Skip to content

Commit 7136365

Browse files
authored
Merge pull request #266456 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents c543b10 + 0d84f1f commit 7136365

File tree

10 files changed

+88
-56
lines changed

10 files changed

+88
-56
lines changed

articles/ai-services/openai/assistants-reference-threads.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ curl https://YOUR_RESOURCE_NAME.openai.azure.com/openai/threads?api-version=2024
6666
## Retrieve thread
6767

6868
```http
69-
GET https://YOUR_RESOURCE_NAME.openai.azure.com/openai/threads{thread_id}?api-version=2024-02-15-preview
69+
GET https://YOUR_RESOURCE_NAME.openai.azure.com/openai/threads/{thread_id}?api-version=2024-02-15-preview
7070
```
7171

7272
Retrieves a thread.
@@ -224,4 +224,4 @@ curl https://YOUR_RESOURCE_NAME.openai.azure.com/openai/threads/{thread_id}?api-
224224
| `id` | string | The identifier, which can be referenced in API endpoints.|
225225
| `object` | string | The object type, which is always thread. |
226226
| `created_at` | integer | The Unix timestamp (in seconds) for when the thread was created. |
227-
| `metadata` | map | Set of 16 key-value pairs that can be attached to an object. This can be useful for storing additional information about the object in a structured format. Keys can be a maximum of 64 characters long and values can be a maximum of 512 characters long. |
227+
| `metadata` | map | Set of 16 key-value pairs that can be attached to an object. This can be useful for storing additional information about the object in a structured format. Keys can be a maximum of 64 characters long and values can be a maximum of 512 characters long. |

articles/aks/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -357,7 +357,7 @@ The AKS Linux Extension is an Azure VM extension that installs and configures mo
357357
358358
- [Node-exporter](https://github.com/prometheus/node_exporter): Collects hardware telemetry from the virtual machine and makes it available using a metrics endpoint. Then, a monitoring tool, such as Prometheus, is able to scrap these metrics.
359359
- [Node-problem-detector](https://github.com/kubernetes/node-problem-detector): Aims to make various node problems visible to upstream layers in the cluster management stack. It's a systemd unit that runs on each node, detects node problems, and reports them to the cluster's API server using Events and NodeConditions.
360-
- [ig](https://inspektor-gadget.io/docs/latest/ig/): An eBPF-powered open-source framework for debugging and observing Linux and Kubernetes systems. It provides a set of tools (or gadgets) designed to gather relevant information, allowing users to identify the cause of performance issues, crashes, or other anomalies. Notably, its independence from Kubernetes enables users to employ it also for debugging control plane issues.
360+
- [ig](https://go.microsoft.com/fwlink/p/?linkid=2260320): An eBPF-powered open-source framework for debugging and observing Linux and Kubernetes systems. It provides a set of tools (or gadgets) designed to gather relevant information, allowing users to identify the cause of performance issues, crashes, or other anomalies. Notably, its independence from Kubernetes enables users to employ it also for debugging control plane issues.
361361
362362
These tools help provide observability around many node health related problems, such as:
363363

articles/aks/manage-azure-rbac.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,13 @@ az role assignment create --role "Azure Kubernetes Service RBAC Admin" --assigne
103103
> az role assignment create --role "Azure Kubernetes Service RBAC Reader" --assignee <AAD-ENTITY-ID> --scope $AKS_ID/namespaces/<namespace-name>
104104
> ```
105105
106+
> [!NOTE]
107+
> In Azure portal, after creating role assignments scoped to a desired namespace, you won't be able to see "role assignments" for namespace [at a scope][list-role-assignments-at-a-scope-at-portal]. You can find it by using the [`az role assignment list`][az-role-assignment-list] command, or [list role assignments for a user or group][list-role-assignments-for-a-user-or-group-at-portal], which you assigned the role to.
108+
>
109+
> ```azurecli-interactive
110+
> az role assignment list --scope $AKS_ID/namespaces/<namespace-name>
111+
> ```
112+
106113
## Create custom roles definitions
107114
108115
The following example custom role definition allows a user to only read deployments and nothing else. For the full list of possible actions, see [Microsoft.ContainerService operations](../role-based-access-control/resource-provider-operations.md#microsoftcontainerservice).
@@ -215,19 +222,22 @@ To learn more about AKS authentication, authorization, Kubernetes RBAC, and Azur
215222
<!-- LINKS - Internal -->
216223
[aks-support-policies]: support-policies.md
217224
[aks-faq]: faq.md
218-
[az-extension-add]: /cli/azure/extension#az_extension_add
219-
[az-extension-update]: /cli/azure/extension#az_extension_update
220-
[az-feature-list]: /cli/azure/feature#az_feature_list
221-
[az-feature-register]: /cli/azure/feature#az_feature_register
222-
[az-aks-install-cli]: /cli/azure/aks#az_aks_install_cli
223-
[az-aks-create]: /cli/azure/aks#az_aks_create
224-
[az-aks-show]: /cli/azure/aks#az_aks_show
225-
[az-role-assignment-create]: /cli/azure/role/assignment#az_role_assignment_create
226-
[az-provider-register]: /cli/azure/provider#az_provider_register
227-
[az-group-create]: /cli/azure/group#az_group_create
228-
[az-aks-update]: /cli/azure/aks#az_aks_update
225+
[az-extension-add]: /cli/azure/extension#az-extension-add
226+
[az-extension-update]: /cli/azure/extension#az-extension-update
227+
[az-feature-list]: /cli/azure/feature#az-feature-list
228+
[az-feature-register]: /cli/azure/feature#az-feature-register
229+
[az-aks-install-cli]: /cli/azure/aks#az-aks-install-cli
230+
[az-aks-create]: /cli/azure/aks#az-aks-create
231+
[az-aks-show]: /cli/azure/aks#az-aks-show
232+
[list-role-assignments-at-a-scope-at-portal]: ../role-based-access-control/role-assignments-list-portal.md#list-role-assignments-at-a-scope
233+
[list-role-assignments-for-a-user-or-group-at-portal]: ../role-based-access-control/role-assignments-list-portal.md#list-role-assignments-for-a-user-or-group
234+
[az-role-assignment-create]: /cli/azure/role/assignment#az-role-assignment-create
235+
[az-role-assignment-list]: /cli/azure/role/assignment#az-role-assignment-list
236+
[az-provider-register]: /cli/azure/provider#az-provider-register
237+
[az-group-create]: /cli/azure/group#az-group-create
238+
[az-aks-update]: /cli/azure/aks#az-aks-update
229239
[managed-aad]: ./managed-azure-ad.md
230240
[install-azure-cli]: /cli/azure/install-azure-cli
231-
[az-role-definition-create]: /cli/azure/role/definition#az_role_definition_create
232-
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get-credentials
241+
[az-role-definition-create]: /cli/azure/role/definition#az-role-definition-create
242+
[az-aks-get-credentials]: /cli/azure/aks#az-aks-get-credentials
233243
[kubernetes-rbac]: /azure/aks/concepts-identity#azure-rbac-for-kubernetes-authorization

articles/communication-services/concepts/call-automation/call-automation.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,10 +54,11 @@ The following list presents the set of features that are currently available in
5454
| | Mute participant | ✔️ | ✔️ | ✔️ | ✔️ |
5555
| | Remove one or more endpoints from an existing call| ✔️ | ✔️ | ✔️ | ✔️ |
5656
| | Blind Transfer* a 1:1 call to another endpoint | ✔️ | ✔️ | ✔️ | ✔️ |
57-
| | Blind Transfer* a participant from group call to another endpoint | ✔️ | ✔️ | ✔️ | ✔️ |
57+
| | Blind Transfer* a participant from group call to another endpoint| ✔️ | ✔️ | ✔️ | ✔️ |
5858
| | Hang up a call (remove the call leg) | ✔️ | ✔️ | ✔️ | ✔️ |
5959
| | Terminate a call (remove all participants and end call)| ✔️ | ✔️ | ✔️ | ✔️ |
6060
| | Cancel media operations | ✔️ | ✔️ | ✔️ | ✔️ |
61+
| | Share [custom info](../../how-tos/call-automation/custom-context.md) (via VOIP or SIP headers) with endpoints when adding them to a call or transferring a call to them| ✔️ | ✔️ | ✔️ | ✔️ |
6162
| Query scenarios | Get the call state | ✔️ | ✔️ | ✔️ | ✔️ |
6263
| | Get a participant in a call | ✔️ | ✔️ | ✔️ | ✔️ |
6364
| | List all participants in a call | ✔️ | ✔️ | ✔️ | ✔️ |

articles/firewall/rule-processing.md

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,12 @@ If a Firewall Policy is inherited from a parent policy, Rule Collection Groups i
3131
3232
Here's an example policy:
3333

34+
Assuming BaseRCG1 is a rule collection group priority (200) that contains the rule collections: DNATRC1, DNATRC3,NetworkRC1.\
35+
BaseRCG2 is a rule collection group priority (300) that contains the rule collections: AppRC2, NetworkRC2.\
36+
ChildRCG1 is a rule collection group priority (200) that contains the rule collections: ChNetRC1, ChAppRC1.\
37+
ChildRCG2 is a rule collection group that contains the rule collections: ChNetRC2, ChAppRC2,ChDNATRC3.
38+
39+
As per following table:
3440

3541
|Name |Type |Priority |Rules |Inherited from
3642
|---------|---------|---------|---------|-------|
@@ -49,7 +55,32 @@ Here's an example policy:
4955
|ChAppRC2 | Application rule collection |2000 |7 |-|
5056
|ChDNATRC3 | DNAT rule collection | 3000 | 2 |-|
5157

52-
The rule processing is in the following order: DNATRC1, DNATRC3, ChDNATRC3, NetworkRC1, NetworkRC2, ChNetRC1, ChNetRC2, AppRC2, ChAppRC1, ChAppRC2.
58+
Initial Processing:
59+
60+
The process begins by examining the rule collection group (RCG) with the lowest number, which is BaseRCG1 with a priority of 200. Within this group, it searches for DNAT rule collections and evaluates them according to their priorities. In this case, DNATRC1 (priority 600) and DNATRC3 (priority 610) are found and processed accordingly.\
61+
Next, it moves to the next RCG, BaseRCG2 (priority 200), but finds no DNAT rule collection.\
62+
Following that, it proceeds to ChildRCG1 (priority 300), also without a DNAT rule collection.\
63+
Finally, it checks ChildRCG2 (priority 650) and finds the ChDNATRC3 rule collection (priority 3000).
64+
65+
Iteration Within Rule Collection Groups:
66+
67+
Returning to BaseRCG1, the iteration continues, this time for NETWORK rules. Only NetworkRC1 (priority 800) is found.\
68+
Then, it moves to BaseRCG2, where NetworkRC2 (priority 1300) is located.\
69+
Moving on to ChildRCG1, it discovers ChNetRC1 (priority 700) as the NETWORK rule.\
70+
Lastly, in ChildRCG2, it finds ChNetRC2 (priority 1100) as the NETWORK rule collection.
71+
72+
Final Iteration for APPLICATION Rules:
73+
74+
Returning to BaseRCG1, the process iterates for APPLICATION rules, but none are found.\
75+
In BaseRCG2, it identifies AppRC2 (priority 1200) as the APPLICATION rule.\
76+
In ChildRCG1, ChAppRC1 (priority 900) is found as the APPLICATION rule.\
77+
Finally, in ChildRCG2, it locates ChAppRC2 (priority 2000) as the APPLICATION rule.
78+
79+
**In summary, the rule processing sequence is as follows: DNATRC1, DNATRC3, ChDNATRC3, NetworkRC1, NetworkRC2, ChNetRC1, ChNetRC2, AppRC2, ChAppRC1, ChAppRC2.**
80+
81+
This process involves analyzing rule collection groups by priority, and within each group, ordering the rules according to their priorities for each rule type (DNAT, NETWORK, and APPLICATION).
82+
83+
So first all the DNAT rules are processed from all the rule collection groups, analysing the rule collection groups by order of priority and ordering the DNAT rules within each rule collection group by order of priority. Then the same process for NETWORK rules, and finally for APPLICATION rules.
5384

5485
For more information about Firewall Policy rule sets, see [Azure Firewall Policy rule sets](policy-rule-sets.md).
5586

articles/frontdoor/end-to-end-tls.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: frontdoor
55
author: duongau
66
ms.service: frontdoor
77
ms.topic: conceptual
8-
ms.date: 02/07/2023
8+
ms.date: 02/15/2024
99
ms.author: duau
1010
zone_pivot_groups: front-door-tiers
1111
---
@@ -30,11 +30,11 @@ Azure Front Door offloads the TLS sessions at the edge and decrypts client reque
3030

3131
## Supported TLS versions
3232

33-
Azure Front Door supports three versions of the TLS protocol: TLS versions 1.0, 1.1, and 1.2. All Azure Front Door profiles created after September 2019 use TLS 1.2 as the default minimum, but TLS 1.0 and TLS 1.1 are still supported for backward compatibility.
33+
Azure Front Door supports four versions of the TLS protocol: TLS versions 1.0, 1.1, 1.2 and 1.3. All Azure Front Door profiles created after September 2019 use TLS 1.2 as the default minimum with TLS 1.3 enabled, but TLS 1.0 and TLS 1.1 are still supported for backward compatibility.
3434

35-
Although Azure Front Door supports TLS 1.2, which introduced client/mutual authentication in RFC 5246, currently, Azure Front Door doesn't support client/mutual authentication.
35+
Although Azure Front Door supports TLS 1.2, which introduced client/mutual authentication in RFC 5246, currently, Azure Front Door doesn't support client/mutual authentication (mTLS) yet.
3636

37-
You can configure the minimum TLS version in Azure Front Door in the custom domain HTTPS settings using the Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2. As such, specifying TLS 1.2 as the minimum version controls the minimum acceptable TLS version Azure Front Door will accept from a client. When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept.
37+
You can configure the minimum TLS version in Azure Front Door in the custom domain HTTPS settings using the Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2. As such, specifying TLS 1.2 as the minimum version controls the minimum acceptable TLS version Azure Front Door will accept from a client. For minimum TLS version 1.2 the negotiation will attempt to establish TLS 1.3 and then TLS 1.2, while for minimum TLS version 1.0 all four versions will be attempted. When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept. Supported TLS versions for origin connections are TLS 1.0, TLS 1.1, TLS 1.2 and TLS 1.3.
3838

3939
## Supported certificates
4040

@@ -105,8 +105,9 @@ For your own custom TLS/SSL certificate:
105105

106106
## Supported cipher suites
107107

108-
For TLS 1.2 the following cipher suites are supported:
109-
108+
For TLS 1.2/1.3 the following cipher suites are supported:
109+
* TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
110+
* TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
110111
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
111112
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
112113
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
@@ -119,6 +120,8 @@ For TLS 1.2 the following cipher suites are supported:
119120
120121
When using custom domains with TLS 1.0 and 1.1 enabled, the following cipher suites are supported:
121122

123+
* TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
124+
* TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
122125
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
123126
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
124127
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

articles/machine-learning/how-to-setup-customer-managed-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ In the [customer-managed keys concepts article](concept-customer-managed-keys.md
4040

4141
## Limitations
4242

43-
* The customer-managed key for resources the workspace depends on can't be updated after workspace creation.
43+
* After workspace creation, the customer-managed encryption key for resources that the workspace depends on can only be updated to another key in the original Azure Key Vault resource..
4444
* Resources managed by Microsoft in your subscription can't transfer ownership to you.
4545
* You can't delete Microsoft-managed resources used for customer-managed keys without also deleting your workspace.
4646
* The key vault that contains your customer-managed key must be in the same Azure subscription as the Azure Machine Learning workspace.

articles/postgresql/flexible-server/generative-ai-azure-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,14 +110,14 @@ azure_ai.version()
110110

111111
### Examples
112112

113-
#### Set the Endpoint and an API Key for Azure Open AI
113+
#### Set the Endpoint and an API Key for Azure OpenAI
114114

115115
```postgresql
116116
select azure_ai.set_setting('azure_openai.endpoint','https://<endpoint>.openai.azure.com');
117117
select azure_ai.set_setting('azure_openai.subscription_key', '<API Key>');
118118
```
119119

120-
#### Get the Endpoint and API Key for Azure Open AI
120+
#### Get the Endpoint and API Key for Azure OpenAI
121121

122122
```postgresql
123123
select azure_ai.get_setting('azure_openai.endpoint');

0 commit comments

Comments
 (0)