Skip to content

Commit 3514c92

Browse files
authored
Merge pull request #262953 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents b26fc0e + 7c8cb4d commit 3514c92

13 files changed

+18
-34
lines changed

articles/ai-services/openai/concepts/provisioned-throughput.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,6 @@ We introduced a new deployment type called **ProvisionedManaged** which provides
5252

5353
Provisioned throughput quota represents a specific amount of total throughput you can deploy. Quota in the Azure OpenAI Service is managed at the subscription level meaning that it can be consumed by different resources within that subscription.
5454

55-
Quota is specific to a (deployment type, mode, region) triplet and isn't interchangeable. Meaning you can't use quota for GPT-4 to deploy GPT-35-turbo. Customers can raise a support request to move the quota across deployment types, models, or regions but we can't guarantee that it will be possible.
55+
Quota is specific to a (deployment type, model, region) triplet and isn't interchangeable. Meaning you can't use quota for GPT-4 to deploy GPT-35-turbo. Customers can raise a support request to move the quota across deployment types, models, or regions but we can't guarantee that it will be possible.
5656

5757
While we make every attempt to ensure that quota is always deployable, quota does not represent a guarantee that the underlying capacity is available for the customer to use. The service assigns capacity to the customer at deployment time and if capacity is unavailable the deployment will fail with an out of capacity error.

articles/aks/azure-cni-overlay.md

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -29,23 +29,6 @@ You can provide outbound (egress) connectivity to the internet for Overlay pods
2929

3030
You can configure ingress connectivity to the cluster using an ingress controller, such as Nginx or [HTTP application routing](./http-application-routing.md). You cannot configure ingress connectivity using Azure App Gateway. For details see [Limitations with Azure CNI Overlay](#limitations-with-azure-cni-overlay).
3131

32-
## Limitations
33-
34-
Azure CNI Overlay networking in AKS currently has the following limitations:
35-
36-
* In case you are using your own subnet to deploy the cluster, the names of the subnet, VNET and resource group which contains the VNET, must be 63 characters or less. This comes from the fact that these names will be used as labels in AKS worker nodes, and are therefore subjected to [Kubernetes label syntax rules](https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#syntax-and-character-set).
37-
38-
## Regional availability for ARM64 node pools
39-
40-
Azure CNI Overlay is currently unavailable for ARM64 node pools in the following regions:
41-
42-
- East US 2
43-
- France Central
44-
- Southeast Asia
45-
- South Central US
46-
- West Europe
47-
- West US 3
48-
4932
## Differences between Kubenet and Azure CNI Overlay
5033

5134
Like Azure CNI Overlay, Kubenet assigns IP addresses to pods from an address space logically different from the VNet, but it has scaling and other limitations. The below table provides a detailed comparison between Kubenet and Azure CNI Overlay. If you don't want to assign VNet IP addresses to pods due to IP shortage, we recommend using Azure CNI Overlay.

articles/aks/cluster-autoscaler.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,6 @@ You can also configure more granular details of the cluster autoscaler by changi
181181
| daemonset-eviction-for-occupied-nodes (Preview) | Whether DaemonSet pods will be gracefully terminated from non-empty nodes | true |
182182
| scale-down-utilization-threshold | Node utilization level, defined as sum of requested resources divided by capacity, in which a node can be considered for scale down | 0.5 |
183183
| max-graceful-termination-sec | Maximum number of seconds the cluster autoscaler waits for pod termination when trying to scale down a node | 600 seconds |
184-
| balance-similar-node-groups | Detects similar node pools and balances the number of nodes between them | false |
185184
| balance-similar-node-groups | Detects similar node pools and balances the number of nodes between them | false |
186185
| expander | Type of node pool [expander](https://github.com/kubernetes/autoscaler/blob/master/cluster-autoscaler/FAQ.md#what-are-expanders) to be used in scale up. Possible values: `most-pods`, `random`, `least-waste`, `priority` | random |
187186
| skip-nodes-with-local-storage | If true, cluster autoscaler doesn't delete nodes with pods with local storage, for example, EmptyDir or HostPath | true |

articles/app-service/configure-ssl-certificate.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ The free certificate comes with the following limitations:
7575
- Isn't exportable.
7676
- Isn't supported in an App Service Environment (ASE).
7777
- Only supports alphanumeric characters, dashes (-), and periods (.).
78+
- Only custom domains of length up to 64 characters are supported.
7879

7980
### [Apex domain](#tab/apex)
8081
- Must have an A record pointing to your web app's IP address.

articles/container-apps/azure-arc-create-container-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ The following example creates a Node.js app.
9191
--name $myContainerApp \
9292
--environment $myConnectedEnvironment \
9393
--environment-type connected \
94-
--image mcr.microsoft.com/azuredocs/containerapps-helloworld:latest \
94+
--image mcr.microsoft.com/k8se/quickstart:latest \
9595
--target-port 80 \
9696
--ingress 'external'
9797

articles/container-apps/get-started-existing-container-image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ New-AzContainerApp @ContainerAppArgs
195195

196196
---
197197

198-
Before you run this command, replace `<REGISTRY_CONTAINER_NAME>` with the full name the public container registry location, including the registry path and tag. For example, a valid container name is `mcr.microsoft.com/azuredocs/containerapps-helloworld:latest`.
198+
Before you run this command, replace `<REGISTRY_CONTAINER_NAME>` with the full name the public container registry location, including the registry path and tag. For example, a valid container name is `mcr.microsoft.com/k8se/quickstart:latest`.
199199

200200
::: zone-end
201201

articles/container-apps/get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ az containerapp up \
125125
--resource-group my-container-apps \
126126
--location centralus \
127127
--environment 'my-container-apps' \
128-
--image mcr.microsoft.com/azuredocs/containerapps-helloworld:latest \
128+
--image mcr.microsoft.com/k8se/quickstart:latest \
129129
--target-port 80 \
130130
--ingress external \
131131
--query properties.configuration.ingress.fqdn
@@ -139,7 +139,7 @@ az containerapp up `
139139
--resource-group my-container-apps `
140140
--location centralus `
141141
--environment my-container-apps `
142-
--image mcr.microsoft.com/azuredocs/containerapps-helloworld:latest `
142+
--image mcr.microsoft.com/k8se/quickstart:latest `
143143
--target-port 80 `
144144
--ingress external `
145145
--query properties.configuration.ingress.fqdn

articles/container-apps/managed-identity-image-pull.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -552,7 +552,7 @@ az containerapp create \
552552
--name $CONTAINERAPP_NAME \
553553
--resource-group $RESOURCE_GROUP \
554554
--environment $CONTAINERAPPS_ENVIRONMENT \
555-
--image mcr.microsoft.com/azuredocs/containerapps-helloworld:latest \
555+
--image mcr.microsoft.com/k8se/quickstart:latest \
556556
--target-port 80 \
557557
--ingress external
558558
```
@@ -562,7 +562,7 @@ az containerapp create \
562562
```powershell
563563
$ImageParams = @{
564564
Name = "my-container-app"
565-
Image = "mcr.microsoft.com/azuredocs/containerapps-helloworld:latest"
565+
Image = "mcr.microsoft.com/k8se/quickstart:latest"
566566
}
567567
$TemplateObj = New-AzContainerAppTemplateObject @ImageParams
568568
$EnvId = (Get-AzContainerAppManagedEnv -EnvName $ContainerAppsEnvironment -ResourceGroupName $ResourceGroupName).Id

articles/container-apps/revisions-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Replace the \<Placeholders\> with your values.
4242
```azurepowershell
4343
$ImageParams = @{
4444
Name = '<ContainerName>'
45-
Image = 'mcr.microsoft.com/azuredocs/containerapps-helloworld:latest'
45+
Image = 'mcr.microsoft.com/k8se/quickstart'
4646
}
4747
$TemplateObj = New-AzContainerAppTemplateObject @ImageParams
4848

articles/container-apps/tutorial-deploy-first-app-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ az containerapp create \
8585
--name my-container-app \
8686
--resource-group $RESOURCE_GROUP \
8787
--environment $CONTAINERAPPS_ENVIRONMENT \
88-
--image mcr.microsoft.com/azuredocs/containerapps-helloworld:latest \
88+
--image mcr.microsoft.com/k8se/quickstart:latest \
8989
--target-port 80 \
9090
--ingress 'external' \
9191
--query properties.configuration.ingress.fqdn
@@ -101,7 +101,7 @@ By setting `--ingress` to `external`, you make the container app available to pu
101101
```azurepowershell
102102
$ImageParams = @{
103103
Name = 'my-container-app'
104-
Image = 'mcr.microsoft.com/azuredocs/containerapps-helloworld:latest'
104+
Image = 'mcr.microsoft.com/k8se/quickstart:latest'
105105
}
106106
$TemplateObj = New-AzContainerAppTemplateObject @ImageParams
107107
$EnvId = (Get-AzContainerAppManagedEnv -EnvName $ContainerAppsEnvironment -ResourceGroupName $ResourceGroupName).Id

0 commit comments

Comments
 (0)