Skip to content

Commit 336f87e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into four-dicom-articles
2 parents dd0fdb8 + 60d9639 commit 336f87e

File tree

515 files changed

+21147
-2154
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

515 files changed

+21147
-2154
lines changed

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -323,8 +323,8 @@ This section describes how you can update the JSONPath settings to definitely re
323323

324324
| **String to find** | **String to use for replace** | **Purpose** |
325325
| ------------------ | ----------------------------- | ------------ |
326-
| `$.employmentNav.results[0].<br>jobInfoNav.results[0].emplStatus` | `$.employmentNav..jobInfoNav..results[?(@.emplStatusNav.externalCode == 'A' || @.emplStatusNav.externalCode == 'U' || @.emplStatusNav.externalCode == 'P' )].emplStatusNav.externalCode` | With this find-replace, we're adding the ability to expand emplStatusNav OData object. |
327-
| `$.employmentNav.results[0].<br>jobInfoNav.results[0]` | `$.employmentNav..jobInfoNav..results[?(@.emplStatusNav.externalCode == 'A' || @.emplStatusNav.externalCode == 'U' || @.emplStatusNav.externalCode == 'P')]` | With this find-replace, we instruct the connector to always retrieve attributes associated with the active SuccessFactors EmpJobInfo record. Attributes associated with terminated/inactive records in SuccessFactors are ignored. |
326+
| `$.employmentNav.results[0].jobInfoNav.results[0].emplStatus` | `$.employmentNav..jobInfoNav..results[?(@.emplStatusNav.externalCode == 'A' || @.emplStatusNav.externalCode == 'U' || @.emplStatusNav.externalCode == 'P' )].emplStatusNav.externalCode` | With this find-replace, we're adding the ability to expand emplStatusNav OData object. |
327+
| `$.employmentNav.results[0].jobInfoNav.results[0]` | `$.employmentNav..jobInfoNav..results[?(@.emplStatusNav.externalCode == 'A' || @.emplStatusNav.externalCode == 'U' || @.emplStatusNav.externalCode == 'P')]` | With this find-replace, we instruct the connector to always retrieve attributes associated with the active SuccessFactors EmpJobInfo record. Attributes associated with terminated/inactive records in SuccessFactors are ignored. |
328328
| `$.employmentNav.results[0]` | `$.employmentNav..results[?(@.jobInfoNav..results[?(@.emplStatusNav.externalCode == 'A' || @.emplStatusNav.externalCode == 'U' || @.emplStatusNav.externalCode == 'P')])]` | With this find-replace, we instruct the connector to always retrieve attributes associated with the active SuccessFactors Employment record. Attributes associated with terminated/inactive records in SuccessFactors are ignored. |
329329

330330
1. Save the schema.

articles/active-directory/azuread-dev/v1-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,5 +47,3 @@ The following articles provide detailed information about APIs, protocol message
4747
## Videos
4848

4949
See [Azure Active Directory developer platform videos](videos.md) for help migrating to the new Microsoft identity platform.
50-
51-
[!INCLUDE [Help and support](../develop/includes/error-handling-and-tips/help-support-include.md)]

articles/active-directory/devices/enterprise-state-roaming-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Data that hasn't been accessed for one year (“the retention period”) will be
7575

7676
### Deleted data recovery
7777

78-
The data retention policy isn't configurable. Once the data is permanently deleted, it isn't recoverable. However, The settings data is deleted only from the Microsoft cloud, not from the end-user device. If any device later reconnects to the Enterprise State Roaming service, the settings are again synced and stored in the Microsoft cloud.
78+
The data retention policy isn't configurable. Once the data is permanently deleted, it isn't recoverable. However, the settings data is deleted only from the Microsoft cloud, not from the end-user device. If any device later reconnects to the Enterprise State Roaming service, the settings are again synced and stored in the Microsoft cloud.
7979

8080
## Next steps
8181

articles/ai-services/openai/concepts/model-versions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Azure works closely with OpenAI to release new model versions. When a new versi
3939
As a customer of Azure OpenAI models, you might notice some changes in the model behavior and compatibility after a version upgrade. These changes might affect your applications and workflows that rely on the models. Here are some tips to help you prepare for version upgrades and minimize the impact:
4040

4141
* Read [what’s new](../whats-new.md) and [models](../concepts/models.md) to understand the changes and new features.
42-
* Read the documentation on [model deployments](../how-to/create-resource.md) and [version upgrades](../concepts/model-versions.md) to understand how to work with model versions.
42+
* Read the documentation on [model deployments](../how-to/create-resource.md) and [version upgrades](../how-to/working-with-models.md) to understand how to work with model versions.
4343
* Test your applications and workflows with the new model version after release.
4444
* Update your code and configuration to use the new features and capabilities of the new model version.
4545

articles/ai-services/openai/how-to/monitoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This article describes the monitoring data generated by Azure OpenAI Service. Az
1919

2020
Azure OpenAI collects the same kinds of monitoring data as other Azure resources. You can configure Azure Monitor to generate data in activity logs, resource logs, virtual machine logs, and platform metrics. For more information, see [Monitoring data from Azure resources](/azure/azure-monitor/essentials/monitor-azure-resource#monitoring-data-from-azure-resources).
2121

22-
Platform metrics and the Azure Monitor activity log are collected and stored automatically. This data be routed to other locations by using a diagnostic setting. Azure Monitor resource logs aren't collected and stored until you create a diagnostic setting and then route the logs to one or more locations.
22+
Platform metrics and the Azure Monitor activity log are collected and stored automatically. This data can be routed to other locations by using a diagnostic setting. Azure Monitor resource logs aren't collected and stored until you create a diagnostic setting and then route the logs to one or more locations.
2323

2424
When you create a diagnostic setting, you specify which categories of logs to collect. For more information about creating a diagnostic setting by using the Azure portal, the Azure CLI, or PowerShell, see [Create diagnostic setting to collect platform logs and metrics in Azure](/azure/azure-monitor/platform/diagnostic-settings).
2525

articles/aks/TOC.yml

Lines changed: 24 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -623,22 +623,32 @@
623623
href: network-observability-managed-cli.md
624624
- name: Upgrade
625625
items:
626-
- name: Upgrade an AKS cluster
626+
- name: Upgrade options
627627
href: upgrade-cluster.md
628-
- name: Upgrade the node image
629-
href: node-image-upgrade.md
630-
- name: Automate and schedule upgrade events
631628
items:
632-
- name: Automatically upgrade an AKS cluster
633-
href: auto-upgrade-cluster.md
634-
- name: Automatically upgrade AKS cluster node operating system images
635-
href: auto-upgrade-node-image.md
636-
- name: Upgrade the node image automatically with GitHub Actions
637-
href: node-upgrade-github-actions.md
638-
- name: Use planned maintenance to schedule and control upgrades
639-
href: planned-maintenance.md
640-
- name: Process node OS updates
641-
href: node-updates-kured.md
629+
- name: Perform manual upgrades
630+
items:
631+
- name: Upgrade an AKS cluster
632+
href: upgrade-aks-cluster.md
633+
- name: Upgrade the node image
634+
href: node-image-upgrade.md
635+
- name: Customize node surge upgrade
636+
href: upgrade-aks-cluster.md#customize-node-surge-upgrade
637+
- name: Process node OS updates
638+
href: node-updates-kured.md
639+
- name: Configure automatic upgrades
640+
items:
641+
- name: Automatically upgrade an AKS cluster
642+
href: auto-upgrade-cluster.md
643+
- name: Use Planned Maintenance to schedule and control upgrades
644+
href: planned-maintenance.md
645+
- name: Stop cluster upgrades automatically on API breaking changes
646+
href: stop-cluster-upgrade-api-breaking-changes.md
647+
- name: Automatically upgrade AKS cluster node operating system images
648+
href: auto-upgrade-node-image.md
649+
- name: Upgrade the node image automatically with GitHub Actions
650+
href: node-upgrade-github-actions.md
651+
642652
- name: Azure Linux container host for AKS
643653
href: use-azure-linux.md
644654
- name: Windows Server containers

articles/aks/dapr.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ ms.custom: devx-track-azurecli, ignite-fall-2021, event-tier1-build-2022, refere
1111

1212
# Dapr extension for Azure Kubernetes Service (AKS) and Arc-enabled Kubernetes
1313

14-
As a portable, event-driven runtime, [Dapr](https://dapr.io/) simplifies building resilient, stateless, and stateful applications that run on the cloud and edge and embrace the diversity of languages and developer frameworks. With its sidecar architecture, Dapr helps you tackle the challenges that come with building microservices and keeps your code platform agnostic. In particular, it helps solve problems around services:
14+
[Dapr](./dapr-overview.md) simplifies building resilient, stateless, and stateful applications that run on the cloud and edge and embrace the diversity of languages and developer frameworks. With Dapr's sidecar architecture, you can keep your code platform agnostic while tackling challenges around building microservices, like:
1515
- Calling other services reliably and securely
16-
- Building event-driven apps with pub-sub
16+
- Building event-driven apps with pub/sub
1717
- Building applications that are portable across multiple cloud services and hosts (for example, Kubernetes vs. a VM)
1818

1919
[Using the Dapr extension to provision Dapr on your AKS or Arc-enabled Kubernetes cluster](../azure-arc/kubernetes/conceptual-extensions.md) eliminates the overhead of:
@@ -189,7 +189,7 @@ az k8s-extension create --cluster-type managedClusters \
189189
### Configuring automatic updates to Dapr control plane
190190

191191
> [!WARNING]
192-
> You should enable automatic updates to the Dapr control plan only in dev or test environments. Auto-upgrade is not suitable for production environments.
192+
> You can enable automatic updates to the Dapr control plane only in dev or test environments. Auto-upgrade is not suitable for production environments.
193193
194194
If you install Dapr without specifying a version, `--auto-upgrade-minor-version` *is automatically enabled*, configuring the Dapr control plane to automatically update its minor version on new releases.
195195
You can disable auto-update by specifying the `--auto-upgrade-minor-version` parameter and setting the value to `false`.

articles/aks/load-balancer-standard.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S
8484
default public-svc LoadBalancer 10.0.39.110 52.156.88.187 80:32068/TCP 52s
8585
```
8686

87-
When you view the service details, the public IP address created for this service on the load balancer is shown in the *EXTERNAL-IP* column. It may take a few minutes for the IP address to change from *\<pending\>* to an actual public IP address.
87+
When you view the service details, the public IP address created for this service on the load balancer is shown in the *EXTERNAL-IP* column. It might take a few minutes for the IP address to change from *\<pending\>* to an actual public IP address.
8888

8989
For more detailed information about your service, use the following command.
9090

@@ -312,7 +312,7 @@ az aks create \
312312

313313
> [!IMPORTANT]
314314
>
315-
> If you have applications on your cluster that can establish a large number of connections to small set of destinations, like many instances of a frontend application connecting to a database, you may have a scenario susceptible to encounter SNAT port exhaustion. SNAT port exhaustion happens when an application runs out of outbound ports to use to establish a connection to another application or host. If you have a scenario susceptible to encounter SNAT port exhaustion, we highly recommended you increase the allocated outbound ports and outbound frontend IPs on the load balancer.
315+
> If you have applications on your cluster that can establish a large number of connections to small set of destinations, like many instances of a frontend application connecting to a database, you might have a scenario susceptible to encounter SNAT port exhaustion. SNAT port exhaustion happens when an application runs out of outbound ports to use to establish a connection to another application or host. If you have a scenario susceptible to encounter SNAT port exhaustion, we highly recommended you increase the allocated outbound ports and outbound frontend IPs on the load balancer.
316316
>
317317
> For more information on SNAT, see [Use SNAT for outbound connections](../load-balancer/load-balancer-outbound-connections.md).
318318

@@ -343,7 +343,7 @@ When calculating the number of outbound ports and IPs and setting the values, ke
343343
* The number of outbound ports per node is fixed based on the value you set.
344344
* The value for outbound ports must be a multiple of 8.
345345
* Adding more IPs doesn't add more ports to any node, but it provides capacity for more nodes in the cluster.
346-
* You must account for nodes that may be added as part of upgrades, including the count of nodes specified via [maxSurge values][maxsurge].
346+
* You must account for nodes that might be added as part of upgrades, including the count of nodes specified via [maxSurge values][maxsurge].
347347

348348
The following examples show how the values you set affect the number of outbound ports and IP addresses:
349349

@@ -397,7 +397,7 @@ If you expect to have numerous short-lived connections and no long-lived connect
397397
When setting *IdleTimeoutInMinutes* to a different value than the default of 30 minutes, consider how long your workloads need an outbound connection. Also consider that the default timeout value for a *Standard* SKU load balancer used outside of AKS is 4 minutes. An *IdleTimeoutInMinutes* value that more accurately reflects your specific AKS workload can help decrease SNAT exhaustion caused by tying up connections no longer being used.
398398

399399
> [!WARNING]
400-
> Altering the values for *AllocatedOutboundPorts* and *IdleTimeoutInMinutes* may significantly change the behavior of the outbound rule for your load balancer and shouldn't be done lightly. Check the [SNAT Troubleshooting section][troubleshoot-snat] and review the [Load Balancer outbound rules][azure-lb-outbound-rules-overview] and [outbound connections in Azure][azure-lb-outbound-connections] before updating these values to fully understand the impact of your changes.
400+
> Altering the values for *AllocatedOutboundPorts* and *IdleTimeoutInMinutes* might significantly change the behavior of the outbound rule for your load balancer and shouldn't be done lightly. Check the [SNAT Troubleshooting section][troubleshoot-snat] and review the [Load Balancer outbound rules][azure-lb-outbound-rules-overview] and [outbound connections in Azure][azure-lb-outbound-connections] before updating these values to fully understand the impact of your changes.
401401

402402
## Restrict inbound traffic to specific IP ranges
403403

@@ -451,7 +451,7 @@ The following annotations are supported for Kubernetes services with type `LoadB
451451
| `service.beta.kubernetes.io/azure-load-balancer-internal` | `true` or `false` | Specify whether the load balancer should be internal. If not set, it defaults to public.
452452
| `service.beta.kubernetes.io/azure-load-balancer-internal-subnet` | Name of the subnet | Specify which subnet the internal load balancer should be bound to. If not set, it defaults to the subnet configured in cloud config file.
453453
| `service.beta.kubernetes.io/azure-dns-label-name` | Name of the DNS label on Public IPs | Specify the DNS label name for the **public** service. If it's set to an empty string, the DNS entry in the Public IP isn't used.
454-
| `service.beta.kubernetes.io/azure-shared-securityrule` | `true` or `false` | Specify that the service should be exposed using an Azure security rule that may be shared with another service. Trade specificity of rules for an increase in the number of services that can be exposed. This annotation relies on the Azure [Augmented Security Rules](../virtual-network/network-security-groups-overview.md#augmented-security-rules) feature of Network Security groups.
454+
| `service.beta.kubernetes.io/azure-shared-securityrule` | `true` or `false` | Specify that the service should be exposed using an Azure security rule that might be shared with another service. Trade specificity of rules for an increase in the number of services that can be exposed. This annotation relies on the Azure [Augmented Security Rules](../virtual-network/network-security-groups-overview.md#augmented-security-rules) feature of Network Security groups.
455455
| `service.beta.kubernetes.io/azure-load-balancer-resource-group` | Name of the resource group | Specify the resource group of load balancer public IPs that aren't in the same resource group as the cluster infrastructure (node resource group).
456456
| `service.beta.kubernetes.io/azure-allowed-service-tags` | List of allowed service tags | Specify a list of allowed [service tags][service-tags] separated by commas.
457457
| `service.beta.kubernetes.io/azure-load-balancer-tcp-idle-timeout` | TCP idle timeouts in minutes | Specify the time in minutes for TCP connection idle timeouts to occur on the load balancer. The default and minimum value is 4. The maximum value is 30. The value must be an integer.
@@ -513,7 +513,7 @@ Since v1.21, two service annotations `service.beta.kubernetes.io/azure-load-bala
513513

514514

515515
### Custom Load Balancer health probe for port
516-
Different ports in a service may require different health probe configurations. This could be because of service design (such as a single health endpoint controlling multiple ports), or Kubernetes features like the [MixedProtocolLBService](https://kubernetes.io/docs/concepts/services-networking/service/#load-balancers-with-mixed-protocol-types).
516+
Different ports in a service can require different health probe configurations. This could be because of service design (such as a single health endpoint controlling multiple ports), or Kubernetes features like the [MixedProtocolLBService](https://kubernetes.io/docs/concepts/services-networking/service/#load-balancers-with-mixed-protocol-types).
517517

518518
The following annotations can be used to customize probe configuration per service port.
519519

@@ -527,7 +527,7 @@ The following annotations can be used to customize probe configuration per servi
527527
| service.beta.kubernetes.io/port_{port}_health-probe_num-of-probe | service.beta.kubernetes.io/azure-load-balancer-health-probe-num-of-probe | Number of consecutive probe failures before the port is considered unhealthy |
528528
| service.beta.kubernetes.io/port_{port}_health-probe_interval | service.beta.kubernetes.io/azure-load-balancer-health-probe-interval | The amount of time between probe attempts |
529529

530-
For following manifest, probe rule for port httpsserver is different from the one for httpserver because annoations for port httpsserver are specified.
530+
For following manifest, probe rule for port httpsserver is different from the one for httpserver because annotations for port httpsserver are specified.
531531

532532
```yaml
533533
apiVersion: v1
@@ -714,6 +714,6 @@ To learn more about using internal load balancer for inbound traffic, see the [A
714714
[use-multiple-node-pools]: use-multiple-node-pools.md
715715
[troubleshoot-snat]: #troubleshooting-snat
716716
[service-tags]: ../virtual-network/network-security-groups-overview.md#service-tags
717-
[maxsurge]: upgrade-cluster.md#customize-node-surge-upgrade
717+
[maxsurge]: ./upgrade-aks-cluster.md#customize-node-surge-upgrade
718718
[az-lb]: ../load-balancer/load-balancer-overview.md
719719
[alb-outbound-rules]: ../load-balancer/outbound-rules.md

0 commit comments

Comments
 (0)