Skip to content

Commit 576f822

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-reliability-az-region-poland-central
2 parents 3405fac + cfb3051 commit 576f822

File tree

4 files changed

+32
-24
lines changed

4 files changed

+32
-24
lines changed

articles/aks/http-proxy.md

Lines changed: 24 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Some more complex solutions may require creating a chain of trust to establish s
1919
## Limitations and other details
2020

2121
The following scenarios are **not** supported:
22+
2223
- Different proxy configurations per node pool
2324
- Updating proxy settings post cluster creation
2425
- User/Password authentication
@@ -31,10 +32,9 @@ By default, *httpProxy*, *httpsProxy*, and *trustedCa* have no value.
3132

3233
## Prerequisites
3334

34-
* An Azure subscription. If you don't have an Azure subscription, you can create a [free account](https://azure.microsoft.com/free).
35-
* Latest version of [Azure CLI installed](/cli/azure/install-azure-cli).
35+
The latest version of the Azure CLI. Run `az --version` to find the version, and run `az upgrade` to upgrade the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
3636

37-
## Configuring an HTTP proxy using Azure CLI
37+
## Configuring an HTTP proxy using the Azure CLI
3838

3939
Using AKS with an HTTP proxy is done at cluster creation, using the [az aks create][az-aks-create] command and passing in configuration as a JSON file.
4040

@@ -51,13 +51,18 @@ The schema for the config file looks like this:
5151
}
5252
```
5353

54-
`httpProxy`: A proxy URL to use for creating HTTP connections outside the cluster. The URL scheme must be `http`.
55-
`httpsProxy`: A proxy URL to use for creating HTTPS connections outside the cluster. If this is not specified, then `httpProxy` is used for both HTTP and HTTPS connections.
56-
`noProxy`: A list of destination domain names, domains, IP addresses or other network CIDRs to exclude proxying.
57-
`trustedCa`: A string containing the `base64 encoded` alternative CA certificate content. For now we only support `PEM` format. Another thing to note is that, for compatibility with Go-based components that are part of the Kubernetes system, the certificate MUST support `Subject Alternative Names(SANs)` instead of the deprecated Common Name certs.
54+
* `httpProxy`: A proxy URL to use for creating HTTP connections outside the cluster. The URL scheme must be `http`.
55+
* `httpsProxy`: A proxy URL to use for creating HTTPS connections outside the cluster. If this isn't specified, then `httpProxy` is used for both HTTP and HTTPS connections.
56+
* `noProxy`: A list of destination domain names, domains, IP addresses or other network CIDRs to exclude proxying.
57+
* `trustedCa`: A string containing the `base64 encoded` alternative CA certificate content. Currently only the `PEM` format is supported.
58+
59+
> [!IMPORTANT]
60+
> For compatibility with Go-based components that are part of the Kubernetes system, the certificate **must** support `Subject Alternative Names(SANs)` instead of the deprecated Common Name certs.
5861
5962
Example input:
60-
Note the CA cert should be the base64 encoded string of the PEM format cert content.
63+
64+
> [!NOTE]
65+
> The CA certificate should be the base64 encoded string of the PEM format cert content.
6166
6267
```json
6368
{
@@ -71,7 +76,7 @@ Note the CA cert should be the base64 encoded string of the PEM format cert cont
7176
}
7277
```
7378

74-
Create a file and provide values for *httpProxy*, *httpsProxy*, and *noProxy*. If your environment requires it, also provide a *trustedCa* value. Next, deploy a cluster, passing in your filename via the `http-proxy-config` flag.
79+
Create a file and provide values for *httpProxy*, *httpsProxy*, and *noProxy*. If your environment requires it, provide a value for *trustedCa*. Next, deploy a cluster, passing in your filename using the `http-proxy-config` flag.
7580

7681
```azurecli
7782
az aks create -n $clusterName -g $resourceGroup --http-proxy-config aks-proxy-config.json
@@ -81,7 +86,7 @@ Your cluster will initialize with the HTTP proxy configured on the nodes.
8186

8287
## Configuring an HTTP proxy using Azure Resource Manager (ARM) templates
8388

84-
Deploying an AKS cluster with an HTTP proxy configured via ARM template is straightforward. The same schema used for CLI deployment exists in the `Microsoft.ContainerService/managedClusters` definition under properties:
89+
Deploying an AKS cluster with an HTTP proxy configured using an ARM template is straightforward. The same schema used for CLI deployment exists in the `Microsoft.ContainerService/managedClusters` definition under properties:
8590

8691
```json
8792
"properties": {
@@ -97,34 +102,34 @@ Deploying an AKS cluster with an HTTP proxy configured via ARM template is strai
97102
}
98103
```
99104

100-
In your template, provide values for *httpProxy*, *httpsProxy*, and *noProxy*. If necessary, also provide a value for `*trustedCa*. Deploy the template, and your cluster should initialize with your HTTP proxy configured on the nodes.
105+
In your template, provide values for *httpProxy*, *httpsProxy*, and *noProxy*. If necessary, provide a value for *trustedCa*. Deploy the template, and your cluster should initialize with your HTTP proxy configured on the nodes.
101106

102107
## Handling CA rollover
103108

104-
Values for *httpProxy*, *httpsProxy*, and *noProxy* cannot be changed after cluster creation. However, to support rolling CA certs, the value for *trustedCa* can be changed and applied to the cluster with the [az aks update][az-aks-update] command.
109+
Values for *httpProxy*, *httpsProxy*, and *noProxy* can't be changed after cluster creation. However, to support rolling CA certs, the value for *trustedCa* can be changed and applied to the cluster with the [az aks update][az-aks-update] command.
105110

106-
For example, assuming a new file has been created with the base64 encoded string of the new CA cert called *aks-proxy-config-2.json*, the following action will update the cluster:
111+
For example, assuming a new file has been created with the base64 encoded string of the new CA cert called *aks-proxy-config-2.json*, the following action updates the cluster:
107112

108113
```azurecli
109114
az aks update -n $clusterName -g $resourceGroup --http-proxy-config aks-proxy-config-2.json
110115
```
111116

112117
## Monitoring add-on configuration
113118

114-
When using the HTTP proxy with the Monitoring add-on, the following configurations are supported:
119+
The HTTP proxy with the Monitoring add-on supports the following configurations:
115120

116121
- Outbound proxy without authentication
117122
- Outbound proxy with username & password authentication
118123
- Outbound proxy with trusted cert for Log Analytics endpoint
119124

120-
The following configurations are not supported:
125+
The following configurations aren't supported:
121126

122-
- The Custom Metrics and Recommended Alerts features are not supported when using proxy with trusted cert
123-
- Outbound proxy is not supported with Azure Monitor Private Link Scope (AMPLS)
127+
- The Custom Metrics and Recommended Alerts features aren't supported when you use a proxy with trusted certificates
128+
- Outbound proxy isn't supported with Azure Monitor Private Link Scope (AMPLS)
124129

125130
## Next steps
126-
- For more on the network requirements of AKS clusters, see [control egress traffic for cluster nodes in AKS][aks-egress].
127131

132+
For more information regarding the network requirements of AKS clusters, see [control egress traffic for cluster nodes in AKS][aks-egress].
128133

129134
<!-- LINKS - internal -->
130135
[aks-egress]: ./limit-egress-traffic.md
@@ -135,3 +140,4 @@ The following configurations are not supported:
135140
[az-provider-register]: /cli/azure/provider#az_provider_register
136141
[az-extension-add]: /cli/azure/extension#az_extension_add
137142
[az-extension-update]: /cli/azure/extension#az-extension-update
143+
[install-azure-cli]: /cli/azure/install-azure-cli

articles/azure-video-indexer/language-support.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,8 @@ ms.date: 01/06/2023
1313

1414
This article provides a comprehensive list of language support by service features in Azure Video Indexer. For the list and definitions of all the features, see [Overview](video-indexer-overview.md).
1515

16-
Some languages are supported only through the API (see [Get Supported Languages](https://api-portal.videoindexer.ai/api-details#api=Operations&operation=Get-Supported-Languages)) and not through the Video Indexer website or widgets. To make sure a language is supported for search, transcription, or translation by the Azure Video Indexer website and widgets, see the [frontend language
17-
support table](#language-support-in-frontend-experiences) further below.
16+
Some languages are supported only through the API (see [Get Supported Languages](https://api-portal.videoindexer.ai/api-details#api=Operations&operation=Get-Supported-Languages)) and not through the Video Indexer website or widgets. To make sure a language is supported for search, transcription, or translation by the Azure Video Indexer website and widgets, see the [front end language
17+
support table](#language-support-in-front-end-experiences) further below.
1818

1919
## API language support
2020

@@ -140,9 +140,9 @@ When [uploading a video](https://api-portal.videoindexer.ai/api-details#api=Oper
140140
> Language identification (LID) and Multi-language identification (MLID) compares speech at the language level, such as English and German.
141141
> Do not include multiple locales of the same language in the custom languages list.
142142
143-
## Language support in frontend experiences
143+
## Language support in front end experiences
144144

145-
The following table describes language support in the Azure Video Indexer frontend experiences.
145+
The following table describes language support in the Azure Video Indexer front end experiences.
146146

147147
* website - the website column lists supported languages for the [Azure Video Indexer website](https://aka.ms/vi-portal-link). For for more information, see [Get started](video-indexer-get-started.md).
148148
* widgets - the [widgets](video-indexer-embed-widgets.md) column lists supported languages for translating the index file. For for more information, see [Get started](video-indexer-embed-widgets.md).

articles/confidential-computing/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ landingContent:
4343
url: ../attestation/overview.md
4444
- text: Azure Confidential Ledger
4545
url: ../confidential-ledger/overview.md
46+
- text: Trusted Hardware Identity Management
47+
url: ../security/fundamentals/trusted-hardware-identity-management.md
4648
- text: Trusted launch
4749
url: ../virtual-machines/trusted-launch.md
4850
- text: Azure Key Vault Managed HSM

articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-concept-recommendations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The following section describes workload-based heuristics you may find in the Az
5656
Currently Advisor will only show at most four replicated table candidates at once with clustered columnstore indexes prioritizing the highest activity.
5757

5858
> [!IMPORTANT]
59-
> The replicated table recommendation is not full proof and does not take into account data movement operations. We are working on adding this as a heuristic but in the meantime, you should always validate your workload after applying the recommendation. To learn more about replicated tables, visit the following [documentation](design-guidance-for-replicated-tables.md#what-is-a-replicated-table).
59+
> The replicated table recommendation is not fool proof and does not take into account data movement operations. We are working on adding this as a heuristic but in the meantime, you should always validate your workload after applying the recommendation. To learn more about replicated tables, visit the following [documentation](design-guidance-for-replicated-tables.md#what-is-a-replicated-table).
6060
6161

6262
## Adaptive (Gen2) cache utilization
@@ -68,4 +68,4 @@ Query performance can degrade when there is high tempdb contention. Tempdb cont
6868

6969
## Data loading misconfiguration
7070

71-
You should always load data from a storage account in the same region as your dedicated SQL pool to minimize latency. Use the [COPY statement for high throughput data ingestion](/sql/t-sql/statements/copy-into-transact-sql?view=azure-sqldw-latest&preserve-view=true) and split your staged files in your storage account to maximize throughput. If you can't use the COPY statement, you can use the SqlBulkCopy API or bcp with a high batch size for better throughput. See [Best practices for data loading](../sql/data-loading-best-practices.md) for additional data loading guidance.
71+
You should always load data from a storage account in the same region as your dedicated SQL pool to minimize latency. Use the [COPY statement for high throughput data ingestion](/sql/t-sql/statements/copy-into-transact-sql?view=azure-sqldw-latest&preserve-view=true) and split your staged files in your storage account to maximize throughput. If you can't use the COPY statement, you can use the SqlBulkCopy API or bcp with a high batch size for better throughput. See [Best practices for data loading](../sql/data-loading-best-practices.md) for additional data loading guidance.

0 commit comments

Comments
 (0)