61+
--match-condition RemoteAddr IPMatch ("<ip-address-range-1>","<ip-address-range-2>") \
6262
--action Allow \
6363
--resource-group <resource-group-name> \
6464
--policy-name IPAllowPolicyExampleCLI
@@ -134,7 +134,7 @@ In the following example, replace *ip-address-range-1*, *ip-address-range-2* wit
134134
$IPMatchCondition = New-AzFrontDoorWafMatchConditionObject `
135135
-MatchVariable RemoteAddr `
136136
-OperatorProperty IPMatch `
137-
-MatchValue ["ip-address-range-1", "ip-address-range-2"]
137+
-MatchValue "ip-address-range-1", "ip-address-range-2"
138138
```
139139
Create an IP *match all condition* rule by using the following command:
140140
```powershell

articles/iot-edge/how-to-install-iot-edge-windows.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ This example demonstrates a manual installation with Windows containers:
8181
3. The **Deploy-IoTEdge** command checks that your Windows machine is on a supported version, turns on the containers feature, and then downloads the moby runtime and the IoT Edge runtime. The command defaults to using Windows containers.
8282
8383
```powershell
84-
. {Invoke-WebRequest -useb aka.ms/iotedge-win} | Invoke-Expression; `
84+
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
8585
Deploy-IoTEdge
8686
```
8787
@@ -90,7 +90,7 @@ This example demonstrates a manual installation with Windows containers:
9090
5. The **Initialize-IoTEdge** command configures the IoT Edge runtime on your machine. The command defaults to manual provisioning with Windows containers.
9191

9292
```powershell
93-
. {Invoke-WebRequest -useb aka.ms/iotedge-win} | Invoke-Expression; `
93+
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
9494
Initialize-IoTEdge
9595
```
9696

@@ -130,7 +130,7 @@ The following example demonstrates an automatic installation with Windows contai
130130
3. The **Deploy-IoTEdge** command checks that your Windows machine is on a supported version, turns on the containers feature, and then downloads the moby runtime and the IoT Edge runtime. The command defaults to using Windows containers.
131131
132132
```powershell
133-
. {Invoke-WebRequest -useb aka.ms/iotedge-win} | Invoke-Expression; `
133+
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
134134
Deploy-IoTEdge
135135
```
136136
@@ -139,7 +139,7 @@ The following example demonstrates an automatic installation with Windows contai
139139
6. The **Initialize-IoTEdge** command configures the IoT Edge runtime on your machine. The command defaults to manual provisioning with Windows containers. Use the `-Dps` flag to use the Device Provisioning Service instead of manual provisioning.
140140

141141
```powershell
142-
. {Invoke-WebRequest -useb aka.ms/iotedge-win} | Invoke-Expression; `
142+
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
143143
Initialize-IoTEdge -Dps
144144
```
145145

@@ -167,7 +167,7 @@ For the latest IoT Edge installation files along with previous versions, see [Az
167167
To install with offline components, use the `-OfflineInstallationPath` parameter as part of the Deploy-IoTEdge command and provide the absolute path to the file directory. For example,
168168

169169
```powershell
170-
. {Invoke-WebRequest -useb aka.ms/iotedge-win} | Invoke-Expression; `
170+
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
171171
Deploy-IoTEdge -OfflineInstallationPath C:\Downloads\iotedgeoffline
172172
```
173173

@@ -184,7 +184,7 @@ Get-Service iotedge
184184
Examine service logs from the last 5 minutes. If you just finished installing the IoT Edge runtime, you may see a list of errors from the time between running **Deploy-IoTEdge** and **Initialize-IoTEdge**. These errors are expected, as the service is trying to start before being configured.
185185

186186
```powershell
187-
. {Invoke-WebRequest -useb aka.ms/iotedge-win} | Invoke-Expression; Get-IoTEdgeLog
187+
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; Get-IoTEdgeLog
188188
```
189189

190190
List running modules. After a new installation, the only module you should see running is **edgeAgent**. After you [deploy IoT Edge modules](how-to-deploy-modules-portal.md), you will see others.
@@ -228,7 +228,7 @@ For more information, see [Update the IoT Edge security daemon and runtime](how-
228228
This example shows an installation that points to an existing configuration file, and uses Windows containers:
229229

230230
```powershell
231-
. {Invoke-WebRequest -useb aka.ms/iotedge-win} | Invoke-Expression; `
231+
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
232232
Update-IoTEdge
233233
```
234234

articles/iot-edge/tutorial-c-module-windows.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,7 @@ The deployment manifest shares the credentials for your container registry with
102102
"address": "<registry name>.azurecr.io"
103103
}
104104
}
105+
```
105106

106107
4. Save the deployment.template.json file.
107108

articles/iot-edge/tutorial-csharp-module-windows.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,7 @@ The deployment manifest shares the credentials for your container registry with
102102
"address": "<registry name>.azurecr.io"
103103
}
104104
}
105+
```
105106

106107
4. Save the deployment.template.json file.
107108

0 commit comments

Comments
 (0)