Skip to content

Commit 74c8733

Browse files
authored
Merge pull request #276135 from MicrosoftDocs/main
5/23 11:00 AM IST Publish
2 parents 6b353cc + ce70cf4 commit 74c8733

File tree

112 files changed

+3559
-1981
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+3559
-1981
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4060,7 +4060,7 @@
40604060
},
40614061
{
40624062
"source_path_from_root":"/articles/cosmos-db/high-availability.md",
4063-
"redirect_url":"/azure/reliability/reliability-cosmos-db-nosql.md",
4063+
"redirect_url":"/azure/reliability/reliability-cosmos-db-nosql",
40644064
"redirect_document_id":false
40654065
},
40664066
{

articles/ai-services/document-intelligence/concept-id-document.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,24 @@ Extract data, including name, birth date, and expiration date, from ID documents
231231

232232
The following are the fields extracted per document type. The Document Intelligence ID model `prebuilt-idDocument` extracts the following fields in the `documents.*.fields`. The json output includes all the extracted text in the documents, words, lines, and styles.
233233

234+
::: moniker-end
235+
236+
::: moniker range="doc-intel-3.1.0"
237+
238+
> [!div class="nextstepaction"]
239+
> [View samples on GitHub.](https://github.com/Azure-Samples/document-intelligence-code-samples/blob/v3.1(2023-07-31-GA)/Python(v3.1)/Prebuilt_model/sample_analyze_identity_documents.py)
240+
241+
::: moniker-end
242+
243+
::: moniker range="doc-intel-4.0.0"
244+
245+
> [!div class="nextstepaction"]
246+
> [View samples on GitHub.](https://github.com/Azure-Samples/document-intelligence-code-samples/blob/main/Python(v4.0)/Prebuilt_model/sample_analyze_identity_documents.py)
247+
248+
::: moniker-end
249+
250+
::: moniker range=">=doc-intel-3.0.0"
251+
234252
### `idDocument.driverLicense`
235253

236254
| Field | Type | Description | Example |

articles/ai-services/document-intelligence/concept-invoice.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -186,6 +186,21 @@ See how data, including customer information, vendor details, and line items, is
186186
*See* our [Language Support—prebuilt models](language-support-prebuilt.md) page for a complete list of supported languages.
187187

188188
## Field extraction
189+
The Document Intelligence invoice model `prebuilt-invoice` extracts the following fields.
190+
191+
::: moniker range="doc-intel-3.1.0"
192+
193+
> [!div class="nextstepaction"]
194+
> [View samples on GitHub.](https://github.com/Azure-Samples/document-intelligence-code-samples/blob/v3.1(2023-07-31-GA)/Python(v3.1)/Prebuilt_model/sample_analyze_invoices.py)
195+
196+
::: moniker-end
197+
198+
::: moniker range="doc-intel-4.0.0"
199+
200+
> [!div class="nextstepaction"]
201+
> [View samples on GitHub.](https://github.com/Azure-Samples/document-intelligence-code-samples/blob/main/Python(v4.0)/Prebuilt_model/sample_analyze_invoices.py)
202+
203+
::: moniker-end
189204

190205
|Name| Type | Description | Standardized output |
191206
|:-----|:----|:----|:----|

articles/ai-services/document-intelligence/concept-receipt.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -228,6 +228,24 @@ See how Document Intelligence extracts data, including time and date of transact
228228
Document Intelligence v3.0 and later versions introduce several new features and capabilities. In addition to thermal receipts, the **Receipt** model supports single-page hotel receipt processing and tax detail extraction for all receipt types.
229229

230230
Document Intelligence v4.0 and later versions introduces support for currency for all price-related fields for thermal and hotel receipts.
231+
232+
::: moniker-end
233+
234+
::: moniker range="doc-intel-3.1.0"
235+
236+
> [!div class="nextstepaction"]
237+
> [View samples on GitHub.](https://github.com/Azure-Samples/document-intelligence-code-samples/blob/v3.1(2023-07-31-GA)/Python(v3.1)/Prebuilt_model/sample_analyze_receipts.py)
238+
239+
::: moniker-end
240+
241+
::: moniker range="doc-intel-4.0.0"
242+
243+
> [!div class="nextstepaction"]
244+
> [View samples on GitHub.](https://github.com/Azure-Samples/document-intelligence-code-samples/blob/main/Python(v4.0)/Prebuilt_model/sample_analyze_receipts.py)
245+
246+
::: moniker-end
247+
248+
::: moniker range=">=doc-intel-3.0.0"
231249

232250
### Receipt
233251

articles/ai-services/document-intelligence/concept-tax-document.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,20 @@ See how data, including customer information, vendor details, and line items, is
106106

107107
The following are the fields extracted from a W-2 tax form in the JSON output response.
108108

109+
::: moniker range="doc-intel-3.1.0"
110+
111+
> [!div class="nextstepaction"]
112+
> [View samples on GitHub.](https://github.com/Azure-Samples/document-intelligence-code-samples/blob/v3.1(2023-07-31-GA)/Python(v3.1)/Prebuilt_model/sample_analyze_tax_us_w2.py)
113+
114+
::: moniker-end
115+
116+
::: moniker range="doc-intel-4.0.0"
117+
118+
> [!div class="nextstepaction"]
119+
> [View samples on GitHub.](https://github.com/Azure-Samples/document-intelligence-code-samples/blob/main/Python(v4.0)/Prebuilt_model/sample_analyze_tax_us_w2.py)
120+
121+
::: moniker-end
122+
109123
|Name| Type | Description | Example output |dependents
110124
|:-----|:----|:----|:---:|
111125
| `W-2FormVariant`| String | IR W-2 Form variant. This field can have the one of the following values: `W-2`, `W-2AS`, `W-2CM`, `W-2GU`, or `W-2VI`| W-2 |

articles/ai-services/openai/assistants-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to use Azure OpenAI's Python & REST API with Assistants.
55
manager: nitinme
66
ms.service: azure-ai-openai
77
ms.topic: conceptual
8-
ms.date: 02/07/2024
8+
ms.date: 05/22/2024
99
author: mrbullwinkle
1010
ms.author: mbullwin
1111
recommendations: false
@@ -34,7 +34,7 @@ Create an assistant with a model and instructions.
3434
| model| string | Required | Model deployment name of the model to use.|
3535
| name | string or null | Optional | The name of the assistant. The maximum length is 256 characters.|
3636
| description| string or null | Optional | The description of the assistant. The maximum length is 512 characters.|
37-
| instructions | string or null | Optional | The system instructions that the assistant uses. The maximum length is 32768 characters.|
37+
| instructions | string or null | Optional | The system instructions that the assistant uses. The maximum length is 256,000 characters.|
3838
| tools | array | Optional | Defaults to []. A list of tools enabled on the assistant. There can be a maximum of 128 tools per assistant. Tools can currently be of types `code_interpreter`, or `function`.|
3939
| file_ids | array | Optional | Defaults to []. A list of file IDs attached to this assistant. There can be a maximum of 20 files attached to the assistant. Files are ordered by their creation date in ascending order.|
4040
| metadata | map | Optional | Set of 16 key-value pairs that can be attached to an object. This can be useful for storing additional information about the object in a structured format. Keys can be a maximum of 64 characters long and values can be a maximum of 512 characters long.|

articles/ai-studio/how-to/fine-tune-model-llama.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Fine-tune Llama models in Azure AI Studio
33
titleSuffix: Azure AI Studio
4-
description: Learn how to fine-tune Llama models in Azure AI Studio.
4+
description: Learn how to fine-tune Meta Llama models in Azure AI Studio.
55
manager: scottpolly
66
ms.service: azure-ai-studio
77
ms.topic: how-to
@@ -13,7 +13,7 @@ author: ssalgadodev
1313
ms.custom: references_regions, build-2024
1414
---
1515

16-
# Fine-tune Llama models in Azure AI Studio
16+
# Fine-tune Meta Llama models in Azure AI Studio
1717

1818
[!INCLUDE [Feature preview](../includes/feature-preview.md)]
1919

@@ -250,9 +250,9 @@ You can delete a fine-tuned model from the fine-tuning model list in [Azure AI S
250250
251251
## Cost and quotas
252252

253-
### Cost and quota considerations for Llama models fine-tuned as a service
253+
### Cost and quota considerations for Meta Llama models fine-tuned as a service
254254

255-
Llama models fine-tuned as a service are offered by Meta through the Azure Marketplace and integrated with Azure AI Studio for use. You can find the Azure Marketplace pricing when [deploying](./deploy-models-llama.md) or fine-tuning the models.
255+
Meta Llama models fine-tuned as a service are offered by Meta through the Azure Marketplace and integrated with Azure AI Studio for use. You can find the Azure Marketplace pricing when [deploying](./deploy-models-llama.md) or fine-tuning the models.
256256

257257
Each time a project subscribes to a given offer from the Azure Marketplace, a new resource is created to track the costs associated with its consumption. The same resource is used to track costs associated with inference and fine-tuning; however, multiple meters are available to track each scenario independently.
258258

articles/ai-studio/reference/reference-model-inference-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,8 @@ Models deployed to [serverless API endpoints](../how-to/deploy-models-serverless
4343
> [!div class="checklist"]
4444
> * [Cohere Embed V3](../how-to/deploy-models-cohere-embed.md) family of models
4545
> * [Cohere Command R](../how-to/deploy-models-cohere-command.md) family of models
46-
> * [Llama2](../how-to/deploy-models-llama.md) family of models
47-
> * [Llama3](../how-to/deploy-models-llama.md) family of models
46+
> * [Meta Llama 2](../how-to/deploy-models-llama.md) family of models
47+
> * [Meta Llama 3](../how-to/deploy-models-llama.md) family of models
4848
> * [Mistral-Small](../how-to/deploy-models-mistral.md)
4949
> * [Mistral-Large](../how-to/deploy-models-mistral.md)
5050
> * [Phi-3](../how-to/deploy-models-phi-3.md) family of models

articles/ai-studio/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,11 @@ items:
7272
href: how-to/deploy-models-cohere-command.md
7373
- name: Deploy Cohere Embed models
7474
href: how-to/deploy-models-cohere-embed.md
75-
- name: Llama models
75+
- name: Meta Llama models
7676
items:
77-
- name: Deploy Llama family models
77+
- name: Deploy Meta Llama family models
7878
href: how-to/deploy-models-llama.md
79-
- name: Fine-tune Llama family models
79+
- name: Fine-tune Meta Llama family models
8080
href: how-to/fine-tune-model-llama.md
8181
- name: Deploy JAIS models
8282
href: how-to/deploy-jais-models.md

articles/aks/auto-upgrade-node-os-image.md

Lines changed: 17 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ title: Auto-upgrade Node OS Images
33
description: Learn how to choose an upgrade channel that best supports your needs for cluster's node OS security and maintenance.
44
ms.topic: article
55
ms.custom: build-2023, devx-track-azurecli
6-
ms.author: nickoman
7-
author: nickomang
6+
ms.author: kaarthis
7+
author: kaarthis
88
ms.subservice: aks-upgrade
9-
ms.date: 11/22/2023
9+
ms.date: 05/10/2024
1010
---
1111

1212
# Auto-upgrade node OS images
@@ -20,19 +20,19 @@ It's best to use both cluster-level [auto-upgrades][Autoupgrade] and the node OS
2020

2121
## Channels for node OS image upgrades
2222

23-
The selected channel determines the timing of upgrades. When making changes to node OS auto-upgrade channels, allow up to 24 hours for the changes to take effect. Once you change from one channel to another channel, a reimage will be triggered leading to rolling nodes.
23+
The selected channel determines the timing of upgrades. When making changes to node OS auto-upgrade channels, allow up to 24 hours for the changes to take effect. Once you change from one channel to another channel, a reimage is triggered leading to rolling nodes.
2424

2525
> [!NOTE]
26-
> Node OS image auto-upgrade won't affect the cluster's Kubernetes version. It only works for a cluster in a [supported version][supported].
26+
> Node OS image auto-upgrade won't affect the cluster's Kubernetes version.
2727
2828
The following upgrade channels are available. You're allowed to choose one of these options:
2929

3030
|Channel|Description|OS-specific behavior|
3131
|---|---|
3232
| `None`| Your nodes don't have security updates applied automatically. This means you're solely responsible for your security updates.|N/A|
33-
| `Unmanaged`|OS updates are applied automatically through the OS built-in patching infrastructure. Newly allocated machines are unpatched initially. The OS's infrastructure patches them at some point.|Ubuntu and Azure Linux (CPU node pools) apply security patches through unattended upgrade/dnf-automatic roughly once per day around 06:00 UTC. Windows doesn't automatically apply security patches, so this option behaves equivalently to `None`. You'll need to manage the reboot process by using a tool like [kured][kured].|
34-
| `SecurityPatch`|This channel is in preview and requires enabling the feature flag `NodeOsUpgradeChannelPreview`. Refer to the prerequisites section for details. AKS regularly updates the node's virtual hard disk (VHD) with patches from the image maintainer labeled "security only." There might be disruptions when the security patches are applied to the nodes. When the patches are applied, the VHD is updated and existing machines are upgraded to that VHD, honoring maintenance windows and surge settings. This option incurs the extra cost of hosting the VHDs in your node resource group. If you use this channel, Linux [unattended upgrades][unattended-upgrades] are disabled by default.|Azure Linux doesn't support this channel on GPU-enabled VMs. `SecurityPatch` works on patch versions that are deprecated, so long as the minor Kubernetes version is still supported.|
35-
| `NodeImage`|AKS updates the nodes with a newly patched VHD containing security fixes and bug fixes on a weekly cadence. The update to the new VHD is disruptive, following maintenance windows and surge settings. No extra VHD cost is incurred when choosing this option. If you use this channel, Linux [unattended upgrades][unattended-upgrades] are disabled by default. Node image upgrades support patch versions that are deprecated, so long as the minor Kubernetes version is still supported.|
33+
| `Unmanaged`|OS updates are applied automatically through the OS built-in patching infrastructure. Newly allocated machines are unpatched initially. The OS's infrastructure patches them at some point.|Ubuntu and Azure Linux (CPU node pools) apply security patches through unattended upgrade/dnf-automatic roughly once per day around 06:00 UTC. Windows doesn't automatically apply security patches, so this option behaves equivalently to `None`. You need to manage the reboot process by using a tool like [kured][kured].|
34+
| `SecurityPatch`|OS security patches, which are AKS-tested, fully managed, and applied with safe deployment practices. AKS regularly updates the node's virtual hard disk (VHD) with patches from the image maintainer labeled "security only." There might be disruptions when the security patches are applied to the nodes, however AKS is limiting disruptions by only reimaging your nodes only when necessary, such as for certain kernel security packages. When the patches are applied, the VHD is updated and existing machines are upgraded to that VHD, honoring maintenance windows and surge settings. If AKS decides reimaging nodes isn't necessary, it patches nodes live without draining pods and performs no VHD update. This option incurs the extra cost of hosting the VHDs in your node resource group. If you use this channel, Linux [unattended upgrades][unattended-upgrades] are disabled by default.|Azure Linux doesn't support this channel on GPU-enabled VMs. `SecurityPatch` works on kubernetes patch versions that are deprecated, so long as the minor Kubernetes version is still supported.|
35+
| `NodeImage`|AKS updates the nodes with a newly patched VHD containing security fixes and bug fixes on a weekly cadence. The update to the new VHD is disruptive, following maintenance windows and surge settings. No extra VHD cost is incurred when choosing this option. If you use this channel, Linux [unattended upgrades][unattended-upgrades] are disabled by default. Node image upgrades support patch versions that are deprecated, so long as the minor Kubernetes version is still supported. Node images are AKS-tested, fully managed, and applied with safe deployment practices|
3636

3737
## Set the node OS auto-upgrade channel on a new cluster
3838

@@ -100,47 +100,20 @@ The default cadence means there's no planned maintenance window applied.
100100
|---|---|
101101
| `Unmanaged`|OS driven security updates. AKS has no control over these updates.|Nightly around 6AM UTC for Ubuntu and Azure Linux. Monthly for Windows.|
102102
| `SecurityPatch`|AKS-tested, fully managed, and applied with safe deployment practices. For more information, refer to [Increased security and resiliency of Canonical workloads on Azure][Blog].|Weekly.|
103-
| `NodeImage`|AKS|Weekly.|
103+
| `NodeImage`|AKS-tested, fully managed, and applied with safe deployment practices. For more real time information on releases, look up [AKS Node Images in Release tracker][release-tracker] |Weekly.|
104104
105105
> [!NOTE]
106-
> While Windows security updates are released on a monthly basis, using the `Unmanaged` channel will not automatically apply these updates to Windows nodes. If you choose the `Unmanaged` channel, you need to manage the reboot process by using a tool like [kured][kured] in order to properly apply security patches.
106+
> While Windows security updates are released on a monthly basis, using the `Unmanaged` channel will not automatically apply these updates to Windows nodes. If you choose the `Unmanaged` channel, you need to manage the reboot process for Windows nodes.
107107
108-
## SecurityPatch channel requirements
109108
110-
To use the `SecurityPatch` channel, your cluster must support these requirements:
111-
112-
* Must be using API version `11-02-preview` or later
113-
* If using Azure CLI, the `aks-preview` CLI extension version `0.5.166` or later must be installed
114-
* The `NodeOsUpgradeChannelPreview` feature flag must be enabled on your subscription
115-
116-
### Register NodeOsUpgradeChannelPreview
117-
118-
Register the `NodeOsUpgradeChannelPreview` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
119-
120-
```azurecli-interactive
121-
az feature register --namespace "Microsoft.ContainerService" --name "NodeOsUpgradeChannelPreview"
122-
```
123-
124-
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature show][az-feature-show] command:
125-
126-
```azurecli-interactive
127-
az feature show --namespace "Microsoft.ContainerService" --name "NodeOsUpgradeChannelPreview"
128-
```
129-
130-
When the status reflects *Registered*, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
131-
132-
```azurecli-interactive
133-
az provider register --namespace Microsoft.ContainerService
134-
```
135-
136-
## Node channel known bugs
109+
## Node channel known limitations
137110
138111
- Currently, when you set the [cluster auto-upgrade channel][Autoupgrade] to `node-image`, it also automatically sets the node OS auto-upgrade channel to `NodeImage`. You can't change node OS auto-upgrade channel value if your cluster auto-upgrade channel is `node-image`. In order to set the node OS auto-upgrade channel value, check the [cluster auto-upgrade channel][Autoupgrade] value isn't `node-image`.
139112
140113
- The `SecurityPatch` channel isn't supported on Windows OS node pools.
141114
142115
> [!NOTE]
143-
> By default, any new cluster created with an API version of `06-01-2023` or later (including 06-02-preview) will set the node OS auto-upgrade channel value to `NodeImage`. Any existing clusters created with an API version earlier than `06-01-2023` will have the node OS auto-upgrade channel value set to `None` by default.
116+
> Use CLI version 2.61.0 or above for the `SecurityPatch` channel.
144117
145118
146119
## Node OS planned maintenance windows
@@ -174,6 +147,10 @@ To view the status of your node OS auto upgrades, look up [activity logs][monito
174147

175148
On the `Unmanaged` channel, AKS has no control over how and when the security updates are delivered. With `SecurityPatch`, the security updates are fully tested and follow safe deployment practices. `SecurityPatch` also honors maintenance windows. For more details, see [Increased security and resiliency of Canonical workloads on Azure][Blog].
176149

150+
* Does `SecurityPatch` always lead to a reimage of my nodes?
151+
152+
AKS limits reimages to only when absolutely necessary, such as certain kernel packages that may require a reimage to get fully applied. `SecurityPatch` is designed to minimize disruptions as much as possible. If AKS decides reimaging nodes isn't necessary, it will patch nodes live without draining pods and no VHD update is performed in such cases.
153+
177154
* How do I know if a `SecurityPatch` or `NodeImage` upgrade is applied on my node?
178155

179156
Run the following command to obtain node labels:
@@ -219,3 +196,4 @@ For a detailed discussion of upgrade best practices and other considerations, se
219196

220197
<!-- LINKS - external -->
221198
[Blog]: https://techcommunity.microsoft.com/t5/linux-and-open-source-blog/increased-security-and-resiliency-of-canonical-workloads-on/ba-p/3970623
199+

0 commit comments

Comments
 (0)