Skip to content

Commit 6c166b0

Browse files
committed
Merge branch 'main' into eur/speech-containers
2 parents 42cb267 + e31b37f commit 6c166b0

File tree

172 files changed

+3543
-944
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

172 files changed

+3543
-944
lines changed

articles/active-directory/authentication/howto-mfa-app-passwords.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,8 +99,7 @@ By default, users can't create app passwords. The app passwords feature must be
9999

100100
When users complete their initial registration for Azure AD Multi-Factor Authentication, there's an option to create app passwords at the end of the registration process.
101101

102-
Users can also create app passwords after registration. For more information and detailed steps for your users, see the following resources:
103-
* [What are app passwords in Azure AD Multi-Factor Authentication?](https://support.microsoft.com/account-billing/manage-app-passwords-for-two-step-verification-d6dc8c6d-4bf7-4851-ad95-6d07799387e9)
102+
Users can also create app passwords after registration. For more information and detailed steps for your users, see the following resource:
104103
* [Create app passwords from the Security info page](https://support.microsoft.com/account-billing/create-app-passwords-from-the-security-info-preview-page-d8bc744a-ce3f-4d4d-89c9-eb38ab9d4137)
105104

106105
## Next steps

articles/active-directory/enterprise-users/clean-up-unmanaged-azure-ad-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Run the following cmdlets:
6262

6363
To identify unmanaged Azure AD accounts, run:
6464

65-
* `Connect-MgGraph -Scope User.ReadAll`
65+
* `Connect-MgGraph -Scope User.Read.All`
6666
* `Get-MsIdUnmanagedExternalUser`
6767

6868
To reset unmanaged Azure AD account redemption status, run:

articles/aks/limit-egress-traffic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -321,7 +321,7 @@ az group create --name $RG --location $LOC
321321

322322
Create a virtual network with two subnets to host the AKS cluster and the Azure Firewall. Each will have their own subnet. Let's start with the AKS network.
323323

324-
```
324+
```azurecli
325325
# Dedicated virtual network with AKS subnet
326326
327327
az network vnet create \
@@ -560,7 +560,7 @@ If you used authorized IP ranges for the cluster on the previous step, you must
560560

561561
Add another IP address to the approved ranges with the following command
562562

563-
```bash
563+
```azurecli
564564
# Retrieve your IP address
565565
CURRENT_IP=$(dig @resolver1.opendns.com ANY myip.opendns.com +short)
566566

articles/application-gateway/ingress-controller-install-new.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -245,10 +245,8 @@ Kubernetes. We'll use it to install the `application-gateway-kubernetes-ingress`
245245
sed -i "s|<applicationGatewayName>|${applicationGatewayName}|g" helm-config.yaml
246246
sed -i "s|<identityResourceId>|${identityResourceId}|g" helm-config.yaml
247247
sed -i "s|<identityClientId>|${identityClientId}|g" helm-config.yaml
248-
249-
# You can further modify the helm config to enable/disable features
250-
nano helm-config.yaml
251248
```
249+
252250
253251
> [!NOTE]
254252
> **For deploying to Sovereign Clouds (e.g., Azure Government)**, the `appgw.environment` configuration parameter must be added and set to the appropriate value as documented below.

articles/azure-arc/data/includes/azure-arc-data-preview-release.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,10 @@ ms.service: azure-arc
55
ms.topic: include
66
ms.date: 12/7/2022
77
---
8-
<!---
9-
At this time, a test or preview build is not available for the next release.
10-
-->
118

9+
At this time, a test or preview build is not available for the next release.
1210

11+
<!---
1312
April 2023 preview release is now available.
1413
1514
|Component|Value|
@@ -45,3 +44,4 @@ April 2023 preview release is now available.
4544
- Arc SQL Server | Azure Policy to enable best practices assessment at scale
4645
- Arc PostgreSQL | Ensure postgres extensions work per database/role.
4746
- Arc PostgreSQL | Upload metrics/logs to Azure Monitor
47+
-->

articles/azure-arc/data/managed-instance-disaster-recovery.md

Lines changed: 143 additions & 26 deletions
Large diffs are not rendered by default.
Binary file not shown.
81.8 KB
Loading

articles/azure-arc/data/release-notes.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,23 @@ ms.custom: references_regions, devx-track-azurecli, event-tier1-build-2022
1717

1818
This article highlights capabilities, features, and enhancements recently released or improved for Azure Arc-enabled data services.
1919

20+
## April 12, 2023
21+
22+
### Image tag
23+
24+
`v1.18.0_2023-04-11`
25+
26+
For complete release version information, see [Version log](version-log.md#april-11-2023).
27+
28+
New for this release:
29+
30+
- Azure Arc-enabled SQL Managed Instance
31+
- Direct mode for failover groups is generally available az CLI
32+
33+
- Arc PostgreSQL
34+
- Ensure postgres extensions work per database/role
35+
- Arc PostgreSQL | Upload metrics/logs to Azure Monitor
36+
2037
## March 14, 2023
2138

2239
### Image tag

articles/azure-arc/data/sizing-guidance.md

Lines changed: 90 additions & 47 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)