Skip to content

Commit 68ce3d6

Browse files
Merge pull request #174474 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/azure-docs (branch master)
2 parents 8b17e6e + 529505c commit 68ce3d6

File tree

10 files changed

+29
-25
lines changed

10 files changed

+29
-25
lines changed

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -442,7 +442,7 @@ The "Attempt Status" field under the "AzureAdPrt" field will provide the status
442442

443443
Use Event Viewer to look for the log entries that are logged by the Azure AD CloudAP plug-in during PRT acquisition.
444444

445-
1. In Event Viewer, open the Azure AD event logs. They're stored under **Applications and Services Log** > **Microsoft** > **Windows** > **User Device Registration**.
445+
1. In Event Viewer, open the Azure AD Operational event logs. They're stored under **Applications and Services Log** > **Microsoft** > **Windows** > **AAD**.
446446

447447
> [!NOTE]
448448
> The CloudAP plug-in logs error events in the operational logs, and it logs the info events in the analytics logs. The analytics and operational log events are both required to troubleshoot issues.

articles/api-management/api-management-access-restriction-policies.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -388,6 +388,9 @@ In the following example, the quota is keyed by the caller IP address.
388388
| increment-condition | The boolean expression specifying if the request should be counted towards the quota (`true`) | No | N/A |
389389
| renewal-period | The time period in seconds after which the quota resets. When it's set to `0` the period is set to infinite. | Yes | N/A |
390390

391+
> [!NOTE]
392+
> The `counter-key` attribute value must be unique across all the APIs in the API Management if you don't want to share the total between the other APIs.
393+
391394
### Usage
392395

393396
This policy can be used in the following policy [sections](./api-management-howto-policies.md#sections) and [scopes](./api-management-howto-policies.md#scopes).

articles/availability-zones/az-region.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,10 +47,10 @@ To achieve comprehensive business continuity on Azure, build your application ar
4747
| Brazil South | France Central | South Africa North* | Australia East |
4848
| Canada Central | Germany West Central | | Central India* |
4949
| Central US | North Europe | | Japan East |
50-
| East US | Norway East | | Korea Central* |
50+
| East US | Norway East | | Korea Central |
5151
| East US 2 | UK South | | Southeast Asia |
5252
| South Central US | West Europe | | |
53-
| US Gov Virginia | | | |
53+
| US Gov Virginia | Sweden* | | |
5454
| West US 2 | | | |
5555
| West US 3 | | | |
5656

articles/azure-maps/weather-services-faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,6 @@ additionalContent: |
118118
* The comments section of this article.
119119
* [MSFT Q&A page for Azure Maps](/answers/topics/azure-maps.html).
120120
* Microsoft Support. To create a new support request, in the [Azure portal](https://portal.azure.com/), on the Help tab, select the **Help +** support button, and then select **New support request**.
121-
* [Azure Maps UserVoice](https://feedback.azure.com/forums/909172-azure-maps) to submit feature requests.
122121
123122
Learn how to request real-time and forecasted weather data using Azure Maps Weather services:
124123
> [!div class="nextstepaction"]

articles/azure-monitor/app/java-standalone-arguments.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ Locate the file `<tomcat>/bin/tomcat8w.exe`. Run that executable and add `-java
8989
Add `-javaagent:path/to/applicationinsights-agent-3.1.1.jar` to the existing `JAVA_OPTS` environment variable in the file `JBOSS_HOME/bin/standalone.conf` (Linux) or `JBOSS_HOME/bin/standalone.conf.bat` (Windows):
9090

9191
```java ...
92-
JAVA_OPTS="<b>-javaagent:path/to/applicationinsights-agent-3.1.1.jar</b> -Xms1303m -Xmx1303m ..."
92+
JAVA_OPTS="-javaagent:path/to/applicationinsights-agent-3.1.1.jar -Xms1303m -Xmx1303m ..."
9393
...
9494
```
9595

articles/azure-sql/virtual-machines/windows/availability-group-az-commandline-configure.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,11 +73,11 @@ az storage account create -n <name> -g <resource group name> -l <region> `
7373
# Create the storage account
7474
# example: New-AzStorageAccount -ResourceGroupName SQLVM-RG -Name cloudwitness `
7575
# -SkuName Standard_LRS -Location West US -Kind StorageV2 `
76-
# -AccessTier Hot -EnableHttpsTrafficOnly
76+
# -AccessTier Hot -EnableHttpsTrafficOnly $true
7777
7878
New-AzStorageAccount -ResourceGroupName <resource group name> -Name <name> `
7979
-SkuName Standard_LRS -Location <region> -Kind StorageV2 `
80-
-AccessTier Hot -EnableHttpsTrafficOnly
80+
-AccessTier Hot -EnableHttpsTrafficOnly $true
8181
```
8282

8383
---
@@ -117,12 +117,13 @@ az sql vm group create -n <cluster name> -l <region ex:eastus> -g <resource grou
117117
# -StorageAccountUrl '<ex:https://cloudwitness.blob.core.windows.net/>' `
118118
# -StorageAccountPrimaryKey '4Z4/i1Dn8/bpbseyWX'
119119
120+
$storageAccountPrimaryKey = ConvertTo-SecureString -String "<PublicKey>" -AsPlainText -Force
120121
$group = New-AzSqlVMGroup -Name <name> -Location <regio>
121122
-ResourceGroupName <resource group name> -Offer <SQL201?-WS201?>
122123
-Sku Enterprise -DomainFqdn <FQDN> -ClusterOperatorAccount <domain account>
123124
-ClusterBootstrapAccount <domain account> -SqlServiceAccount <service account>
124125
-StorageAccountUrl '<ex:StorageAccountUrl>' `
125-
-StorageAccountPrimaryKey '<PublicKey>'
126+
-StorageAccountPrimaryKey $storageAccountPrimaryKey
126127
```
127128

128129
---

articles/azure-sql/virtual-machines/windows/availability-group-manually-configure-multiple-regions.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,6 +148,8 @@ To create a replica in a remote data center, do the following steps:
148148

149149
1. On the new SQL Server in SQL Server Configuration Manager, [enable Always On Availability Groups](/sql/database-engine/availability-groups/windows/enable-and-disable-always-on-availability-groups-sql-server).
150150

151+
1. On the new SQL Server in SQL Server Management Studio, [configure system account permissions](availability-group-manually-configure-prerequisites-tutorial.md#configure-system-account-permissions).
152+
151153
1. [Open firewall ports on the new SQL Server](availability-group-manually-configure-prerequisites-tutorial.md#endpoint-firewall).
152154

153155
The port numbers you need to open depend on your environment. Open ports for the mirroring endpoint and Azure load balancer health probe.
@@ -156,12 +158,13 @@ To create a replica in a remote data center, do the following steps:
156158
1. [Add a replica to the availability group on the new SQL Server](/sql/database-engine/availability-groups/windows/use-the-add-replica-to-availability-group-wizard-sql-server-management-studio).
157159

158160
For a replica in a remote Azure region, set it for asynchronous replication with manual failover.
161+
159162

160163
## Set connection for multiple subnets
161164

162165
The replica in the remote data center is part of the availability group but it is in a different subnet. If this replica becomes the primary replica, application connection time-outs may occur. This behavior is the same as an on-premises availability group in a multi-subnet deployment. To allow connections from client applications, either update the client connection or configure name resolution caching on the cluster network name resource.
163166

164-
Preferably, update the client connection strings to set `MultiSubnetFailover=Yes`. See [Connecting With MultiSubnetFailover](/sql/relational-databases/native-client/features/sql-server-native-client-support-for-high-availability-disaster-recovery#Anchor_0).
167+
Preferably, update the cluster configuration to set `RegisterAllProvidersIP=1` and the client connection strings to set `MultiSubnetFailover=Yes`. See [Connecting With MultiSubnetFailover](/sql/relational-databases/native-client/features/sql-server-native-client-support-for-high-availability-disaster-recovery#Anchor_0).
165168

166169
If you cannot modify the connection strings, you can configure name resolution caching. See [Time-out error and you cannot connect to a SQL Server 2012 AlwaysOn availability group listener in a multi-subnet environment](https://support.microsoft.com/help/2792139/time-out-error-and-you-cannot-connect-to-a-sql-server-2012-alwayson-av).
167170

@@ -204,4 +207,4 @@ To learn more, see:
204207
- [Windows Server Failover Cluster with SQL Server on Azure VMs](hadr-windows-server-failover-cluster-overview.md)
205208
- [Always On availability groups with SQL Server on Azure VMs](availability-group-overview.md)
206209
- [Always On availability groups overview](/sql/database-engine/availability-groups/windows/overview-of-always-on-availability-groups-sql-server)
207-
- [HADR settings for SQL Server on Azure VMs](hadr-cluster-best-practices.md)
210+
- [HADR settings for SQL Server on Azure VMs](hadr-cluster-best-practices.md)

articles/devtest-labs/encrypt-disks-customer-managed-keys.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,17 @@
11
---
2-
title: Encrypt OS disks using customer-managed keys
3-
description: Learn how to encrypt operating system (OS) disks using customer-managed keys in Azure DevTest Labs.
2+
title: Encrypt disks using customer-managed keys
3+
description: Learn how to encrypt disks using customer-managed keys in Azure DevTest Labs.
44
ms.topic: how-to
5-
ms.date: 09/01/2020
5+
ms.date: 09/29/2021
66
---
77

8-
# Encrypt operating system (OS) disks using customer-managed keys in Azure DevTest Labs
8+
# Encrypt disks using customer-managed keys in Azure DevTest Labs
99
Server-side encryption (SSE) protects your data and helps you meet your organizational security and compliance commitments. SSE automatically encrypts your data stored on managed disks in Azure (OS and data disks) at rest by default when persisting it to the cloud. Learn more about [Disk Encryption](../virtual-machines/disk-encryption.md) on Azure.
1010

11-
Within DevTest Labs, all OS disks and data disks created as part of a lab are encrypted using platform-managed keys. However, as a lab owner you can choose to encrypt lab virtual machine OS disks using your own keys. If you choose to manage encryption with your own keys, you can specify a **customer-managed key** to use for encrypting data in lab OS disks. To learn more on Server-side encryption (SSE) with customer-managed keys, and other managed disk encryption types, see [Customer-managed keys](../virtual-machines/disk-encryption.md#customer-managed-keys). Also, see [restrictions with using customer-managed keys](../virtual-machines/disks-enable-customer-managed-keys-portal.md#restrictions).
11+
Within DevTest Labs, all OS disks and data disks created as part of a lab are encrypted using platform-managed keys. However, as a lab owner you can choose to encrypt lab virtual machine disks using your own keys. If you choose to manage encryption with your own keys, you can specify a **customer-managed key** to use for encrypting data in lab disks. To learn more on Server-side encryption (SSE) with customer-managed keys, and other managed disk encryption types, see [Customer-managed keys](../virtual-machines/disk-encryption.md#customer-managed-keys). Also, see [restrictions with using customer-managed keys](../virtual-machines/disks-enable-customer-managed-keys-portal.md#restrictions).
1212

1313
> [!NOTE]
14-
> - Currently disk encryption with a customer-managed key is supported only for OS disks in DevTest Labs.
15-
>
16-
> - The setting applies to newly created OS disks in the lab. If you choose to change the disk encryption set at some point, older disks in the lab will continue to remain encrypted using the previous disk encryption set.
14+
> - The setting applies to newly created disks in the lab. If you choose to change the disk encryption set at some point, older disks in the lab will continue to remain encrypted using the previous disk encryption set.
1715
1816
The following section shows how a lab owner can set up encryption using a customer-managed key.
1917

@@ -22,12 +20,12 @@ The following section shows how a lab owner can set up encryption using a custom
2220
1. If you don’t have a disk encryption set, follow this article to [set up a Key Vault and a Disk Encryption Set](../virtual-machines/disks-enable-customer-managed-keys-portal.md). Note the following requirements for the disk encryption set:
2321

2422
- The disk encryption set needs to be **in same region and subscription as your lab**.
25-
- Ensure you (lab owner) have at least a **reader-level access** to the disk encryption set that will be used to encrypt lab OS disks.
23+
- Ensure you (lab owner) have at least a **reader-level access** to the disk encryption set that will be used to encrypt lab disks.
2624
1. For labs created prior to 8/1/2020, lab owner will need to ensure lab system assigned identity is enabled. To do so, lab owner can go to their lab, click on **Configuration and policies**, click on **Identity (Preview)** blade, change System Assigned identity **Status** to **On** and click on **Save**. For new labs created after 8/1/2020 lab's system assigned identity will be enabled by default.
2725

2826
> [!div class="mx-imgBorder"]
2927
> :::image type="content" source="./media/encrypt-disks-customer-managed-keys/managed-keys.png" alt-text="Managed keys":::
30-
1. For the lab to handle encryption for all the lab OS disks, lab owner needs to explicitly grant the lab’s **system-assigned identity** reader role on the disk encryption set as well as virtual machine contributor role on the underlying Azure subscription. Lab owner can do so by completing the following steps:
28+
1. For the lab to handle encryption for all the lab disks, lab owner needs to explicitly grant the lab’s **system-assigned identity** reader role on the disk encryption set as well as virtual machine contributor role on the underlying Azure subscription. Lab owner can do so by completing the following steps:
3129

3230

3331
1. Ensure you are a member of [User Access Administrator role](../role-based-access-control/built-in-roles.md#user-access-administrator) at the Azure subscription level so that you can manage user access to Azure resources.
@@ -67,7 +65,7 @@ The following section shows how a lab owner can set up encryption using a custom
6765
:::image type="content" source="./media/encrypt-disks-customer-managed-keys/disk-encryption-set.png" alt-text="Enable encryption with customer-managed key":::
6866
1. On the message box with the following text: *This setting will apply to newly created machines in the lab. Old OS disk will remain encrypted with the old disk encryption set*, select **OK**.
6967

70-
Once configured, lab OS disks will be encrypted with the customer-managed key provided using the disk encryption set.
68+
Once configured, lab disks will be encrypted with the customer-managed key provided using the disk encryption set.
7169

7270
## How to validate if disks are being encrypted
7371

@@ -89,4 +87,4 @@ The following section shows how a lab owner can set up encryption using a custom
8987
See the following articles:
9088

9189
- [Azure Disk Encryption](../virtual-machines/disk-encryption.md).
92-
- [Customer-managed keys](../virtual-machines/disk-encryption.md#customer-managed-keys)
90+
- [Customer-managed keys](../virtual-machines/disk-encryption.md#customer-managed-keys)

articles/machine-learning/how-to-machine-learning-interpretability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Using the classes and methods in the SDK, you can:
4949

5050
In machine learning, **features** are the data fields used to predict a target data point. For example,
5151
to predict credit risk, data fields for age, account size, and account age might be used. In this case,
52-
age, account size, and account age are **features**. Feature importance tells you how each data field affected the model's predictions. For example, age may be heavily used in the prediction while account size and age do not affect the prediction values significantly. This process allows data scientists to explain resulting predictions, so that stakeholders have visibility into what features are most important in the model.
52+
age, account size, and account age are **features**. Feature importance tells you how each data field affected the model's predictions. For example, age may be heavily used in the prediction while account size and account age do not affect the prediction values significantly. This process allows data scientists to explain resulting predictions, so that stakeholders have visibility into what features are most important in the model.
5353

5454
## Supported interpretability techniques
5555

@@ -103,4 +103,4 @@ You can run explanation remotely on Azure Machine Learning Compute and log the e
103103
- See the [how-to](how-to-machine-learning-interpretability-aml.md) for enabling interpretability for models training both locally and on Azure Machine Learning remote compute resources.
104104
- Learn how to enable [interpretability for automated machine learning models](how-to-machine-learning-interpretability-automl.md).
105105
- See the [sample notebooks](https://github.com/Azure/MachineLearningNotebooks/tree/master/how-to-use-azureml/explain-model) for additional scenarios.
106-
- If you're interested in interpretability for text scenarios, see [Interpret-text](https://github.com/interpretml/interpret-text), a related open source repo to [Interpret-Community](https://github.com/interpretml/interpret-community/), for interpretability techniques for NLP. `azureml.interpret` package does not currently support these techniques but you can get started with an [example notebook on text classification](https://github.com/interpretml/interpret-text/blob/master/notebooks/text_classification/text_classification_classical_text_explainer.ipynb).
106+
- If you're interested in interpretability for text scenarios, see [Interpret-text](https://github.com/interpretml/interpret-text), a related open source repo to [Interpret-Community](https://github.com/interpretml/interpret-community/), for interpretability techniques for NLP. `azureml.interpret` package does not currently support these techniques but you can get started with an [example notebook on text classification](https://github.com/interpretml/interpret-text/blob/master/notebooks/text_classification/text_classification_classical_text_explainer.ipynb).

articles/storage/blobs/object-replication-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ When you configure object replication in the Azure portal, you only need to conf
4141
To create a replication policy in the Azure portal, follow these steps:
4242

4343
1. Navigate to the source storage account in the Azure portal.
44-
1. Under **Blob service**, select **Object replication**.
44+
1. Under **Data management**, select **Object replication**.
4545
1. Select **Set up replication rules**.
4646
1. Select the destination subscription and storage account.
4747
1. In the **Container pairs** section, select a source container from the source account, and a destination container from the destination account. You can create up to 10 container pairs per replication policy.

0 commit comments

Comments
 (0)