Skip to content

Commit 45c0cad

Browse files
authored
Merge pull request #125309 from ArieHein/Spelling-53
Spelling Fixes
2 parents d169830 + 8e85df5 commit 45c0cad

12 files changed

+17
-17
lines changed

articles/event-grid/assign-custom-domain-name.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ For information configuring system and user-assigned identities using the Azure
6464
1. Use the following command to create an Azure Key Vault account:
6565

6666
```azurecli-interactive
67-
az keyvault create --name "<your-unique-keyvault-name>" --resource-group "<resource group name>" --location "centraluseaup"
67+
az keyvault create --name "<your-unique-keyvault-name>" --resource-group "<resource group name>" --location "centraluseuap"
6868
```
6969
2. Use the following command to import a certificate to the Azure Key Vault
7070
@@ -268,7 +268,7 @@ To prove your domain ownership, follow these steps:
268268
"type": "SystemAssigned"
269269
},
270270
"certificateInfo": {
271-
"keyVaultArmId": " /subscriptions/AZURESUBCRIPTIONID/resourceGroups/RESOURCEGROUPNAME/providers/Microsoft.KeyVault/vaults/KEYVAULTNAME",
271+
"keyVaultArmId": " /subscriptions/AZURESUBSCRIPTIONID/resourceGroups/RESOURCEGROUPNAME/providers/Microsoft.KeyVault/vaults/KEYVAULTNAME",
272272
"certificateName": "CERTIFICATENAME"
273273
}
274274
}

articles/event-grid/authenticate-with-namespaces-using-json-web-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ For information configuring system and user-assigned identities using the Azure
4949
1. Use the following command to create an Azure Key Vault account:
5050

5151
```azurecli-interactive
52-
az keyvault create --name "<your-unique-keyvault-name>" --resource-group "<resource group name>" --location "centraluseaup"
52+
az keyvault create --name "<your-unique-keyvault-name>" --resource-group "<resource group name>" --location "centraluseuap"
5353
```
5454
2. Use the following command to import a certificate to the Azure Key Vault
5555

articles/event-grid/custom-event-quickstart-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The first example uses Azure CLI. It gets the URL and key for the custom topic,
105105
### Azure CLI
106106
1. In the Azure portal, select **Cloud Shell**. The Cloud Shell opens in the bottom pane of the web browser.
107107

108-
:::image type="content" source="./media/custom-event-quickstart-portal/select-cloud-shell.png" alt-text="Screnshot that shows the selection of Cloud Shell button." lightbox="./media/custom-event-quickstart-portal/select-cloud-shell.png":::
108+
:::image type="content" source="./media/custom-event-quickstart-portal/select-cloud-shell.png" alt-text="Screenshot that shows the selection of Cloud Shell button." lightbox="./media/custom-event-quickstart-portal/select-cloud-shell.png":::
109109
1. If the Cloud Shell opens a PowerShell session, select **Switch to Bash** in the top-left corner of the Cloud Shell window. If not, continue to the next step.
110110

111111
:::image type="content" source="./media/custom-event-quickstart-portal/cloud-shell-bash.png" alt-text="Screenshot that shows the Cloud Shell with Bash selected in the top-left corner.":::

articles/event-grid/monitor-mqtt-delivery-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This article provides a reference of log and metric data collected to analyze th
3434

3535

3636
> [!NOTE]
37-
> Each subscription request increments the MQTT.RequestCount metric, while each topic filter within the subscription request increments the subscription operation metrics. For example, consider a subscription request that is sent with five different topic filters. Three of these topic filters were succeessfully processed while two of the topic filters failed to be processed. The following list represent the resulting increments to the metrics:
37+
> Each subscription request increments the MQTT.RequestCount metric, while each topic filter within the subscription request increments the subscription operation metrics. For example, consider a subscription request that is sent with five different topic filters. Three of these topic filters were successfully processed while two of the topic filters failed to be processed. The following list represent the resulting increments to the metrics:
3838
> - MQTT.RequestCount:1
3939
> - MQTT.SuccessfulSubscriptionOperations:3
4040
> - MQTT.FailedSubscriptionOperations:2

articles/event-grid/monitor-virtual-machine-changes-logic-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ Now add an [*action*](../logic-apps/logic-apps-overview.md#logic-app-concepts) s
222222

223223
1. Provide information about the email as specified in the following table:
224224

225-
![Screenshot that shows the workflow designer with dynamic content being addded to email subject line for a true condition.](./media/monitor-virtual-machine-changes-logic-app/logic-app-empty-email-action.png)
225+
![Screenshot that shows the workflow designer with dynamic content being added to email subject line for a true condition.](./media/monitor-virtual-machine-changes-logic-app/logic-app-empty-email-action.png)
226226

227227
> [!TIP]
228228
> To select output from the previous steps in your workflow, click inside an edit box so that the dynamic content list appears,

articles/event-hubs/event-hubs-dotnet-standard-getstarted-send.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ This section shows you how to create a .NET Core console application to send eve
186186
A batch of 3 events has been published.
187187
```
188188
> [!NOTE]
189-
> If you get an error "InvalidIssuer: Token issuer is invalid" when using Microsoft Entra authentication, it may be because the wrong Entra Tenant Id is being used. In you code replace'new DefaultAzureCredential()' with 'new DefaultAzureCredential(new DefaultAzureCredentialOptions {TenantId = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"})' to explictly specify Entra Tenant Id.
189+
> If you get an error "InvalidIssuer: Token issuer is invalid" when using Microsoft Entra authentication, it may be because the wrong Entra Tenant Id is being used. In you code replace'new DefaultAzureCredential()' with 'new DefaultAzureCredential(new DefaultAzureCredentialOptions {TenantId = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"})' to explicitly specify Entra Tenant Id.
190190
191191
192192
> [!IMPORTANT]

articles/event-hubs/schema-registry-dotnet-send-receive-quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ This section shows how to write a .NET Core console application that receives ev
266266
// connection string for the Azure Storage account
267267
const string blobStorageConnectionString = "AZURESTORAGECONNECTIONSTRING";
268268

269-
// name of the blob container that will be userd as a checkpoint store
269+
// name of the blob container that will be used as a checkpoint store
270270
const string blobContainerName = "BLOBCONTAINERNAME";
271271

272272
// Create a blob container client that the event processor will use

articles/external-attack-surface-management/modifying-inventory-assets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ You should modify assets from the inventory list page if you want to update nume
6464

6565
1. On the leftmost pane of your Microsoft Defender External Attack Surface Management (Defender EASM) resource, select **Inventory**.
6666

67-
2. Apply filters to produce your intended results. In this example, we're looking for domains that expire within 30 days that require renewal. The applied label helps you more quickly access any expiring domains to simplify the remediation process. You can apply as many filters as necessary to obtain the specific results that are needed. For more information on filters, see [Inventory filters overview](inventory-filters.md). For instances where you'd like to mark CVEs as non-applicable, the relevant dashbaord chart drilldown provides a link that directly routes you to this Inventory page with the correct filters applied.
67+
2. Apply filters to produce your intended results. In this example, we're looking for domains that expire within 30 days that require renewal. The applied label helps you more quickly access any expiring domains to simplify the remediation process. You can apply as many filters as necessary to obtain the specific results that are needed. For more information on filters, see [Inventory filters overview](inventory-filters.md). For instances where you'd like to mark CVEs as non-applicable, the relevant dashboard chart drilldown provides a link that directly routes you to this Inventory page with the correct filters applied.
6868

6969
![Screenshot that shows the inventory list view with the Add filter dropdown opened to display the query editor.](media/labels-2.png)
7070

articles/firewall/monitor-firewall-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ The latency probe currently uses Microsoft's Ping Mesh technology, which is base
7676
- Recommended latency threshold: A recommended guideline is that latency should not exceed 3x the baseline. If this threshold is crossed, further investigation is recommended.
7777
- Check the rule limit: Ensure that the network rules are within the 20K rule limit. Exceeding this limit can affect performance.
7878
- New application onboarding: Check for any newly onboarded applications that could be adding significant load or causing latency issues.
79-
- Support request: If you observe continuous latency degredation that does not align with expected behavior, consider filing a support ticket for further assistance.
79+
- Support request: If you observe continuous latency degradation that does not align with expected behavior, consider filing a support ticket for further assistance.
8080

8181
:::image type="content" source="media/metrics/latency-probe.png" alt-text="Screenshot showing the Azure Firewall Latency Probe metric.":::
8282

articles/firewall/premium-migrate.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -168,15 +168,15 @@ function TransformPolicyToPremium {
168168
Write-Host "Populating rules in new policy"
169169
foreach ($ruleCollectionGroup in $Policy.RuleCollectionGroups) {
170170
$ruleResource = Get-AzResource -ResourceId $ruleCollectionGroup.Id
171-
$ruleToTransfom = Get-AzFirewallPolicyRuleCollectionGroup -AzureFirewallPolicy $Policy -Name $ruleResource.Name
171+
$ruleToTransform = Get-AzFirewallPolicyRuleCollectionGroup -AzureFirewallPolicy $Policy -Name $ruleResource.Name
172172
$ruleCollectionGroup = @{
173173
FirewallPolicyObject = $premiumPolicy
174-
Priority = $ruleToTransfom.Properties.Priority
175-
Name = $ruleToTransfom.Name
174+
Priority = $ruleToTransform.Properties.Priority
175+
Name = $ruleToTransform.Name
176176
}
177177
178-
if ($ruleToTransfom.Properties.RuleCollection.Count) {
179-
$ruleCollectionGroup["RuleCollection"] = $ruleToTransfom.Properties.RuleCollection
178+
if ($ruleToTransform.Properties.RuleCollection.Count) {
179+
$ruleCollectionGroup["RuleCollection"] = $ruleToTransform.Properties.RuleCollection
180180
}
181181
182182
Set-AzFirewallPolicyRuleCollectionGroup @ruleCollectionGroup

0 commit comments

Comments
 (0)