Skip to content

Commit 33eee6b

Browse files
authored
Merge pull request #216405 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 380126d + 22d7c84 commit 33eee6b

File tree

11 files changed

+21
-35
lines changed

11 files changed

+21
-35
lines changed

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ To configure the Temporary Access Pass authentication method policy:
6363
|---|---|---|---|
6464
| Minimum lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Minimum number of minutes that the Temporary Access Pass is valid. |
6565
| Maximum lifetime | 8 hours | 10 – 43,200 Minutes (30 days) | Maximum number of minutes that the Temporary Access Pass is valid. |
66-
| Default lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Default values can be override by the individual passes, within the minimum and maximum lifetime configured by the policy. |
66+
| Default lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Default values can be overridden by the individual passes, within the minimum and maximum lifetime configured by the policy. |
6767
| One-time use | False | True / False | When the policy is set to false, passes in the tenant can be used either once or more than once during its validity (maximum lifetime). By enforcing one-time use in the Temporary Access Pass policy, all passes created in the tenant will be created as one-time use. |
6868
| Length | 8 | 8-48 characters | Defines the length of the passcode. |
6969

articles/active-directory/fundamentals/multi-tenant-user-management-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ These terms are used throughout this content:
5858

5959
* **Home tenant**: The Azure AD tenant containing users requiring access to the resources in the resource tenant.
6060

61-
* **User lifecycle management**: the process of provisioning, managing, and deprovisioning user access to resources.
61+
* **User lifecycle management**: The process of provisioning, managing, and deprovisioning user access to resources.
6262

6363
* **Unified GAL**: Each user in each tenant can see users from each organization in their Global Address List (GAL).
6464

articles/active-directory/identity-protection/howto-identity-protection-configure-mfa-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ For more information on Azure AD multifactor authentication, see [What is Azure
3636
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **MFA registration policy**.
3737
1. Under **Assignments**
3838
1. **Users** - Choose **All users** or **Select individuals and groups** if limiting your rollout.
39-
1. Optionally you can choose to exclude users from the policy.
39+
1. Optionally you can choose to exclude users or groups from the policy.
4040
1. **Enforce Policy** - **On**
4141
1. **Save**
4242

articles/active-directory/managed-identities-azure-resources/managed-identities-status.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,8 @@ The following Azure services support managed identities for Azure resources:
6868
| Azure Service Fabric | [Using Managed identities for Azure with Service Fabric](../../service-fabric/concepts-managed-identity.md) |
6969
| Azure SignalR Service | [Managed identities for Azure SignalR Service](../../azure-signalr/howto-use-managed-identity.md) |
7070
| Azure Spring Apps | [Enable system-assigned managed identity for an application in Azure Spring Apps](../../spring-apps/how-to-enable-system-assigned-managed-identity.md) |
71-
| Azure SQL | [Azure SQL Transparent Data Encryption with customer-managed key](/azure/azure-sql/database/transparent-data-encryption-byok-overview) |
72-
| Azure SQL Managed Instance | [Azure SQL Transparent Data Encryption with customer-managed key](/azure/azure-sql/database/transparent-data-encryption-byok-overview) |
71+
| Azure SQL | [Managed identities in Azure AD for Azure SQL](/azure/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity) |
72+
| Azure SQL Managed Instance | [Managed identities in Azure AD for Azure SQL](/azure/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity) |
7373
| Azure Stack Edge | [Manage Azure Stack Edge secrets using Azure Key Vault](../../databox-online/azure-stack-edge-gpu-activation-key-vault.md#recover-managed-identity-access)
7474
| Azure Static Web Apps | [Securing authentication secrets in Azure Key Vault](../../static-web-apps/key-vault-secrets.md)
7575
| Azure Stream Analytics | [Authenticate Stream Analytics to Azure Data Lake Storage Gen1 using managed identities](../../stream-analytics/stream-analytics-managed-identities-adls.md) |

articles/azure-monitor/containers/container-insights-prometheus-metrics-addon.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ The output will be similar to the following:
136136

137137
- Register the `AKS-PrometheusAddonPreview` feature flag in the Azure Kubernetes clusters subscription with the following command in Azure CLI: `az feature register --namespace Microsoft.ContainerService --name AKS-PrometheusAddonPreview`.
138138
- The Azure Monitor workspace and Azure Managed Grafana workspace must already be created.
139-
- The template needs to be deployed in the same resource group as the cluster.
139+
- The template needs to be deployed in the Azure Managed Grafana workspaces resource group.
140140

141141
### Retrieve list of Grafana integrations
142142
If you're using an existing Azure Managed Grafana instance that already has been linked to an Azure Monitor workspace then you need the list of Grafana integrations. Open the **Overview** page for the Azure Managed Grafana instance and select the JSON view. Copy the value of the `azureMonitorWorkspaceIntegrations` field. If it doesn't exist, then the instance hasn't been linked with any Azure Monitor workspace.
@@ -157,7 +157,7 @@ If you're using an existing Azure Managed Grafana instance that already has been
157157
```
158158

159159
### Retrieve System Assigned identity for Grafana resource
160-
If you're using an existing Azure Managed Grafana instance that already has been linked to an Azure Monitor workspace then you need the list of Grafana integrations. Open the **Overview** page for the Azure Managed Grafana instance and select the JSON view. Copy the value of the `principalId` field for the `SystemAssigned` identity.
160+
The system assigned identity for the Azure Managed Grafana resource is also required. To get to it, open the **Overview** page for the Azure Managed Grafana instance and select the JSON view. Copy the value of the `principalId` field for the `SystemAssigned` identity.
161161

162162
```json
163163
"identity": {
@@ -166,8 +166,7 @@ If you're using an existing Azure Managed Grafana instance that already has been
166166
"type": "SystemAssigned"
167167
},
168168
```
169-
170-
Assign the `Monitoring Data Reader` role to the Grafana System Assigned Identity. This is the principalId on the Azure Monitor Workspace resource. This will let the Azure Managed Grafana resource read data from the Azure Monitor Workspace and is a requirement for viewing the metrics.
169+
Please assign the `Monitoring Data Reader` on the Azure Monitor Workspace for the Grafana System Identity i.e. take the principal ID that you got from the Azure Managed Grafana Resource, open the Access Control Blade for the Azure Monitor Workspace and assign the `Monitoring Data Reader` Built-In role to the principal ID (System Assigned MSI for the Azure Managed Grafana resource). This will let the Azure Managed Grafana resource read data from the Azure Monitor Workspace and is a requirement for viewing the metrics.
171170

172171
### Download and edit template and parameter file
173172

@@ -207,14 +206,15 @@ Assign the `Monitoring Data Reader` role to the Grafana System Assigned Identity
207206
},
208207
{
209208
"azureMonitorWorkspaceResourceId": "full_resource_id_2"
210-
}
209+
},
211210
{
212-
"azureMonitorWorkspaceResourceId": "[parameters('azureMonitorWorkspaceResourceId')]"
211+
"azureMonitorWorkspaceResourceId": "[parameters('azureMonitorWorkspaceResourceId')]"
213212
}
214213
]
215214
}
216215
}
217216
````
217+
For e.g. In the above code snippet `full_resource_id_1` and `full_resource_id_2` were already present on the Azure Managed Grafana resource and we're manually adding them to the ARM template. The final `azureMonitorWorkspaceResourceId` already exists in the template and is being used to link to the Azure Monitor Workspace resource ID provided in the parameters file. Please note, You do not have to replace `full_resource_id_1` and `full_resource_id_2` and any other resource id's if no integrations are found in the retrieval step.
218218

219219

220220
### Deploy template
@@ -268,7 +268,9 @@ ama-metrics-ksm-5fcf8dffcd 1 1 1 11h
268268

269269

270270
## Uninstall metrics addon
271-
Currently, Azure CLI is the only option to remove the metrics addon and stop sending Prometheus metrics to Azure Monitor managed service for Prometheus. The following command removes the agent from the cluster nodes and deletes the recording rules created for the data being collected from the cluster, it doesn't remove the DCE, DCR, or the data already collected and stored in your Azure Monitor workspace.
271+
272+
Currently, Azure CLI is the only option to remove the metrics addon and stop sending Prometheus metrics to Azure Monitor managed service for Prometheus.
273+
The aks-preview extension needs to be installed using the command `az extension add --name aks-preview`. For more information on how to install a CLI extension, see [Use and manage extensions with the Azure CLI](/azure/azure-cli-extensions-overview). The following command removes the agent from the cluster nodes and deletes the recording rules created for the data being collected from the cluster, it doesn't remove the DCE, DCR, or the data already collected and stored in your Azure Monitor workspace.
272274

273275
```azurecli
274276
az aks update --disable-azuremonitormetrics -n <cluster-name> -g <cluster-resource-group>

articles/azure-vmware/deploy-disaster-recovery-using-jetstream.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ Azure VMware Solution supports the installation of JetStream using either static
194194
| **Datastore** | Name of the datastore where you'll deploy the JetStream MSA. |
195195
| **VMName** | Name of JetStream MSA VM, for example, **jetstreamServer**. |
196196
| **Cluster** | Name of the Azure VMware Solution private cluster where the JetStream MSA is deployed, for example, **Cluster-1**. |
197-
| **Netmask** | Netmask of the MSA to be deployed, for example, **22** or **24**. |
197+
| **Netmask** | Netmask of the MSA to be deployed, for example, **255.255.255.0**. |
198198
| **MSIp** | IP address of the JetStream MSA VM. |
199199
| **Dns** | DNS IP that the JetStream MSA VM should use. |
200200
| **Gateway** | IP address of the network gateway for the JetStream MSA VM. |

articles/backup/blob-backup-support-matrix.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Operational backup of blobs uses blob point-in-time restore, blob versioning, so
2222

2323
**Other limitations:**
2424

25-
- If you've deleted a container during the retention period, that container won't be restored with the point-in-time restore operation. If you attempt to restore a range of blobs that includes blobs in a deleted container, the point-in-time restore operation will fail. For more information about protecting containers from deletion, see [Soft delete for containers (preview)](../storage/blobs/soft-delete-container-overview.md).
25+
- If you've deleted a container during the retention period, that container won't be restored with the point-in-time restore operation. If you attempt to restore a range of blobs that includes blobs in a deleted container, the point-in-time restore operation will fail. For more information about protecting containers from deletion, see [Soft delete for containers](../storage/blobs/soft-delete-container-overview.md).
2626
- If a blob has moved between the hot and cool tiers in the period between the present moment and the restore point, the blob is restored to its previous tier. Restoring block blobs in the archive tier isn't supported. For example, if a blob in the hot tier was moved to the archive tier two days ago, and a restore operation restores to a point three days ago, the blob isn't restored to the hot tier. To restore an archived blob, first move it out of the archive tier. For more information, see [Rehydrate blob data from the archive tier](../storage/blobs/archive-rehydrate-overview.md).
2727
- A block that has been uploaded via [Put Block](/rest/api/storageservices/put-block) or [Put Block from URL](/rest/api/storageservices/put-block-from-url), but not committed via [Put Block List](/rest/api/storageservices/put-block-list), isn't part of a blob and so isn't restored as part of a restore operation.
2828
- A blob with an active lease can't be restored. If a blob with an active lease is included in the range of blobs to restore, the restore operation will fail automatically. Break any active leases before starting the restore operation.
@@ -31,4 +31,4 @@ Operational backup of blobs uses blob point-in-time restore, blob versioning, so
3131

3232
## Next steps
3333

34-
[Overview of operational backup for Azure Blobs](blob-backup-overview.md)
34+
[Overview of operational backup for Azure Blobs](blob-backup-overview.md)

articles/cosmos-db/mongodb/indexing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -378,7 +378,7 @@ Regardless of the value specified for the **Background** index property, index u
378378
379379
There is no impact to read availability when adding a new index. Queries will only utilize new indexes once the index transformation is complete. During the index transformation, the query engine will continue to use existing indexes, so you'll observe similar read performance during the indexing transformation to what you had observed before initiating the indexing change. When adding new indexes, there is also no risk of incomplete or inconsistent query results.
380380
381-
When removing indexes and immediately running queries the have filters on the dropped indexes, results might be inconsistent and incomplete until the index transformation finishes. If you remove indexes, the query engine does not provide consistent or complete results when queries filter on these newly removed indexes. Most developers do not drop indexes and then immediately try to query them so, in practice, this situation is unlikely.
381+
When removing indexes and immediately running queries that have filters on the dropped indexes, results might be inconsistent and incomplete until the index transformation finishes. If you remove indexes, the query engine does not provide consistent or complete results when queries filter on these newly removed indexes. Most developers do not drop indexes and then immediately try to query them so, in practice, this situation is unlikely.
382382
383383
> [!NOTE]
384384
> You can [track index progress](#track-index-progress).

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 1 addition & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -92,22 +92,6 @@ Follow the steps below to create your GCP cloud connector.
9292
|--|--|
9393
| CSPM service account reader role <br> Microsoft Defender for Cloud identity federation <br> CSPM identity pool <br>*Microsoft Defender for Servers* service account (when the servers plan is enabled) <br>*Azure-Arc for servers onboarding* service account (when the Arc for servers auto-provisioning is enabled) | Microsoft Defender Containers’ service account role <br> Microsoft Defender Data Collector service account role <br> Microsoft Defender for cloud identity pool |
9494

95-
(**Servers/SQL only**) When Arc auto-provisioning is enabled, copy the unique numeric ID presented at the end of the Cloud Shell script.
96-
97-
:::image type="content" source="media/quickstart-onboard-gcp/powershell-unique-id.png" alt-text="Screenshot showing the unique numeric ID to be copied." lightbox="media/quickstart-onboard-gcp/powershell-unique-id-expanded.png":::
98-
99-
To locate the unique numeric ID in the GCP portal, navigate to **IAM & Admin** > **Service Accounts**, locate `Azure-Arc for servers onboarding` in the Name column, and copy the unique numeric ID number (OAuth 2 Client ID).
100-
101-
1. Navigate back to the Microsoft Defender for Cloud portal.
102-
103-
1. (Optional) If you changed any of the names of any of the resources, update the names in the appropriate fields.
104-
105-
1. Select the **Next: Review and generate >**.
106-
107-
1. Ensure the information presented is correct.
108-
109-
1. Select the **Create**.
110-
11195
After creating a connector, a scan will start on your GCP environment. New recommendations will appear in Defender for Cloud after up to 6 hours. If you enabled auto-provisioning, Azure Arc and any enabled extensions will install automatically for each new resource detected.
11296

11397
## (Optional) Configure selected plans
@@ -382,4 +366,4 @@ Connecting your GCP project is part of the multicloud experience available in Mi
382366

383367
- [Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
384368
- [Google Cloud resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy) - Learn about the Google Cloud resource hierarchy in Google's online docs
385-
- [Troubleshoot your multicloud connectors](troubleshooting-guide.md#troubleshooting-the-native-multicloud-connector)
369+
- [Troubleshoot your multicloud connectors](troubleshooting-guide.md#troubleshooting-the-native-multicloud-connector)

articles/static-web-apps/nextjs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The following example shows the GitHub Actions job that is enabled for static ex
3838
uses: azure/static-web-apps-deploy@latest
3939
with:
4040
azure_static_web_apps_api_token: ${{ secrets.AZURE_STATIC_WEB_APPS_TOKEN }}
41-
repo_token: ${{ secrets.GITHUB_TOKEN }} # Used for Github integrations (i.e. PR comments)
41+
repo_token: ${{ secrets.GITHUB_TOKEN }} # Used for GitHub integrations (i.e. PR comments)
4242
action: "upload"
4343
app_location: "/" # App source code path
4444
api_location: "" # Api source code path - optional

0 commit comments

Comments
 (0)