Skip to content

Commit 7fdd118

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sas-expiry
2 parents c9f285c + ff4149c commit 7fdd118

File tree

62 files changed

+210
-213
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+210
-213
lines changed

articles/ai-services/speech-service/embedded-speech.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -288,8 +288,8 @@ For embedded voices, it's essential to note that certain SSML tags might not be
288288
|-----------------|-----------|-------------------------------------------------------|--------------------------|
289289
| audio | src | | No |
290290
| bookmark | | | Yes |
291-
| break | strength | | No |
292-
| | time | | No |
291+
| break | strength | | Yes |
292+
| | time | | Yes |
293293
| silence | type | Leading, Tailing, Comma-exact, etc. | No |
294294
| | value | | No |
295295
| emphasis | level | | No |

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 1 addition & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ There are three different configuration modes for outbound traffic from the mana
4848
> While you can create a private endpoint for Azure AI Search, the connected services must allow public networking. For more information, see [Connectivity to other services](#connectivity-to-other-services).
4949
5050
* You must add rules for each outbound connection you need to allow.
51-
* Adding FQDN outbound rules __increase your costs__ as this rule type uses Azure Firewall.
51+
* Adding FQDN outbound rules __increase your costs__ as this rule type uses Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
5252
* The default rules for _allow only approved outbound_ are designed to minimize the risk of data exfiltration. Any outbound rules you add might increase your risk.
5353

5454
The managed virtual network is preconfigured with [required default rules](#list-of-required-rules). It's also configured for private endpoint connections to your hub, the hub's default storage, container registry, and key vault if they're configured as private or the hub isolation mode is set to allow only approved outbound. After choosing the isolation mode, you only need to consider other outbound requirements you might need to add.
@@ -380,9 +380,6 @@ To configure a managed virtual network that allows internet outbound communicati
380380

381381
If the destination type is __FQDN__, provide the following information:
382382

383-
> [!WARNING]
384-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
385-
386383
* __FQDN destination__: The fully qualified domain name to add to the approved outbound rules.
387384

388385
Select __Save__ to save the rule. You can continue using __Add user-defined outbound rules__ to add rules.
@@ -415,9 +412,6 @@ You can also define _outbound rules_ to define approved outbound communication.
415412
> * Adding an outbound for a service tag or FQDN is only valid when the managed VNet is configured to `allow_only_approved_outbound`.
416413
> * If you add outbound rules, Microsoft can't guarantee data exfiltration.
417414

418-
> [!WARNING]
419-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
420-
421415
```yaml
422416
managed_network:
423417
isolation_mode: allow_only_approved_outbound
@@ -476,9 +470,6 @@ You can configure a managed virtual network using either the `az ml workspace cr
476470

477471
The following YAML file defines a managed virtual network for the hub. It also demonstrates how to add an approved outbound to the managed virtual network. In this example, an outbound rule is added for both a service tag:
478472

479-
> [!WARNING]
480-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
481-
482473
```yaml
483474
name: myhub_dep
484475
managed_network:
@@ -522,9 +513,6 @@ To configure a managed virtual network that allows only approved outbound commun
522513
> * Adding an outbound for a service tag or FQDN is only valid when the managed VNet is configured to `IsolationMode.ALLOW_ONLY_APPROVED_OUTBOUND`.
523514
> * If you add outbound rules, Microsoft can't guarantee data exfiltration.
524515

525-
> [!WARNING]
526-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
527-
528516
```python
529517
# Basic managed VNet configuration
530518
network = ManagedNetwork(isolation_mode=IsolationMode.ALLOW_ONLY_APPROVED_OUTBOUND)
@@ -587,9 +575,6 @@ To configure a managed virtual network that allows only approved outbound commun
587575

588576
> [!TIP]
589577
> Adding an outbound for a service tag or FQDN is only valid when the managed VNet is configured to `IsolationMode.ALLOW_ONLY_APPROVED_OUTBOUND`.
590-
591-
> [!WARNING]
592-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are added to your billing. For more information, see [Pricing](#pricing).
593578

594579
```python
595580
# Get the existing hub
@@ -728,9 +713,6 @@ __Inbound__ service tag rules:
728713

729714
To allow installation of __Python packages for training and deployment__, add outbound _FQDN_ rules to allow traffic to the following host names:
730715

731-
> [!WARNING]
732-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
733-
734716
> [!NOTE]
735717
> This is not a complete list of the hosts required for all Python resources on the internet, only the most commonly used. For example, if you need access to a GitHub repository or other host, you must identify and add the required hosts for that scenario.
736718

@@ -748,9 +730,6 @@ Visual Studio Code relies on specific hosts and ports to establish a remote conn
748730
#### Hosts
749731
If you plan to use __Visual Studio Code__ with the hub, add outbound _FQDN_ rules to allow traffic to the following hosts:
750732

751-
> [!WARNING]
752-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
753-
754733
* `*.vscode.dev`
755734
* `vscode.blob.core.windows.net`
756735
* `*.gallerycdn.vsassets.io`
@@ -773,9 +752,6 @@ You must allow network traffic to ports 8704 to 8710. The VS Code server dynamic
773752

774753
If you plan to use __HuggingFace models__ with the hub, add outbound _FQDN_ rules to allow traffic to the following hosts:
775754

776-
> [!WARNING]
777-
> FQDN outbound rules are implemented using Azure Firewall. If you use outbound FQDN rules, charges for Azure Firewall are included in your billing. For more information, see [Pricing](#pricing).
778-
779755
* docker.io
780756
* *.docker.io
781757
* *.docker.com

articles/api-center/import-api-management-apis.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -255,15 +255,15 @@ In the following command, substitute the names of your API center, your API cent
255255

256256
```azurecli
257257
#! /bin/bash
258-
import-from-apim --service-name <api-center-name> --resource-group <resource-group-name> \
258+
az apic import-from-apim --service-name <api-center-name> --resource-group <resource-group-name> \
259259
--apim-name <api-management-name> --apim-resource-group <api-management-resource-group-name> \
260260
--apim-apis 'petstore-api'
261261
```
262262

263263

264264
```azurecli
265265
# PowerShell syntax
266-
import-from-apim --service-name <api-center-name> --resource-group <resource-group-name> `
266+
az apic import-from-apim --service-name <api-center-name> --resource-group <resource-group-name> `
267267
--apim-name <api-management-name> --apim-resource-group <api-management-resource-group-name> `
268268
--apim-apis 'petstore-api'
269269
```

articles/api-management/retry-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ The `retry` policy executes its child policies once and then retries their execu
4949

5050
* When only the `interval` is specified, **fixed** interval retries are performed.
5151
* When only the `interval` and `delta` are specified, a **linear** interval retry algorithm is used. The wait time between retries increases according to the following formula: `interval + (count - 1)*delta`.
52-
* When the `interval`, `max-interval` and `delta` are specified, an **exponential** interval retry algorithm is applied. The wait time between the retries increases exponentially according to the following formula: `interval + (2^count - 1) * random(delta * 0.8, delta * 1.2)`, up to a maximum interval set by `max-interval`.
52+
* When the `interval`, `max-interval` and `delta` are specified, an **exponential** interval retry algorithm is applied. The wait time between the retries increases exponentially according to the following formula: `interval + (2^(count - 1)) * random(delta * 0.8, delta * 1.2)`, up to a maximum interval set by `max-interval`.
5353

5454
For example, when `interval` and `delta` are both set to 10 seconds, and `max-interval` is 100 seconds, the approximate wait time between retries increases as follows: 10 seconds, 20 seconds, 40 seconds, 80 seconds, with 100 seconds wait time used for remaining retries.
5555

articles/azure-arc/resource-bridge/troubleshoot-resource-bridge.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -304,12 +304,16 @@ When deploying Arc resource bridge on VMware, you specify the folder in which th
304304

305305
### Cannot retrieve resource
306306

307-
When Arc resource bridge is deployed, you specify where the appliance VM will be deployed. The appliance VM can't be moved from that location path. If you want to change the path, you need to delete and redeploy the Arc resource bridge. When upgrading Arc resource bridge, if you moved the appliance VM, you may hit an error similar to:
307+
When Arc resource bridge is deployed, you specify where the appliance VM will be deployed. The appliance VM can't be moved from that location path. If the appliance VM moved location, you may hit an error similar to the one below when upgrading:
308308

309309
```
310310
{\n \"code\": \"PreflightcheckError\",\n \"message\": \"{\\n \\\"code\\\": \\\"InvalidEntityError\\\",\\n \\\"message\\\": \\\"Cannot retrieve <resource> 'resource-name': <resource> 'resource-name' not found\\\"\\n }\"\n }"
311311
```
312-
You can either move the appliance VM back to its original location and ensure RBAC credentials are updated for the location change or delete and redeploy the Arc resource bridge.
312+
You have three options to move the Arc resource bridge VM:
313+
314+
1. You can move the appliance VM back to its original location and ensure RBAC credentials are updated for the location change
315+
1. [Run the Arc-enabled VMware disaster recovery script](../vmware-vsphere/disaster-recovery.md). The script will delete the appliance, deploy a new appliance and reconnect the appliance with the previously deployed custom location, cluster extension and Arc-enabled VMs.
316+
1. Delete and [redeploy the Arc resource bridge](../vmware-vsphere/quick-start-connect-vcenter-to-arc-using-script.md).
313317

314318
### Insufficient permissions
315319

articles/azure-arc/servers/arc-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ To configure an existing machine to use Arc gateway, follow these steps:
225225
1. Associate your existing machine with your Arc gateway resource:
226226
227227
```azurecli
228-
az connectedmachine setting update --resource-group [res-group] --subscription [subscription name] --base-provider Microsoft.HyrbridCompute --base-resource-type machines --base-resource-name [Arc-server's resource name] --settings-resource-name default --gateway-resource-id [Full Arm resourceid]
228+
az connectedmachine setting update --resource-group [res-group] --subscription [subscription name] --base-provider Microsoft.HybridCompute --base-resource-type machines --base-resource-name [Arc-server's resource name] --settings-resource-name default --gateway-resource-id [Full Arm resourceid]
229229
```
230230
231231
1. Update the machine to use the Arc gateway resource.

articles/azure-functions/functions-identity-access-azure-sql-with-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ To enable system-assigned managed identity in the Azure portal:
7676
1. Select Identity.
7777
1. Within the System assigned tab, switch Status to On. Click Save.
7878
79-
![Turn on system assigned identity for Function app](./media/functions-identity-access-sql-with-managed-identity/function-system-identity.png)
79+
:::image type="content" source="./media/functions-identity-access-sql-with-managed-identity/function-system-identity.png" alt-text="Screenshot of function app, showing the Status set to On.":::
8080
8181
8282
For information on enabling system-assigned managed identity through Azure CLI or PowerShell, check out more information on [using managed identities with Azure Functions](../app-service/overview-managed-identity.md?tabs=dotnet&toc=%2fazure%2fazure-functions%2ftoc.json#add-a-system-assigned-identity).
52.6 KB
Loading
Loading
Loading

0 commit comments

Comments
 (0)