Skip to content

Commit 5531c5e

Browse files
authored
Merge pull request #234433 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 5546a09 + 186b0df commit 5531c5e

14 files changed

+44
-14
lines changed

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ originalUserPrincipalName = alias_theirdomain#EXT#@yourdomain
8888

8989
## Provisioning cycles: Initial and incremental
9090

91-
When Azure AD is the source system, the provisioning service uses the [Use delta query to track changes in Microsoft Graph data](/graph/delta-query-overview) to monitor users and groups. The provisioning service runs an initial cycle against the source system and target system, followed by periodic incremental cycles.
91+
When Azure AD is the source system, the provisioning service uses the [delta query to track changes in Microsoft Graph data](/graph/delta-query-overview) to monitor users and groups. The provisioning service runs an initial cycle against the source system and target system, followed by periodic incremental cycles.
9292

9393
### Initial cycle
9494

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,9 @@ To quickly see SSPR in action and then come back to understand additional deploy
3838
> [!div class="nextstepaction"]
3939
> [Enable self-service password reset (SSPR)](tutorial-enable-sspr.md)
4040
41+
> [!TIP]
42+
> As a companion to this article, we recommend using the [Plan your self-service password reset deployment guide](https://go.microsoft.com/fwlink/?linkid=2221501) when signed in to the Microsoft 365 Admin Center. This guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [M365 Setup portal](https://go.microsoft.com/fwlink/?linkid=2221600).
43+
4144
## Learn about SSPR
4245

4346
Learn more about SSPR. See [How it works: Azure AD self-service password reset](./concept-sspr-howitworks.md).

articles/app-service/monitor-instances-health-check.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,11 @@ If you restart the instance and the restart process fails, you will then be give
136136

137137
Windows applications will also have the option to view processes via the Process Explorer. This gives you further insight on the instance's processes including thread count, private memory, and total CPU time.
138138

139+
## Diagnostic information collection
140+
For Windows applications, you have the option to collect diagnostic information in the Health Check tab. Enabling diagnostic collection will add an auto-heal rule that creates memory dumps for unhealthy instances and saves it to a designated storage account. Enabling this option will change auto-heal configurations. If there are existing auto-heal rules, we recommend setting this up through App Service diagnostics.
141+
142+
Once diagnostic collection is enabled, you can create or choose an existing storage account for your files. You can only select storage accounts in the same region as your application. Keep in mind that saving will restart your application. After saving, if your site instances are found to be unhealthy after continuous pings, you can go to your storage account resource and view the memory dumps.
143+
139144

140145
## Monitoring
141146

articles/cosmos-db/how-to-setup-customer-managed-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -554,7 +554,7 @@ Use the Azure CLI to restore a continuous account that is already configured usi
554554
--resource-group $resourceGroupName \
555555
--account-name $sourceAccountName \
556556
--target-database-account-name $targetAccountName \
557-
--locations regionName=$location \
557+
--location $location \
558558
--restore-timestamp $timestamp \
559559
--assign-identity $identityId \
560560
--default-identity "UserAssignedIdentity=$identityId" \

articles/defender-for-cloud/includes/defender-for-containers-assign-workspace-aks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,6 @@ If the policy has already been assigned to a workspace, you'll see `Assignments
8585

8686
:::image type="content" source="../media/defender-for-containers/drop-down-menu.png" alt-text="Screenshot showing where the dropdown menu is located." lightbox="../media/defender-for-containers/drop-down-menu.png":::
8787

88-
1. Select **Review + create**.
88+
1. Select **Review + save**.
8989

90-
1. Select **Create**.
90+
1. Select **Save**.

articles/defender-for-cloud/includes/defender-for-containers-assign-workspace-arc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,6 @@ If the policy has already been assigned to a workspace, you'll see `Assignments
8585

8686
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for ARC." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
8787

88-
1. Select **Review + create**.
88+
1. Select **Review + save**.
8989

90-
1. Select **Create**.
90+
1. Select **Save**.

articles/networking/nva-accelerated-connections.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,8 @@ This list will be updated as more regions become available. The following region
6565

6666
* North Central US
6767
* West Central US
68+
* East US
69+
* West US
6870

6971
## Supported SKUs
7072

articles/static-web-apps/database-azure-cosmos-db.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -177,9 +177,9 @@ Next, create the configuration file that your static web app uses to interface w
177177
178178
The `init` command creates the *staticwebapp.database.config.json* file in the *swa-db-connections* folder.
179179
180-
1. Paste in this sample schema into the *staticwebapp.schema.config.json* file you generated.
180+
1. Paste in this sample schema into the *staticwebapp.database.schema.gql* file you generated.
181181
182-
Since Cosmos DB for NoSQL is a schema agnostic database, Azure Static Web Apps database connections can't extract the schema of your database. The *staticwebapp.schema.config.json* file allows you to specify the schema of your Cosmos DB for NoSQL database for Static Web Apps.
182+
Since Cosmos DB for NoSQL is a schema agnostic database, Azure Static Web Apps database connections can't extract the schema of your database. The *staticwebapp.database.schema.gql* file allows you to specify the schema of your Cosmos DB for NoSQL database for Static Web Apps.
183183
184184
```gql
185185
type Person @model {

articles/storage/blobs/blob-inventory.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -407,6 +407,8 @@ An inventory job can take a longer amount of time in these cases:
407407

408408
An inventory job might take more than one day to complete for hierarchical namespace enabled accounts that have hundreds of millions of blobs. Sometimes the inventory job fails and doesn't create an inventory file. If a job doesn't complete successfully, check subsequent jobs to see if they're complete before contacting support.
409409

410+
- There is no option to generate a report retrospectively for a particular date.
411+
410412
#### Inventory jobs can't write reports to containers that have an object replication policy
411413

412414
An object replication policy can prevent an inventory job from writing inventory reports to the destination container. Some other scenarios can archive the reports or make the reports immutable when they're partially completed which can cause inventory jobs to fail.

articles/storage/blobs/data-lake-storage-acl-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ $file.ACL
185185
```
186186

187187
> [!NOTE]
188-
> To a set the ACL of a specific group or user, use their respective object IDs. For example, to set the ACL of a **group**, use `group:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx`. To set the ACL of a **user**, use `user:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx`.
188+
> To set the ACL of a specific group or user, service principal, or managed identity, use their respective object IDs. For example, to set the ACL of a **group**, use `group:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx`. To set the ACL of a **user**, use `user:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx`.
189189
190190
The following image shows the output after setting the ACL of a file.
191191

@@ -262,7 +262,7 @@ Update-AzDataLakeGen2AclRecursive -Context $ctx -FileSystem $filesystemName -Pat
262262
```
263263

264264
> [!NOTE]
265-
> To a set the ACL of a specific group or user, use their respective object IDs. For example, `group:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx` or `user:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx`.
265+
> To set the ACL of a specific group or user, service principal, or managed identity, use their respective object IDs. For example, to set the ACL of a **group**, use `group:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx`. To set the ACL of a **user**, use `user:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx`.
266266
267267
To see an example that updates ACLs recursively in batches by specifying a batch size, see the [Update-AzDataLakeGen2AclRecursive](/powershell/module/az.storage/update-azdatalakegen2aclrecursive) reference article.
268268

0 commit comments

Comments
 (0)