Skip to content

Commit 50ffe29

Browse files
authored
Merge pull request #268507 from AbhishekMallick-MS/release-files-vaulted-backup
Dirty PR
2 parents 5937092 + 5d52035 commit 50ffe29

File tree

114 files changed

+1890
-2424
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

114 files changed

+1890
-2424
lines changed

.openpublishing.redirection.app-service.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2659,6 +2659,21 @@
26592659
"source_path": "articles/app-service/quickstart-dotnet-framework.md",
26602660
"redirect_url": "/azure/app-service/quickstart-dotnetcore?tabs=netframework48",
26612661
"redirect_document_id": false
2662+
},
2663+
{
2664+
"source_path": "articles/app-service/quickstart-arm-template-uiex.md",
2665+
"redirect_url": "/azure/app-service/quickstart-arm-template",
2666+
"redirect_document_id": true
2667+
},
2668+
{
2669+
"source_path": "articles/app-service/quickstart-dotnetcore-uiex.md",
2670+
"redirect_url": "/azure/app-service/quickstart-dotnetcore",
2671+
"redirect_document_id": true
2672+
},
2673+
{
2674+
"source_path": "articles/app-service/quickstart-java-uiex.md",
2675+
"redirect_url": "/azure/app-service/quickstart-java",
2676+
"redirect_document_id": true
26622677
}
26632678
]
26642679
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6750,6 +6750,11 @@
67506750
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
67516751
"redirect_document_id": false
67526752
},
6753+
{
6754+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-blob-python.md",
6755+
"redirect_url": "/azure/search/samples-python",
6756+
"redirect_document_id": false
6757+
},
67536758
{
67546759
"source_path_from_root": "/articles/search/semantic-ranking.md",
67556760
"redirect_url": "/azure/search/semantic-search-overview",

articles/ai-services/cognitive-services-virtual-networks.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ Virtual networks are supported in [regions where Azure AI services are available
5959
> - `AzureResourceManager`
6060
> - `CognitiveServicesManagement`
6161
> - `CognitiveServicesFrontEnd`
62+
> - `Storage` (Speech Studio only)
6263
6364
## Change the default network access rule
6465

articles/ai-services/speech-service/includes/language-support/multilingual-voices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ ms.author: v-baolianzou
1717

1818
<sup>2</sup> The neural voice is a multilingual voice in Azure AI Speech. All multilingual voices (except `en-US-JennyMultilingualNeural`) can speak in the language in default locale of the input text without [using SSML](../../speech-synthesis-markup-voice.md#adjust-speaking-languages). However, you can still use the `<lang xml:lang>` element to adjust the speaking accent of each language to set preferred accent such as British accent (`en-GB`) for English. Check the [full list](https://speech.microsoft.com/portal/voicegallery) of supported locales through SSML.
1919

20-
<sup>3</sup> The OpenAI text to speech voices in Azure AI Speech are in public preview and only available in North Central US (`northcentralus`) and Sweden Central (`swedencentral`).
20+
<sup>3</sup> The OpenAI text to speech voices in Azure AI Speech are in public preview and only available in North Central US (`northcentralus`) and Sweden Central (`swedencentral`). Locales not listed for OpenAI voices aren't supported by design.

articles/aks/howto-deploy-java-liberty-app.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -59,23 +59,23 @@ The following steps guide you to create a Liberty runtime on AKS. After completi
5959
1. Create a new resource group. Because resource groups must be unique within a subscription, pick a unique name. An easy way to have unique names is to use a combination of your initials, today's date, and some identifier. For example, `ejb0913-java-liberty-project-rg`.
6060
1. Select *East US* as **Region**.
6161

62-
Create environment variables in your shell for the resource group names for the cluster and the database.
63-
64-
### [Bash](#tab/in-bash)
65-
66-
```bash
67-
export RESOURCE_GROUP_NAME=<your-resource-group-name>
68-
export DB_RESOURCE_GROUP_NAME=<your-resource-group-name>
69-
```
70-
71-
### [PowerShell](#tab/in-powershell)
72-
73-
```powershell
74-
$Env:RESOURCE_GROUP_NAME="<your-resource-group-name>"
75-
$Env:DB_RESOURCE_GROUP_NAME="<your-resource-group-name>"
76-
```
77-
78-
---
62+
Create environment variables in your shell for the resource group names for the cluster and the database.
63+
64+
### [Bash](#tab/in-bash)
65+
66+
```bash
67+
export RESOURCE_GROUP_NAME=<your-resource-group-name>
68+
export DB_RESOURCE_GROUP_NAME=<your-resource-group-name>
69+
```
70+
71+
### [PowerShell](#tab/in-powershell)
72+
73+
```powershell
74+
$Env:RESOURCE_GROUP_NAME="<your-resource-group-name>"
75+
$Env:DB_RESOURCE_GROUP_NAME="<your-resource-group-name>"
76+
```
77+
78+
---
7979

8080
1. Select **Next**, enter the **AKS** pane. This pane allows you to select an existing AKS cluster and Azure Container Registry (ACR), instead of causing the deployment to create a new one, if desired. This capability enables you to use the sidecar pattern, as shown in the [Azure architecture center](/azure/architecture/patterns/sidecar). You can also adjust the settings for the size and number of the virtual machines in the AKS node pool. The remaining values do not need to be changed from their default values.
8181

articles/aks/use-managed-identity.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: article
55
ms.custom:
66
- devx-track-azurecli
77
- ignite-2023
8-
ms.date: 02/27/2024
8+
ms.date: 03/07/2024
99
---
1010

1111
# Use a managed identity in Azure Kubernetes Service (AKS)
@@ -24,12 +24,12 @@ When you deploy an AKS cluster, a system-assigned managed identity is automatica
2424

2525
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*.
2626

27-
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
27+
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable. These identity types shouldn't be confused with a [Microsoft Entra Workload identity][workload-identity-overview], which is intended for use by an application running on a pod.
2828

2929
> [!IMPORTANT]
3030
> The open source [Microsoft Entra pod-managed identity][entra-id-pod-managed-identity] (preview) in Azure Kubernetes Service was deprecated on 10/24/2022, and the project archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on begins deprecation in Sept. 2024.
3131
>
32-
> We recommend you first review [Microsoft Entra Workload ID][workload-identity-overview] overview. This authentication method replaces Microsoft Entra pod-managed identity (preview) and is the recommended method.
32+
> We recommend you first review [Microsoft Entra Workload ID][workload-identity-overview] overview. Entra Workload ID authentication replaces Microsoft Entra pod-managed identity (preview) and is the recommended method to enable an application running on a pod to authenticate itself against other Azure services that support it.
3333
3434
## Before you begin
3535

@@ -67,7 +67,7 @@ AKS uses several managed identities for built-in services and add-ons.
6767
| Add-on | omsagent | Used to send AKS metrics to Azure Monitor. | Monitoring Metrics Publisher role | No
6868
| Add-on | Virtual-Node (ACIConnector) | Manages required network resources for Azure Container Instances (ACI). | Contributor role for node resource group | No
6969
| Add-on | Cost analysis | Used to gather cost allocation data | |
70-
| OSS project | Microsoft Entra ID-pod-identity | Enables applications to access cloud resources securely with Microsoft Entra ID. | N/A | Steps to grant permission at [Microsoft Entra Pod Identity Role Assignment configuration](./use-azure-ad-pod-identity.md).
70+
| Workload identity | Microsoft Entra workload ID | Enables applications to access cloud resources securely with Microsoft Entra workload ID. | N/A | No |
7171

7272
## Enable managed identities on a new AKS cluster
7373

@@ -103,7 +103,7 @@ To update your existing AKS cluster that's using a service principal to use a sy
103103
az aks update -g myResourceGroup -n myManagedCluster --enable-managed-identity
104104
```
105105

106-
After updating your cluster, the control plane and pods use the managed identity. kubelet continues using a service principal until you upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned/drained and reimaged.
106+
After updating your cluster, the control plane and pods use the managed identity. Kubelet continues using a service principal until you upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned/drained and reimaged.
107107

108108
> [!NOTE]
109109
>

articles/api-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -639,6 +639,8 @@
639639
href: breaking-changes/self-hosted-gateway-v0-v1-retirement-oct-2023.md
640640
- name: Deprecated (legacy) developer portal (October 2023)
641641
href: breaking-changes/legacy-portal-retirement-oct-2023.md
642+
- name: Workspaces breaking changes (June 2024)
643+
href: breaking-changes/workspaces-breaking-changes-june-2024.md
642644
- name: stv1 compute platform retirement (August 2024)
643645
href: breaking-changes/stv1-platform-retirement-august-2024.md
644646
- name: ADAL-based identity provider retirement (September 2025)

articles/api-management/breaking-changes/overview.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: Upcoming Breaking Changes in Azure API Management | Microsoft Docs
33
description: A list of all the upcoming breaking changes for Azure API Management
44
services: api-management
5-
author: adrianhall
5+
author: dlepow
66

77
ms.service: api-management
88
ms.topic: reference
9-
ms.date: 03/15/2023
10-
ms.author: adhal
9+
ms.date: 01/25/2024
10+
ms.author: danlep
1111
---
1212

1313
# Upcoming breaking changes
@@ -22,6 +22,7 @@ The following table lists all the upcoming breaking changes and feature retireme
2222
| [API version retirements][api2023] | September 30, 2023 |
2323
| [Deprecated (legacy) portal retirement][devportal2023] | October 31, 2023 |
2424
| [Self-hosted gateway v0/v1 retirement][shgwv0v1] | October 1, 2023 |
25+
| [Workspaces breaking changes][workspaces2024] | June 14, 2024 |
2526
| [stv1 platform retirement][stv12024] | August 31, 2024 |
2627
| [ADAL-based Microsoft Entra ID or Azure AD B2C identity provider retirement][msal2025] | September 30, 2025 |
2728
| [CAPTCHA endpoint update][captcha2025] | September 30, 2025 |
@@ -36,3 +37,4 @@ The following table lists all the upcoming breaking changes and feature retireme
3637
[msal2025]: ./identity-provider-adal-retirement-sep-2025.md
3738
[captcha2025]: ./captcha-endpoint-change-sep-2025.md
3839
[metrics2023]: ./metrics-retirement-aug-2023.md
40+
[workspaces2024]: ./workspaces-breaking-changes-june-2024.md
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: Azure API Management workspaces - breaking changes (June 2024) | Microsoft Docs
3+
description: Azure API Management is updating the workspaces (preview) with breaking changes. If your service uses workspaces, you may need to update workspace configurations.
4+
services: api-management
5+
author: dlepow
6+
ms.service: api-management
7+
ms.topic: reference
8+
ms.date: 03/07/2024
9+
ms.author: danlep
10+
---
11+
12+
# Workspaces - breaking changes (June 2024)
13+
14+
On 14 June 2024, as part of our development of [workspaces](../workspaces-overview.md) (preview) in Azure API Management, we're introducing several breaking changes.
15+
16+
These changes will have no effect on the availability of your API Management service. However, you may have to take action to continue using full workspaces functionality beyond 14 June 2024.
17+
18+
## Is my service affected by these changes?
19+
20+
Your service may be affected by these changes if you configured workspaces (preview) in your API Management instance. This feature was introduced in the **Premium**, **Standard**, and **Developer** tiers.
21+
22+
## Breaking changes
23+
24+
Review the following breaking changes to determine if you need to take action:
25+
26+
### Change to supported service tiers
27+
28+
The following service tiers will no longer support workspaces: **Standard** and **Developer**. Workspaces will be available in the **Premium** tier.
29+
30+
For availability in the v2 tiers, see [Azure API Management v2 tiers](../v2-service-tiers-overview.md).
31+
32+
### Changes to support for assigning service-level entities in workspaces
33+
34+
The following assignments of workspace entities to service-level entities will no longer be supported:
35+
36+
* Assign workspace APIs to service-level products
37+
* Assign workspace APIs to service-level tags
38+
* Assign workspace products to service-level tags
39+
* Assign service-level groups to workspace products for visibility controls
40+
41+
> [!NOTE]
42+
> The built-in Guests and Developer groups will continue to be available in workspaces.
43+
44+
### Changes to supported context objects
45+
46+
The following `context` objects will no longer be supported in workspace policies or in the all-APIs policy on the service level:
47+
48+
* `context.Api.Workspace`
49+
* `context.Product.Workspace`
50+
51+
The `context.Workspace` object can be used instead.
52+
53+
54+
> [!NOTE]
55+
> You can continue to reference users from the service level in the `context` object in workspace-level policies.
56+
57+
## What is the deadline for the change?
58+
59+
The breaking changes are effective 14 June 2024. We strongly recommend that you make all required changes to the configuration of workspaces before then.
60+
61+
## Help and support
62+
63+
If you have questions, get answers from community experts in [Microsoft Q&A](https://aka.ms/apim/azureqa/change/captcha-2022). If you have a support plan and you need technical help, create a [support request](https://portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/~/overview).
64+
65+
## More information
66+
67+
* [Workspaces overview](../workspaces-overview.md)
68+
69+
## Related content
70+
71+
See all [upcoming breaking changes and feature retirements](overview.md).

articles/api-management/v2-service-tiers-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: api-management
88
ms.topic: conceptual
9-
ms.date: 10/02/2023
9+
ms.date: 01/31/2024
1010
ms.author: danlep
1111
ms.custom: references_regions
1212
---
@@ -85,7 +85,7 @@ Currently, the following API Management capabilities are unavailable in the v2 t
8585
* Built-in analytics
8686
* Inbound connection using a private endpoint
8787
* Upgrade to v2 tiers from v1 tiers
88-
* Workspaces
88+
* Workspaces (*Standard v2*)
8989

9090
**Developer portal**
9191
* Delegation of user registration and product subscription

0 commit comments

Comments
 (0)