Skip to content

Commit 717ecb2

Browse files
authored
Merge branch 'main' into docs-editor/release-notes-1720626600
2 parents b36eac9 + 0e428bc commit 717ecb2

File tree

912 files changed

+13086
-12239
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

912 files changed

+13086
-12239
lines changed

.openpublishing.redirection.app-service.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1850,6 +1850,16 @@
18501850
"redirect_url": "/azure/app-service/scripts/powershell-scale-manual",
18511851
"redirect_document_id": false
18521852
},
1853+
{
1854+
"source_path_from_root": "/articles/app-service/get-resource-events.md",
1855+
"redirect_url": "/azure/app-service/monitor-app-service",
1856+
"redirect_document_id": false
1857+
},
1858+
{
1859+
"source_path_from_root": "/articles/app-service/overview-monitoring.md",
1860+
"redirect_url": "/azure/app-service/monitor-app-service",
1861+
"redirect_document_id": false
1862+
},
18531863
{
18541864
"source_path_from_root": "/articles/app-service/app-service-security-attributes.md",
18551865
"redirect_url": "/azure/app-service/security-baseline",

.openpublishing.redirection.azure-monitor.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@
1010
"redirect_url": "/azure/azure-monitor/vm/scom-managed-instance-overview",
1111
"redirect_document_id": false
1212
},
13+
{
14+
"source_path_from_root": "/articles/azure-monitor/scom-manage-instance/monitor-arc-enabled-vm-with-scom-managed-instance.md",
15+
"redirect_url": "/azure/azure-monitor/scom-manage-instance/monitor-azure-off-azure-vm-with-scom-managed-instance",
16+
"redirect_document_id": false
17+
},
1318
{
1419
"source_path_from_root": "/articles/azure-monitor/scom-manage-instance/common-questions.md",
1520
"redirect_url": "/azure/azure-monitor/scom-manage-instance/scom-managed-instance-faq",
@@ -5559,6 +5564,41 @@
55595564
"redirect_url": "/azure/azure-monitor/essentials/resource-manager-diagnostic-settings#diagnostic-setting-for-activity-log",
55605565
"redirect_document_id": false
55615566
},
5567+
{
5568+
"source_path_from_root": "/articles/azure-monitor/app/availability-overview.md",
5569+
"redirect_url": "/azure/azure-monitor/app/availability",
5570+
"redirect_document_id": false
5571+
},
5572+
{
5573+
"source_path_from_root": "/articles/azure-monitor/app/availability-standard-tests.md",
5574+
"redirect_url": "/azure/azure-monitor/app/availability",
5575+
"redirect_document_id": false
5576+
},
5577+
{
5578+
"source_path_from_root": "/articles/azure-monitor/app/availability-azure-functions.md",
5579+
"redirect_url": "/azure/azure-monitor/app/availability",
5580+
"redirect_document_id": false
5581+
},
5582+
{
5583+
"source_path_from_root": "/articles/azure-monitor/app/availability-private-test.md",
5584+
"redirect_url": "/azure/azure-monitor/app/availability",
5585+
"redirect_document_id": false
5586+
},
5587+
{
5588+
"source_path_from_root": "/articles/azure-monitor/app/availability-alerts.md",
5589+
"redirect_url": "/azure/azure-monitor/app/availability",
5590+
"redirect_document_id": false
5591+
},
5592+
{
5593+
"source_path_from_root": "/articles/azure-monitor/app/availability-test-migration.md",
5594+
"redirect_url": "/azure/azure-monitor/app/availability",
5595+
"redirect_document_id": false
5596+
},
5597+
{
5598+
"source_path_from_root": "/articles/azure-monitor/app/sla-report.md",
5599+
"redirect_url": "/azure/azure-monitor/app/availability",
5600+
"redirect_document_id": false
5601+
},
55625602
{
55635603
"source_path_from_root": "/articles/azure-monitor/app/tutorial-alert.md",
55645604
"redirect_url": "/azure/azure-monitor/app/availability-standard-tests",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -980,6 +980,11 @@
980980
"redirect_url": "/azure/defender-for-cloud/view-and-remediate-vulnerability-registry-images",
981981
"redirect_document_id": false
982982
},
983+
{
984+
"source_path_from_root": "/articles/defender-for-cloud/management-groups-roles.md",
985+
"redirect_url": "/azure/governance/management-groups/overview",
986+
"redirect_document_id": false
987+
},
983988
{
984989
"source_path_from_root": "/articles/defender-for-cloud/how-to-migrate-to-built-in.md",
985990
"redirect_url": "/azure/defender-for-cloud/how-to-transition-to-built-in",

.openpublishing.redirection.json

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/digital-twins/how-to-integrate-maps.md",
5+
"redirect_url": "/previous-versions/azure/digital-twins/how-to-integrate-maps",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/mysql/single-server/azure-pipelines-mysql-deploy.md",
510
"redirect_url": "/previous-versions/azure/mysql/single-server/azure-pipelines-mysql-deploy",
@@ -1242,7 +1247,22 @@
12421247
},
12431248
{
12441249
"source_path_from_root": "/articles/azure-maps/tutorial-creator-feature-stateset.md",
1245-
"redirect_url": "/azure/azure-maps/how-to-creator-feature-stateset",
1250+
"redirect_url": "/azure/azure-maps/about-creator",
1251+
"redirect_document_id": false
1252+
},
1253+
{
1254+
"source_path_from_root": "/articles/azure-maps/schema-stateset-stylesobject.md",
1255+
"redirect_url": "/azure/azure-maps/about-creator",
1256+
"redirect_document_id": false
1257+
},
1258+
{
1259+
"source_path_from_root": "/articles/azure-maps/indoor-map-dynamic-styling.md",
1260+
"redirect_url": "/azure/azure-maps/about-creator",
1261+
"redirect_document_id": false
1262+
},
1263+
{
1264+
"source_path_from_root": "/articles/azure-maps/how-to-creator-feature-stateset.md",
1265+
"redirect_url": "/azure/azure-maps/about-creator",
12461266
"redirect_document_id": false
12471267
},
12481268
{
@@ -4483,6 +4503,11 @@
44834503
"redirect_url": "/azure/orbital/overview",
44844504
"redirect_document_id": false
44854505
},
4506+
{
4507+
"source_path_from_root": "/articles/update-manager/pre-post-events-common-scenarios.md",
4508+
"redirect_url": "/azure/update-manager/manage-pre-post-events",
4509+
"redirect_document_id": false
4510+
},
44864511
{
44874512
"source_path_from_root": "/articles/update-manager/whats-upcoming.md",
44884513
"redirect_url": "/azure/update-manager/whats-new",

articles/ai-services/document-intelligence/concept-accuracy-confidence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-ai-document-intelligence
88
ms.custom:
99
- ignite-2023
1010
ms.topic: conceptual
11-
ms.date: 07/09/2024
11+
ms.date: 07/11/2024
1212
ms.author: lajanuar
1313
---
1414

articles/ai-services/document-intelligence/concept-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ To create a custom extraction model, label a dataset of documents with the value
5454
> Starting with version 4.0 (2024-02-29-preview) API, custom neural models now support **overlapping fields** and **table, row and cell level confidence**.
5555
>
5656
57-
The custom neural (custom document) model uses deep learning models and base model trained on a large collection of documents. This model is then fine-tuned or adapted to your data when you train the model with a labeled dataset. Custom neural models support structured, semi-structured, and unstructured documents to extract fields. Custom neural models currently support English-language documents. When you're choosing between the two model types, start with a neural model to determine if it meets your functional needs. See [neural models](concept-custom-neural.md) to learn more about custom document models.
57+
The custom neural (custom document) model uses deep learning models and base model trained on a large collection of documents. This model is then fine-tuned or adapted to your data when you train the model with a labeled dataset. Custom neural models support structured, semi-structured, and unstructured documents to extract fields. When you're choosing between the two model types, start with a neural model to determine if it meets your functional needs. See [neural models](concept-custom-neural.md) to learn more about custom document models.
5858

5959
### Custom template model
6060

@@ -131,7 +131,7 @@ The `build custom model` operation adds support for the *template* and *neural*
131131

132132
* Template models only accept documents that have the same basic page structure—a uniform visual appearance—or the same relative positioning of elements within the document.
133133

134-
* Neural models support documents that have the same information, but different page structures. Examples of these documents include United States W2 forms, which share the same information, but vary in appearance across companies. Neural models currently only support English text.
134+
* Neural models support documents that have the same information, but different page structures. Examples of these documents include United States W2 forms, which share the same information, but vary in appearance across companies.
135135

136136
This table provides links to the build mode programming language SDK references and code samples on GitHub:
137137

articles/ai-services/document-intelligence/create-sas-tokens.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: nitinme
77
ms.service: azure-ai-document-intelligence
88
ms.custom:
99
- ignite-2023
10-
ms.date: 07/18/2023
10+
ms.date: 07/11/2024
1111
ms.author: lajanuar
1212
---
1313

@@ -24,11 +24,9 @@ ms.author: lajanuar
2424

2525
At a high level, here's how SAS tokens work:
2626

27-
* Your application submits the SAS token to Azure Storage as part of a REST API request.
27+
* First, your application submits the SAS token to Azure Storage as part of a REST API request.
2828

29-
* If the storage service verifies that the SAS is valid, the request is authorized.
30-
31-
* If the SAS token is deemed invalid, the request is declined and the error code 403 (Forbidden) is returned.
29+
* Next, if the storage service verifies that the SAS is valid, the request is authorized. If, the SAS token is deemed invalid, the request is declined and the error code 403 (Forbidden) is returned.
3230

3331
Azure Blob Storage offers three resource types:
3432

@@ -109,26 +107,26 @@ The Azure portal is a web-based console that enables you to manage your Azure su
109107
>
110108
> :::image type="content" source="media/sas-tokens/need-permissions.png" alt-text="Screenshot that shows the lack of permissions warning.":::
111109
>
112-
> * [Azure role-based access control](../../role-based-access-control/overview.md) (Azure RBAC) is the authorization system used to manage access to Azure resources. Azure RBAC helps you manage access and permissions for your Azure resources.
110+
> * [Azure role-based access control](../../role-based-access-control/overview.md) (Azure RBAC) is the authorization system used to manage access to Azure resources. Azure RBAC helps you manage access and permissions for your Azure resources.
113111
> * [Assign an Azure role for access to blob data](../../role-based-access-control/role-assignments-portal.yml?tabs=current) to assign a role that allows for read, write, and delete permissions for your Azure storage container. *See* [Storage Blob Data Contributor](../../role-based-access-control/built-in-roles.md#storage-blob-data-contributor).
114112
115113
1. Specify the signed key **Start** and **Expiry** times.
116114

117115
* When you create a SAS token, the default duration is 48 hours. After 48 hours, you'll need to create a new token.
118116
* Consider setting a longer duration period for the time you're using your storage account for Document Intelligence Service operations.
119117
* The value of the expiry time is determined by whether you're using an **Account key** or **User delegation key** **Signing method**:
120-
* **Account key**: There's no imposed maximum time limit; however, best practices recommended that you configure an expiration policy to limit the interval and minimize compromise. [Configure an expiration policy for shared access signatures](/azure/storage/common/sas-expiration-policy).
121-
* **User delegation key**: The value for the expiry time is a maximum of seven days from the creation of the SAS token. The SAS is invalid after the user delegation key expires, so a SAS with an expiry time of greater than seven days will still only be valid for seven days. For more information,*see* [Use Microsoft Entra credentials to secure a SAS](/azure/storage/blobs/storage-blob-user-delegation-sas-create-cli#use-azure-ad-credentials-to-secure-a-sas).
118+
* **Account key**: No imposed maximum time limit; however, best practices recommended that you configure an expiration policy to limit the interval and minimize compromise. [Configure an expiration policy for shared access signatures](/azure/storage/common/sas-expiration-policy).
119+
* **User delegation key**: The value for the expiry time is a maximum of seven days from the creation of the SAS token. The SAS is invalid after the user delegation key expires, so a SAS with an expiry time of greater than seven days will still only be valid for seven days. For more information, *see* [Use Microsoft Entra credentials to secure a SAS](/azure/storage/blobs/storage-blob-user-delegation-sas-create-cli#use-azure-ad-credentials-to-secure-a-sas).
122120

123-
1. The **Allowed IP addresses** field is optional and specifies an IP address or a range of IP addresses from which to accept requests. If the request IP address doesn't match the IP address or address range specified on the SAS token, authorization fails. The IP address or a range of IP addresses must be public IPs, not private. For more information,*see*, [**Specify an IP address or IP range**](/rest/api/storageservices/create-account-sas#specify-an-ip-address-or-ip-range).
121+
1. The **Allowed IP addresses** field is optional and specifies an IP address or a range of IP addresses from which to accept requests. If the request IP address doesn't match the IP address or address range specified on the SAS token, authorization fails. The IP address or a range of IP addresses must be public IPs, not private. For more information, *see*, [**Specify an IP address or IP range**](/rest/api/storageservices/create-account-sas#specify-an-ip-address-or-ip-range).
124122

125123
1. The **Allowed protocols** field is optional and specifies the protocol permitted for a request made with the SAS token. The default value is HTTPS.
126124

127125
1. Select **Generate SAS token and URL**.
128126

129127
1. The **Blob SAS token** query string and **Blob SAS URL** appear in the lower area of the window. To use the Blob SAS token, append it to a storage service URI.
130128

131-
1. Copy and paste the **Blob SAS token** and **Blob SAS URL** values in a secure location. They're displayed only once and can't be retrieved after the window is closed.
129+
1. Copy and paste the **Blob SAS token** and **Blob SAS URL** values in a secure location. The values are displayed only once and can't be retrieved after the window is closed.
132130

133131
1. To [construct a SAS URL](#use-your-sas-url-to-grant-access), append the SAS token (URI) to the URL for a storage service.
134132

@@ -176,7 +174,7 @@ To use your SAS URL with the [REST API](/rest/api/aiservices/document-models/bui
176174
}
177175
```
178176

179-
That's it! You've learned how to create SAS tokens to authorize how clients access your data.
177+
That's it! You learned how to create SAS tokens to authorize how clients access your data.
180178

181179
## Next step
182180

articles/ai-services/document-intelligence/deploy-label-tool.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-ai-document-intelligence
88
ms.custom:
99
- ignite-2023
1010
ms.topic: how-to
11-
ms.date: 07/18/2023
11+
ms.date: 07/11/2024
1212
ms.author: lajanuar
1313
monikerRange: 'doc-intel-2.1.0'
1414
---
@@ -32,7 +32,7 @@ The Document Intelligence Sample Labeling tool is an application that provides a
3232

3333
* [Run the Sample Labeling tool locally](#run-the-sample-labeling-tool-locally)
3434
* [Deploy the Sample Labeling tool to an Azure Container Instance (ACI)](#deploy-with-azure-container-instances-aci)
35-
* [Use and contribute to the open-source OCR Form Labeling Tool](#open-source-on-github)
35+
* [Use and contribute to the open-source Form Labeling Tool](#open-source-on-github)
3636

3737
## Run the Sample Labeling tool locally
3838

@@ -97,7 +97,7 @@ Follow these steps to create a new resource using the Azure portal:
9797

9898
### Continuous deployment
9999

100-
After you've created your web app, you can enable the continuous deployment option:
100+
After you create your web app, you can enable the continuous deployment option:
101101

102102
* From the left pane, choose **Container settings**.
103103
* In the main window, navigate to Continuous deployment and toggle between the **On** and **Off** buttons to set your preference:
@@ -116,10 +116,10 @@ As an alternative to using the Azure portal, you can create a resource using the
116116

117117
There's a few things you need know about this command:
118118

119-
* `DNS_NAME_LABEL=aci-demo-$RANDOM` generates a random DNS name.
119+
* `DNS_NAME_LABEL=aci-demo-$RANDOM` generates a random Domain Name System (DNS) identity.
120120
* This sample assumes that you have a resource group that you can use to create a resource. Replace `<resource_group_name>` with a valid resource group associated with your subscription.
121121
* You need to specify where you want to create the resource. Replace `<region name>` with your desired region for the web app.
122-
* This command automatically accepts EULA.
122+
* This command automatically accepts End User License Agreement (EULA).
123123

124124
From the Azure CLI, run this command to create a web app resource for the Sample Labeling tool:
125125

@@ -145,11 +145,11 @@ az container create \
145145

146146
### Connect to Microsoft Entra ID for authorization
147147

148-
It's recommended that you connect your web app to Microsoft Entra ID. This connection ensures that only users with valid credentials can sign in and use your web app. Follow the instructions in [Configure your App Service app](../../app-service/configure-authentication-provider-aad.md) to connect to Microsoft Entra ID.
148+
We recommend that you connect your web app to Microsoft Entra ID. This connection ensures that only users with valid credentials can sign in and use your web app. Follow the instructions in [Configure your App Service app](../../app-service/configure-authentication-provider-aad.md) to connect to Microsoft Entra ID.
149149

150150
## Open source on GitHub
151151

152-
The OCR Form Labeling Tool is also available as an open-source project on GitHub. The tool is a web application built using React + Redux, and is written in TypeScript. To learn more or contribute, see [OCR Form Labeling Tool](https://github.com/microsoft/OCR-Form-Tools/blob/master/README.md).
152+
The Form Labeling Tool is also available as an open-source project on GitHub. The tool is a web application built using React + Redux, and is written in TypeScript. To learn more or contribute, see [Form Labeling Tool](https://github.com/microsoft/OCR-Form-Tools/blob/master/README.md).
153153

154154
## Next steps
155155

articles/ai-services/document-intelligence/faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,11 +59,11 @@ sections:
5959
- You can find more details in the [technical community blog](https://techcommunity.microsoft.com/t5/azure-ai-services-blog/document-generative-ai-the-power-of-azure-ai-document/ba-p/3875015).
6060
6161
- question: |
62-
Does Document Intelligence offer a semantic chunking solution for retrieval-augmented generation?
62+
Can Document Intelligence help with semantic chunking within documents for retrieval-augmented generation?
6363
answer: |
6464
**Yes.**
65-
66-
Semantic chunking is a key step in retrieval-augmented generation (RAG) to ensure its efficient storage and retrieval.
65+
66+
Document Intelligence can provide the building blocks to enable semantic chunking. Semantic chunking is a key step in retrieval-augmented generation (RAG) to ensure its efficient storage and retrieval.
6767
6868
- Document Intelligence provides a layout model that segments documents into coherent units based on their semantic content.
6969

0 commit comments

Comments
 (0)