Skip to content

Commit 4fd86ea

Browse files
authored
Merge pull request #108167 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents e878284 + 6622b95 commit 4fd86ea

File tree

8 files changed

+13
-8
lines changed

8 files changed

+13
-8
lines changed

articles/active-directory/saas-apps/paloaltoadmin-tutorial.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,8 @@ To configure Azure AD single sign-on with Palo Alto Networks - Admin UI, perform
114114

115115
> [!NOTE]
116116
> These values are not real. Update these values with the actual Sign-On URL, Identifier and Reply URL. Contact [Palo Alto Networks - Admin UI Client support team](https://support.paloaltonetworks.com/support) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
117+
>
118+
> Port 443 is required on the **Identifier** and the **Reply URL** as these values are hardcoded into the Palo Alto Firewall. Removing the port number will result in an error during login if removed.
117119

118120
5. Palo Alto Networks - Admin UI application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the **User Attributes** section on application integration page. On the **Set up Single Sign-On with SAML** page, click **Edit** button to open **User Attributes** dialog.
119121

articles/data-factory/connector-azure-sql-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ For Copy activity, this Azure SQL Database connector supports these functions:
4040
>Azure SQL Database [Always Encrypted](https://docs.microsoft.com/sql/relational-databases/security/encryption/always-encrypted-database-engine?view=azuresqldb-current) isn't supported by this connector now. To work around, you can use a [generic ODBC connector](connector-odbc.md) and a SQL Server ODBC driver via a self-hosted integration runtime. Follow [this guidance](https://docs.microsoft.com/sql/connect/odbc/using-always-encrypted-with-the-odbc-driver?view=azuresqldb-current) with ODBC driver download and connection string configurations.
4141
4242
> [!IMPORTANT]
43-
> If you copy data by using the Azure Data Factory integration runtime, configure an [Azure SQL Server firewall](https://msdn.microsoft.com/library/azure/ee621782.aspx#ConnectingFromAzure) so that Azure services can access the server.
43+
> If you copy data by using the Azure Data Factory integration runtime, configure an [Azure SQL Server firewall](https://docs.microsoft.com/azure/sql-database/sql-database-firewall-configure) so that Azure services can access the server.
4444
> If you copy data by using a self-hosted integration runtime, configure the Azure SQL Server firewall to allow the appropriate IP range. This range includes the machine's IP that's used to connect to Azure SQL Database.
4545
4646
## Get started

articles/data-factory/connector-http.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ The following properties are supported for HTTP under `location` settings in for
175175
| Property | Description | Required |
176176
| ----------- | ------------------------------------------------------------ | -------- |
177177
| type | The type property under `location` in dataset must be set to **HttpServerLocation**. | Yes |
178-
| relativeUrl | A relative URL to the resource that contains the data. The HTTP connector copies data from the combined URL: `[URL specified in linked service]/[relative URL specified in dataset]`. | No |
178+
| relativeUrl | A relative URL to the resource that contains the data. The HTTP connector copies data from the combined URL: `[URL specified in linked service][relative URL specified in dataset]`. | No |
179179

180180
> [!NOTE]
181181
> The supported HTTP request payload size is around 500 KB. If the payload size you want to pass to your web endpoint is larger than 500 KB, consider batching the payload in smaller chunks.

articles/load-balancer/concepts-limitations.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,11 @@ Basic Load Balancers have limited scope (availability set) can only scale up to
4545
* **Load-balancing rules**: Load-Balancing rules are the ones that tell the Load Balancer what needs to be done when.
4646
* **Inbound NAT rules**: An Inbound NAT rule forwards traffic from a specific port of a specific frontend IP address to a specific port of a specific backend instance inside the virtual network. **[Port forwarding](https://docs.microsoft.com/azure/load-balancer/tutorial-load-balancer-port-forwarding-portal)** is done by the same hash-based distribution as load balancing. Common scenarios for this capability are Remote Desktop Protocol (RDP) or Secure Shell (SSH) sessions to individual VM instances inside an Azure Virtual Network. You can map multiple internal endpoints to ports on the same front-end IP address. You can use the front-end IP addresses to remotely administer your VMs without an additional jump box.
4747
* **Outbound rules**: An **[outbound rule](https://docs.microsoft.com/azure/load-balancer/load-balancer-outbound-rules-overview)** configures outbound Network Address Translation (NAT) for all virtual machines or instances identified by the backend pool of your Standard Load Balancer to be translated to the frontend.
48-
Basic Load Balancer does not support Outbound Rules.
49-
![Azure Load Balancer](./media/load-balancer-overview/load-balancer-overview.png)
48+
49+
Basic Load Balancer does not support Outbound Rules.
50+
51+
![Azure Load Balancer](./media/load-balancer-overview/load-balancer-overview.png)
52+
* **Transport protocols**: Load Balancer doesn't support ICMP; ICMP pings to a public-facing load balancer will time out. To ping your public-facing load balancer, use TCP Ping
5053

5154
## <a name = "load-balancer-concepts"></a>Load Balancer concepts
5255

articles/machine-learning/how-to-create-register-datasets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ workspace = Workspace.from_config()
9797
datastore = Datastore.get(workspace, datastore_name)
9898

9999
# create a TabularDataset from 3 paths in datastore
100-
datastore_paths = [(datastore, 'ather/2018/11.csv'),
100+
datastore_paths = [(datastore, 'weather/2018/11.csv'),
101101
(datastore, 'weather/2018/12.csv'),
102102
(datastore, 'weather/2019/*.csv')]
103103
weather_ds = Dataset.Tabular.from_delimited_files(path=datastore_paths)

articles/private-link/private-link-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Azure Private Link provides the following benefits:
5858
| |Azure Service Bus | All public regions | Preview |
5959
| |Azure Relay | All public regions | Preview |
6060
| |Azure Event Grid| All public regions | Preview <br/> [Learn more](https://docs.microsoft.com/azure/event-grid/network-security) |
61-
| |Azure Web Apps | All public regions | Preview <br/> [Learn more](https://docs.microsoft.com/azure/app-service/networking/private-endpoint) |
61+
| |Azure Web Apps | EAST US, WEST US2 | Preview <br/> [Learn more](https://docs.microsoft.com/azure/app-service/networking/private-endpoint) |
6262

6363
For the most up-to-date notifications, check the [Azure Virtual Network updates page](https://azure.microsoft.com/updates/?product=virtual-network).
6464

articles/virtual-machines/windows/dedicated-hosts-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ Tags : {}
163163

164164
## Add an existing VM
165165

166-
You can add an exiting VM to a dedicated host, but the VM must first be Stop\Deallocated. Before you move a VM to a dedicated host, make sure that the VM configuration is supported:
166+
You can add an existing VM to a dedicated host, but the VM must first be Stop\Deallocated. Before you move a VM to a dedicated host, make sure that the VM configuration is supported:
167167

168168
- The VM size must be in the same size family as the dedicated host. For example, if your dedicated host is DSv3, then the VM size could be Standard_D4s_v3, but it could not be a Standard_A4_v2.
169169
- The VM needs to be located in same region as the dedicated host.

articles/virtual-network/ddos-protection-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Azure DDoS protection, combined with application design best practices, provide
3131
|Metrics & alerts |No |Real time attack metrics & diagnostic logs via Azure monitor |
3232
|Mitigation reports |No |Post attack mitigation reports |
3333
|Mitigation flow logs |No |NRT log stream for SIEM integration |
34-
|Mitigation policy customizations |No |Engage DDoS Experts |
34+
|Mitigation policy customization |No |Engage DDoS Experts |
3535
|Support |Best effort |Access to DDoS Experts during an active attack|
3636
|SLA |Azure Region |Application guarantee & cost protection |
3737
|Pricing |Free |Monthly & usage based |

0 commit comments

Comments
 (0)