Skip to content

Commit 43f9fb6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-gh
2 parents 29c15e2 + 898060c commit 43f9fb6

32 files changed

+660
-270
lines changed

articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-configure-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,8 @@ The application uses the [Implicit Grant Flow](../../develop/v2-oauth2-implicit-
9898

9999
1. Replace the following values with the values from the Azure portal:
100100
- Find the `Enter_the_Application_Id_Here` value and replace it with the **Application ID (clientId)** of the app you registered in the Microsoft Entra admin center.
101-
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is *caseyjensen@onmicrosoft.com*, the value you should enter is *casyjensen*.
102-
1. Save the file.
101+
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is `contoso.onmicrosoft.com`, use `contoso`. If you don't have your tenant name, [learn how to read your tenant details](how-to-create-customer-tenant-portal.md#get-the-customer-tenant-details).
102+
2. Save the file.
103103
104104
## Adding code to the redirection file
105105

articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-prepare-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.date: 06/09/2023
1818

1919
This tutorial series demonstrates how to build a vanilla JavaScript single-page application (SPA) and prepare it for authentication using the Microsoft Entra admin center. You'll use the [Microsoft Authentication Library for JavaScript](/javascript/api/overview/msal-overview) library to authenticate your app with your Azure Active Directory (Azure AD) for customers tenant. Finally, you'll run the application and test the sign-in and sign-out experiences.
2020

21-
In this tutorial, you'll;
21+
In this tutorial;
2222

2323
> [!div class="checklist"]
2424
> * Register a SPA in the Microsoft Entra admin center, and record its identifiers

articles/active-directory/external-identities/customers/how-to-single-page-application-react-prepare-app.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -150,9 +150,10 @@ Identity related **npm** packages must be installed in the project to enable use
150150
// };
151151
```
152152
153-
1. Replace the following values with the values from the Azure admin center:
154-
- Replace `Enter_the_Application_Id_Here` with the **Application (client) ID** value that was recorded earlier from the **Overview** page of the registered application.
155-
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is *[email protected]*, the value you should enter is *casyjensen*.
153+
1. Replace the following values with the values from the Azure portal:
154+
- Find the `Enter_the_Application_Id_Here` value and replace it with the **Application ID (clientId)** of the app you registered in the Microsoft Entra admin center.
155+
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is `contoso.onmicrosoft.com`, use `contoso`. If you don't have your tenant name, [learn how to read your tenant details](how-to-create-customer-tenant-portal.md#get-the-customer-tenant-details).
156+
2. Save the file.
156157
157158
## Modify *index.js* to include the authentication provider
158159

articles/azure-resource-manager/management/azure-services-resource-providers.md

Lines changed: 34 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,10 @@
22
title: Resource providers by Azure services
33
description: Lists all resource provider namespaces for Azure Resource Manager and shows the Azure service for that namespace.
44
ms.topic: conceptual
5-
ms.date: 02/28/2023
5+
ms.date: 07/14/2023
66
ms.custom: ignite-2022, devx-track-arm-template
7+
content_well_notification:
8+
- AI-contribution
79
---
810

911
# Resource providers for Azure services
@@ -186,26 +188,26 @@ The resources providers that are marked with **- registered** are registered by
186188

187189
## Registration
188190

189-
The resources providers in the preceding section that are marked with **- registered** are registered by default for your subscription. To use the other resource providers, you must [register them](resource-providers-and-types.md). However, many resource providers are registered for you when you take certain actions. For example, if you create a resource through the portal, the portal automatically registers any unregistered resource providers that are needed. When deploy resources through an [Azure Resource Manager template](../templates/overview.md), any required resource providers are also registered.
191+
Resource providers marked with **- registered** in the previous section are automatically registered for your subscription. For other resource providers, you need to [register them](resource-providers-and-types.md). However, many resource providers are registered automatically when you perform specific actions. For example, when you create resources through the portal or by deploying an [Azure Resource Manager template](../templates/overview.md), Azure Resource Manager automatically registers any required unregistered resource providers.
190192

191193
> [!IMPORTANT]
192-
> Only register a resource provider when you're ready to use it. The registration step enables you to maintain least privileges within your subscription. A malicious user can't use resource providers that aren't registered.
194+
> Register a resource provider only when you're ready to use it. This registration step helps maintain least privileges within your subscription. A malicious user can't use unregistered resource providers.
193195
>
194-
> When you register resource providers that aren't needed, you may see apps in your Azure Active Directory tenant that you don't recognize. Microsoft adds the app for a resource provider when you register it. These applications are typically added by Windows Azure Service Management API. To avoid having unnecessary apps in your tenant, only register resource providers that are needed.
196+
> Registering unnecessary resource providers may result in unrecognized apps appearing in your Azure Active Directory tenant. Microsoft adds the app for a resource provider when you register it. These apps are typically added by the Windows Azure Service Management API. To prevent unnecessary apps in your tenant, only register needed resource providers.
195197
196198
## Find resource provider
197199

198-
If you have existing infrastructure in Azure, but aren't sure which resource provider is used, you can use either Azure CLI or PowerShell to find the resource provider. Specify the name of the resource group that contains the resources to find.
200+
To identify resource providers used for your existing Azure infrastructure, list the deployed resources. Specify the resource group containing the resources.
199201

200202
The following example uses Azure CLI:
201203

202204
```azurecli-interactive
203-
az resource list -g examplegroup
205+
az resource list --resource-group examplegroup
204206
```
205207

206208
The results include the resource type. The resource provider namespace is the first part of the resource type. The following example shows the **Microsoft.KeyVault** resource provider.
207209

208-
```json
210+
```output
209211
[
210212
{
211213
...
@@ -222,13 +224,37 @@ Get-AzResource -ResourceGroupName examplegroup
222224

223225
The results include the resource type. The resource provider namespace is the first part of the resource type. The following example shows the **Microsoft.KeyVault** resource provider.
224226

225-
```azurepowershell
227+
```output
226228
Name : examplekey
227229
ResourceGroupName : examplegroup
228230
ResourceType : Microsoft.KeyVault/vaults
229231
...
230232
```
231233

234+
The following example uses Python:
235+
236+
```python
237+
import os
238+
from azure.identity import DefaultAzureCredential
239+
from azure.mgmt.resource import ResourceManagementClient
240+
241+
subscription_id = os.environ["AZURE_SUBSCRIPTION_ID"]
242+
credential = DefaultAzureCredential()
243+
resource_client = ResourceManagementClient(credential, subscription_id)
244+
245+
resource_group_name = "examplegroup"
246+
resources = resource_client.resources.list_by_resource_group(resource_group_name)
247+
248+
for resource in resources:
249+
print(resource.type)
250+
```
251+
252+
The results list the resource type. The resource provider namespace is the first part of the resource type. The following example shows the **Microsoft.KeyVault** resource provider.
253+
254+
```output
255+
Microsoft.KeyVault/vaults
256+
```
257+
232258
## Next steps
233259

234260
For more information about resource providers, including how to register a resource provider, see [Azure resource providers and types](resource-providers-and-types.md).

articles/azure-vmware/attach-azure-netapp-files-to-azure-vmware-solution-hosts.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Attach Azure NetApp Files datastores to Azure VMware Solution hosts
33
description: Learn how to create Azure NetApp Files-based NFS datastores for Azure VMware Solution hosts.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 02/28/2023
6+
ms.date: 07/14/2023
77
ms.custom: "references_regions, engagement-fy23"
88
---
99

@@ -60,6 +60,7 @@ Azure NetApp Files datastores for Azure VMware Solution are currently supported
6060
* Japan West
6161
* North Central US
6262
* North Europe
63+
* Qatar Central
6364
* South Africa North
6465
* South Central US
6566
* Southeast Asia
@@ -71,7 +72,7 @@ Azure NetApp Files datastores for Azure VMware Solution are currently supported
7172
* West Europe
7273
* West US
7374
* West US 2
74-
75+
* West US 3
7576

7677
## Performance best practices
7778

articles/chaos-studio/chaos-studio-fault-library.md

Lines changed: 104 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -349,7 +349,7 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
349349
```
350350

351351
### Limitations
352-
* **Windows**: Service-friendly names aren't supported. Use `sc.exe query` in the command prompt to explore service names.
352+
* **Windows**: Display names for services aren't supported. Use `sc.exe query` in the command prompt to explore service names.
353353
* **Linux**: Other service types besides systemd, like sysvinit, aren't supported.
354354

355355
## Time change
@@ -403,7 +403,7 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
403403
| Prerequisites | None. |
404404
| Urn | urn:csci:microsoft:agent:killProcess/1.0 |
405405
| Parameters (key, value) | |
406-
| processName | Name of a process running on a VM (without the .exe). |
406+
| processName | Name of a process to continuously kill (without the .exe). The process does not need to be running when the fault begins executing. |
407407
| killIntervalInMilliseconds | Amount of time the fault waits in between successive kill attempts in milliseconds. |
408408
| virtualMachineScaleSetInstances | An array of instance IDs when this fault is applied to a virtual machine scale set. Required for virtual machine scale sets. |
409409

@@ -536,6 +536,11 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
536536
}
537537
```
538538

539+
### Limitations
540+
541+
* The agent-based network faults currently only support IPv4 addresses.
542+
543+
539544
## Network disconnect
540545

541546
| Property | Value |
@@ -580,8 +585,11 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
580585
}
581586
```
582587

583-
> [!WARNING]
584-
> The network disconnect fault only affects new connections. Existing *active* connections continue to persist. You can restart the service or process to force connections to break.
588+
### Limitations
589+
590+
* The agent-based network faults currently only support IPv4 addresses.
591+
* The network disconnect fault only affects new connections. Existing active connections continue to persist. You can restart the service or process to force connections to break.
592+
* On Windows, the network disconnect fault currently only works with TCP or UDP packets.
585593

586594
## Network disconnect with firewall rule
587595

@@ -627,6 +635,63 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
627635
}
628636
```
629637

638+
### Limitations
639+
640+
* The agent-based network faults currently only support IPv4 addresses.
641+
642+
## Network packet loss
643+
644+
| Property | Value |
645+
|-|-|
646+
| Capability name | NetworkPacketLoss-1.0 |
647+
| Target type | Microsoft-Agent |
648+
| Supported OS types | Windows, Linux |
649+
| Description | Introduces packet loss for outbound traffic at a specified rate, between 0.0 (no packets lost) and 1.0 (all packets lost). This can help simulate scenarios like network congestion or network hardware issues. |
650+
| Prerequisites | Agent must run as administrator. If the agent is installed as a VM extension, it runs as administrator by default. |
651+
| Urn | urn:csci:microsoft:agent:networkPacketLoss/1.0 |
652+
| Parameters (key, value) | |
653+
| lossRate | The rate at which packets matching the destination filters will be lost, ranging from 0.0 to 1.0. |
654+
| virtualMachineScaleSetInstances | An array of instance IDs when this fault is applied to a virtual machine scale set. Required for virtual machine scale sets. |
655+
| destinationFilters | Delimited JSON array of packet filters (parameters below) that define which outbound packets to target for fault injection. Maximum of three.|
656+
| address | IP address that indicates the start of the IP range. |
657+
| subnetMask | Subnet mask for the IP address range. |
658+
| portLow | (Optional) Port number of the start of the port range. |
659+
| portHigh | (Optional) Port number of the end of the port range. |
660+
661+
### Sample JSON
662+
663+
```json
664+
{
665+
"name": "branchOne",
666+
"actions": [
667+
{
668+
"type": "continuous",
669+
"name": "urn:csci:microsoft:agent:networkPacketLoss/1.0",
670+
"parameters": [
671+
{
672+
"key": "destinationFilters",
673+
"value": "[{\"address\":\"23.45.229.97\",\"subnetMask\":\"255.255.255.224\",\"portLow\":5000,\"portHigh\":5200}]"
674+
},
675+
{
676+
"key": "lossRate",
677+
"value": "0.5"
678+
},
679+
{
680+
"key": "virtualMachineScaleSetInstances",
681+
"value": "[0,1,2]"
682+
}
683+
],
684+
"duration": "PT10M",
685+
"selectorid": "myResources"
686+
}
687+
]
688+
}
689+
```
690+
691+
### Limitations
692+
693+
* The agent-based network faults currently only support IPv4 addresses.
694+
630695
## Azure Resource Manager virtual machine shutdown
631696
| Property | Value |
632697
|-|-|
@@ -663,7 +728,7 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
663728

664729
## Azure Resource Manager virtual machine scale set instance shutdown
665730

666-
This fault has two available versions that you can use, Version 1.0 and Version 2.0.
731+
This fault has two available versions that you can use, Version 1.0 and Version 2.0. The main difference is that Version 2.0 allows you to filter by availability zones, only shutting down instances within a specified zone or zones.
667732

668733
### Version 1.0
669734

@@ -864,7 +929,7 @@ Currently, only virtual machine scale sets configured with the **Uniform** orche
864929
"parameters": [
865930
{
866931
"key": "jsonSpec",
867-
"value": "{\"action\":\"pod-failure\",\"mode\":\"one\",\"duration\":\"30s\",\"selector\":{\"labelSelectors\":{\"app.kubernetes.io\/component\":\"tikv\"}}}"
932+
"value": "{\"action\":\"pod-failure\",\"mode\":\"one\",\"selector\":{\"labelSelectors\":{\"app.kubernetes.io\/component\":\"tikv\"}}}"
868933
}
869934
],
870935
"selectorid": "myResources"
@@ -932,7 +997,7 @@ Currently, only virtual machine scale sets configured with the **Uniform** orche
932997
"parameters": [
933998
{
934999
"key": "jsonSpec",
935-
"value": "{\"action\":\"latency\",\"mode\":\"one\",\"selector\":{\"labelSelectors\":{\"app\":\"etcd\"}},\"volumePath\":\"\/var\/run\/etcd\",\"path\":\"\/var\/run\/etcd\/**\/*\",\"delay\":\"100ms\",\"percent\":50,\"duration\":\"400s\"}"
1000+
"value": "{\"action\":\"latency\",\"mode\":\"one\",\"selector\":{\"labelSelectors\":{\"app\":\"etcd\"}},\"volumePath\":\"\/var\/run\/etcd\",\"path\":\"\/var\/run\/etcd\/**\/*\",\"delay\":\"100ms\",\"percent\":50}"
9361001
}
9371002
],
9381003
"selectorid": "myResources"
@@ -1034,7 +1099,7 @@ Currently, only virtual machine scale sets configured with the **Uniform** orche
10341099
"parameters": [
10351100
{
10361101
"key": "jsonSpec",
1037-
"value": "{\"mode\":\"all\",\"selector\":{\"labelSelectors\":{\"app\":\"nginx\"}},\"target\":\"Request\",\"port\":80,\"method\":\"GET\",\"path\":\"\/api\",\"abort\":true,\"duration\":\"5m\",\"scheduler\":{\"cron\":\"@every 10m\"}}"
1102+
"value": "{\"mode\":\"all\",\"selector\":{\"labelSelectors\":{\"app\":\"nginx\"}},\"target\":\"Request\",\"port\":80,\"method\":\"GET\",\"path\":\"\/api\",\"abort\":true,\"scheduler\":{\"cron\":\"@every 10m\"}}"
10381103
}
10391104
],
10401105
"selectorid": "myResources"
@@ -1089,8 +1154,8 @@ Currently, only virtual machine scale sets configured with the **Uniform** orche
10891154
| Parameters (key, value) | |
10901155
| name | A unique name for the security rule that's created. The fault fails if another rule already exists on the NSG with the same name. Must begin with a letter or number. Must end with a letter, number, or underscore. May contain only letters, numbers, underscores, periods, or hyphens. |
10911156
| protocol | Protocol for the security rule. Must be Any, TCP, UDP, or ICMP. |
1092-
| sourceAddresses | A string that represents a JSON-delimited array of CIDR-formatted IP addresses. Can also be a service tag name for an inbound rule, for example, `AppService`. An asterisk `*` can also be used to match all source IPs. |
1093-
| destinationAddresses | A string that represents a JSON-delimited array of CIDR-formatted IP addresses. Can also be a service tag name for an outbound rule, for example, `AppService`. An asterisk `*` can also be used to match all destination IPs. |
1157+
| sourceAddresses | A string that represents a JSON-delimited array of CIDR-formatted IP addresses. Can also be a [service tag name](../virtual-network/service-tags-overview.md) for an inbound rule, for example, `AppService`. An asterisk `*` can also be used to match all source IPs. |
1158+
| destinationAddresses | A string that represents a JSON-delimited array of CIDR-formatted IP addresses. Can also be a [service tag name](../virtual-network/service-tags-overview.md) for an outbound rule, for example, `AppService`. An asterisk `*` can also be used to match all destination IPs. |
10941159
| action | Security group access type. Must be either Allow or Deny. |
10951160
| destinationPortRanges | A string that represents a JSON-delimited array of single ports and/or port ranges, such as 80 or 1024-65535. |
10961161
| sourcePortRanges | A string that represents a JSON-delimited array of single ports and/or port ranges, such as 80 or 1024-65535. |
@@ -1456,3 +1521,32 @@ Currently, only virtual machine scale sets configured with the **Uniform** orche
14561521
]
14571522
}
14581523
```
1524+
1525+
## App Service Stop
1526+
1527+
| Property | Value |
1528+
| ---- | --- |
1529+
| Capability name | Stop-1.0 |
1530+
| Target type | Microsoft-AppService |
1531+
| Description | Stops the targeted App Service applications, then restarts them at the end of the fault duration. This applies to resources of the "Microsoft.Web/sites" type, including App Service, API Apps, Mobile Apps, and Azure Functions. |
1532+
| Prerequisites | None. |
1533+
| Urn | urn:csci:microsoft:appService:stop/1.0 |
1534+
| Fault type | Continuous. |
1535+
| Parameters (key, value) | None. |
1536+
1537+
### Sample JSON
1538+
1539+
```json
1540+
{
1541+
"name": "branchOne",
1542+
"actions": [
1543+
{
1544+
"type": "continuous",
1545+
"name": "urn:csci:microsoft:appService:stop/1.0",
1546+
"duration": "PT10M",
1547+
"parameters":[],
1548+
"selectorid": "myResources"
1549+
}
1550+
]
1551+
}
1552+
```

articles/chaos-studio/chaos-studio-fault-providers.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,3 +27,4 @@ The following table lists the supported resource types for faults, the target ty
2727
| Microsoft.Insights/autoscalesettings (service-direct) | Microsoft-AutoScaleSettings | Web Plan Contributor |
2828
| Microsoft.KeyVault/vaults (service-direct) | Microsoft-KeyVault | Azure Key Vault Contributor |
2929
| Microsoft.Network/networkSecurityGroups (service-direct) | Microsoft-NetworkSecurityGroup | Network Contributor |
30+
| Microsoft.Web/sites (service-direct) | Microsoft-AppService | Website Contributor |

articles/databox-online/azure-stack-edge-deploy-aks-on-azure-stack-edge.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: alkohli
77
ms.service: databox
88
ms.subservice: edge
99
ms.topic: how-to
10-
ms.date: 02/16/2023
10+
ms.date: 07/11/2023
1111
ms.author: alkohli
1212
# Customer intent: As an IT admin, I need to understand how to deploy and configure Azure Kubernetes service on Azure Stack Edge.
1313
---
@@ -48,7 +48,7 @@ Depending on the workloads you intend to deploy, you may need to ensure the foll
4848

4949
```azurepowershell
5050
az login
51-
az ad sp show --id 'bc313c14-387c-4e7d-a58e-70417303ee3b' --query id -o tsv
51+
az ad sp show --id bc313c14-387c-4e7d-a58e-70417303ee3b --query id -o tsv
5252
```
5353

5454
Here's a sample output using the Azure CLI. You can run the same commands via the Cloud Shell in the Azure portal.

0 commit comments

Comments
 (0)