Skip to content

Commit 3bfe116

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into eroverview
2 parents d3faf4b + 52d4f9c commit 3bfe116

File tree

5 files changed

+146
-74
lines changed

5 files changed

+146
-74
lines changed

articles/azure-netapp-files/backup-introduction.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ Azure NetApp Files backup is supported for the following regions:
4848
* Japan East
4949
* Japan West
5050
* Korea Central
51+
* Korea South
5152
* North Central US
5253
* North Europe
5354
* Norway East
@@ -63,6 +64,7 @@ Azure NetApp Files backup is supported for the following regions:
6364
* UAE Central
6465
* UAE North
6566
* UK South
67+
* UK West
6668
* West Europe
6769
* West US
6870
* West US 2

articles/chaos-studio/TOC.yml

Lines changed: 45 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,17 @@
44
items:
55
- name: What is Azure Chaos Studio?
66
href: chaos-studio-overview.md
7+
- name: Chaos experiments
8+
href: chaos-studio-chaos-experiments.md
9+
- name: Faults and actions
10+
href: chaos-studio-faults-actions.md
11+
- name: Targets and capabilities
12+
href: chaos-studio-targets-capabilities.md
13+
- name: Target selection
14+
href: chaos-studio-target-selection.md
715
- name: Quickstart
816
items:
9-
- name: Create and run a chaos experiment using Azure Chaos Studio
17+
- name: Create and run a chaos experiment
1018
href: chaos-studio-quickstart-azure-portal.md
1119
- name: Tutorials
1220
items:
@@ -28,68 +36,60 @@
2836
href: chaos-studio-bicep.md
2937
- name: Azure policy definitions
3038
href: sample-policy-targets.md
31-
- name: Concepts
39+
- name: Security and Reliability
3240
items:
33-
- name: Chaos experiments
34-
href: chaos-studio-chaos-experiments.md
35-
- name: Faults and actions
36-
href: chaos-studio-faults-actions.md
37-
- name: Targets and capabilities
38-
href: chaos-studio-targets-capabilities.md
39-
- name: Target selection
40-
href: chaos-studio-target-selection.md
4141
- name: Permissions and security
4242
href: chaos-studio-permissions-security.md
4343
- name: Private networking
4444
href: chaos-studio-private-networking.md
45-
- name: Regional availability
46-
href: chaos-studio-region-availability.md
4745
- name: Reliability
4846
href: ../reliability/reliability-chaos-studio.md?toc=/azure/chaos-studio/toc.json&bc=/azure/chaos-studio/breadcrumb/toc.json
49-
- name: How-to guides
47+
- name: Create and run experiments
5048
items:
51-
- name: Create and run experiment - Service-direct faults
49+
- name: Service-direct faults
5250
items:
5351
- name: Portal
5452
href: chaos-studio-tutorial-service-direct-portal.md
5553
- name: CLI
5654
href: chaos-studio-tutorial-service-direct-cli.md
57-
- name: Create and run experiment - Agent-based faults
55+
- name: Agent-based faults
5856
items:
5957
- name: Portal
6058
href: chaos-studio-tutorial-agent-based-portal.md
6159
- name: CLI
6260
href: chaos-studio-tutorial-agent-based-cli.md
63-
- name: Create and run experiment - Chaos Mesh faults on AKS
61+
- name: Chaos Mesh faults on AKS
6462
items:
6563
- name: Portal
6664
href: chaos-studio-tutorial-aks-portal.md
6765
- name: CLI
6866
href: chaos-studio-tutorial-aks-cli.md
69-
- name: Create and run experiment - Dynamic targeting
67+
- name: Dynamic targeting
7068
items:
7169
- name: Portal
7270
href: chaos-studio-tutorial-dynamic-target-portal.md
7371
- name: CLI
7472
href: chaos-studio-tutorial-dynamic-target-cli.md
75-
- name: Experiment templates
76-
items:
77-
- name: Use a chaos experiment template to induce an outage on an Azure Active Directory instance
78-
href: chaos-studio-tutorial-aad-outage-portal.md
79-
- name: Use a chaos experiment template to take down Virtual Machine Scale Set availability zones with autoscale disabled
80-
href: chaos-studio-tutorial-availability-zone-down-portal.md
81-
- name: Telemetry
82-
items:
83-
- name: Set up your Chaos Experiment to emit telemetry to Azure Monitor
84-
href: chaos-studio-set-up-azure-monitor.md
85-
- name: Set up your Agent-Based Chaos Experiment to emit telemetry to App Insights
86-
href: chaos-studio-set-up-app-insights.md
87-
- name: Configure an experiment using customer-managed keys (CMK)
88-
href: chaos-studio-configure-customer-managed-keys.md
89-
- name: Set up an agent-based chaos experiment using private link
90-
href: chaos-studio-private-link-agent-service.md
91-
- name: Troubleshoot common issues
92-
href: troubleshooting.md
73+
- name: Use Chaos experiment templates
74+
items:
75+
- name: Use a chaos experiment template to induce an outage on an Azure Active Directory instance
76+
href: chaos-studio-tutorial-aad-outage-portal.md
77+
- name: Use a chaos experiment template to take down Virtual Machine Scale Set availability zones with autoscale disabled
78+
href: chaos-studio-tutorial-availability-zone-down-portal.md
79+
- name: Manage and Monitor experiments
80+
items:
81+
- name: Emit Chaos experiment telemetry
82+
items:
83+
- name: Set up your Chaos Experiment to emit telemetry to Azure Monitor
84+
href: chaos-studio-set-up-azure-monitor.md
85+
- name: Set up your Agent-Based Chaos Experiment to emit telemetry to App Insights
86+
href: chaos-studio-set-up-app-insights.md
87+
- name: Configure an experiment using customer-managed keys (CMK)
88+
href: chaos-studio-configure-customer-managed-keys.md
89+
- name: Set up an agent-based chaos experiment using private link
90+
href: chaos-studio-private-link-agent-service.md
91+
- name: Troubleshoot common issues
92+
href: troubleshooting.md
9393
- name: Reference
9494
items:
9595
- name: Fault library
@@ -98,18 +98,22 @@
9898
href: chaos-studio-fault-providers.md
9999
- name: Version compatibility
100100
href: chaos-studio-versions.md
101+
- name: Regional availability
102+
href: chaos-studio-region-availability.md
101103
- name: Limitations and known issues
102104
href: chaos-studio-limitations.md
103105
- name: Service limits
104106
href: chaos-studio-service-limits.md
105107
- name: REST API documentation
106108
href: /rest/api/chaosstudio/
107-
- name: Python SDK
108-
href: /python/api/azure-mgmt-chaos/
109-
- name: .NET SDK
110-
href: /dotnet/api/overview/azure/resourcemanager.chaos-readme?view=azure-dotnet-preview&preserve-view=true
111-
- name: JavaScript SDK
112-
href: https://www.npmjs.com/package/@azure/arm-chaos/
109+
- name: SDKs
110+
items:
111+
- name: Python SDK
112+
href: /python/api/azure-mgmt-chaos/
113+
- name: .NET SDK
114+
href: /dotnet/api/overview/azure/resourcemanager.chaos-readme?view=azure-dotnet-preview&preserve-view=true
115+
- name: JavaScript SDK
116+
href: https://www.npmjs.com/package/@azure/arm-chaos/
113117
- name: Resources
114118
items:
115119
- name: Service updates

articles/chaos-studio/chaos-studio-quickstart-dns-outage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ ms.reviewer: prashabora
1010
ms.service: chaos-studio
1111
---
1212

13-
# Quickstart: Replicate a DNS outage by using the NSG fault
13+
# Replicate a DNS outage by using the NSG fault
1414

1515
The network security group (NSG) fault enables you to modify your existing NSG rules as part of a chaos experiment in Azure Chaos Studio. By using this fault, you can block network traffic to your Azure resources and simulate a loss of connectivity or outages of dependent resources.
1616

17-
In this quickstart, you create a chaos experiment that blocks all traffic to external (internet) DNS servers for 15 minutes. With this experiment, you can validate that resources connected to the Azure virtual network associated with the target NSG don't have a dependency on external DNS servers. In this way, you can validate one of the risk-threat model requirements.
17+
This article walks you through creating a chaos experiment that blocks all traffic to external (internet) DNS servers for 15 minutes. You can validate that resources connected to the Azure virtual network associated with the target NSG don't have a dependency on external DNS servers. In this way, you can validate one of the risk-threat model requirements.
1818

1919
## Prerequisites
2020

articles/healthcare-apis/azure-api-for-fhir/fhir-rest-api-capabilities.md

Lines changed: 68 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,72 @@ For example: `https://myworkspace-myfhirserver.fhir.azurehealthcareapis.com/Pati
6767
After you've found the record you want to restore, use the `PUT` operation to recreate the resource with the same ID, or use the `POST` operation to make a new resource with the same information.
6868

6969
> [!NOTE]
70-
> There is no time-based expiration for history/soft delete data. The only way to remove history/soft deleted data is with a hard delete or the purge history operation.
70+
> There is no time-based expiration for history/soft delete data. The only way to remove history/soft deleted data is with a hard delete or the purge history operation.\
71+
72+
## Batch Bundles
73+
In FHIR, bundles can be considered as a container that holds multiple resources. Batch bundles enable users to submit a set of actions to be performed on a server in single HTTP request/response.
74+
75+
A batch bundle interaction with FHIR service is performed with HTTP POST command at base URL.
76+
```rest
77+
POST {{fhir_url}}
78+
{
79+
"resourceType": "Bundle",
80+
"type": "batch",
81+
"entry": [
82+
{
83+
"resource": {
84+
"resourceType": "Patient",
85+
"id": "patient-1",
86+
"name": [
87+
{
88+
"given": ["Alice"],
89+
"family": "Smith"
90+
}
91+
],
92+
"gender": "female",
93+
"birthDate": "1990-05-15"
94+
},
95+
"request": {
96+
"method": "POST",
97+
"url": "Patient"
98+
}
99+
},
100+
{
101+
"resource": {
102+
"resourceType": "Patient",
103+
"id": "patient-2",
104+
"name": [
105+
{
106+
"given": ["Bob"],
107+
"family": "Johnson"
108+
}
109+
],
110+
"gender": "male",
111+
"birthDate": "1985-08-23"
112+
},
113+
"request": {
114+
"method": "POST",
115+
"url": "Patient"
116+
}
117+
}
118+
}
119+
]
120+
}
121+
```
122+
123+
In the case of a batch, each entry is treated as an individual interaction or operation.
124+
> [!NOTE]
125+
> For batch bundles there should be no interdependencies between different entries in FHIR bundle. The success or failure of one entry should not impact the success or failure of another entry.
126+
127+
### Batch bundle parallel processing in public preview
128+
129+
Currently batch bundles are executed serially in FHIR service. To improve performance and throughput, we're enabling parallel processing of batch bundles in public preview.
130+
To use the capability of parallel batch bundle processing-
131+
* Set header “x-bundle-processing-logic” value to “parallel”.
132+
* Ensure there's no overlapping resource ID that is executing on DELETE, POST, PUT or PATCH operations in the same bundle.
133+
134+
> [!IMPORTANT]
135+
> Bundle parallel processing is currently in public preview. Preview APIs and SDKs are provided without a service-level agreement. We recommend that you don't use them for production workloads. Some features might not be supported, or they might have constrained capabilities. For more information, review Supplemental Terms of Use for Microsoft Azure Previews
71136
72137
## Patch and Conditional Patch
73138

@@ -162,7 +227,8 @@ Content-Type: `application/json`
162227
```
163228

164229
## Performance consideration with Conditional operations
165-
Conditional interactions can be complex and performance-intensive. To enhance the latency of queries involving conditional interactions, you have the option to utilize the request header **x-conditionalquery-processing-logic** . Setting this header to **parallel** allows concurrent execution of queries with conditional interactions.
230+
1. Conditional interactions can be complex and performance-intensive. To enhance the latency of queries involving conditional interactions, you have the option to utilize the request header **x-conditionalquery-processing-logic** . Setting this header to **parallel** allows concurrent execution of queries with conditional interactions.
231+
2. **x-ms-query-latency-over-efficiency** header value when set to "true", all queries are executed using maximum supported parallelism, which forces the scan of physical partitions to be executed concurrently. This feature was designed for accounts with a high number of physical partitions which queries can take longer due to the number of physical segments that need to be scanned.
166232

167233
## Next steps
168234

articles/machine-learning/how-to-create-workspace-template.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,10 @@ ms.service: machine-learning
77
ms.subservice: enterprise-readiness
88
ms.topic: how-to
99
ms.custom: devx-track-azurepowershell, devx-track-arm-template, devx-track-azurecli
10-
ms.author: deeikele
11-
author: deeikele
12-
ms.reviewer: larryfr
13-
ms.date: 11/09/2022
10+
ms.author: larryfr
11+
author: Blackmist
12+
ms.reviewer: deeikele
13+
ms.date: 02/29/2024
1414
#Customer intent: As a DevOps person, I need to automate or customize the creation of Azure Machine Learning by using templates.
1515
---
1616

@@ -39,7 +39,7 @@ For more information, see [Deploy an application with Azure Resource Manager tem
3939

4040
```json
4141
"type": "Microsoft.MachineLearningServices/workspaces",
42-
"apiVersion": "2020-03-01",
42+
"apiVersion": "2023-10-01",
4343
```
4444

4545
### Multiple workspaces in the same VNet
@@ -188,43 +188,43 @@ For more information, see [Customer-managed keys](concept-customer-managed-keys.
188188
>
189189
> For steps on creating the vault and key, see [Configure customer-managed keys](how-to-setup-customer-managed-keys.md).
190190
191-
__To get the values__ for the `cmk_keyvault` (ID of the Key Vault) and the `resource_cmk_uri` (key URI) parameters needed by this template, use the following steps:
191+
__To get the values__ for the `cmk_keyvault` (ID of the Key Vault) and the `resource_cmk_uri` (key URI) parameters needed by this template, use the following steps:
192192

193-
1. To get the Key Vault ID, use the following command:
193+
1. To get the Key Vault ID, use the following command:
194194

195-
# [Azure CLI](#tab/azcli)
195+
# [Azure CLI](#tab/azcli)
196196

197-
```azurecli
198-
az keyvault show --name <keyvault-name> --query 'id' --output tsv
199-
```
197+
```azurecli
198+
az keyvault show --name <keyvault-name> --query 'id' --output tsv
199+
```
200200
201-
# [Azure PowerShell](#tab/azpowershell)
201+
# [Azure PowerShell](#tab/azpowershell)
202202
203-
```azurepowershell
204-
Get-AzureRMKeyVault -VaultName '<keyvault-name>'
205-
```
206-
---
203+
```azurepowershell
204+
Get-AzureRMKeyVault -VaultName '<keyvault-name>'
205+
```
206+
---
207207
208-
This command returns a value similar to `/subscriptions/{subscription-guid}/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>`.
208+
This command returns a value similar to `/subscriptions/{subscription-guid}/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>`.
209209
210-
1. To get the value for the URI for the customer managed key, use the following command:
210+
1. To get the value for the URI for the customer managed key, use the following command:
211211
212-
# [Azure CLI](#tab/azcli)
212+
# [Azure CLI](#tab/azcli)
213213
214-
```azurecli
215-
az keyvault key show --vault-name <keyvault-name> --name <key-name> --query 'key.kid' --output tsv
216-
```
214+
```azurecli
215+
az keyvault key show --vault-name <keyvault-name> --name <key-name> --query 'key.kid' --output tsv
216+
```
217217
218-
# [Azure PowerShell](#tab/azpowershell)
218+
# [Azure PowerShell](#tab/azpowershell)
219219
220-
```azurepowershell
221-
Get-AzureKeyVaultKey -VaultName '<keyvault-name>' -KeyName '<key-name>'
222-
```
223-
---
220+
```azurepowershell
221+
Get-AzureKeyVaultKey -VaultName '<keyvault-name>' -KeyName '<key-name>'
222+
```
223+
---
224224
225-
This command returns a value similar to `https://mykeyvault.vault.azure.net/keys/mykey/{guid}`.
225+
This command returns a value similar to `https://mykeyvault.vault.azure.net/keys/mykey/{guid}`.
226226
227-
> [!IMPORTANT]
227+
> [!IMPORTANT]
228228
> Once a workspace has been created, you cannot change the settings for confidential data, encryption, key vault ID, or key identifiers. To change these values, you must create a new workspace using the new values.
229229
230230
To enable use of Customer Managed Keys, set the following parameters when deploying the template:

0 commit comments

Comments
 (0)