Skip to content

Commit 4259a7e

Browse files
authored
Merge pull request #296110 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 4f0f594 + 0bb5900 commit 4259a7e

File tree

9 files changed

+56
-35
lines changed

9 files changed

+56
-35
lines changed

articles/azure-cache-for-redis/cache-how-to-encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by defau
8787

8888
1. Select your chosen user assigned managed identity, and then choose the key input method to use.
8989

90-
1. If using the **Select Azure key vault and key** input method, choose the Key Vault instance that holds your customer managed key. This instance must be in the same region as your cache.
90+
1. If using the **Select Azure Key Vault and key** input method, choose the Key Vault instance that holds your customer managed key. This instance must be in the same region as your cache.
9191

9292
> [!NOTE]
9393
> For instructions on how to set up an Azure Key Vault instance, see the [Azure Key Vault quickstart guide](/azure/key-vault/secrets/quick-create-portal). You can also select the _Create a key vault_ link beneath the Key Vault selection to create a new Key Vault instance. Remember that both purge protection and soft delete must be enabled in your Key Vault instance.
@@ -113,7 +113,7 @@ In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by defau
113113

114114
1. Select your chosen user assigned managed identity, and then choose which key input method to use.
115115

116-
1. If using the **Select Azure key vault and key** input method, choose the Key Vault instance that holds your customer managed key. This instance must be in the same region as your cache.
116+
1. If using the **Select Azure Key Vault and key** input method, choose the Key Vault instance that holds your customer managed key. This instance must be in the same region as your cache.
117117

118118
> [!NOTE]
119119
> For instructions on how to set up an Azure Key Vault instance, see the [Azure Key Vault quickstart guide](/azure/key-vault/secrets/quick-create-portal). You can also select the _Create a key vault_ link beneath the Key Vault selection to create a new Key Vault instance.

articles/azure-maps/how-to-secure-sas-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The following example scenario uses two Azure Resource Manager (ARM) template de
4141
1. Create a user-assigned managed identity.
4242
1. Assign Azure role-based access control (RBAC) **Azure Maps Data Reader** role to the user-assigned managed identity.
4343
1. Create an Azure Maps account with a [Cross Origin Resource Sharing (CORS) configuration](azure-maps-authentication.md#cross-origin-resource-sharing-cors), and attach the user-assigned managed identity.
44-
1. Create and save a SAS token in the Azure key vault.
44+
1. Create and save a SAS token in the Azure Key Vault.
4545
1. Retrieve the SAS token secret from the key vault.
4646
1. Create an Azure Maps REST API request that uses the SAS token.
4747

articles/container-apps/workload-profiles-overview.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -30,23 +30,27 @@ Profiles are configured to fit the different needs of your applications.
3030
> [!NOTE]
3131
> When using GPU-enabled workload profiles, make sure your application is running the latest version of [CUDA](https://catalog.ngc.nvidia.com/orgs/nvidia/containers/cuda).
3232
33-
The Consumption workload profile is the default profile added to every Workload profiles [environment](environment.md) type. You can add Dedicated workload profiles to your environment when you create it or after you create it. Workload profiles environments are deployed separately from Consumption only environments.
33+
The Consumption workload profile is the default profile added to every Workload profiles [environment](environment.md) type. You can add Consumption GPU workload profiles for each type of GPU. All Consuption workload profiles:
3434

35-
For each Dedicated workload profile in your environment, you can:
35+
- Automatically scale as needed
36+
- Can deploy multiple apps
3637

37-
- Select the type and size
38-
- Deploy multiple apps into the profile
39-
- Use autoscaling to add and remove instances based on the needs of the apps
38+
You can add Dedicated workload profiles to your environment. These enable you to:
39+
40+
- Use reserved VMs for your apps
41+
- Select the type and size of the VM
42+
- Deploy multiple apps in each profile
43+
- Use autoscaling to add and remove VM instances based on the needs of the apps
4044
- Limit scaling of the profile to better control costs
4145

4246
You can configure each of your apps to run on any of the workload profiles defined in your Container Apps environment. This configuration is ideal for deploying microservices where each app can run on the appropriate compute infrastructure.
4347

4448
> [!NOTE]
45-
> You can only apply a GPU workload profile to an environment as the environment is created.
49+
> You can only add a Dedicated GPU workload profile when initially creating an environment. Consumption GPU and other types of workload profiles may be added later.
4650
4751
## Profile types
4852

49-
There are different types and sizes of workload profiles available by region. By default, each Dedicated plan includes a consumption profile, but you can also add any of the following profiles:
53+
There are different types and sizes of workload profiles available by region. By default, each workload profile enabled environment includes a Consumption profile, but you can also add any of the following profiles:
5054

5155
| Display name | Name | vCPU | Memory (GiB) | GPU | Category | Allocation | Quota name |
5256
|---|---|---|---|---|---|---|
@@ -61,9 +65,9 @@ There are different types and sizes of workload profiles available by region. By
6165
| Dedicated-E8 | E8 | 8 | 64 | - | Memory optimized | per node | Managed Environment Memory Optimized Cores |
6266
| Dedicated-E16 | E16 | 16 | 128 | - | Memory optimized | per node | Managed Environment Memory Optimized Cores |
6367
| Dedicated-E32 | E32 | 32 | 256 | - | Memory optimized | per node | Managed Environment Memory Optimized Cores |
64-
| Dedicated-NC24-A100 (preview) | NC24-A100 | 24 | 220 | 1 | GPU enabled | per node<sup>\*</sup> | Managed Environment Compute Optimized Cores |
65-
| Dedicated-NC48-A100 (preview) | NC48-A100 | 48 | 440 | 2 | GPU enabled | per node<sup>\*</sup> | Managed Environment Compute Optimized Cores |
66-
| Dedicated-NC96-A100 (preview) | NC96-A100 | 96 | 880 | 4 | GPU enabled | per node<sup>\*</sup> | Managed Environment Compute Optimized Cores |
68+
| Dedicated-NC24-A100 (preview) | NC24-A100 | 24 | 220 | 1 | GPU enabled | per node<sup>\*</sup> | Subscription NCA 100 Gpus |
69+
| Dedicated-NC48-A100 (preview) | NC48-A100 | 48 | 440 | 2 | GPU enabled | per node<sup>\*</sup> | Subscription NCA 100 Gpus |
70+
| Dedicated-NC96-A100 (preview) | NC96-A100 | 96 | 880 | 4 | GPU enabled | per node<sup>\*</sup> | Subscription NCA 100 Gpus |
6771

6872
<sup>\*</sup> Capacity is allocated on a per-case basis. Submit a [support ticket](https://azure.microsoft.com/support/create-ticket/) to request the capacity amount required for your application.
6973

articles/devtest-labs/devtest-lab-store-secrets-in-key-vault.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 06/26/2020
1111
# Store secrets in a key vault in Azure DevTest Labs
1212
You might need to enter a complex secret when you use Azure DevTest Labs. Secrets include passwords for your Windows VMs, public SSH keys for your Linux VMs, or personal access token to clone your Git repo through an artifact. Secrets are often long and have random characters. Entering them can be tricky and inconvenient, especially if you use the same secret multiple times.
1313

14-
To solve this problem and keep your secrets in a safe place, DevTest Labs supports storing secrets in an [Azure key vault](/azure/key-vault/general/overview). The first time a user saves a secret, DevTest Labs automatically creates a key vault in the same resource group as the lab, and stores the secret. DevTest Labs creates a separate key vault for each user.
14+
To solve this problem and keep your secrets in a safe place, DevTest Labs supports storing secrets in an [Azure Key Vault](/azure/key-vault/general/overview). The first time a user saves a secret, DevTest Labs automatically creates a key vault in the same resource group as the lab, and stores the secret. DevTest Labs creates a separate key vault for each user.
1515

1616
Lab users need to create a lab virtual machine before they can create a secret in the key vault. This requirement is because DevTest Labs must associate lab users with valid user documents. DevTest Labs then allows users to create and store secrets in their key vaults.
1717

articles/logic-apps/authenticate-with-managed-identity.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -520,7 +520,7 @@ Before you can use your logic app's managed identity for authentication, you hav
520520
> suppose you have a managed identity for a logic app that needs access to update the application
521521
> settings for that same logic app from a workflow. You must give that identity access to the associated logic app.
522522
523-
For example, to access an Azure Blob storage account or an Azure key vault with your managed identity, you need to set up Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
523+
For example, to use a managed identity for authenticating access to a Blob storage account or key vault in Azure, you need to set up Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
524524

525525
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
526526

@@ -530,7 +530,7 @@ The steps in this section describe how to assign role-based access using the [Az
530530
| Azure CLI | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli) |
531531
| Azure REST API | [Add role assignment](../role-based-access-control/role-assignments-rest.md) |
532532

533-
For an Azure key vault, you also have the option to create an access policy for your managed identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
533+
For Azure Key Vault, you also have the option to create an access policy for your managed identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
534534

535535
| Tool | Documentation |
536536
|------|---------------|
@@ -542,7 +542,7 @@ For an Azure key vault, you also have the option to create an access policy for
542542

543543
### Assign role-based access to a managed identity using the Azure portal
544544

545-
To use a managed identity for authentication, some Azure resources, such as Azure storage accounts, require that you assign that identity to a role that has the appropriate permissions on the target resource. Other Azure resources, such as Azure key vaults, support multiple options, so you can choose either role-based access or an [access policy that has the appropriate permissions on the target resource for that identity](#azure-portal-access-policy).
545+
To use a managed identity for authentication, some Azure resources, such as Azure storage accounts, require that you assign that identity to a role that has the appropriate permissions on the target resource. Other Azure resources, such as key vaults, support multiple options. You can choose either role-based access or an [access policy that has the appropriate permissions on the target resource for that identity](#azure-portal-access-policy).
546546

547547
1. In the [Azure portal](https://portal.azure.com), open the resource where you want to use the identity.
548548

@@ -578,7 +578,9 @@ For more general information about this task, see [Assign a managed identity acc
578578

579579
To use a managed identity for authentication, other Azure resources also support or require that you create an access policy that has the appropriate permissions on the target resource for that identity. Other Azure resources, such as Azure storage accounts, instead require that you [assign that identity to a role that has the appropriate permissions on the target resource](#azure-portal-assign-role).
580580

581-
1. In the [Azure portal](https://portal.azure.com), open the target resource where you want to use the identity. This example uses an Azure key vault as the target resource.
581+
1. In the [Azure portal](https://portal.azure.com), open the target resource where you want to use the identity.
582+
583+
This example uses a key vault as the target Azure resource.
582584

583585
1. On the resource menu, select **Access policies** > **Create**, which opens the **Create an access policy** pane.
584586

articles/managed-grafana/how-to-grafana-enterprise.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,21 +17,34 @@ The Grafana Enterprise plans offered through Azure Managed Grafana enable users
1717
>[!NOTE]
1818
> To activate the Grafana Enterprise option, your Azure Managed Grafana workspace must be using the Standard plan. For more information about plans, go to [pricing plans](overview.md#service-tiers).
1919
20-
Grafana Enterprise plugins, as of October 2023:
20+
Grafana Enterprise plugins, as of March 2025:
2121

22+
- Adobe Analytics
23+
- Amazon Aurora
2224
- AppDynamics
25+
- Atlassian Statuspage
26+
- Azure Cosmos DB
2327
- Azure DevOps
28+
- Catchpoint
29+
- Cloudflare
30+
- CockroachDB
2431
- Databricks
2532
- Datadog
33+
- Drone
34+
- DynamoDB
2635
- Dynatrace
2736
- GitLab
37+
- Grafana Enterprise Logs
38+
- Grafana Enterprise Metrics
39+
- Grafana Enterprise Traces
2840
- Honeycomb
2941
- Jira
30-
- k6 Cloud App
3142
- Looker
3243
- MongoDB
44+
- Netlify
3345
- New Relic
3446
- Oracle Database
47+
- PagerDuty
3548
- Salesforce
3649
- SAP HANA®
3750
- ServiceNow
@@ -40,7 +53,9 @@ Grafana Enterprise plugins, as of October 2023:
4053
- Splunk Infrastructure Monitoring
4154
- Sqlyze Datasource
4255
- Sumo Logic
56+
- Vercel
4357
- Wavefront
58+
- Zendesk
4459

4560
> [!NOTE]
4661
> Grafana Enterprise plugins are directly supported by Grafana Labs. For more information and an updated list, go to [Grafana Enterprise plugins](https://grafana.com/docs/plugins/).

articles/sap/automation/configure-system.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -319,7 +319,7 @@ This section defines the parameters used for defining the key vault information.
319319
> | ------------------------------------ | ------------------------------------------------------------------------------ | ------------ | ----------------------------------- |
320320
> | `user_keyvault_id` | Azure resource identifier for existing system credentials key vault | Optional | |
321321
> | `spn_keyvault_id` | Azure resource identifier for existing deployment credentials (SPNs) key vault | Optional | |
322-
> | `enable_purge_control_for_keyvaults` | Disables the purge protection for Azure key vaults | Optional | Only use for test environments. |
322+
> | `enable_purge_control_for_keyvaults` | Disables the purge protection for Azure Key Vaults | Optional | Only use for test environments. |
323323
324324
### Anchor virtual machine parameters
325325

articles/sap/automation/tutorial.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -873,7 +873,7 @@ For this example configuration, the resource group is `LAB-SECE-DEP05-INFRASTRUC
873873
vi sap-parameters.yaml
874874
```
875875
876-
1. Update the `bom_base_name` with the name BOM. Replace `<Deployer KeyVault Name>` with the name of the Azure key vault for the deployer resource group.
876+
1. Update the `bom_base_name` with the name BOM. Replace `<Deployer KeyVault Name>` with the name of the Azure Key Vault for the deployer resource group.
877877
878878
Your file should look similar to the following example configuration:
879879
@@ -918,7 +918,7 @@ For this example configuration, the resource group is `LAB-SECE-DEP05-INFRASTRUC
918918
"${@}"
919919
)
920920
921-
# Run the playbook to retrieve the ssh key from the Azure key vault
921+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
922922
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
923923
924924
# Run the playbook to perform the Operating System configuration
@@ -949,7 +949,7 @@ For this example configuration, the resource group is `LAB-SECE-DEP05-INFRASTRUC
949949
"${@}"
950950
)
951951
952-
# Run the playbook to retrieve the ssh key from the Azure key vault
952+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
953953
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
954954
955955
# Run the playbook to perform the Operating System configuration
@@ -1003,7 +1003,7 @@ playbook_options=(
10031003
"${@}"
10041004
)
10051005
1006-
# Run the playbook to retrieve the ssh key from the Azure key vault
1006+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
10071007
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
10081008
10091009
# Run the playbook to perform the Operating System configuration
@@ -1032,7 +1032,7 @@ playbook_options=(
10321032
"${@}"
10331033
)
10341034
1035-
# Run the playbook to retrieve the ssh key from the Azure key vault
1035+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
10361036
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
10371037
10381038
# Run the playbook to perform the SAP Specific Operating System configuration
@@ -1062,7 +1062,7 @@ playbook_options=(
10621062
"${@}"
10631063
)
10641064
1065-
# Run the playbook to retrieve the ssh key from the Azure key vault
1065+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
10661066
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
10671067
10681068
# Run the playbook to download the software from the SAP Library
@@ -1092,7 +1092,7 @@ playbook_options=(
10921092
"${@}"
10931093
)
10941094
1095-
# Run the playbook to retrieve the ssh key from the Azure key vault
1095+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
10961096
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
10971097
10981098
# Run the playbook to download the software from the SAP Library
@@ -1122,7 +1122,7 @@ playbook_options=(
11221122
"${@}"
11231123
)
11241124
1125-
# Run the playbook to retrieve the ssh key from the Azure key vault
1125+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
11261126
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
11271127
11281128
# Run the playbook to download the software from the SAP Library
@@ -1152,7 +1152,7 @@ playbook_options=(
11521152
"${@}"
11531153
)
11541154
1155-
# Run the playbook to retrieve the ssh key from the Azure key vault
1155+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
11561156
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
11571157
11581158
# Run the playbook to download the software from the SAP Library
@@ -1182,7 +1182,7 @@ playbook_options=(
11821182
"${@}"
11831183
)
11841184
1185-
# Run the playbook to retrieve the ssh key from the Azure key vault
1185+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
11861186
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
11871187
11881188
# Run the playbook to download the software from the SAP Library
@@ -1211,7 +1211,7 @@ playbook_options=(
12111211
"${@}"
12121212
)
12131213
1214-
# Run the playbook to retrieve the ssh key from the Azure key vault
1214+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
12151215
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
12161216
12171217
# Run the playbook to download the software from the SAP Library
@@ -1240,7 +1240,7 @@ playbook_options=(
12401240
"${@}"
12411241
)
12421242
1243-
# Run the playbook to retrieve the ssh key from the Azure key vault
1243+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
12441244
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
12451245
12461246
# Run the playbook to download the software from the SAP Library
@@ -1271,7 +1271,7 @@ playbook_options=(
12711271
"${@}"
12721272
)
12731273
1274-
# Run the playbook to retrieve the ssh key from the Azure key vault
1274+
# Run the playbook to retrieve the ssh key from the Azure Key Vault
12751275
ansible-playbook "${playbook_options[@]}" ~/Azure_SAP_Automated_Deployment/sap-automation/deploy/ansible/pb_get-sshkey.yaml
12761276
12771277
# Run the playbook to download the software from the SAP Library

0 commit comments

Comments
 (0)