Skip to content

Commit 3d04177

Browse files
authored
Merge pull request #180776 from MicrosoftDocs/master
11/22 PM Publish
2 parents 07bbc57 + 074a050 commit 3d04177

File tree

154 files changed

+1684
-829
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

154 files changed

+1684
-829
lines changed

.vscode/settings.json

Lines changed: 0 additions & 8 deletions
This file was deleted.
886 Bytes
Loading

articles/app-service/quickstart-dotnetcore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -414,7 +414,7 @@ Follow these steps to create your App Service resources and publish your project
414414
:::zone target="docs" pivot="development-environment-cli"
415415
<!-- markdownlint-enable MD044 -->
416416
417-
1. Sign into your Azure account by using the [`az login`](/cli/reference-index#az_login) command and following the prompt:
417+
1. Sign into your Azure account by using the [`az login`](/cli/azure/reference-index#az_login) command and following the prompt:
418418
419419
```azurecli
420420
az login

articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -426,7 +426,7 @@ message associated with error code {errorCode}
426426
427427
**Cause:** This error occurs when Application Gateway can't verify the validity of the certificate.
428428
429-
**Solution:** To resolve this issue, verify that the certificate on your server was created properly. For example, you can use [OpenSSL](https://www.openssl.org/docs/man1.0.2/man1/verify.html) to verify the certificate and its properties and then try reuploading the certificate to the Application Gateway HTTP settings.
429+
**Solution:** To resolve this issue, verify that the certificate on your server was created properly. For example, you can use [OpenSSL](https://www.openssl.org/docs/manmaster/man1/verify.html) to verify the certificate and its properties and then try reuploading the certificate to the Application Gateway HTTP settings.
430430
431431
## Backend health status: unknown
432432

articles/applied-ai-services/form-recognizer/quickstarts/try-v3-rest-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@ Before you run the command, make these changes:
422422
#### Request
423423
424424
```bash
425-
curl -v -i POST "https://{endpoint}/formrecognizer/documentModels/prebuilt-invoice:analyze?api-version=2021-09-30-preview" -H "Content-Type: application/json" -H "Ocp-Apim-Subscription-Key: {subscription key}" --data-ascii "{'urlsource': '{your-document-url}'}"
425+
curl -v -i POST "https://{endpoint}/formrecognizer/documentModels/prebuilt-invoice:analyze?api-version=2021-09-30-preview" -H "Content-Type: application/json" -H "Ocp-Apim-Subscription-Key: {subscription key}" --data-ascii "{'urlSource': '{your-document-url}'}"
426426
```
427427

428428
#### Operation-Location

articles/availability-zones/az-region.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn what services are supported by availability zones and underst
44
author: prsandhu
55
ms.service: azure
66
ms.topic: conceptual
7-
ms.date: 10/01/2021
7+
ms.date: 11/22/2021
88
ms.author: rarco
99
ms.reviewer: cynthn
1010
ms.custom: references_regions
@@ -122,6 +122,8 @@ In the Product Catalog, always-available services are listed as "non-regional" s
122122
| [Azure Firewall](../firewall/deploy-availability-zone-powershell.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
123123
| [Azure Firewall Manager](../firewall-manager/quick-firewall-policy.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
124124
| [Azure Functions](https://azure.github.io/AppService/2021/08/25/App-service-support-for-availability-zones.html) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
125+
| [Azure IoT Hub](../iot-hub/iot-hub-ha-dr.md#availability-zones) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
126+
| [Azure IoT Hub Device Provisioning Service](../iot-dps/about-iot-dps.md#availability) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
125127
| [Azure Kubernetes Service (AKS)](../aks/availability-zones.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) ![An icon that signifies this service is zonal](media/icon-zonal.svg) |
126128
| [Azure Monitor](../azure-monitor/logs/availability-zones.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
127129
| [Azure Monitor: Application Insights](../azure-monitor/logs/availability-zones.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |

articles/azure-arc/data/connectivity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Some Azure-attached services are only available when they can be directly reache
3434
||**Indirectly connected**|**Directly connected**|**Never connected**|
3535
|---|---|---|---|
3636
|**Description**|Indirectly connected mode offers most of the management services locally in your environment with no direct connection to Azure. A minimal amount of data must be sent to Azure for inventory and billing purposes _only_. It is exported to a file and uploaded to Azure at least once per month. No direct or continuous connection to Azure is required. Some features and services which require a connection to Azure will not be available.|Directly connected mode offers all of the available services when a direct connection can be established with Azure. Connections are always initiated _from_ your environment to Azure and use standard ports and protocols such as HTTPS/443.|No data can be sent to or from Azure in any way.|
37-
|**Current availability**| Available |Available in preview.|Not currently supported.|
37+
|**Current availability**| Available |Available|Not currently supported.|
3838
|**Typical use cases**|On-premises data centers that don’t allow connectivity in or out of the data region of the data center due to business or regulatory compliance policies or out of concerns of external attacks or data exfiltration. Typical examples: Financial institutions, health care, government. <br/><br/>Edge site locations where the edge site doesn’t typically have connectivity to the Internet. Typical examples: oil/gas or military field applications. <br/><br/>Edge site locations that have intermittent connectivity with long periods of outages. Typical examples: stadiums, cruise ships. | Organizations who are using public clouds. Typical examples: Azure, AWS or Google Cloud.<br/><br/>Edge site locations where Internet connectivity is typically present and allowed. Typical examples: retail stores, manufacturing.<br/><br/>Corporate data centers with more permissive policies for connectivity to/from their data region of the datacenter to the Internet. Typical examples: Non-regulated businesses, small/medium sized businesses|Truly "air-gapped" environments where no data under any circumstances can come or go from the data environment. Typical examples: top secret government facilities.|
3939
|**How data is sent to Azure**|There are three options for how the billing and inventory data can be sent to Azure:<br><br> 1) Data is exported out of the data region by an automated process that has connectivity to both the secure data region and Azure.<br><br>2) Data is exported out of the data region by an automated process within the data region, automatically copied to a less secure region, and an automated process in the less secure region uploads the data to Azure.<br><br>3) Data is manually exported by a user within the secure region, manually brought out of the secure region, and manually uploaded to Azure. <br><br>The first two options are an automated continuous process that can be scheduled to run frequently so there is minimal delay in the transfer of data to Azure subject only to the available connectivity to Azure.|Data is automatically and continuously sent to Azure.|Data is never sent to Azure.|
4040

@@ -50,7 +50,7 @@ Some Azure-attached services are only available when they can be directly reache
5050
|**Automatic upgrades and patching**|Supported<br/>The data controller must either have direct access to the Microsoft Container Registry (MCR) or the container images need to be pulled from MCR and pushed to a local, private container registry that the data controller has access to.|Supported<br/>**Pending availability in directly connected.**|
5151
|**Automatic backup and restore**|Supported<br/>Automatic local backup and restore.|Supported<br/>In addition to automated local backup and restore, you can _optionally_ send backups to Azure Backup for long-term, off-site retention. **Pending availability in directly connected mode.**|
5252
|**Monitoring**|Supported<br/>Local monitoring using Grafana and Kibana dashboards.|Supported<br/>In addition to local monitoring dashboards, you can _optionally_ send monitoring data and logs to Azure Monitor for at-scale monitoring of multiple sites in one place. |
53-
|**Authentication**|Use local username/password for data controller and dashboard authentication. Use SQL and Postgres logins or Active Directory (AD is not currently supported, will be in preview soon) for connectivity to database instances. Use K8s authentication providers for authentication to the Kubernetes API.|In addition to or instead of the authentication methods for the indirectly connected mode, you can _optionally_ use Azure Active Directory. **Pending availability in directly connected mode**|
53+
|**Authentication**|Use local username/password for data controller and dashboard authentication. Use SQL and Postgres logins or Active Directory (AD is not currently supported) for connectivity to database instances. Use K8s authentication providers for authentication to the Kubernetes API.|In addition to or instead of the authentication methods for the indirectly connected mode, you can _optionally_ use Azure Active Directory. **Pending availability in directly connected mode**|
5454
|**Role-based access control (RBAC)**|Use Kubernetes RBAC on Kubernetes API. Use SQL and Postgres RBAC for database instances.|You can use Azure Active Directory and Azure RBAC. **Pending availability in directly connected mode**|
5555
|**Microsoft Defender for Cloud**|Not supported|Planned for future|
5656

articles/azure-arc/data/create-data-controller.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Regardless of the option you choose, during the creation process you will need t
4747
- **Data controller username** - Any username for the data controller administrator user.
4848
- **Data controller password** - A password for the data controller administrator user.
4949
- **Name of your Kubernetes namespace** - the name of the Kubernetes namespace that you want to create the data controller in.
50-
- **Connectivity mode** - Connectivity mode determines the degree of connectivity from your Azure Arc-enabled data services environment to Azure. Indirect connectivity mode is generally available. Direct connectivity mode is in preview. For information, see [connectivity mode](./connectivity.md).
50+
- **Connectivity mode** - Connectivity mode determines the degree of connectivity from your Azure Arc-enabled data services environment to Azure. For information, see [connectivity mode](./connectivity.md).
5151
- **Azure subscription ID** - The Azure subscription GUID for where you want the data controller resource in Azure to be created.
5252
- **Azure resource group name** - The name of the resource group where you want the data controller resource in Azure to be created.
5353
- **Azure location** - The Azure location where the data controller resource metadata will be stored in Azure. For a list of available regions, see [Azure global infrastructure / Products by region](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc). The metadata and billing information about the Azure resources managed by the data controller that you are deploying will be stored only in the location in Azure that you specify as the location parameter. If you are deploying in the directly connected mode, the location parameter for the data controller will be the same as the location of the custom location resource that you target.

articles/azure-arc/data/plan-azure-arc-data-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ When you're creating Azure Arc-enabled data services, regardless of the service
7171
- **Username**: The username for the Kibana/Grafana administrator user.
7272
- **Password**: The password for the Kibana/Grafana administrator user.
7373
- **Name of your Kubernetes namespace**: The name of the Kubernetes namespace where you want to create the data controller.
74-
- **Connectivity mode**: Determines the degree of connectivity from your Azure Arc-enabled data services environment to Azure. *Indirect* connectivity mode is generally available, and *direct* connectivity mode is in preview. Your choice of connectivity mode determines the options for deployment methods. For more information, see [Connectivity modes and requirements](./connectivity.md).
74+
- **Connectivity mode**: Determines the degree of connectivity from your Azure Arc-enabled data services environment to Azure. Your choice of connectivity mode determines the options for deployment methods. For more information, see [Connectivity modes and requirements](./connectivity.md).
7575
- **Azure subscription ID**: The Azure subscription GUID for where you want to create the data controller resource in Azure. All Azure Arc-enabled SQL managed instances and Azure Database for PostgreSQL Hyperscale server groups are also created in and billed to this subscription.
7676
- **Azure resource group name**: The name of the resource group where you want to create the data controller resource in Azure. All Azure Arc-enabled SQL managed instances and Azure Database for PostgreSQL Hyperscale server groups are also created in this resource group.
7777
- **Azure location**: The Azure location where the data controller resource metadata will be stored in Azure. For a list of available regions, see the [Products available by region](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc) page for Azure global infrastructure. The metadata and billing information about the Azure resources that are managed by your deployed data controller is stored only in the location in Azure that you specify as the location parameter. If you're deploying in direct connectivity mode, the location parameter for the data controller is the same as the location of your targeted custom location resource.

articles/azure-cache-for-redis/cache-whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ ms.date: 10/11/2021
1818
Azure Cache for Redis 6.0 is now generally available. The new version includes:
1919

2020
- Redis Streams, a new data type
21-
- performance enhancements
22-
- enhanced developer productivity
23-
- boosts security
21+
- Performance enhancements
22+
- Enhanced developer productivity
23+
- Boosts security
2424

2525
You can now use an append-only data structure, Redis Streams, to ingest, manage, and make sense of data that is continuously being generated.
2626

0 commit comments

Comments
 (0)