Skip to content

Commit 310f058

Browse files
committed
Merge branch 'main' into small-fixes
2 parents 0b30a84 + 8b4b90d commit 310f058

File tree

4 files changed

+15
-5
lines changed

4 files changed

+15
-5
lines changed

articles/azure-arc/kubernetes/validation-program.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The following providers and their corresponding Kubernetes distributions have su
2727

2828
| Provider name | Distribution name | Version |
2929
| ------------ | ----------------- | ------- |
30-
| RedHat | [OpenShift Container Platform](https://www.openshift.com/products/container-platform) | [4.5.41+](https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html), [4.6.35+](https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html), [4.7.18+](https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html) |
30+
| RedHat | [OpenShift Container Platform](https://www.openshift.com/products/container-platform) | [4.7.18+](https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html), [4.9.17+](https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html), [4.10.0+](https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html) |
3131
| VMware | [Tanzu Kubernetes Grid](https://tanzu.vmware.com/kubernetes-grid) | TKGm 1.4.0; upstream K8s v1.21.2+vmware.1 <br>TKGm 1.3.1; upstream K8s v1.20.5_vmware.2 <br>TKGm 1.2.1; upstream K8s v1.19.3+vmware.1 |
3232
| Canonical | [Charmed Kubernetes](https://ubuntu.com/kubernetes) | [1.19](https://ubuntu.com/kubernetes/docs/1.19/components) |
3333
| SUSE Rancher | [Rancher Kubernetes Engine](https://rancher.com/products/rke/) | RKE CLI version: [v1.2.4](https://github.com/rancher/rke/releases/tag/v1.2.4); Kubernetes versions: [1.19.6](https://github.com/kubernetes/kubernetes/releases/tag/v1.19.6)), [1.18.14](https://github.com/kubernetes/kubernetes/releases/tag/v1.18.14)), [1.17.16](https://github.com/kubernetes/kubernetes/releases/tag/v1.17.16)) |

articles/azure-monitor/logs/log-analytics-tutorial.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,9 +64,15 @@ A **where** statement is added to the query with the value that you selected. Th
6464

6565

6666
### Time range
67-
All tables in a Log Analytics workspace have a column called **TimeGenerated**, which is the time that the record was created. All queries have a time range that limits the results to records that have a **TimeGenerated** value within that range. You can set the time range in the query or by using the selector at the top of the screen.
6867

69-
By default, the query returns records from the last 24 hours. You should see a message here that says we're not seeing all of the results. This is because Log Analytics can return a maximum of 30,000 records, and our query returned more records than that. Select the **Time range** dropdown list, and change the value to **12 hours**. Select **Run** again to return the results.
68+
All queries return records generated within a set time range. By default, the query returns records generated in the last 24 hours.
69+
70+
You can set a different time range using the [where operator](/azure/data-explorer/kusto/query/tutorial?pivots=azuremonitor#filter-by-boolean-expression-where-1) in the query, or using the **Time range** dropdown list at the top of the screen.
71+
72+
Let’s change the time range of the query by selecting **Last 12 hours** from the **Time range** dropdown. Select **Run** to return the results.
73+
74+
> [!NOTE]
75+
> Changing the time range using the **Time range** dropdown does not change the query in the query editor.
7076
7177
:::image type="content" source="media/log-analytics-tutorial/query-results-max.png" alt-text="Screenshot that shows the time range." lightbox="media/log-analytics-tutorial/query-results-max.png":::
7278

articles/azure-sql/database/sql-data-sync-data-sql-server-sql-database.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -261,6 +261,10 @@ Federation Root Database can be used in the SQL Data Sync Service without any li
261261

262262
The Dynamics 365 bring your own database feature lets administrators export data entities from the application into their own Microsoft Azure SQL database. Data Sync can be used to sync this data into other databases if data is exported using **incremental push** (full push is not supported) and **enable triggers in target database** is set to **yes**.
263263

264+
### How do I create Data Sync in Failover group to support Disaster Recovery?
265+
266+
- To ensure data sync operations in failover region are at par with Primary region, after failover you have to manually re-create the Sync Group in failover region with same settings as primary region.
267+
264268
## Next steps
265269

266270
### Update the schema of a synced database

articles/machine-learning/how-to-secure-workspace-vnet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: enterprise-readiness
88
ms.reviewer: larryfr
99
ms.author: jhirono
1010
author: jhirono
11-
ms.date: 03/01/2022
11+
ms.date: 03/09/2022
1212
ms.topic: how-to
1313
ms.custom: contperf-fy20q4, tracking-python, contperf-fy21q1, security
1414

@@ -81,7 +81,7 @@ When ACR is behind a virtual network, Azure Machine Learning can’t use it to d
8181
> The compute cluster used to build Docker images needs to be able to access the package repositories that are used to train and deploy your models. You may need to add network security rules that allow access to public repos, [use private Python packages](how-to-use-private-python-packages.md), or use [custom Docker images](how-to-train-with-custom-image.md) that already include the packages.
8282
8383
> [!WARNING]
84-
> If your Azure Container Registry uses a private endpoint to communicate with the virtual network, you cannot use a managed identity with an Azure Machine Learning compute cluster. To use a managed identity with a compute cluster, use a service endpoint with the Azure Container Registry for the workspace.
84+
> If your Azure Container Registry uses a private endpoint or service endpoint to communicate with the virtual network, you cannot use a managed identity with an Azure Machine Learning compute cluster.
8585
8686
### Azure Monitor
8787

0 commit comments

Comments
 (0)