Skip to content

Commit 68a85e2

Browse files
Merge pull request #100935 from MicrosoftDocs/master
Merge master to live 4:10 AM
2 parents e9776e6 + aacb16b commit 68a85e2

19 files changed

+45
-31
lines changed

articles/app-service/app-service-web-get-started-windows-container.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -159,15 +159,15 @@ The streamed logs looks like this:
159159

160160
## Use a different parent image
161161

162-
You're free to use a different custom Docker image to run your app. However, you must choose the right [parent image](https://docs.docker.com/develop/develop-images/baseimages/) for the framework you want:
162+
You're free to use a different custom Docker image to run your app. However, you must choose the right [parent image (base image)](https://docs.docker.com/develop/develop-images/baseimages/) for the framework you want:
163163

164164
- To deploy .NET Framework apps, use a parent image based on the Windows Server Core 2019 [Long-Term Servicing Channel (LTSC)](https://docs.microsoft.com/windows-server/get-started-19/servicing-channels-19#long-term-servicing-channel-ltsc) release.
165165
- To deploy .NET Core apps, use a parent image based on the Windows Server Nano 1809 [Semi-Annual Servicing Channel (SAC)](https://docs.microsoft.com/windows-server/get-started-19/servicing-channels-19#semi-annual-channel) release.
166166

167167
It takes some time to download a parent image during app start-up. However, you can reduce start-up time by using one of the following parent images that are already cached in Azure App Service:
168168

169169
- [mcr.microsoft.com/dotnet/framework/aspnet](https://hub.docker.com/_/microsoft-dotnet-framework-aspnet/):4.7.2-windowsservercore-ltsc2019
170-
- [mcr.microsoft.com/windows/nanoserver](https://hub.docker.com/_/microsoft-windows-nanoserver/):1809 - this image is the base container used across Microsoft [ASP.NET Core](https://hub.docker.com/_microsoft-dotnet-cores-aspnet) Microsoft Windows Nano Server images.
170+
- [mcr.microsoft.com/windows/nanoserver](https://hub.docker.com/_/microsoft-windows-nanoserver/):1809 - this image is the base container used across Microsoft [ASP.NET Core](https://hub.docker.com/_/microsoft-dotnet-core-aspnet/) Microsoft Windows Nano Server images.
171171

172172
## Next steps
173173

articles/app-service/containers/how-to-configure-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ az webapp config set --resource-group <resource-group-name> --name <app-name> --
4646

4747
## Container characteristics
4848

49-
Python apps deployed to App Service on Linux run within a Docker container that's defined in the GitHub repository, [Python 3.6](https://github.com/Azure-App-Service/python/tree/master/3.6.6) or [Python 3.7](https://github.com/Azure-App-Service/python/tree/master/3.7.0).
49+
Python apps deployed to App Service on Linux run within a Docker container that's defined in the [App Service Python GitHub repository](https://github.com/Azure-App-Service/python). You can find the image configurations inside the version-specific directories.
5050

5151
This container has the following characteristics:
5252

articles/app-service/containers/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@
180180
- name: Azure CLI
181181
href: /cli/azure/appservice
182182
- name: Azure PowerShell
183-
href: /powershell
183+
href: /powershell/module/az.websites/#app_service
184184
- name: REST API
185185
href: /rest/api/appservice/
186186
- name: Resources

articles/app-service/deploy-zip.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,8 @@ For more information, see [Kudu documentation](https://github.com/projectkudu/ku
8585

8686
To deploy a WAR file to App Service, send a POST request to `https://<app_name>.scm.azurewebsites.net/api/wardeploy`. The POST request must contain the .war file in the message body. The deployment credentials for your app are provided in the request by using HTTP BASIC authentication.
8787

88+
Always use `/api/wardeploy` when deploying WAR files. This API will expand your WAR file and place it on the shared file drive. using other deployment APIs may result in inconsistent behavior.
89+
8890
For the HTTP BASIC authentication, you need your App Service deployment credentials. To see how to set your deployment credentials, see [Set and reset user-level credentials](deploy-configure-credentials.md#userscope).
8991

9092
### With cURL

articles/app-service/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,7 @@
220220
- name: Azure CLI
221221
href: /cli/azure/appservice
222222
- name: Azure PowerShell
223-
href: /powershell
223+
href: /powershell/module/az.websites/#app_service
224224
- name: REST API
225225
href: /rest/api/appservice/
226226
- name: Resource Manager template

articles/automation/automation-secure-asset-encryption.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ Based on the top-level key used for the encryption, there are two models for enc
1818
- Using Microsoft-managed keys
1919
- Using customer-managed keys
2020

21-
### Microsoft-managed Keys
21+
## Microsoft-managed Keys
2222

2323
By default, your Azure Automation account uses Microsoft-managed keys.
2424

2525
Each secure asset is encrypted and stored in Azure Automation using a unique key (Data Encryption key) that is generated for each automation account. These keys themselves are encrypted and stored in Azure Automation using yet another unique key that is generated for each account called an Account Encryption Key (AEK). These account encryption keys encrypted and stored in Azure Automation using Microsoft Managed Keys.
2626

27-
### Customer-managed Keys with Key Vault (preview)
27+
## Customer-managed Keys with Key Vault (preview)
2828

2929
You can manage encryption of secure assets in Azure Automation at the level of an automation account with your own keys. When you specify a customer-managed key at the level of the Automation account, that key is used to protect and control access to the account encryption key for the automation account, which in turn is used to encrypt and decrypt all the secure assets. Customer-managed keys offer greater flexibility to create, rotate, disable, and revoke access controls. You can also audit the encryption keys used to protect your secure assets.
3030

@@ -36,12 +36,12 @@ When you enable encryption with customer-managed keys for an automation account,
3636

3737
A new automation account is always encrypted using Microsoft-managed keys. It's not possible to enable customer-managed keys at the time that the account is created. Customer-managed keys are stored in Azure Key Vault, and the key vault must be provisioned with access policies that grant key permissions to the managed identity that is associated with the automation account. The managed identity is available only after the storage account is created.
3838

39-
When you modify the key being used for Azure Automation secure asset encryption by enabling or disabling customer-managed keys, updating the key version, or specifying a different key, then the encryption of the root key changes, but the secure assets in your Azure Automation account do not need to be re-encrypted.
39+
When you modify the key being used for Azure Automation secure asset encryption by enabling or disabling customer-managed keys, updating the key version, or specifying a different key, then the encryption of the account encryption key changes, but the secure assets in your Azure Automation account do not need to be re-encrypted.
4040

4141
The following three sections describe the mechanics of enabling customer-managed keys for an Automation account.
4242

4343
> [!NOTE]
44-
> To enable customer-managed keys, you will currently need to make Azure Automation REST APIs using api version 2020-01-13-preview
44+
> To enable customer-managed keys, you will currently need to make Azure Automation REST API calls using api version 2020-01-13-preview
4545
4646
### Pre-requisites for using Customer-managed keys in Azure Automation
4747

@@ -122,7 +122,7 @@ Request body
122122
```
123123

124124
> [!NOTE]
125-
> The tenantId and objectId fields must be provided with values of identity.tenantId and identity.principalId from the response of managed identity for the automation account.
125+
> The **tenantId** and **objectId** fields must be provided with values of **identity.tenantId** and **identity.principalId** respectively from the response of managed identity for the automation account.
126126
127127
### Change the configuration of automation account to use customer managed key
128128

@@ -175,11 +175,11 @@ Sample response
175175

176176
You can rotate a customer-managed key in Azure Key Vault according to your compliance policies. When the key is rotated, you must update the automation account to use the new key URI.
177177

178-
Rotating the key does not trigger re-encryption of data in the storage account. There is no further action required from the user.
178+
Rotating the key does not trigger re-encryption of secure assets in the automation account. There is no further action required from the user.
179179

180-
## Revoke access to customer-managed keys
180+
### Revoke access to customer-managed keys
181181

182-
To revoke access to customer-managed keys, use PowerShell or Azure CLI. For more information, see [Azure Key Vault PowerShell](https://docs.microsoft.com/powershell/module/az.keyvault/) or [Azure Key Vault CLI](https://docs.microsoft.com/cli/azure/keyvault). Revoking access effectively blocks access to all data in the storage account, as the encryption key is inaccessible by Azure Storage.
182+
To revoke access to customer-managed keys, use PowerShell or Azure CLI. For more information, see [Azure Key Vault PowerShell](https://docs.microsoft.com/powershell/module/az.keyvault/) or [Azure Key Vault CLI](https://docs.microsoft.com/cli/azure/keyvault). Revoking access effectively blocks access to all secure assets in the automation account, as the encryption key is inaccessible by Azure Automation.
183183

184184
## Next steps
185185

articles/backup/tutorial-backup-azure-files.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ Before you can back up an Azure file share, ensure that it's present in one of t
2323

2424
Backup for Azure file shares is in preview. Azure file shares in both general-purpose v1 and general-purpose v2 storage accounts are supported. The following backup scenarios aren't supported for Azure file shares:
2525

26-
* You can't protect Azure file shares in storage accounts that have Virtual Networks or Firewall enabled.
2726
* There is no CLI available for protecting Azure Files using Azure Backup.
2827
* The maximum number of scheduled backups per day is one.
2928
* The maximum number of on-demand backups per day is four.

articles/cognitive-services/Speech-Service/batch-transcription.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -154,6 +154,7 @@ For mono input audio, one transcription result file is being created. For stereo
154154
"Duration": number 'time in milliseconds'
155155
"OffsetInSeconds": number 'Real number. Two decimal places'
156156
"DurationInSeconds": number 'Real number. Two decimal places'
157+
"Confidence": number 'between 0 and 1'
157158
}
158159
]
159160
}

articles/data-factory/solution-template-bulk-copy-from-files-to-database.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Bulk Copy from Files to Database
2+
title: Bulk copy from files to database
33
description: Learn how to use a solution template to copy data in bulk from Azure Data Lake Storage Gen2 to Azure Synapse Analytics / Azure SQL Database.
44
services: data-factory
55
author: linda33wj
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
ms.date: 01/08/2020
1111
---
1212

13-
# Bulk Copy from Files to Database
13+
# Bulk copy from files to database
1414

1515
This article describes a solution template that you can use to copy data in bulk from Azure Data Lake Storage Gen2 to Azure Synapse Analytics / Azure SQL Database.
1616

articles/event-grid/cloudevents-schema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Here is an example of an Azure Blob Storage event in CloudEvents format:
5656
}
5757
```
5858

59-
A detailed description of the available fields, their types, and definitions in CloudEvents v0.1 is [available here](https://github.com/cloudevents/spec/blob/v1.0/spec.md#required-attributes).
59+
A detailed description of the available fields, their types, and definitions in CloudEvents v1.0 is [available here](https://github.com/cloudevents/spec/blob/v1.0/spec.md#required-attributes).
6060

6161
The headers values for events delivered in the CloudEvents schema and the Event Grid schema are the same except for `content-type`. For CloudEvents schema, that header value is `"content-type":"application/cloudevents+json; charset=utf-8"`. For Event Grid schema, that header value is `"content-type":"application/json; charset=utf-8"`.
6262

0 commit comments

Comments
 (0)