Skip to content

Commit 7712c2d

Browse files
Merge pull request #205545 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 5ef56a4 + 9f8ec7e commit 7712c2d

File tree

8 files changed

+62
-64
lines changed

8 files changed

+62
-64
lines changed

articles/azure-app-configuration/use-key-vault-references-dotnet-core.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ To add a secret to the vault, you need to take just a few additional steps. In t
104104
using Azure.Identity;
105105
```
106106
107-
1. Update the `CreateWebHostBuilder` method to use App Configuration by calling the `config.AddAzureAppConfiguration` method. Include the `ConfigureKeyVault` option, and pass the correct credentials to your Key Vault.
107+
1. Update the `CreateWebHostBuilder` method to use App Configuration by calling the `config.AddAzureAppConfiguration` method. Include the `ConfigureKeyVault` option, and pass the correct credential to your Key Vault using the `SetCredential` method. If you have multiple Key Vaults, the same credential will be used for all of them. If your Key Vaults require different credentials, you can set them using `Register` or `SetSecretResolver` methods from the [`AzureAppConfigurationKeyVaultOptions`](/dotnet/api/microsoft.extensions.configuration.azureappconfiguration.azureappconfigurationkeyvaultoptions) class.
108108
109109
#### [.NET Core 5.x](#tab/core5x)
110110

articles/azure-vmware/concepts-identity.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: Concepts - Identity and access
33
description: Learn about the identity and access concepts of Azure VMware Solution
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 06/06/2022
6+
ms.date: 07/21/2022
77
ms.custom: references_regions
88
---
99

1010
# Azure VMware Solution identity concepts
1111

12-
Azure VMware Solution private clouds are provisioned with a vCenter Server and NSX-T Manager. You'll use vCenter to manage virtual machine (VM) workloads and NSX-T Manager to manage and extend the private cloud. The CloudAdmin role is used for vCenter Server and the administrator role (with restricted permissions) is used for NSX-T Manager.
12+
Azure VMware Solution private clouds are provisioned with a vCenter Server and NSX-T Manager. You'll use vCenter to manage virtual machine (VM) workloads and NSX-T Manager to manage and extend the private cloud. The CloudAdmin role is used for vCenter Server and the CloudAdmin role (with restricted permissions) is used for NSX-T Manager.
1313

1414
## vCenter Server access and identity
1515

@@ -18,9 +18,9 @@ Azure VMware Solution private clouds are provisioned with a vCenter Server and N
1818
> [!IMPORTANT]
1919
> Azure VMware Solution offers custom roles on vCenter Server but currently doesn't offer them on the Azure VMware Solution portal. For more information, see the [Create custom roles on vCenter Server](#create-custom-roles-on-vcenter-server) section later in this article.
2020
21-
### View the vCenter privileges
21+
### View the vCenter Server privileges
2222

23-
You can view the privileges granted to the Azure VMware Solution CloudAdmin role on your Azure VMware Solution private cloud vCenter.
23+
You can view the privileges granted to the Azure VMware Solution CloudAdmin role on your Azure VMware Solution private cloud vCenter Server.
2424

2525
1. Sign into the vSphere Client and go to **Menu** > **Administration**.
2626
1. Under **Access Control**, select **Roles**.
@@ -89,28 +89,28 @@ To prevent creating roles that can't be assigned or deleted, clone the CloudAdmi
8989

9090
## NSX-T Manager access and identity
9191

92-
When a private cloud is provisioned using Azure portal, software defined data center (SDDC) management components like vCenter and NSX-T Manager are provisioned for customers.
92+
When a private cloud is provisioned using Azure portal, software-defined data center (SDDC) management components like vCenter Server and NSX-T Manager are provisioned for customers.
9393

94-
Microsoft is responsible for the lifecycle management of NSX-T appliances like NSX-T Managers and NSX-T Edges. They're responsible for bootstrapping network configuration, like creating the Tier-0 gateway.
94+
Microsoft is responsible for the lifecycle management of NSX-T appliances like NSX-T Managers and NSX-T Data Center Edges. They're responsible for bootstrapping network configuration, like creating the Tier-0 gateway.
9595

96-
You're responsible for NSX-T software-defined networking (SDN) configuration, for example:
96+
You're responsible for NSX-T Data Center software-defined networking (SDN) configuration, for example:
9797

9898
- Network segments
9999
- Other Tier-1 gateways
100100
- Distributed firewall rules
101101
- Stateful services like gateway firewall
102102
- Load balancer on Tier-1 gateways
103103

104-
You can access NSX-T Manager using the built-in local user "admin" assigned to **Enterprise admin** role that gives full privileges to a user to manage NSX-T. While Microsoft manages the lifecycle of NSX-T, certain operations aren't allowed by a user. Operations not allowed include editing the configuration of host and edge transport nodes or starting an upgrade. For new users, Azure VMware Solution deploys them with a specific set of permissions needed by that user. The purpose is to provide a clear separation of control between the Azure VMware Solution control plane configuration and Azure VMware Solution private cloud user.
104+
You can access NSX-T Manager using the built-in local user "cloudadmin" assigned to a custom role that gives limited privileges to a user to manage NSX-T Data Center. While Microsoft manages the lifecycle of NSX-T Data Center, certain operations aren't allowed by a user. Operations not allowed include editing the configuration of host and edge transport nodes or starting an upgrade. For new users, Azure VMware Solution deploys them with a specific set of permissions needed by that user. The purpose is to provide a clear separation of control between the Azure VMware Solution control plane configuration and Azure VMware Solution private cloud user.
105105

106-
For new private cloud deployments, NSX-T access will be provided with a built-in local user cloud admin assigned to the **cloudadmin** role with a specific set of permissions to use NSX-T functionality for workloads.
106+
For new private cloud deployments, NSX-T Data Center access will be provided with a built-in local user cloudadmin assigned to the **cloudadmin** role with a specific set of permissions to use NSX-T Data Center functionality for workloads.
107107

108-
### NSX-T cloud admin user permissions
108+
### NSX-T Data Center cloudadmin user permissions
109109

110-
The following permissions are assigned to the **cloudadmin** user in Azure VMware Solution NSX-T.
110+
The following permissions are assigned to the **cloudadmin** user in Azure VMware Solution NSX-T Data Center.
111111

112112
> [!NOTE]
113-
> **NSX-T cloudadmin user** on Azure VMware Solution is not the same as the **cloudadmin user** mentioned in the VMware product documentation.
113+
> **NSX-T Data Center cloudadmin user** on Azure VMware Solution is not the same as the **cloudadmin user** mentioned in the VMware product documentation.
114114
115115
| Category | Type | Operation | Permission |
116116
|-----------------|-----------------------|----------------------------------------------------------------------|------------------------------------------------------------------|
@@ -130,28 +130,28 @@ The following permissions are assigned to the **cloudadmin** user in Azure VMwar
130130
| System | Configuration<br>Settings<br>Settings<br>Settings | Identity firewall<br>Users and Roles<br>Certificate Management (Service Certificate only)<br>User Interface Settings | Full Access<br>Full Access<br>Full Access<br>Full Access |
131131
| System | All other | | Read-only |
132132

133-
You can view the permissions granted to the Azure VMware Solution cloudadmin role on your Azure VMware Solution private cloud NSX-T.
133+
You can view the permissions granted to the Azure VMware Solution cloudadmin role on your Azure VMware Solution private cloud NSX-T Data Center.
134134

135135
1. Log in to the NSX-T Manager.
136136
1. Navigate to **Systems** and locate **Users and Roles**.
137137
1. Select and expand the **cloudadmin** role, found under **Roles**.
138138
1. Select a category like, Networking or Security, to view the specific permissions.
139139

140140
> [!NOTE]
141-
> **Private clouds created before June 2022** will switch from **admin** role to **cloudadmin** role. You'll receive a notification through Azure Service Health that includes the timeline of this change so you can change the NSX-T credentials you've used for other integration.
141+
> **Private clouds created before June 2022** will switch from **admin** role to **cloudadmin** role. You'll receive a notification through Azure Service Health that includes the timeline of this change so you can change the NSX-T Data Center credentials you've used for other integration.
142142
143-
## NSX-T LDAP integration for role based access control (RBAC)
143+
## NSX-T Data Center LDAP integration for role based access control (RBAC)
144144

145-
In an Azure VMware Solution deployment, the NSX-T can be integrated with external LDAP directory service to add remote directory users or group, and assign them an NSX-T RBAC role, like on-premises deployment. For more information on how to enable NSX-T LDAP integration, see the [VMware product documentation](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DB5A44F1-6E1D-4E5C-8B50-D6161FFA5BD2.html).
145+
In an Azure VMware Solution deployment, the NSX-T Data Center can be integrated with external LDAP directory service to add remote directory users or group, and assign them an NSX-T Data Center RBAC role, like on-premises deployment. For more information on how to enable NSX-T Data Center LDAP integration, see the [VMware product documentation](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DB5A44F1-6E1D-4E5C-8B50-D6161FFA5BD2.html).
146146

147-
Unlike on-premises deployment, not all pre-defined NSX-T RBAC roles are supported with Azure VMware solution to keep Azure VMware Solution IaaS control plane config management separate from tenant network and security configuration. Please see the next section, Supported NSX-T RBAC roles, for more details.
147+
Unlike on-premises deployment, not all pre-defined NSX-T Data Center RBAC roles are supported with Azure VMware solution to keep Azure VMware Solution IaaS control plane config management separate from tenant network and security configuration. Please see the next section, Supported NSX-T Data Center RBAC roles, for more details.
148148

149149
> [!NOTE]
150-
> NSX-T LDAP Integration supported only with SDDC’s with NSX-T “cloudadmin” user.
150+
> NSX-T LDAP Integration supported only with SDDC’s with NSX-T Data Center “cloudadmin” user.
151151
152-
### Supported and unsupported NSX-T RBAC roles
152+
### Supported and unsupported NSX-T Data Center RBAC roles
153153

154-
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are supported with LDAP integration:
154+
In an Azure VMware Solution deployment, the following NSX-T Data Center predefined RBAC roles are supported with LDAP integration:
155155

156156
- Auditor
157157
- Cloudadmin
@@ -160,17 +160,17 @@ Unlike on-premises deployment, not all pre-defined NSX-T RBAC roles are supporte
160160
- VPN Admin
161161
- Network Operator
162162

163-
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are not supported with LDAP integration:
163+
In an Azure VMware Solution deployment, the following NSX-T Data Center predefined RBAC roles are not supported with LDAP integration:
164164

165165
- Enterprise Admin
166166
- Network AdminSecurity Admin
167167
- Netx Partner Admin
168168
- GI Partner Admin
169169

170-
You can create custom roles in NSX-T with permissions lesser than or equal to Cloudadmin role created by Microsoft. Following are examples on how to create a supported "Network Admin" and "Security Admin" role.
170+
You can create custom roles in NSX-T Data Center with permissions lesser than or equal to CloudAdmin role created by Microsoft. Following are examples on how to create a supported "Network Admin" and "Security Admin" role.
171171

172172
> [!NOTE]
173-
> Custom role creation will fail if you assign a permission not allowed by Cloudadmin role.
173+
> Custom role creation will fail if you assign a permission not allowed by CloudAdmin role.
174174
175175
#### Create “AVS network admin” role
176176

@@ -206,10 +206,10 @@ You can create custom roles in NSX-T with permissions lesser than or equal to Cl
206206
4. **Apply** the changes and **Save** the Role.
207207

208208
> [!NOTE]
209-
> The NSX-T **System** > **Identity Firewall AD** configuration option isn't supported by the NSX custom role. The recommendation is to assign the **Security Operator** role to the user with the custom role to allow managing the Identity Firewall (IDFW) feature for that user.
209+
> The NSX-T Data Center **System** > **Identity Firewall AD** configuration option isn't supported by the NSX custom role. The recommendation is to assign the **Security Operator** role to the user with the custom role to allow managing the Identity Firewall (IDFW) feature for that user.
210210
211211
> [!NOTE]
212-
> The NSX-T Traceflow feature isn't supported by NSX-T custom role. The recommendation is to assign the **Auditor** role to the user along with above custom role to enable Traceflow feature for that user.
212+
> The NSX-T Data Center Traceflow feature isn't supported by NSX-T Data Center custom role. The recommendation is to assign the **Auditor** role to the user along with above custom role to enable Traceflow feature for that user.
213213
214214
## Next steps
215215

articles/azure-vmware/concepts-run-command.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 09/17/2021
99

1010
# Run command in Azure VMware Solution
1111

12-
In Azure VMware Solution, vCenter Server has a built-in local user called *cloudadmin* assigned to the CloudAdmin role. The CloudAdmin role has vCenter Server [privileges](concepts-identity.md#view-the-vcenter-privileges) that differ from other VMware cloud solutions and on-premises deployments. The Run command feature lets you perform operations that would normally require elevated privileges through a collection of PowerShell cmdlets.
12+
In Azure VMware Solution, vCenter Server has a built-in local user called *cloudadmin* assigned to the CloudAdmin role. The CloudAdmin role has vCenter Server [privileges](concepts-identity.md#vcenter-server-access-and-identity) that differ from other VMware cloud solutions and on-premises deployments. The Run command feature lets you perform operations that would normally require elevated privileges through a collection of PowerShell cmdlets.
1313

1414
Azure VMware Solution supports the following operations:
1515

articles/azure-vmware/configure-storage-policy.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -121,10 +121,6 @@ You'll run the `Set-LocationStoragePolicy` cmdlet to Modify vSAN based storage p
121121
You'll run the `Set-ClusterDefaultStoragePolicy` cmdlet to specify default storage policy for a cluster,
122122

123123

124-
>[!NOTE]
125-
>Changing the storage policy of the default management cluster (Cluster-1) isn't allowed.
126-
127-
128124
1. Select **Run command** > **Packages** > **Set-ClusterDefaultStoragePolicy**.
129125

130126
1. Provide the required values or change the default values, and then select **Run**.

articles/cognitive-services/Translator/document-translation/client-sdks.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ To get started, you'll need:
2323

2424
* An active [**Azure account**](https://azure.microsoft.com/free/cognitive-services/). If you don't have one, you can [**create a free account**](https://azure.microsoft.com/free/).
2525

26-
* A [**single-service Translator resource**](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) (**not** a multi-service Cognitive Services resource).
26+
* A [**single-service Translator resource**](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) (**not** a multi-service Cognitive Services resource). Choose **Global** unless your business or application requires a specific region. Select the **Standard S1** pricing tier to get started (document translation is not supported for the free tier).
2727

2828
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM). You'll [**create containers**](../../../storage/blobs/storage-quickstart-blobs-portal.md#create-a-container) in your Azure blob storage account for your source and target files:
2929

@@ -180,47 +180,47 @@ pip install azure-ai-translation-document==1.0.0
180180
Create a new Python application in your preferred editor or IDE. Then import the following libraries.
181181

182182
```python
183-
import os
184-
from azure.core.credentials import AzureKeyCredential
185-
from azure.ai.translation.document import DocumentTranslationClient
183+
import os
184+
from azure.core.credentials import AzureKeyCredential
185+
from azure.ai.translation.document import DocumentTranslationClient
186186
```
187187

188188
Create variables for your resource key, custom endpoint, sourceUrl, and targetUrl. For
189189
more information, *see* [Custom domain name and key](get-started-with-document-translation.md#your-custom-domain-name-and-key)
190190

191191
```python
192-
key = "<your-key>"
193-
endpoint = "<your-custom-endpoint>"
194-
sourceUrl = "<your-container-sourceUrl>"
195-
targetUrl = "<your-container-targetUrl>"
192+
key = "<your-key>"
193+
endpoint = "<your-custom-endpoint>"
194+
sourceUrl = "<your-container-sourceUrl>"
195+
targetUrl = "<your-container-targetUrl>"
196196
```
197197

198198
### Translate a document or batch files
199199

200200
```python
201201
client = DocumentTranslationClient(endpoint, AzureKeyCredential(key))
202202

203-
poller = client.begin_translation(sourceUrl, targetUrl, "fr")
204-
result = poller.result()
205-
206-
print("Status: {}".format(poller.status()))
207-
print("Created on: {}".format(poller.details.created_on))
208-
print("Last updated on: {}".format(poller.details.last_updated_on))
209-
print("Total number of translations on documents: {}".format(poller.details.documents_total_count))
210-
211-
print("\nOf total documents...")
212-
print("{} failed".format(poller.details.documents_failed_count))
213-
print("{} succeeded".format(poller.details.documents_succeeded_count))
214-
215-
for document in result:
216-
print("Document ID: {}".format(document.id))
217-
print("Document status: {}".format(document.status))
218-
if document.status == "Succeeded":
219-
print("Source document location: {}".format(document.source_document_url))
220-
print("Translated document location: {}".format(document.translated_document_url))
221-
print("Translated to language: {}\n".format(document.translated_to))
222-
else:
223-
print("Error Code: {}, Message: {}\n".format(document.error.code, document.error.message))
203+
poller = client.begin_translation(sourceUrl, targetUrl, "fr")
204+
result = poller.result()
205+
206+
print("Status: {}".format(poller.status()))
207+
print("Created on: {}".format(poller.details.created_on))
208+
print("Last updated on: {}".format(poller.details.last_updated_on))
209+
print("Total number of translations on documents: {}".format(poller.details.documents_total_count))
210+
211+
print("\nOf total documents...")
212+
print("{} failed".format(poller.details.documents_failed_count))
213+
print("{} succeeded".format(poller.details.documents_succeeded_count))
214+
215+
for document in result:
216+
print("Document ID: {}".format(document.id))
217+
print("Document status: {}".format(document.status))
218+
if document.status == "Succeeded":
219+
print("Source document location: {}".format(document.source_document_url))
220+
print("Translated document location: {}".format(document.translated_document_url))
221+
print("Translated to language: {}\n".format(document.translated_to))
222+
else:
223+
print("Error Code: {}, Message: {}\n".format(document.error.code, document.error.message))
224224
```
225225

226226
That's it! You've created a program to translate documents in a storage container using the Python client library.

articles/machine-learning/how-to-responsible-ai-dashboard-ui.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ After you picked your dataset, select your modeling task type.
4646
:::image type="content" source="./media/how-to-responsible-ai-dashboard-ui/modeling.png" alt-text="Screenshot of the wizard on modeling task type." lightbox= "./media/how-to-responsible-ai-dashboard-ui/modeling.png":::
4747

4848
> [!NOTE]
49-
> The wizard only supports models with MLflow format and sci-kit learn flavor.
49+
> The wizard only supports models with MLflow format and scikit-learn flavor.
5050
5151
## Select your dashboard components
5252

0 commit comments

Comments
 (0)