Skip to content

Commit 529021d

Browse files
authored
Merge pull request #280624 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 4c0fb54 + 50f188f commit 529021d

File tree

5 files changed

+24
-17
lines changed

5 files changed

+24
-17
lines changed

articles/aks/api-server-vnet-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ API Server VNet Integration is available in all global Azure regions.
6868
6969
## Create an AKS cluster with API Server VNet Integration using managed VNet
7070
71-
You can configure your AKS clusters with API Server VNet Integration in managed VNet or bring-your-own VNet mode. You can create the as public clusters (with API server access available via a public IP) or private clusters (where the API server is only accessible via private VNet connectivity). You can also toggle between a public and private state without redeploying your cluster.
71+
You can configure your AKS clusters with API Server VNet Integration in managed VNet or bring-your-own VNet mode. You can create them as public clusters (with API server access available via a public IP) or private clusters (where the API server is only accessible via private VNet connectivity). You can also toggle between a public and private state without redeploying your cluster.
7272
7373
### Create a resource group
7474

articles/aks/auto-upgrade-node-os-image.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -131,31 +131,31 @@ For more information on Planned Maintenance, see [Use Planned Maintenance to sch
131131
132132
## Node OS auto-upgrades FAQ
133133
134-
* How can I check the current nodeOsUpgradeChannel value on a cluster?
134+
### How can I check the current nodeOsUpgradeChannel value on a cluster?
135135
136136
Run the `az aks show` command and check the "autoUpgradeProfile" to determine what value the `nodeOsUpgradeChannel` is set to:
137137
138138
```azurecli-interactive
139139
az aks show --resource-group myResourceGroup --name myAKSCluster --query "autoUpgradeProfile"
140140
```
141141

142-
* How can I monitor the status of node OS auto-upgrades?
142+
### How can I monitor the status of node OS auto-upgrades?
143143

144144
To view the status of your node OS auto upgrades, look up [activity logs][monitor-aks] on your cluster. You can also look up specific upgrade-related events as mentioned in [Upgrade an AKS cluster][aks-upgrade]. AKS also emits upgrade-related Event Grid events. To learn more, see [AKS as an Event Grid source][aks-eventgrid].
145145

146-
* Can I change the node OS auto-upgrade channel value if my cluster auto-upgrade channel is set to `node-image` ?
146+
### Can I change the node OS auto-upgrade channel value if my cluster auto-upgrade channel is set to `node-image` ?
147147

148148
No. Currently, when you set the [cluster auto-upgrade channel][Autoupgrade] to `node-image`, it also automatically sets the node OS auto-upgrade channel to `NodeImage`. You can't change the node OS auto-upgrade channel value if your cluster auto-upgrade channel is `node-image`. In order to be able to change the node OS auto-upgrade channel values, make sure the [cluster auto-upgrade channel][Autoupgrade] isn't `node-image`.
149149

150-
* Why is `SecurityPatch` recommended over `Unmanaged` channel?
150+
### Why is `SecurityPatch` recommended over `Unmanaged` channel?
151151

152152
On the `Unmanaged` channel, AKS has no control over how and when the security updates are delivered. With `SecurityPatch`, the security updates are fully tested and follow safe deployment practices. `SecurityPatch` also honors maintenance windows. For more details, see [Increased security and resiliency of Canonical workloads on Azure][Blog].
153153

154-
* Does `SecurityPatch` always lead to a reimage of my nodes?
154+
### Does `SecurityPatch` always lead to a reimage of my nodes?
155155

156156
AKS limits reimages to only when absolutely necessary, such as certain kernel packages that may require a reimage to get fully applied. `SecurityPatch` is designed to minimize disruptions as much as possible. If AKS decides reimaging nodes isn't necessary, it will patch nodes live without draining pods and no VHD update is performed in such cases.
157157

158-
* How do I know if a `SecurityPatch` or `NodeImage` upgrade is applied on my node?
158+
### How do I know if a `SecurityPatch` or `NodeImage` upgrade is applied on my node?
159159

160160
Run the following command to obtain node labels:
161161

articles/frontdoor/standard-premium/how-to-configure-https-custom-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,13 +103,13 @@ Register the service principal for Azure Front Door as an app in your Microsoft
103103
Azure public cloud:
104104

105105
```azurepowershell-interactive
106-
New-MgServicePrincipal -ApplicationId '205478c0-bd83-4e1b-a9d6-db63a3e1e1c8'
106+
New-MgServicePrincipal -AppId '205478c0-bd83-4e1b-a9d6-db63a3e1e1c8'
107107
```
108108
109109
Azure government cloud:
110110
111111
```azurepowershell-interactive
112-
New-MgServicePrincipal -ApplicationId 'd4631ece-daab-479b-be77-ccb713491fc0'
112+
New-MgServicePrincipal -AppId 'd4631ece-daab-479b-be77-ccb713491fc0'
113113
```
114114
115115
# [Azure CLI](#tab/cli)

articles/network-watcher/traffic-analytics-schema.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -190,8 +190,8 @@ The following table lists the fields in the schema and what they signify for vir
190190
> | **FlowStartTime** | Date and time in UTC | First occurrence of the flow (which gets aggregated) in the flow log processing interval between `FlowIntervalStartTime` and `FlowIntervalEndTime`. This flow gets aggregated based on aggregation logic. |
191191
> | **FlowEndTime** | Date and time in UTC | Last occurrence of the flow (which gets aggregated) in the flow log processing interval between `FlowIntervalStartTime` and `FlowIntervalEndTime`. |
192192
> | **FlowType** | - IntraVNet <br> - InterVNet <br> - S2S <br> - P2S <br> - AzurePublic <br> - ExternalPublic <br> - MaliciousFlow <br> - Unknown Private <br> - Unknown | See [Notes](#notes) for definitions. |
193-
> | **SrcIP** | Source IP address | Blank in AzurePublic and ExternalPublic flows. |
194-
> | **DestIP** | Destination IP address | Blank in AzurePublic and ExternalPublic flows. |
193+
> | **SrcIp** | Source IP address | Blank in AzurePublic and ExternalPublic flows. |
194+
> | **DestIp** | Destination IP address | Blank in AzurePublic and ExternalPublic flows. |
195195
> | **TargetResourceId** | ResourceGroupName/ResourceName | The ID of the resource at which flow logging and traffic analytics is enabled. |
196196
> | **TargetResourceType** | VirtualNetwork/Subnet/NetworkInterface | Type of resource at which flow logging and traffic analytics is enabled (virtual network, subnet, NIC or network security group).|
197197
> | **FlowLogResourceId** | ResourceGroupName/NetworkWatcherName/FlowLogName | The resource ID of the flow log. |
@@ -201,17 +201,17 @@ The following table lists the fields in the schema and what they signify for vir
201201
> | **FlowDirection** | - **I** = Inbound <br> - **O** = Outbound | Direction of the flow: in or out of the target resource per flow log. |
202202
> | **FlowStatus** | - **A** = Allowed <br> - **D** = Denied | Status of flow: allowed or denied by target resource per flow log. |
203203
> | **NSGList** | \<SUBSCRIPTIONID\>/\<RESOURCEGROUP_NAME\>/\<NSG_NAME\> | Network security group associated with the flow. |
204-
> | **NSGRule** | NSG_RULENAME | Network security group rule that allowed or denied the flow. |
205-
> | **NSGRuleType** | - User Defined <br> - Default | The type of network security group rule used by the flow. |
204+
> | **NsgRule** | NSG_RULENAME | Network security group rule that allowed or denied the flow. |
205+
> | **NsgRuleType** | - User Defined <br> - Default | The type of network security group rule used by the flow. |
206206
> | **MACAddress** | MAC Address | MAC address of the NIC at which the flow was captured. |
207207
> | **SrcSubscription** | Subscription ID | Subscription ID of virtual network / network interface / virtual machine that the source IP in the flow belongs to. |
208208
> | **DestSubscription** | Subscription ID | Subscription ID of virtual network / network interface / virtual machine that the destination IP in the flow belongs to. |
209209
> | **SrcRegion** | Azure Region | Azure region of virtual network / network interface / virtual machine to which the source IP in the flow belongs to. |
210210
> | **DestRegion** | Azure Region | Azure region of virtual network to which the destination IP in the flow belongs to. |
211-
> | **SrcNIC** | \<resourcegroup_Name\>/\<NetworkInterfaceName\> | NIC associated with the source IP in the flow. |
212-
> | **DestNIC** | \<resourcegroup_Name\>/\<NetworkInterfaceName\> | NIC associated with the destination IP in the flow. |
213-
> | **SrcVM** | \<resourcegroup_Name\>/\<VirtualMachineName\> | Virtual machine associated with the source IP in the flow. |
214-
> | **DestVM** | \<resourcegroup_Name\>/\<VirtualMachineName\> | Virtual machine associated with the destination IP in the flow. |
211+
> | **SrcNic** | \<resourcegroup_Name\>/\<NetworkInterfaceName\> | NIC associated with the source IP in the flow. |
212+
> | **DestNic** | \<resourcegroup_Name\>/\<NetworkInterfaceName\> | NIC associated with the destination IP in the flow. |
213+
> | **SrcVm** | \<resourcegroup_Name\>/\<VirtualMachineName\> | Virtual machine associated with the source IP in the flow. |
214+
> | **DestVm** | \<resourcegroup_Name\>/\<VirtualMachineName\> | Virtual machine associated with the destination IP in the flow. |
215215
> | **SrcSubnet** | \<ResourceGroup_Name\>/\<VirtualNetwork_Name\>/\<SubnetName\> | Subnet associated with the source IP in the flow. |
216216
> | **DestSubnet** | \<ResourceGroup_Name\>/\<VirtualNetwork_Name\>/\<SubnetName\> | Subnet associated with the destination IP in the flow. |
217217
> | **SrcApplicationGateway** | \<SubscriptionID\>/\<ResourceGroupName\>/\<ApplicationGatewayName\> | Application gateway associated with the source IP in the flow. |

articles/oracle/oracle-db/database-overview.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,13 @@ To purchase Oracle Database@Azure, contact [Oracle's sales team](https://go.orac
3333

3434
Billing and payment for the service is done through Azure. Payment for Oracle Database@Azure counts toward your Microsoft Azure Consumption Commitment (MACC). Existing Oracle Database software customers can use the Bring Your Own License (BYOL) option or Unlimited License Agreements (ULAs). On your regular Microsoft Azure invoices, you can see charges for Oracle Database@Azure alongside charges for your other Azure Marketplace services.
3535

36+
## Compliance
37+
38+
Oracle Database@Azure is an Oracle Cloud database service that runs Oracle Database workloads in a customer's Azure environment. Oracle Database@Azure offers various Oracle Database Services through customer’s Microsoft Azure environment. This service allows customers to monitor database metrics, audit logs, events, logging data, and telemetry natively in Azure. It runs on infrastructure managed by Oracle's Cloud Infrastructure operations team who performs software patching, infrastructure updates, and other operations through a connection to Oracle Cloud.
39+
All infrastructure for Oracle Database@Azure is co-located in Azure's physical data centers and uses Azure Virtual Network for networking, managed within the Azure environment. Federated identity and access management for Oracle Database@Azure is provided by Microsoft Entra ID.
40+
41+
For detailed information on the compliance certifications please visit [Microsoft Services Trust Portal](https://servicetrust.microsoft.com/) and [Oracle compliance website](https://docs.oracle.com/en-us/iaas/Content/multicloud/compliance.htm). If you have further questions about OracleDB@Azure compliance please reach out to your account team and/or get information through [Oracle and Microsoft support for Oracle Database@Azure](https://docs.oracle.com/en-us/iaas/Content/multicloud/oaahelp.htm).
42+
3643
## Available regions
3744

3845
Oracle Database@Azure is available in the following locations. Oracle Database@Azure infrastructure resources must be provisioned in the Azure regions listed.

0 commit comments

Comments
 (0)