Skip to content

Commit 43435a0

Browse files
authored
Merge pull request #192633 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 58c8991 + a270746 commit 43435a0

File tree

4 files changed

+6
-5
lines changed

4 files changed

+6
-5
lines changed

articles/iot-edge/how-to-connect-downstream-iot-edge-device.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -576,13 +576,13 @@ Learn more about the [Defender for IoT micro agent](../defender-for-iot/device-b
576576
577577
1. Open a terminal on the leaf device.
578578
579-
1. Use the following command to place the connection string encoded in utf-8 in the Defender for Cloud agent directory into the file `connection_string.txt` in the following path: `/var/defender_iot_micro_agent/connection_string.txt`:
579+
1. Use the following command to place the connection string encoded in utf-8 in the Defender for Cloud agent directory into the file `connection_string.txt` in the following path: `/etc/defender_iot_micro_agent/connection_string.txt`:
580580
581581
```bash
582-
sudo bash -c 'echo "<connection string>" > /var/defender_iot_micro_agent/connection_string.txt'
582+
sudo bash -c 'echo "<connection string>" > /etc/defender_iot_micro_agent/connection_string.txt'
583583
```
584584
585-
The `connection_string.txt` should now be located in the following path location `/var/defender_iot_micro_agent/connection_string.txt`.
585+
The `connection_string.txt` should now be located in the following path location `/etc/defender_iot_micro_agent/connection_string.txt`.
586586
587587
1. Restart the service using this command:
588588

articles/machine-learning/how-to-enable-studio-virtual-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ In this article, you learn how to:
7171
* When the storage account is in the VNet, there are extra validation requirements when using studio:
7272

7373
* If the storage account uses a __service endpoint__, the workspace private endpoint and storage service endpoint must be in the same subnet of the VNet.
74-
* If the storage account uses a __private endpoint__, the workspace private endpoint and storage service endpoint must be in the same VNet. In this case, they can be in different subnets.
74+
* If the storage account uses a __private endpoint__, the workspace private endpoint and storage private endpoint must be in the same VNet. In this case, they can be in different subnets.
7575

7676
### Designer sample pipeline
7777

articles/virtual-network-manager/concept-network-manager-scope.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ In this article, you'll learn about how Azure Virtual Network Manager uses the c
3737
A *scope* within Azure Virtual Network Manager is a set of resources where features can be applied to. When specifying a scope, you're limiting the access to which Network Manager can manage resources for. The value for the scope can be at the management group level or at the subscription level. See [Azure management groups](../governance/management-groups/overview.md), to learn how to manage your resource hierarchy. When you select a management group as the scope, all child resources are included within the scope.
3838

3939
> [!NOTE]
40-
> You can't create multiple Azure Virtual Network Manager with an overlapping scope of the same hierarchy and the same features selected.
40+
> You can't create multiple Azure Virtual Network Manager instances with an overlapping scope of the same hierarchy and the same features selected.
4141
>
4242
4343
## Features

includes/front-door-limits.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,5 +87,6 @@
8787
* Maximum rules engine action header value character: 640 characters.
8888
* Maximum rules engine condition header value character: 256 characters.
8989
* Maximum ETag header size: 128 bytes
90+
* Maximum endhpoint name for Standard and Premium: 46 characters.
9091

9192
For more information about limits that apply to Rules Engine configurations, see [Rules Engine terminology](../articles/frontdoor/front-door-rules-engine.md#terminology)

0 commit comments

Comments
 (0)