Skip to content

Commit 2d5da2a

Browse files
authored
Merge pull request #233047 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 8290746 + 6f43c07 commit 2d5da2a

File tree

9 files changed

+38
-44
lines changed

9 files changed

+38
-44
lines changed

articles/aks/enable-host-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ If you want to create clusters without host-based encryption, you can do so by o
4747
You can enable host-based encryption on existing clusters by adding a new node pool to your cluster. Configure a new node pool to use host-based encryption by using the `--enable-encryption-at-host` parameter.
4848

4949
```azurecli
50-
az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 -l westus2 --enable-encryption-at-host
50+
az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 --enable-encryption-at-host
5151
```
5252

5353
If you want to create new node pools without the host-based encryption feature, you can do so by omitting the `--enable-encryption-at-host` parameter.

articles/aks/use-pod-sandboxing.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ To demonstrate the deployment of an untrusted application into the pod sandbox o
234234
235235
```output
236236
root@untrusted:/# uname -r
237-
5.15.80.mshv2-hvl1.m2
237+
5.15.48.1-8.cm2
238238
```
239239
240240
3. Start a shell session to the container of the *trusted* pod to verify the kernel output:
@@ -252,7 +252,8 @@ To demonstrate the deployment of an untrusted application into the pod sandbox o
252252
The following example resembles output from the VM that is running the *trusted* pod, which is a different kernel than the *untrusted* pod running within the pod sandbox:
253253
254254
```output
255-
5.15.48.1-8.cm2
255+
5.15.80.mshv2-hvl1.m2
256+
```
256257
257258
## Cleanup
258259

articles/app-service/overview-disaster-recovery.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ For IT, business continuity plans are largely driven by two metrics:
1919
- Recovery Time Objective (RTO) – the time duration in which your application must come back online after an outage.
2020
- Recovery Point Objective (RPO) – the acceptable amount of data loss in a disaster, expressed as a unit of time (for example, 1 minute of transactional database records).
2121

22-
Normally, maintaining an SLA around RTO is impractical for regional disasters, and you would typically design your disaster recovery strategy around RPO alone (i.e. focus on recovering data and not on minimizing interruption). With Azure, however, it's not only practical but could even be straightforward to deploy App Service for automatic geo-failovers. This lets you disaster-proof your applications further by take care of both RTO and RPO.
22+
Normally, maintaining an SLA around RTO is impractical for regional disasters, and you would typically design your disaster recovery strategy around RPO alone (i.e. focus on recovering data and not on minimizing interruption). With Azure, however, it's not only practical but could even be straightforward to deploy App Service for automatic geo-failovers. This lets you disaster-proof your applications further by taking care of both RTO and RPO.
2323

2424
Depending on your desired RTO and RPO metrics, three disaster recovery architectures are commonly used, as shown in the following table:
2525

@@ -155,4 +155,4 @@ Steps to create a passive-cold region without GRS and GZRS are summarized as fol
155155
156156
## Next steps
157157
158-
[Tutorial: Create a highly available multi-region app in Azure App Service](tutorial-multi-region-app.md)
158+
[Tutorial: Create a highly available multi-region app in Azure App Service](tutorial-multi-region-app.md)

articles/azure-functions/monitor-functions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -100,10 +100,10 @@ The following table lists common and recommended alert rules for Functions.
100100
| Metric | Average connections| When number of connections exceed a set value|
101101
| Metric | HTTP 404| When HTTP 404 responses exceed a set value|
102102
| Metric | HTTP Server Errors| When HTTP 5xx errors exceed a set value|
103-
| Activity Log | Create or Update Web App | When app is created or updated|
104-
| Activity Log | Delete Web App | When app is deleted|
105-
| Activity Log | Restart Web App| When app is restarted|
106-
| Activity Log | Stop Web App| When app is stopped|
103+
| Activity Log | Create or update function app | When app is created or updated|
104+
| Activity Log | Delete function app | When app is deleted|
105+
| Activity Log | Restart function app| When app is restarted|
106+
| Activity Log | Stop function app| When app is stopped|
107107

108108
## Next steps
109109

articles/cosmos-db/nosql/how-to-manage-conflicts.md

Lines changed: 13 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -117,15 +117,10 @@ const { container: lwwContainer } = await database.containers.createIfNotExists(
117117
### <a id="create-custom-conflict-resolution-policy-lww-python"></a>Python SDK
118118

119119
```python
120-
udp_collection = {
121-
'id': self.udp_collection_name,
122-
'conflictResolutionPolicy': {
123-
'mode': 'LastWriterWins',
124-
'conflictResolutionPath': '/myCustomId'
125-
}
126-
}
127-
udp_collection = self.try_create_document_collection(
128-
create_client, database, udp_collection)
120+
database = client.get_database_client(database=database_id)
121+
lww_conflict_resolution_policy = {'mode': 'LastWriterWins', 'conflictResolutionPath': '/regionId'}
122+
lww_container = database.create_container(id=lww_container_id, partition_key=PartitionKey(path="/id"),
123+
conflict_resolution_policy=lww_conflict_resolution_policy)
129124
```
130125

131126
## Create a custom conflict resolution policy using a stored procedure
@@ -314,15 +309,10 @@ After your container is created, you must create the `resolver` stored procedure
314309
### <a id="create-custom-conflict-resolution-policy-stored-proc-python"></a>Python SDK
315310

316311
```python
317-
udp_collection = {
318-
'id': self.udp_collection_name,
319-
'conflictResolutionPolicy': {
320-
'mode': 'Custom',
321-
'conflictResolutionProcedure': 'dbs/' + self.database_name + "/colls/" + self.udp_collection_name + '/sprocs/resolver'
322-
}
323-
}
324-
udp_collection = self.try_create_document_collection(
325-
create_client, database, udp_collection)
312+
database = client.get_database_client(database=database_id)
313+
udp_custom_resolution_policy = {'mode': 'Custom' }
314+
udp_container = database.create_container(id=udp_container_id, partition_key=PartitionKey(path="/id"),
315+
conflict_resolution_policy=udp_custom_resolution_policy)
326316
```
327317

328318
After your container is created, you must create the `resolver` stored procedure.
@@ -421,14 +411,10 @@ const {
421411
### <a id="create-custom-conflict-resolution-policy-python"></a>Python SDK
422412

423413
```python
424-
database = client.ReadDatabase("dbs/" + self.database_name)
425-
manual_collection = {
426-
'id': self.manual_collection_name,
427-
'conflictResolutionPolicy': {
428-
'mode': 'Custom'
429-
}
430-
}
431-
manual_collection = client.CreateContainer(database['_self'], collection)
414+
database = client.get_database_client(database=database_id)
415+
manual_resolution_policy = {'mode': 'Custom'}
416+
manual_container = database.create_container(id=manual_container_id, partition_key=PartitionKey(path="/id"),
417+
conflict_resolution_policy=manual_resolution_policy)
432418
```
433419

434420
## Read from conflict feed
@@ -509,7 +495,7 @@ const { result: conflicts } = await container.conflicts.readAll().toArray();
509495
### <a id="read-from-conflict-feed-python"></a>Python
510496

511497
```python
512-
conflicts_iterator = iter(client.ReadConflicts(self.manual_collection_link))
498+
conflicts_iterator = iter(container.list_conflicts())
513499
conflict = next(conflicts_iterator, None)
514500
while conflict:
515501
# Do something with conflict

articles/machine-learning/how-to-manage-quotas.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -169,9 +169,6 @@ For more information, see [Container Instances limits](../azure-resource-manager
169169
### Storage
170170
Azure Storage has a limit of 250 storage accounts per region, per subscription. This limit includes both Standard and Premium storage accounts.
171171

172-
To increase the limit, make a request through [Azure Support](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest/). The Azure Storage team will review your case and can approve up to 250 storage accounts for a region.
173-
174-
175172
## Workspace-level quotas
176173

177174
Use workspace-level quotas to manage Azure Machine Learning compute target allocation between multiple [workspaces](concept-workspace.md) in the same subscription.

articles/site-recovery/how-to-migrate-run-as-accounts-managed-identity.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,7 @@ You can configure your managed identities through:
5252

5353
**To migrate your Azure Automation account authentication type from a Run As to a managed identity authentication, follow these steps:**
5454

55+
5556
1. In the [Azure portal](https://portal.azure.com), select the recovery services vault for which you want to migrate the runbooks.
5657

5758
1. On the homepage of your recovery services vault page, do the following:
@@ -64,7 +65,12 @@ You can configure your managed identities through:
6465

6566
:::image type="content" source="./media/how-to-migrate-from-run-as-to-managed-identities/extension-update-settings.png" alt-text="Screenshot of the Create Recovery Services vault page.":::
6667

67-
1. After the successful migration of your automation account, the authentication type for the linked account details on the **Extension update settings** page is updated.
68+
69+
> [!NOTE]
70+
> Ensure that the System assigned Managed Identity is turned off for the Automation account for the _"Migrate"_ button to appear. If the account is not migrated and the _"Migrate"_ button isn't appearing, turn off the Managed Identity for the Automation Account and try again.
71+
72+
3. After the successful migration of your automation account, the authentication type for the linked account details on the **Extension update settings** page is updated.
73+
1. Once the _Migrate_ operation is completed, toggle the **Site Recovery to manage** button to turn it _On_ again.
6874

6975
When you successfully migrate from a Run As to a Managed Identities account, the following changes are reflected on the Automation Run As Accounts :
7076

@@ -99,8 +105,7 @@ To link an existing managed identity Automation account to your Recovery Service
99105
1. Select the **Select** option.
100106
:::image type="content" source="./media/how-to-migrate-from-run-as-to-managed-identities/select-mi.png" alt-text="Screenshot that shows select managed identity settings page.":::
101107
1. Select **Review + assign**.
102-
103-
108+
1. Navigate to the **Extension update settings** under the Recovery Services Vault, toggle the **Site Recovery to manage** button to turn it _On_ again.
104109

105110
## Next steps
106111

articles/storage/files/storage-files-identity-multiple-forests.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,11 @@ To use this method, complete the following steps:
145145

146146
Now, from domain-joined clients, you should be able to use storage accounts joined to any forest.
147147

148+
> [!NOTE]
149+
> Ensure hostname part of the FQDN matches the storage account name as described above. Otherwise you will get an access denied error: "The filename, directory name, or volume label syntax is incorrect." A network trace will show STATUS_OBJECT_NAME_INVALID (0xc0000033) message during the SMB session setup.
150+
151+
152+
148153
### Add custom name suffix and routing rule
149154

150155
If you've already modified the storage account name suffix and added a CNAME record as described in the previous section, you can skip this step. If you'd rather not make DNS changes or modify the storage account name suffix, you can configure a suffix routing rule from **Forest 1** to **Forest 2** for a custom suffix of **file.core.windows.net**.

includes/functions-cosmosdb-input-settings-v4.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: glenga
77
---
88
|function.json property | Description|
99
|---------|----------------------|
10-
|**type** | Must be set to `cosmosDBTrigger`. |
10+
|**type** | Must be set to `cosmosDB`. |
1111
|**direction** | Must be set to `in`. |
1212
|**name** | The variable name used in function code that represents the list of documents with changes. |
1313
|**connection** | The name of an app setting or setting container that specifies how to connect to the Azure Cosmos DB account being monitored. For more information, see [Connections](#connections).|
@@ -16,4 +16,4 @@ ms.author: glenga
1616
|**partitionKey**| Specifies the partition key value for the lookup. May include binding parameters. It is required for lookups in [partitioned](../articles/cosmos-db/partitioning-overview.md#logical-partitions) containers.|
1717
|**id** | The ID of the document to retrieve. This property supports [binding expressions](../articles/azure-functions/functions-bindings-expressions-patterns.md). Don't set both the `id` and `sqlQuery` properties. If you don't set either one, the entire container is retrieved. |
1818
|**sqlQuery** | An Azure Cosmos DB SQL query used for retrieving multiple documents. The property supports runtime bindings, as in this example: `SELECT * FROM c where c.departmentId = {departmentId}`. Don't set both the `id` and `sqlQuery` properties. If you don't set either one, the entire container is retrieved.|
19-
|**preferredLocations**| (Optional) Defines preferred locations (regions) for geo-replicated database accounts in the Azure Cosmos DB service. Values should be comma-separated. For example, `East US,South Central US,North Europe`. |
19+
|**preferredLocations**| (Optional) Defines preferred locations (regions) for geo-replicated database accounts in the Azure Cosmos DB service. Values should be comma-separated. For example, `East US,South Central US,North Europe`. |

0 commit comments

Comments
 (0)