Skip to content

Commit 82a3a0e

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ds-updatetoc1
2 parents 7132ab6 + 6d92945 commit 82a3a0e

File tree

10 files changed

+22
-48
lines changed

10 files changed

+22
-48
lines changed

articles/active-directory/hybrid/how-to-connect-sync-endpoint-api-v2.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ editor: ''
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 05/19/2020
11+
ms.date: 05/20/2020
1212
ms.subservice: hybrid
1313
ms.author: billmath
1414
ms.collection: M365-identity-device-management
@@ -27,6 +27,9 @@ Microsoft has deployed a new endpoint (API) for Azure AD Connect that improves t
2727
## Pre-requisites 
2828
In order to use the new V2 endpoint, you will need to use [Azure AD Connect version 1.5.30.0](https://www.microsoft.com/download/details.aspx?id=47594) or later and follow the deployment steps provided below to enable the V2 endpoint for your Azure AD Connect server.
2929

30+
>[!NOTE]
31+
>Currently, this public preview is only available in the Azure global cloud and not available for [national clouds](https://docs.microsoft.com/azure/active-directory/develop/authentication-national-cloud).
32+
3033
### Public preview limitations 
3134
While this release has undergone extensive testing, you may still encounter issues. One of the goals of this public preview release is to find and fix any such issues.
3235

articles/active-directory/managed-identities-azure-resources/known-issues.md

Lines changed: 1 addition & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -46,27 +46,7 @@ The security boundary of the identity is the resource to which it is attached to
4646
- If system assigned managed identity is not enabled, and only one user assigned managed identity exists, IMDS will default to that single user assigned managed identity.
4747
- If system assigned managed identity is not enabled, and multiple user assigned managed identities exist, then specifying a managed identity in the request is required.
4848

49-
### Should I use the managed identities for Azure resources IMDS endpoint or the VM extension endpoint?
5049

51-
When using managed identities for Azure resources with VMs, we recommend using the IMDS endpoint. The Azure Instance Metadata Service is a REST Endpoint accessible to all IaaS VMs created via the Azure Resource Manager.
52-
53-
Some of the benefits of using managed identities for Azure resources over IMDS are:
54-
- All Azure IaaS supported operating systems can use managed identities for Azure resources over IMDS.
55-
- No longer need to install an extension on your VM to enable managed identities for Azure resources.
56-
- The certificates used by managed identities for Azure resources are no longer present in the VM.
57-
- The IMDS endpoint is a well-known non-routable IP address, only available from within the VM.
58-
- 1000 user-assigned managed identities can be assigned to a single VM.
59-
60-
The managed identities for Azure resources VM extension is still available; however, we are no longer developing new functionality on it. We recommend switching to use the IMDS endpoint.
61-
62-
Some of the limitations of using the VM extension endpoint are:
63-
- Limited support for Linux distributions: CoreOS Stable, CentOS 7.1, Red Hat 7.2, Ubuntu 15.04, Ubuntu 16.04
64-
- Only 32 user-assigned managed identities can be assigned to the VM.
65-
66-
67-
Note: The managed identities for Azure resources VM extension will be out of support in January 2019.
68-
69-
For more information on Azure Instance Metadata Service, see [IMDS documentation](https://docs.microsoft.com/azure/virtual-machines/windows/instance-metadata-service)
7050

7151
### Will managed identities be recreated automatically if I move a subscription to another directory?
7252

@@ -83,16 +63,7 @@ No. Managed identities do not currently support cross-directory scenarios.
8363
- System-assigned managed identity: You need write permissions over the resource. For example, for virtual machines you need Microsoft.Compute/virtualMachines/write. This action is included in resource specific built-in roles like [Virtual Machine Contributor](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#virtual-machine-contributor).
8464
- User-assigned managed identity: You need write permissions over the resource. For example, for virtual machines you need Microsoft.Compute/virtualMachines/write. In addition to [Managed Identity Operator](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignment over the managed identity.
8565

86-
### How do you restart the managed identities for Azure resources extension?
87-
On Windows and certain versions of Linux, if the extension stops, the following cmdlet may be used to manually restart it:
88-
89-
```powershell
90-
Set-AzVMExtension -Name <extension name> -Type <extension Type> -Location <location> -Publisher Microsoft.ManagedIdentity -VMName <vm name> -ResourceGroupName <resource group name> -ForceRerun <Any string different from any last value used>
91-
```
9266

93-
Where:
94-
- Extension name and type for Windows is: ManagedIdentityExtensionForWindows
95-
- Extension name and type for Linux is: ManagedIdentityExtensionForLinux
9667

9768
## Known issues
9869

@@ -128,12 +99,7 @@ Once the VM is started, the tag can be removed by using following command:
12899
az vm update -n <VM Name> -g <Resource Group> --remove tags.fixVM
129100
```
130101

131-
### VM extension provisioning fails
132102

133-
Provisioning of the VM extension might fail due to DNS lookup failures. Restart the VM, and try again.
134-
135-
> [!NOTE]
136-
> The VM extension is planned for deprecation by January 2019. We recommend you move to using the IMDS endpoint.
137103

138104
### Transferring a subscription between Azure AD directories
139105

@@ -146,4 +112,4 @@ Workaround for managed identities in a subscription that has been moved to anoth
146112

147113
### Moving a user-assigned managed identity to a different resource group/subscription
148114

149-
Moving a user-assigned managed identity to a different resource group will cause the identity to break. As a result, resources (e.g. VM) using that identity will not be able to request tokens for it.
115+
Moving a user-assigned managed identity to a different resource group is not supported.

articles/cognitive-services/LUIS/luis-interactive-test.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Test app in LUIS portal
33
description: Use Language Understanding (LUIS) to continuously work on your application to refine it and improve its language understanding.
44
ms.topic: conceptual
5-
ms.date: 05/17/2020
5+
ms.date: 05/20/2020
66
---
77

88
# Test your LUIS app in the LUIS portal
@@ -37,18 +37,23 @@ The test utterance should not be exactly the same as any example utterances in t
3737

3838
1. The utterance, its top intent, and score are added to the list of utterances under the text box.
3939

40-
![Interactive testing identifies the wrong intent](./media/luis-how-to-interactive-test/test-weather-1.png)
40+
> [!div class="mx-imgBorder"]
41+
> ![Interactive testing identifies the wrong intent](./media/luis-how-to-interactive-test/test-weather-1.png)
4142
4243
## Inspect the prediction
4344

4445
You inspect details of the test result in the **Inspect** panel.
4546

4647
1. With the **Test** slide-out panel open, select **Inspect** for an utterance you want to compare.
4748

48-
![Select Inspect button to see more details about the test results](./media/luis-how-to-interactive-test/inspect.png)
49+
> [!div class="mx-imgBorder"]
50+
> ![Select Inspect button to see more details about the test results](./media/luis-how-to-interactive-test/inspect.png)
4951
5052
1. The **Inspection** panel appears. The panel includes the top scoring intent as well as any identified entities. The panel shows the prediction of the selected utterance.
5153

54+
> [!div class="mx-imgBorder"]
55+
> ![Partial screenshot of Test Inspect panel](./media/luis-how-to-interactive-test/inspect-panel.png)
56+
5257
## Add to example utterances
5358

5459
From the inspection panel, you can add the test utterance to an intent by selecting **Add to example utterances**.
@@ -71,12 +76,14 @@ If you are using [Patterns](luis-concept-patterns.md) and the utterance matched
7176

7277
You can test the active version of your app with the published [endpoint](luis-glossary.md#endpoint) version. In the **Inspect** panel, select **Compare with published**. Any testing against the published model is deducted from your Azure subscription quota balance.
7378

74-
![Compare with published](./media/luis-how-to-interactive-test/inspect-panel-compare.png)
79+
> [!div class="mx-imgBorder"]
80+
> ![Compare with published](./media/luis-how-to-interactive-test/inspect-panel-compare.png)
7581
7682
## View endpoint JSON in test panel
7783
You can view the endpoint JSON returned for the comparison by selecting the **Show JSON view**.
7884

79-
![Published JSON response](./media/luis-how-to-interactive-test/inspect-panel-compare-json.png)
85+
> [!div class="mx-imgBorder"]
86+
> ![Published JSON response](./media/luis-how-to-interactive-test/inspect-panel-compare-json.png)
8087
8188
## Additional settings in test panel
8289

2.53 KB
Loading
29.1 KB
Loading
3.21 KB
Loading
760 Bytes
Loading

articles/static-web-apps/getting-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Begin by configuring your new app and linking it to a GitHub repository.
7676
- Select your _Azure subscription_
7777
- Select or create a new _Resource Group_
7878
- Name the app **my-first-static-web-app**.
79-
- Valid characters are `a-z` (case insensitive), `0-9`, and `_`.
79+
- Valid characters are `a-z` (case insensitive), `0-9`, and `-`.
8080
- Select a _Region_ closest to you
8181
- Select the **Free** _SKU_
8282
- Click the **Sign-in with GitHub** button and authenticate with GitHub

articles/synapse-analytics/sql/develop-transaction-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The transaction safety limits only apply to fully logged operations.
3939

4040
The following operations are capable of being minimally logged:
4141

42-
* CREATE TABLE AS SELECT ([CTAS](../sql-data-warehouse/sql-data-warehouse-develop-ctas.md?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json)
42+
* CREATE TABLE AS SELECT ([CTAS])(../sql-data-warehouse/sql-data-warehouse-develop-ctas.md?toc=/azure/synapse-analytics/toc.json&bc=/azure/synapse-analytics/breadcrumb/toc.json)
4343
* INSERT..SELECT
4444
* CREATE INDEX
4545
* ALTER INDEX REBUILD

includes/azure-storage-account-limits-standard.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,16 @@
55
author: tamram
66
ms.service: storage
77
ms.topic: include
8-
ms.date: 03/13/2020
8+
ms.date: 05/20/2020
99
ms.author: tamram
1010
ms.custom: include file
1111
---
1212

13-
The following table describes default limits for Azure general-purpose v1, v2, Blob storage, block blob storage, and Data Lake Storage Gen2 enabled storage accounts. The *ingress* limit refers to all data that is sent to a storage account. The *egress* limit refers to all data that is received from a storage account.
13+
The following table describes default limits for Azure general-purpose v1, v2, Blob storage, and block blob storage accounts. The *ingress* limit refers to all data that is sent to a storage account. The *egress* limit refers to all data that is received from a storage account.
1414

1515
| Resource | Limit |
1616
| --- | --- |
17-
| Number of storage accounts per region per subscription, including standard, premium, and Data Lake Storage Gen2 enabled storage accounts.<sup>3</sup> | 250 |
17+
| Number of storage accounts per region per subscription, including standard, and premium storage accounts.| 250 |
1818
| Maximum storage account capacity | 5 PiB <sup>1</sup>|
1919
| Maximum number of blob containers, blobs, file shares, tables, queues, entities, or messages per storage account | No limit |
2020
| Maximum request rate<sup>1</sup> per storage account | 20,000 requests per second |
@@ -32,8 +32,6 @@ The following table describes default limits for Azure general-purpose v1, v2, B
3232

3333
[!INCLUDE [azure-storage-redundancy](azure-storage-redundancy.md)]
3434

35-
<sup>3</sup> [Azure Data Lake Storage Gen2](../articles/storage/blobs/data-lake-storage-introduction.md) is a set of capabilities dedicated to big data analytics, built on Azure Blob storage. Azure Storage and blob storage limitations apply to Data Lake Storage Gen2.
36-
3735
> [!NOTE]
3836
> Microsoft recommends that you use a general-purpose v2 storage account for most scenarios. You can easily upgrade a general-purpose v1 or an Azure Blob storage account to a general-purpose v2 account with no downtime and without the need to copy data. For more information, see [Upgrade to a general-purpose v2 storage account](../articles/storage/common/storage-account-upgrade.md).
3937

0 commit comments

Comments
 (0)