Skip to content

Commit 29f574b

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents e6bd8ae + 54c5697 commit 29f574b

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

articles/deployment-environments/how-to-configure-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ You can set up your key vault to use either a [key vault access policy](/azure/k
124124
125125
### Key vault access policy
126126

127-
[!INCLUDE [contributor-role-warning.md](~/reusable-content/ce-skilling/azure/includes/key-vault/includes/key-vault-contributor-role-warning.md)]
127+
[!INCLUDE [contributor-role-warning.md](~/reusable-content/ce-skilling/azure/includes/key-vault/key-vault-contributor-role-warning.md)]
128128

129129
If the key vault is configured to use a key vault access policy:
130130

articles/private-link/private-endpoint-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ A private-link resource is the destination target of a specified private endpoin
8080
| Azure Batch | Microsoft.Batch/batchAccounts | batchAccount, nodeManagement |
8181
| Azure Cache for Redis | Microsoft.Cache/Redis | redisCache |
8282
| Azure Cache for Redis Enterprise | Microsoft.Cache/redisEnterprise | redisEnterprise |
83-
| Azure Container Apps | Microsoft.App/ManagedEnvironments | managedEnvironment |
83+
| Azure Container Apps | Microsoft.App/ManagedEnvironments | managedEnvironments |
8484
| Azure Container Registry | Microsoft.ContainerRegistry/registries | registry |
8585
| Azure Cosmos DB | Microsoft.AzureCosmosDB/databaseAccounts | SQL, MongoDB, Cassandra, Gremlin, Table |
8686
| Azure Cosmos DB for MongoDB vCore | Microsoft.DocumentDb/mongoClusters | mongoCluster |

articles/redis/architecture.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -63,10 +63,10 @@ The **Non-Clustered (preview)** clustering policy stores data on each node witho
6363

6464
The considerations for using Non-Clustered (Preview) policy are:
6565

66-
- It only applies to Azure Managed Redis tiers less than or equal to 25 GB.
67-
- It’s not as performant as other clustering policies because CPUs can only multi-thread with Redis Enterprise software when it’s sharded.
68-
- If you want to scale up your Azure Managed Redis cache, you must firs change the cluster policy.
69-
- If you're moving from Basic, Standard, or Premium non-clustered topology, consider to using OSS clusters to accelerate performance. Non-clustered should only be considered if the application program can't work with either OSS or Enterprise topologies.
66+
- This only applies to Azure Managed Redis tiers that are less than or equal to 25 GB.
67+
- It’s not as performant as other clustering policies, because CPUs can only multi-thread with Redis Enterprise software when the cache is sharded.
68+
- If you want to scale up your Azure Managed Redis cache, you must first change the cluster policy.
69+
- If you're moving from a Basic, Standard, or Premium non-clustered topology, consider using OSS clusters to improve performance. Non-clustered configurations should only be used if the application cannot support either OSS or Enterprise topologies.
7070

7171
### Scaling out or adding nodes
7272

articles/role-based-access-control/built-in-roles/security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -423,7 +423,7 @@ Manage key vaults, but does not allow you to assign roles in Azure RBAC, and doe
423423

424424
[Learn more](/azure/key-vault/general/security-features)
425425

426-
[!INCLUDE [contributor-role-warning.md](~/reusable-content/ce-skilling/azure/includes/key-vault/includes/key-vault-contributor-role-warning.md)]
426+
[!INCLUDE [contributor-role-warning.md](~/reusable-content/ce-skilling/azure/includes/key-vault/key-vault-contributor-role-warning.md)]
427427

428428
> [!div class="mx-tableFixed"]
429429
> | Actions | Description |
@@ -1605,4 +1605,4 @@ View permissions for Microsoft Defender for Cloud. Can view recommendations, ale
16051605

16061606
## Next steps
16071607

1608-
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)
1608+
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)

0 commit comments

Comments
 (0)