Skip to content

Commit 31fa993

Browse files
committed
[APIM][release-ga-apim-v2-tiers] Dirty PR to resolve merge conflict with main
2 parents c96f946 + d2ef66a commit 31fa993

File tree

158 files changed

+1510
-746
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

158 files changed

+1510
-746
lines changed

.openpublishing.redirection.api-management.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,10 @@
7676
"redirect_document_id": false
7777
},
7878
{
79+
"source_path_from_root": "/articles/api-management/api-management-howto-developer-portal.md",
80+
"redirect_url": "/azure/api-management/developer-portal-overview",
81+
"redirect_document_id": false
82+
}, {
7983
"source_path_from_root": "/articles/api-management/authorizations-overview.md",
8084
"redirect_url": "/azure/api-management/credentials-overview",
8185
"redirect_document_id": false

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This article shows you how to enable sign-in for users using the multitenant end
3636
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
3737

3838
> [!NOTE]
39-
> In this article, it assumed that **SocialAndLocalAccounts** starter pack is used in the previous steps mentioned in pre-requisite.
39+
> In this article, it is assumed that the **SocialAndLocalAccounts** starter pack is used in the previous steps mentioned in the pre-requisite.
4040
4141
## Register a Microsoft Entra app
4242

articles/advisor/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@
4444
items:
4545
- name: Use Azure Well Architected Framework Assessments
4646
href: advisor-assessments.md
47-
# - name: Use Azure Advisor resiliency reviews
48-
# href: advisor-resiliency-reviews.md
47+
- name: Use Azure Advisor resiliency reviews
48+
href: advisor-resiliency-reviews.md
4949
- name: Optimize virtual machine spend by resizing or shutting down underutilized instances
5050
href: advisor-cost-recommendations.md
5151
- name: Optimize your Azure costs using the cost optimization workbook

articles/aks/custom-node-configuration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -205,14 +205,14 @@ For agent nodes, which are expected to handle very large numbers of concurrent s
205205
| `net.ipv4.tcp_fin_timeout` | 5 - 120 | 60 | The length of time an orphaned (no longer referenced by any application) connection will remain in the FIN_WAIT_2 state before it's aborted at the local end. |
206206
| `net.ipv4.tcp_keepalive_time` | 30 - 432000 | 7200 | How often TCP sends out `keepalive` messages when `keepalive` is enabled. |
207207
| `net.ipv4.tcp_keepalive_probes` | 1 - 15 | 9 | How many `keepalive` probes TCP sends out, until it decides that the connection is broken. |
208-
| `net.ipv4.tcp_keepalive_intvl` | 10 - 75 | 75 | How frequently the probes are sent out. Multiplied by `tcp_keepalive_probes` it makes up the time to kill a connection that isn't responding, after probes started. |
208+
| `net.ipv4.tcp_keepalive_intvl` | 10 - 90 | 75 | How frequently the probes are sent out. Multiplied by `tcp_keepalive_probes` it makes up the time to kill a connection that isn't responding, after probes started. |
209209
| `net.ipv4.tcp_tw_reuse` | 0 or 1 | 0 | Allow to reuse `TIME-WAIT` sockets for new connections when it's safe from protocol viewpoint. |
210-
| `net.ipv4.ip_local_port_range` | First: 1024 - 60999 and Last: 32768 - 65000] | First: 32768 and Last: 60999 | The local port range that is used by TCP and UDP traffic to choose the local port. Comprised of two numbers: The first number is the first local port allowed for TCP and UDP traffic on the agent node, the second is the last local port number. |
210+
| `net.ipv4.ip_local_port_range` | First: 1024 - 60999 and Last: 32768 - 65535] | First: 32768 and Last: 60999 | The local port range that is used by TCP and UDP traffic to choose the local port. Comprised of two numbers: The first number is the first local port allowed for TCP and UDP traffic on the agent node, the second is the last local port number. |
211211
| `net.ipv4.neigh.default.gc_thresh1`| 128 - 80000 | 4096 | Minimum number of entries that may be in the ARP cache. Garbage collection won't be triggered if the number of entries is below this setting. |
212212
| `net.ipv4.neigh.default.gc_thresh2`| 512 - 90000 | 8192 | Soft maximum number of entries that may be in the ARP cache. This setting is arguably the most important, as ARP garbage collection will be triggered about 5 seconds after reaching this soft maximum. |
213213
| `net.ipv4.neigh.default.gc_thresh3`| 1024 - 100000 | 16384 | Hard maximum number of entries in the ARP cache. |
214-
| `net.netfilter.nf_conntrack_max` | 131072 - 1048576 | 131072 | `nf_conntrack` is a module that tracks connection entries for NAT within Linux. The `nf_conntrack` module uses a hash table to record the *established connection* record of the TCP protocol. `nf_conntrack_max` is the maximum number of nodes in the hash table, that is, the maximum number of connections supported by the `nf_conntrack` module or the size of connection tracking table. |
215-
| `net.netfilter.nf_conntrack_buckets` | 65536 - 147456 | 65536 | `nf_conntrack` is a module that tracks connection entries for NAT within Linux. The `nf_conntrack` module uses a hash table to record the *established connection* record of the TCP protocol. `nf_conntrack_buckets` is the size of hash table. |
214+
| `net.netfilter.nf_conntrack_max` | 131072 - 2097152 | 131072 | `nf_conntrack` is a module that tracks connection entries for NAT within Linux. The `nf_conntrack` module uses a hash table to record the *established connection* record of the TCP protocol. `nf_conntrack_max` is the maximum number of nodes in the hash table, that is, the maximum number of connections supported by the `nf_conntrack` module or the size of connection tracking table. |
215+
| `net.netfilter.nf_conntrack_buckets` | 65536 - 524288 | 65536 | `nf_conntrack` is a module that tracks connection entries for NAT within Linux. The `nf_conntrack` module uses a hash table to record the *established connection* record of the TCP protocol. `nf_conntrack_buckets` is the size of hash table. |
216216

217217
### Worker limits
218218

articles/aks/gpu-cluster.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@ To view supported GPU-enabled VMs, see [GPU-optimized VM sizes in Azure][gpu-sku
2525

2626
* If you're using an Azure Linux GPU-enabled node pool, automatic security patches aren't applied, and the default behavior for the cluster is *Unmanaged*. For more information, see [auto-upgrade](./auto-upgrade-node-image.md).
2727
* [NVadsA10](../virtual-machines/nva10v5-series.md) v5-series are *not* a recommended SKU for GPU VHD.
28-
* AKS doesn't support Windows GPU-enabled node pools.
2928
* Updating an existing node pool to add GPU isn't supported.
3029

3130
## Before you begin
@@ -47,7 +46,7 @@ Using NVIDIA GPUs involves the installation of various NVIDIA software component
4746
4847
### Skip GPU driver installation (preview)
4948
50-
AKS has automatic GPU driver installation enabled by default. In some cases, such as installing your own drivers or using the NVIDIA GPU Operator, you may want to skip GPU driver installation.
49+
AKS has automatic GPU driver installation enabled by default. In some cases, such as installing your own drivers or using the [NVIDIA GPU Operator](https://docs.nvidia.com/datacenter/cloud-native/gpu-operator/latest/getting-started.html), you may want to skip GPU driver installation.
5150
5251
[!INCLUDE [preview features callout](includes/preview/preview-callout.md)]
5352
@@ -71,7 +70,6 @@ AKS has automatic GPU driver installation enabled by default. In some cases, suc
7170
--node-count 1 \
7271
--skip-gpu-driver-install \
7372
--node-vm-size Standard_NC6s_v3 \
74-
--node-taints sku=gpu:NoSchedule \
7573
--enable-cluster-autoscaler \
7674
--min-count 1 \
7775
--max-count 3
@@ -81,7 +79,7 @@ AKS has automatic GPU driver installation enabled by default. In some cases, suc
8179
8280
### NVIDIA device plugin installation
8381
84-
NVIDIA device plugin installation is required when using GPUs on AKS. In some cases, the installation is handled automatically, such as when using the [NVIDIA GPU Operator](https://docs.nvidia.com/datacenter/cloud-native/gpu-operator/latest/microsoft-aks.html) or the [AKS GPU image (preview)](#use-the-aks-gpu-image-preview). Alternatively, you can manually install the NVIDIA device plugin.
82+
NVIDIA device plugin installation is required when using GPUs on AKS. In some cases, the installation is handled automatically, such as when using the [NVIDIA GPU Operator](https://docs.nvidia.com/datacenter/cloud-native/gpu-operator/latest/getting-started.html) or the [AKS GPU image (preview)](#use-the-aks-gpu-image-preview). Alternatively, you can manually install the NVIDIA device plugin.
8583
8684
#### Manually install the NVIDIA device plugin
8785
@@ -222,7 +220,7 @@ The NVIDIA GPU Operator automates the management of all NVIDIA software componen
222220
223221
1. Skip automatic GPU driver installation by creating a node pool using the [`az aks nodepool add`][az-aks-nodepool-add] command with `--skip-gpu-driver-install`. Adding the `--skip-gpu-driver-install` flag during node pool creation skips the automatic GPU driver installation. Any existing nodes aren't changed. You can scale the node pool to zero and then back up to make the change take effect.
224222
225-
2. Follow the NVIDIA documentation to [Install the GPU Operator](https://docs.nvidia.com/datacenter/cloud-native/openshift/latest/install-gpu-ocp.html#install-nvidiagpu:~:text=NVIDIA%20GPU%20Operator-,Installing%20the%20NVIDIA%20GPU%20Operator,-%EF%83%81).
223+
2. Follow the NVIDIA documentation to [Install the GPU Operator](https://docs.nvidia.com/datacenter/cloud-native/gpu-operator/latest/getting-started.html).
226224
227225
3. Now that you successfully installed the GPU Operator, you can check that your [GPUs are schedulable](#confirm-that-gpus-are-schedulable) and [run a GPU workload](#run-a-gpu-enabled-workload).
228226

articles/aks/upgrade-windows-2019-2022.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ When upgrading the OS version of a running Windows workload on Azure Kubernetes
1616
When a new version of the Windows Server operating system is released, AKS is committed to supporting it and recommending you upgrade to the latest version to take advantage of the fixes, improvements, and new functionality. AKS provides a five-year support lifecycle for every Windows Server version, starting with Windows Server 2022. During this period, AKS will release a new version that supports a newer version of Windows Server OS for you to upgrade to.
1717

1818
> [!NOTE]
19-
>- Windows Server 2019 is being retired after Kubernetes version 1.32 reaches end of life (EOL). For more information, see [AKS release notes][aks-release-notes].
20-
>- Windows Server 2022 is being retired after Kubernetes version 1.34 reaches its end of life (EOL). For more information, see [AKS release notes][aks-release-notes].
19+
> - Windows Server 2019 is being retired after Kubernetes version 1.32 reaches end of life (EOL). For more information, see [AKS release notes][aks-release-notes].
20+
> - Windows Server 2022 is being retired after Kubernetes version 1.34 reaches its end of life (EOL). For more information, see [AKS release notes][aks-release-notes].
2121
2222
## Limitations
2323

@@ -102,7 +102,7 @@ Node Selector is the most common and recommended option for placement of Windows
102102
kubectl get pods -o wide
103103
```
104104

105-
The following example output shows the pods in the `defualt` namespace:
105+
The following example output shows the pods in the `default` namespace:
106106

107107
```output
108108
NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES

articles/api-management/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -375,16 +375,18 @@
375375
href: api-management-howto-create-or-invite-developers.md
376376
- name: Manage groups
377377
href: api-management-howto-create-groups.md
378-
- name: Customize the developer portal
378+
- name: Manage and customize the developer portal
379379
items:
380380
- name: Understand the developer portal
381-
href: api-management-howto-developer-portal.md
381+
href: developer-portal-overview.md
382382
- name: Frequently asked questions - developer portal
383383
href: developer-portal-faq.md
384384
- name: Automate portal deployments
385385
href: automate-portal-deployments.md
386386
- name: Extend portal with custom functionality
387387
href: developer-portal-extend-custom-functionality.md
388+
- name: Enable CORS for interactive console
389+
href: enable-cors-developer-portal.md
388390
- name: Enable console OAuth support
389391
href: api-management-howto-oauth2.md
390392
- name: Integrate Application Insights

articles/api-management/api-management-howto-aad-b2c.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,13 +105,13 @@ For steps to update the Azure AD B2C app, see [Switch redirect URIs to the singl
105105
1. Select **Azure Active Directory B2C** from the list.
106106
1. In the **Client library** dropdown, select **MSAL**.
107107
1. Select **Update**.
108-
1. [Republish your developer portal](api-management-howto-developer-portal-customize.md#publish-from-the-azure-portal).
108+
1. [Republish your developer portal](developer-portal-overview.md#publish-the-portal).
109109

110110

111111
## Developer portal - add Azure Active Directory B2C account authentication
112112

113113
> [!IMPORTANT]
114-
> You need to [republish the developer portal](api-management-howto-developer-portal-customize.md#publish) when you create or update Azure Active Directory B2C configuration settings for the changes to take effect.
114+
> You need to [republish the developer portal](developer-portal-overview.md#publish-the-portal) when you create or update Azure Active Directory B2C configuration settings for the changes to take effect.
115115
116116
In the developer portal, sign-in with Azure Active Directory B2C is possible with the **Sign-in button: OAuth** widget. The widget is already included on the sign-in page of the default developer portal content.
117117

articles/api-management/api-management-howto-aad.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ For steps, see [Switch redirect URIs to the single-page application type](../act
151151
1. Select **Microsoft Entra ID** from the list.
152152
1. In the **Client library** dropdown, select **MSAL**.
153153
1. Select **Update**.
154-
1. [Republish your developer portal](api-management-howto-developer-portal-customize.md#publish-from-the-azure-portal).
154+
1. [Republish your developer portal](developer-portal-overview.md#publish-the-portal).
155155

156156

157157
<a name='add-an-external-azure-ad-group'></a>
@@ -208,7 +208,7 @@ In the developer portal, you can sign in with Microsoft Entra ID using the **Sig
208208
Although a new account will automatically be created when a new user signs in with Microsoft Entra ID, consider adding the same widget to the sign-up page. The **Sign-up form: OAuth** widget represents a form used for signing up with OAuth.
209209

210210
> [!IMPORTANT]
211-
> You need to [republish the portal](api-management-howto-developer-portal-customize.md#publish) for the Microsoft Entra ID changes to take effect.
211+
> You need to [republish the portal](developer-portal-overview.md#publish-the-portal) for the Microsoft Entra ID changes to take effect.
212212
213213
## Related content
214214

articles/api-management/api-management-howto-create-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,8 +91,8 @@ Once the association is added between the developer and the group, you can view
9191

9292
## <a name="next-steps"> </a>Next steps
9393

94-
* Once a developer is added to a group, they can view and subscribe to the products associated with that group. For more information, see [How create and publish a product in Azure API Management][How create and publish a product in Azure API Management].
95-
* You can control how the developer portal content appears to different users and groups you've configured. Learn more about [customizing the developer portal](api-management-howto-developer-portal-customize.md#customize-the-portals-content).
94+
* Once a developer is added to a group, they can view and subscribe to the products associated with that group. For more information, see [How to create and publish a product in Azure API Management][How create and publish a product in Azure API Management].
95+
* You can control how the developer portal content appears to different users and groups you've configured. Learn more about [visibility and access controls in the developer portal](developer-portal-overview.md#content-visibility-and-access).
9696
* Learn how to manage the administrator [email settings](api-management-howto-configure-notifications.md#configure-email-settings) that are used in notifications to developers from your API Management instance.
9797

9898

0 commit comments

Comments
 (0)