Skip to content

Commit 22572b0

Browse files
authored
Merge pull request #276174 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 4b66969 + 046a36d commit 22572b0

File tree

7 files changed

+67
-55
lines changed

7 files changed

+67
-55
lines changed

articles/ai-services/openai/assistants-reference-runs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -457,7 +457,7 @@ When a run has the status: "requires_action" and required_action.type is submit_
457457

458458
|Name | Type | Required | Description |
459459
|--- |--- |--- |--- |
460-
| `tool_outputs | array | Required | A list of tools for which the outputs are being submitted. |
460+
| `tool_outputs` | array | Required | A list of tools for which the outputs are being submitted. |
461461

462462
### Returns
463463

articles/aks/intro-aks-automatic.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,14 +54,14 @@ Node management is automatically handled without the need for manual node pool c
5454

5555
### Security and policies
5656

57-
Cluster authentication and authorization use [Azure Role-based Access Control (RBAC) for Kubernetes authorization][azure-rbac-for-k8s-auth] and applications can use features like [workload identity with Microsoft Entra Workload ID][workload-identity] and [OpenID Connect (OIDC) cluster issuer][oidc-issuer] to have secure communication with Azure services. [Deployment safeguards][deployment-safeguards] enforce Kubernetes best practices through Azure Policy controls and the built-in [image cleaner][image-cleaner] removes stale and vulnerable images, enhancing image security.
57+
Cluster authentication and authorization use [Azure Role-based Access Control (RBAC) for Kubernetes authorization][azure-rbac-for-k8s-auth] and applications can use features like [workload identity with Microsoft Entra Workload ID][workload-identity] and [OpenID Connect (OIDC) cluster issuer][oidc-issuer] to have secure communication with Azure services. [Deployment safeguards][deployment-safeguards] enforce Kubernetes best practices through Azure Policy controls and the built-in [image cleaner][image-cleaner] removes unused images with vulnerabilities, enhancing image security.
5858

5959
| Option | AKS Automatic | AKS Standard |
6060
|--- |--- |--- |
6161
| Cluster authentication and authorization | **Pre-configured:** [Azure RBAC for Kubernetes authorization][azure-rbac-for-k8s-auth] for managing cluster authentication and authorization using Azure role-based access control. | **Default:** Local accounts. <br/> **Optional:** <ul><li>[Azure RBAC for Kubernetes authorization][azure-rbac-for-k8s-auth]</li><li>[Kubernetes RBAC with Microsoft Entra integration][k8s-rbac-with-entra]</li></ul> |
6262
| Cluster security | **Pre-configured:** [API server virtual network integration][api-server-vnet-integration] enables network communication between the API server and the cluster nodes over a private network without requiring a private link or tunnel. | **Optional:** [API server virtual network integration][api-server-vnet-integration] enables network communication between the API server and the cluster nodes over a private network without requiring a private link or tunnel.|
6363
| Application security | **Pre-configured:** <ul><li>[Workload identity with Microsoft Entra Workload ID][workload-identity]</li><li>[OpenID Connect (OIDC) cluster issuer][oidc-issuer]</li></ul> | **Optional:** <ul><li>[Workload identity with Microsoft Entra Workload ID][workload-identity]</li><li>[OpenID Connect (OIDC) cluster issuer][oidc-issuer]</li></ul> |
64-
| Image security | **Pre-configured:** [Image cleaner][image-cleaner] to remove stale and vulnerable images. | **Optional:** [Image cleaner][image-cleaner] to remove stale and vulnerable images. |
64+
| Image security | **Pre-configured:** [Image cleaner][image-cleaner] to remove unused images with vulnerabilities. | **Optional:** [Image cleaner][image-cleaner] to remove unused images with vulnerabilities. |
6565
| Policy enforcement | **Pre-configured:** [Deployment safeguards][deployment-safeguards] that enforce Kubernetes best practices in your AKS cluster through Azure Policy controls. | **Optional:** [Deployment safeguards][deployment-safeguards] enforce Kubernetes best practices in your AKS cluster through Azure Policy controls. |
6666

6767
### Networking
@@ -72,7 +72,7 @@ AKS Automatic clusters use [managed Virtual Network powered by Azure CNI Overlay
7272
|--- |--- |--- |
7373
| Virtual network | **Pre-configured:** [Managed Virtual Network using Azure CNI Overlay powered by Cilium][azure-cni-powered-by-cilium] combines the robust control plane of Azure CNI with the data plane of Cilium to provide high-performance networking and security. | **Default:** [Managed Virtual Network with kubenet][kubenet] <br/> **Optional:** <ul><li>[Azure CNI][azure-cni]</li><li>[Azure CNI Overlay][azure-cni-overlay]</li><li>[Azure CNI Overlay powered by Cilium][azure-cni-powered-by-cilium]</li><li>[Bring your own CNI][use-byo-cni]</li></ul> |
7474
| Ingress | **Pre-configured:** [Managed NGINX using the application routing add-on][app-routing] with integrations for Azure DNS and Azure Key Vault. <br/> **Optional:** <ul><li>[Azure Service Mesh (Istio)][istio-deploy-ingress] ingress gateway</li><li>Bring your own ingress or gateway.</li></ul> | **Optional:** <ul><li>[Managed NGINX using the application routing add-on][app-routing] with integrations for Azure DNS and Azure Key Vault.</li><li>[Azure Service Mesh (Istio)][istio-deploy-ingress] ingress gateway</li><li>Bring your own ingress or gateway.</li></ul> |
75-
| Egress | **Pre-configured:** [AKS managed NAT gateway][managed-nat-gateway] for a scalable outbound connection flows| **Default:** <ul><li>[Azure Load Balancer][egress-load-balancer]</li><li>[User-assigned NAT gateway][managed-nat-gateway]</li><li>[AKS managed NAT gateway][userassigned-nat-gateway]</li></ul> |
75+
| Egress | **Pre-configured:** [AKS managed NAT gateway][managed-nat-gateway] for a scalable outbound connection flows| **Default:** [Azure Load Balancer][egress-load-balancer] <br/> **Optional:** <ul><li>[User-assigned NAT gateway][managed-nat-gateway]</li><li>[AKS managed NAT gateway][userassigned-nat-gateway]</li></ul> |
7676
| Service mesh | **Optional:** <ul><li>[Azure Service Mesh (Istio)][istio-mesh]</li><li>Bring your own service mesh.</li></ul> | **Optional:** <ul><li>[Azure Service Mesh (Istio)][istio-mesh]</li><li>Bring your own service mesh.</li></ul> |
7777

7878
## Next steps
@@ -120,4 +120,4 @@ To learn more about AKS Automatic, follow the quickstart to create a cluster.
120120
[container-insights]: ../azure-monitor/containers/container-insights-overview.md
121121
[uptime-sla]: free-standard-pricing-tiers.md#uptime-sla-terms-and-conditions
122122
[long-term-support]: long-term-support.md
123-
[quickstart-aks-automatic]: ./learn/quick-kubernetes-automatic-deploy.md
123+
[quickstart-aks-automatic]: ./learn/quick-kubernetes-automatic-deploy.md

articles/aks/use-kms-etcd-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This article shows you how to turn on encryption at rest for your Azure Kubernet
1616
* Provide encryption at rest for secrets that are stored in etcd.
1717
* Rotate the keys in a key vault.
1818

19-
For more information on using KMS, see [Encrypting Secret Data at Rest](https://kubernetes.io/docs/tasks/administer-cluster/kms-provider/).
19+
For more information on using KMS, see [Using a KMS provider for data encryption](https://kubernetes.io/docs/tasks/administer-cluster/kms-provider/).
2020

2121
## Prerequisites
2222

articles/azure-monitor/app/release-and-work-item-insights.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -224,12 +224,19 @@ You can use the `CreateReleaseAnnotation` PowerShell script to create annotation
224224
$annotation = ConvertTo-Json $annotation -Compress
225225
$annotation = Convert-UnicodeToEscapeHex -JsonString $annotation
226226
227-
$body = $annotation -replace '(\\+)"', '$1$1"' -replace "`"", "`"`""
228-
229-
az rest --method put --uri "$($aiResourceId)/Annotations?api-version=2015-05-01" --body "$($body) "
230-
231-
# Use the following command for Linux Azure DevOps Hosts or other PowerShell scenarios
232-
# Invoke-AzRestMethod -Path "$aiResourceId/Annotations?api-version=2015-05-01" -Method PUT -Payload $body
227+
$accessToken = (az account get-access-token | ConvertFrom-Json).accessToken
228+
$headers = @{
229+
"Authorization" = "Bearer $accessToken"
230+
"Accept" = "application/json"
231+
"Content-Type" = "application/json"
232+
}
233+
$params = @{
234+
Headers = $headers
235+
Method = "Put"
236+
Uri = "https://management.azure.com$($aiResourceId)/Annotations?api-version=2015-05-01"
237+
Body = $annotation
238+
}
239+
Invoke-RestMethod @params
233240
```
234241
235242
> [!NOTE]

articles/governance/management-groups/overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ above subscriptions. You organize subscriptions into management groups; the gove
1414
cascade by inheritance to all associated subscriptions.
1515

1616
Management groups give you enterprise-grade management at scale, no matter what type of subscriptions you might have.
17-
However, all subscriptions within a single management group must trust the same Azure Active Directory (Azure AD) tenant.
17+
However, all subscriptions within a single management group must trust the same Entra ID tenant.
1818

1919
For example, you can apply policies to a management group that limits the regions available for virtual machine (VM) creation. This policy would be applied to all nested management groups, subscriptions, and resources and allow VM creation only in authorized regions.
2020

@@ -56,15 +56,15 @@ subscriptions.
5656
Each directory is given a single top-level management group called the **root** management group. The
5757
root management group is built into the hierarchy to have all management groups and subscriptions
5858
fold up to it. This root management group allows for global policies and Azure role assignments to
59-
be applied at the directory level. The [Azure AD Global Administrator needs to elevate
59+
be applied at the directory level. The [Entra ID Global Administrator needs to elevate
6060
themselves](../../role-based-access-control/elevate-access-global-admin.md) to the User Access
6161
Administrator role of this root group initially. After elevating access, the administrator can
6262
assign any Azure role to other directory users or groups to manage the hierarchy. As an administrator,
6363
you can assign your account as the owner of the root management group.
6464

6565
### Important facts about the root management group
6666

67-
- By default, the root management group's display name is **Tenant root group** and operates itself as a management group. The ID is the same value as the Azure Active Directory (Azure AD) tenant ID.
67+
- By default, the root management group's display name is **Tenant root group** and operates itself as a management group. The ID is the same value as the Entra ID tenant ID.
6868
- To change the display name, your account must be assigned the **Owner** or **Contributor** role on the
6969
root management group. See
7070
[Change the name of a management group](manage.md#change-the-name-of-a-management-group) to update
@@ -78,7 +78,7 @@ you can assign your account as the owner of the root management group.
7878
that root management group.
7979
- Everyone who has access to a subscription can see the context of where that subscription is in
8080
the hierarchy.
81-
- No one is given default access to the root management group. Azure AD Global Administrators are
81+
- No one is given default access to the root management group. Entra ID Global Administrators are
8282
the only users that can elevate themselves to gain access. Once they have access to the root
8383
management group, the global administrators can assign any Azure role to other users to manage
8484
it.
@@ -98,7 +98,7 @@ The reason for this process is to make sure there's only one management group hi
9898
directory. The single hierarchy within the directory allows administrative customers to apply global
9999
access and policies that other customers within the directory can't bypass. Anything assigned on the
100100
root will apply to the entire hierarchy, which includes all management groups, subscriptions,
101-
resource groups, and resources within that Azure AD tenant.
101+
resource groups, and resources within that Entra ID tenant.
102102

103103
## Management group access
104104

articles/oracle/oracle-db/database-overview.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: oracle-on-azure
66
ms.collection: linux
77
ms.topic: article
88
ms.date: 12/12/2023
9-
ms.custom: engagement-fy23
9+
ms.custom: engagement-fy23, references_regions
1010
ms.author: jacobjaygbay
1111
---
1212

@@ -49,6 +49,12 @@ Oracle Database@Azure is available in the following locations. Oracle Database@A
4949
|------------|
5050
|Germany West Central (Frankfurt)|
5151

52+
### France
53+
54+
|Azure region|
55+
|------------|
56+
|France Central (Paris)|
57+
5258
### United Kingdom
5359

5460
|Azure region|

0 commit comments

Comments
 (0)