Skip to content

Commit 83ed352

Browse files
authored
Merge pull request #275886 from PatrickFarley/main
[Dirty PR] Main
2 parents 2720194 + f923097 commit 83ed352

File tree

2,733 files changed

+104226
-21040
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,733 files changed

+104226
-21040
lines changed

.openpublishing.publish.config.json

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,6 +236,12 @@
236236
"branch": "main",
237237
"branch_mapping": {}
238238
},
239+
{
240+
"path_to_root": "functions-python-extensions",
241+
"url": "https://github.com/Azure/azure-functions-python-extensions",
242+
"branch": "dev",
243+
"branch_mapping": {}
244+
},
239245
{
240246
"path_to_root": "functions-python-tensorflow-tutorial",
241247
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
@@ -247,7 +253,7 @@
247253
"url": "https://github.com/Azure-Samples/function-app-arm-templates",
248254
"branch": "main",
249255
"branch_mapping": {}
250-
},
256+
},
251257
{
252258
"path_to_root": "functions-azure-product",
253259
"url": "https://github.com/Azure/Azure-Functions",
@@ -1004,6 +1010,12 @@
10041010
"branch": "docs-snippets",
10051011
"branch_mapping": {}
10061012
},
1013+
{
1014+
"path_to_root": "functions-openai-extension",
1015+
"url": "https://github.com/Azure/azure-functions-openai-extension",
1016+
"branch": "main",
1017+
"branch_mapping": {}
1018+
},
10071019
{
10081020
"path_to_root": "cosmos-db-nosql-dotnet-samples",
10091021
"url": "https://github.com/azure-samples/cosmos-db-nosql-dotnet-samples",
@@ -1225,6 +1237,7 @@
12251237
"redirection_files": [
12261238
".openpublishing.redirection.active-directory.json",
12271239
".openpublishing.redirection.ansible.json",
1240+
".openpublishing.redirection.api-center.json",
12281241
".openpublishing.redirection.api-management.json",
12291242
".openpublishing.redirection.app-service.json",
12301243
".openpublishing.redirection.asc-for-iot.json",
@@ -1342,6 +1355,7 @@
13421355
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
13431356
"articles/operator-insights/.openpublishing.redirection.operator-insights.json",
13441357
"articles/operator-nexus/.openpublishing.redirection.operator-nexus.json",
1358+
"articles/operator-service-manager/.openpublishing.redirection.operator-service-manager.json",
13451359
"articles/peering-service/.openpublishing.redirection.peering-service.json",
13461360
"articles/postgresql/.openpublishing.redirection.postgresql.json",
13471361
"articles/route-server/.openpublishing.redirection.route-server.json",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/api-center/use-vscode-extension-copilot.md",
5+
"redirect_url": "/azure/api-center/use-vscode-extension",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -451,6 +451,11 @@
451451
"redirect_url": "/azure/aks/create-node-pools",
452452
"redirect_document_id": false
453453
},
454+
{
455+
"source_path_from_root": "/articles/copilot/limited-access.md",
456+
"redirect_url": "/azure/copilot/manage-access",
457+
"redirect_document_id": false
458+
},
454459
{
455460
"source_path_from_root": "/articles/aks/command-invoke.md",
456461
"redirect_url": "/azure/aks/access-private-cluster",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6649,6 +6649,11 @@
66496649
"redirect_url": "/azure/azure-functions/functions-monitoring",
66506650
"redirect_document_id": false
66516651
},
6652+
{
6653+
"source_path_from_root": "/articles/azure-monitor/app/resources-roles-access-control.md",
6654+
"redirect_url": "/azure/azure-monitor//roles-permissions-security",
6655+
"redirect_document_id": false
6656+
},
66526657
{
66536658
"source_path_from_root": "/articles/azure-monitor/app/java-standalone-arguments.md",
66546659
"redirect_url": "/azure/azure-monitor/app/java-get-started-supplemental",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -690,6 +690,16 @@
690690
"redirect_url": "/azure/azure-maps/power-bi-visual-conversion",
691691
"redirect_document_id": false
692692
},
693+
{
694+
"source_path_from_root": "/articles/azure-maps/migrate-from-bing-maps-web-services.md",
695+
"redirect_url": "/azure/azure-maps/migrate-bing-maps-overview",
696+
"redirect_document_id": false
697+
},
698+
{
699+
"source_path_from_root": "/articles/azure-maps/migrate-from-bing-maps.md",
700+
"redirect_url": "/azure/azure-maps/migrate-bing-maps-overview",
701+
"redirect_document_id": false
702+
},
693703
{
694704
"source_path_from_root": "/articles/azure-portal/resource-group-portal-linked-resources.md",
695705
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/operator-service-manager/how-to-use-azure-operator-service-manager-cli-extension.md",
5+
"redirect_url": "/azure/operator-service-manager/concepts-about-azure-operator-service-manager-cli",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.sentinel.json

Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,85 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/sentinel/automate-responses-with-playbooks.md#azure-logic-apps-basic-concepts",
5+
"redirect_url": "/azure/sentinel/playbooks/logic-apps-playbooks",
6+
"redirect_document_id": true
7+
},
8+
{
9+
"source_path": "articles/sentinel/automate-responses-with-playbooks.md#how-to-run-a-playbook",
10+
"redirect_url": "/azure/sentinel/playbooks/run-manage-playbooks",
11+
"redirect_document_id": true
12+
},
13+
{
14+
"source_path": "articles/sentinel/automate-responses-with-playbooks.md#recommended-playbooks",
15+
"redirect_url": "/azure/sentinel/playbooks/playbooks-recommendations",
16+
"redirect_document_id": true
17+
},
18+
{
19+
"source_path": "articles/sentinel/authenticate-playbooks-to-sentinel.md",
20+
"redirect_url": "/azure/sentinel/automation/authenticate-playbooks-to-sentinel",
21+
"redirect_document_id": true
22+
},
23+
{
24+
"source_path": "articles/sentinel/automate-responses-with-playbooks.md",
25+
"redirect_url": "/azure/sentinel/automation/automate-responses-with-playbooks",
26+
"redirect_document_id": true
27+
},
28+
{
29+
"source_path": "articles/sentinel/automation.md",
30+
"redirect_url": "/azure/sentinel/automation/automation",
31+
"redirect_document_id": true
32+
},
33+
{
34+
"source_path": "articles/sentinel/create-playbooks.md",
35+
"redirect_url": "/azure/sentinel/automation/create-playbooks",
36+
"redirect_document_id": true
37+
},
38+
{
39+
"source_path": "articles/sentinel/create-tasks-playbook.md",
40+
"redirect_url": "/azure/sentinel/automation/create-tasks-playbook",
41+
"redirect_document_id": true
42+
},
43+
{
44+
"source_path": "articles/sentinel/define-playbook-access-restrictions.md",
45+
"redirect_url": "/azure/sentinel/automation/define-playbook-access-restrictions",
46+
"redirect_document_id": true
47+
},
48+
{
49+
"source_path": "articles/sentinel/logic-apps-playbooks.md",
50+
"redirect_url": "/azure/sentinel/automation/logic-apps-playbooks",
51+
"redirect_document_id": true
52+
},
53+
{
54+
"source_path": "articles/sentinel/migrate-playbooks-to-automation-rules.md",
55+
"redirect_url": "/azure/sentinel/automation/migrate-playbooks-to-automation-rules",
56+
"redirect_document_id": true
57+
},
58+
{
59+
"source_path": "articles/sentinel/playbook-recommendations.md",
60+
"redirect_url": "/azure/sentinel/automation/playbook-recommendations",
61+
"redirect_document_id": true
62+
},
63+
{
64+
"source_path": "articles/sentinel/playbook-triggers-actions.md",
65+
"redirect_url": "/azure/sentinel/automation/playbook-triggers-actions",
66+
"redirect_document_id": true
67+
},
68+
{
69+
"source_path": "articles/sentinel/run-playbooks.md",
70+
"redirect_url": "/azure/sentinel/automation/run-playbooks",
71+
"redirect_document_id": true
72+
},
73+
{
74+
"source_path": "articles/sentinel/tutorial-respond-threats-playbook.md",
75+
"redirect_url": "/azure/sentinel/automation/tutorial-respond-threats-playbook",
76+
"redirect_document_id": true
77+
},
78+
{
79+
"source_path": "articles/sentinel/use-playbook-templates.md",
80+
"redirect_url": "/azure/sentinel/automation/use-playbook-templates",
81+
"redirect_document_id": true
82+
},
383
{
484
"source_path": "articles/sentinel/sap/deploy-data-connector-agent-container-other-methods.md",
585
"redirect_url": "/azure/sentinel/sap/deploy-data-connector-agent-container",

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,11 +262,13 @@ The `RunAsync` method in the _Program.cs_ file:
262262
1. Initializes the auth provider using [OAuth 2.0 client credentials grant](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md) flow. With the client credentials grant flow, the app is able to get an access token to call the Microsoft Graph API.
263263
1. Sets up the Microsoft Graph service client with the auth provider:
264264

265-
:::code language="csharp" source="~/ms-identity-dotnetcore-b2c-account-management/src/Program.cs" id="ms_docref_set_auth_provider":::
265+
The previously published sample code is not available at this time.
266+
<!--:::code language="csharp" source="~/ms-identity-dotnetcore-b2c-account-management/src/Program.cs" id="ms_docref_set_auth_provider":::-->
266267

267268
The initialized _GraphServiceClient_ is then used in _UserService.cs_ to perform the user management operations. For example, getting a list of the user accounts in the tenant:
268269

269-
:::code language="csharp" source="~/ms-identity-dotnetcore-b2c-account-management/src/Services/UserService.cs" id="ms_docref_get_list_of_user_accounts":::
270+
The previously published sample code is not available at this time.
271+
<!--:::code language="csharp" source="~/ms-identity-dotnetcore-b2c-account-management/src/Services/UserService.cs" id="ms_docref_get_list_of_user_accounts":::-->
270272

271273
[Make API calls using the Microsoft Graph SDKs](/graph/sdks/create-requests) includes information on how to read and write information from Microsoft Graph, use `$select` to control the properties returned, provide custom query parameters, and use the `$filter` and `$orderBy` query parameters.
272274

articles/ai-services/cognitive-services-virtual-networks.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -370,11 +370,9 @@ Currently, only IPv4 addresses are supported. Each Azure AI services resource su
370370
371371
To grant access from your on-premises networks to your Azure AI services resource with an IP network rule, identify the internet-facing IP addresses used by your network. Contact your network administrator for help.
372372
373-
If you use Azure ExpressRoute on-premises for public peering or Microsoft peering, you need to identify the NAT IP addresses. For more information, see [What is Azure ExpressRoute](../expressroute/expressroute-introduction.md).
373+
If you use Azure ExpressRoute on-premises for Microsoft peering, you need to identify the NAT IP addresses. For more information, see [What is Azure ExpressRoute](../expressroute/expressroute-introduction.md).
374374
375-
For public peering, each ExpressRoute circuit by default uses two NAT IP addresses. Each is applied to Azure service traffic when the traffic enters the Microsoft Azure network backbone. For Microsoft peering, the NAT IP addresses that are used are either customer provided or supplied by the service provider. To allow access to your service resources, you must allow these public IP addresses in the resource IP firewall setting.
376-
377-
To find your public peering ExpressRoute circuit IP addresses, [open a support ticket with ExpressRoute](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview) use the Azure portal. For more information, see [NAT requirements for Azure public peering](../expressroute/expressroute-nat.md#nat-requirements-for-azure-public-peering).
375+
For Microsoft peering, the NAT IP addresses that are used are either customer provided or supplied by the service provider. To allow access to your service resources, you must allow these public IP addresses in the resource IP firewall setting.
378376
379377
### Managing IP network rules
380378

0 commit comments

Comments
 (0)