Skip to content

Commit 87a3599

Browse files
authored
Merge pull request #244530 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 7c3589c + 6b0ec72 commit 87a3599

14 files changed

+95
-23
lines changed

articles/active-directory/develop/app-only-access-primer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ For example, to read a list of all teams created in an organization, you need to
4242

4343
As a developer, you need to configure all required app-only permissions, also referred to as app roles on your application registration. You can configure your app's requested app-only permissions through the Azure portal or Microsoft Graph. App-only access doesn't support dynamic consent, so you can't request individual permissions or sets of permissions at runtime.
4444

45-
Once you've configured all the permissions your app needs, it must get admin consent [admin consent](../manage-apps/grant-admin-consent.md) for it to access the resources. For example, only users with the global admin role can grant app-only permissions (app roles) for the Microsoft Graph API. Users with other admin roles, like application admin and cloud app admin, are able to grant app-only permissions for other resources.
45+
Once you've configured all the permissions your app needs, it must get [admin consent](../manage-apps/grant-admin-consent.md) for it to access the resources. For example, only users with the global admin role can grant app-only permissions (app roles) for the Microsoft Graph API. Users with other admin roles, like application admin and cloud app admin, are able to grant app-only permissions for other resources.
4646

4747
Admin users can grant app-only permissions by using the Azure portal or by creating grants programmatically through the Microsoft Graph API. You can also prompt for interactive consent from within your app, but this option isn't preferable since app-only access doesn't require a user.
4848

@@ -85,4 +85,4 @@ The example given is a simple illustration of application authorization. The pro
8585

8686
- [Learn how to create and assign app roles in Azure AD](howto-add-app-roles-in-azure-ad-apps.md)
8787
- [Overview of permissions in Microsoft Graph](/graph/permissions-overview)
88-
- [Microsoft Graph permissions reference](/graph/permissions-reference)
88+
- [Microsoft Graph permissions reference](/graph/permissions-reference)

articles/active-directory/hybrid/connect/how-to-connect-sync-feature-directory-extensions.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,9 @@ During installation of Azure AD Connect, an application is registered where thes
5959

6060
![Schema extension app](./media/how-to-connect-sync-feature-directory-extensions/extension3new.png)
6161

62+
>[!NOTE]
63+
> The **Tenant Schema Extension App** is a system-only application that can't be deleted and attribute extension definitions can't be removed.
64+
6265
Make sure you select **All applications** to see this app.
6366

6467
The attributes are prefixed with **extension \_{ApplicationId}\_**. ApplicationId has the same value for all attributes in your Azure AD tenant. You will need this value for all other scenarios in this topic.

articles/aks/api-server-vnet-integration.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -66,10 +66,6 @@ API Server VNet Integration is available in all global Azure regions.
6666
az provider register --namespace Microsoft.ContainerService
6767
```
6868
69-
## Limitations
70-
71-
* Existing AKS private clusters can't be converted to API Server VNet Integration clusters.
72-
7369
## Create an AKS cluster with API Server VNet Integration using managed VNet
7470
7571
You can configure your AKS clusters with API Server VNet Integration in managed VNet or bring-your-own VNet mode. You can create the as public clusters (with API server access available via a public IP) or private clusters (where the API server is only accessible via private VNet connectivity). You can also toggle between a public and private state without redeploying your cluster.
@@ -109,12 +105,12 @@ You can configure your AKS clusters with API Server VNet Integration in managed
109105
110106
## Create a private AKS cluster with API Server VNet Integration using bring-your-own VNet
111107
112-
When using bring-your-own VNet, you must create and delegate an API server subnet to `Microsoft.ContainerService/managedClusters`, which grants the AKS service permissions to inject the API server pods and internal load balancer into that subnet. You can't use the subnet for any other workloads, but you can use it for multiple AKS clusters located in the same virtual network. An AKS cluster requires *two to seven* IP addresses depending on cluster scale. The minimum supported API server subnet size is a */28*.
108+
When using bring-your-own VNet, you must create and delegate an API server subnet to `Microsoft.ContainerService/managedClusters`, which grants the AKS service permissions to inject the API server pods and internal load balancer into that subnet. You can't use the subnet for any other workloads, but you can use it for multiple AKS clusters located in the same virtual network. The minimum supported API server subnet size is a */28*.
113109
114110
The cluster identity needs permissions to both the API server subnet and the node subnet. Lack of permissions at the API server subnet can cause a provisioning failure.
115111
116112
> [!WARNING]
117-
> Running out of IP addresses may prevent API server scaling and cause an API server outage.
113+
> An AKS cluster reserves at least 9 IPs in the subnet address space. Running out of IP addresses may prevent API server scaling and cause an API server outage.
118114
119115
### Create a resource group
120116
@@ -211,7 +207,7 @@ az group create -l <location> -n <resource-group>
211207
212208
## Convert an existing AKS cluster to API Server VNet Integration
213209
214-
You can convert existing public AKS clusters to API Server VNet Integration clusters by supplying an API server subnet that meets the requirements listed earlier. These requirements include: in the same VNet as the cluster nodes, permissions granted for the AKS cluster identity, and size of at least */28*. Converting your cluster is a one-way migration. Clusters can't have API Server VNet Integration disabled after it's been enabled.
210+
You can convert existing public/private AKS clusters to API Server VNet Integration clusters by supplying an API server subnet that meets the requirements listed earlier. These requirements include: in the same VNet as the cluster nodes, permissions granted for the AKS cluster identity, and size of at least */28*. Converting your cluster is a one-way migration. Clusters can't have API Server VNet Integration disabled after it's been enabled.
215211
216212
This upgrade performs a node-image version upgrade on all node pools and restarts all workloads while they undergo a rolling image upgrade.
217213

articles/azure-monitor/agents/azure-monitor-agent-windows-client.md

Lines changed: 67 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Since MO is a tenant level resource, the scope of the permission would be higher
107107

108108
#### 1. Assign ‘Monitored Object Contributor’ role to the operator
109109

110-
This step grants the ability to create and link a monitored object to a user.
110+
This step grants the ability to create and link a monitored object to a user or group.
111111

112112
**Request URI**
113113
```HTTP
@@ -139,7 +139,7 @@ PUT https://management.azure.com/providers/microsoft.insights/providers/microsof
139139
| Name | Description |
140140
|:---|:---|
141141
| roleDefinitionId | Fixed value: Role definition ID of the 'Monitored Objects Contributor' role: `/providers/Microsoft.Authorization/roleDefinitions/56be40e24db14ccf93c37e44c597135b` |
142-
| principalId | Provide the `Object Id` of the identity of the user to which the role needs to be assigned. It may be the user who elevated at the beginning of step 1, or another user who will perform later steps. |
142+
| principalId | Provide the `Object Id` of the identity of the user to which the role needs to be assigned. It may be the user who elevated at the beginning of step 1, or another user or group who will perform later steps. |
143143

144144
After this step is complete, **reauthenticate** your session and **reacquire** your ARM bearer token.
145145

@@ -217,6 +217,71 @@ PUT https://management.azure.com/providers/Microsoft.Insights/monitoredObjects/{
217217
|:---|:---|
218218
| `dataCollectionRuleID` | The resource ID of an existing Data Collection Rule that you created in the **same region** as the Monitored Object. |
219219

220+
#### 4. List associations to Monitored Object
221+
If you need to view the associations, you can list them for the Monitored Object.
222+
223+
**Permissions required**: Anyone who has ‘Reader’ at an appropriate scope can perform this operation, similar to that assigned in step 1.
224+
225+
**Request URI**
226+
```HTTP
227+
GET https://management.azure.com/{MOResourceId}/providers/microsoft.insights/datacollectionruleassociations/?api-version=2021-09-01-preview
228+
```
229+
**Sample Request URI**
230+
```HTTP
231+
GET https://management.azure.com/providers/Microsoft.Insights/monitoredObjects/{AADTenantId}/providers/microsoft.insights/datacollectionruleassociations/?api-version=2021-09-01-preview
232+
```
233+
234+
```JSON
235+
{
236+
"value": [
237+
{
238+
"id": "/subscriptions/703362b3-f278-4e4b-9179-c76eaf41ffc2/resourceGroups/myResourceGroup/providers/Microsoft.Compute/virtualMachines/myVm/providers/Microsoft.Insights/dataCollectionRuleAssociations/myRuleAssociation",
239+
"name": "myRuleAssociation",
240+
"type": "Microsoft.Insights/dataCollectionRuleAssociations",
241+
"properties": {
242+
"dataCollectionRuleId": "/subscriptions/703362b3-f278-4e4b-9179-c76eaf41ffc2/resourceGroups/myResourceGroup/providers/Microsoft.Insights/dataCollectionRules/myCollectionRule",
243+
"provisioningState": "Succeeded"
244+
},
245+
"systemData": {
246+
"createdBy": "user1",
247+
"createdByType": "User",
248+
"createdAt": "2021-04-01T12:34:56.1234567Z",
249+
"lastModifiedBy": "user2",
250+
"lastModifiedByType": "User",
251+
"lastModifiedAt": "2021-04-02T12:34:56.1234567Z"
252+
},
253+
"etag": "070057da-0000-0000-0000-5ba70d6c0000"
254+
}
255+
],
256+
"nextLink": null
257+
}
258+
```
259+
260+
#### 5. Disassociate DCR to Monitored Object
261+
If you need to remove an association of a Data Collection Rule (DCR) to the Monitored Object.
262+
263+
**Permissions required**: Anyone who has ‘Monitored Object Contributor’ at an appropriate scope can perform this operation, as assigned in step 1.
264+
265+
**Request URI**
266+
```HTTP
267+
DELETE https://management.azure.com/{MOResourceId}/providers/microsoft.insights/datacollectionruleassociations/{associationName}?api-version=2021-09-01-preview
268+
```
269+
**Sample Request URI**
270+
```HTTP
271+
DELETE https://management.azure.com/providers/Microsoft.Insights/monitoredObjects/{AADTenantId}/providers/microsoft.insights/datacollectionruleassociations/{associationName}?api-version=2021-09-01-preview
272+
```
273+
274+
**URI Parameters**
275+
276+
| Name | In | Type | Description |
277+
|---|---|---|---|
278+
| `MOResourceId` | path | string | Full resource ID of the MO created in step 2. Example: 'providers/Microsoft.Insights/monitoredObjects/{AADTenantId}' |
279+
| `associationName` | path | string | The name of the association. The name is case insensitive. Example: 'assoc01' |
280+
281+
**Headers**
282+
- Authorization: ARM Bearer Token
283+
- Content-Type: Application/json
284+
220285

221286
### Using PowerShell for onboarding
222287
```PowerShell

articles/batch/simplified-node-communication-pool-no-public-ip.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ client-request-id: 00000000-0000-0000-0000-000000000000
9696
"sku": "22_04-lts"
9797
},
9898
"nodeAgentSKUId": "batch.node.ubuntu 22.04"
99-
}
99+
},
100100
"networkConfiguration": {
101101
"subnetId": "/subscriptions/<your_subscription_id>/resourceGroups/<your_resource_group>/providers/Microsoft.Network/virtualNetworks/<your_vnet_name>/subnets/<your_subnet_name>",
102102
"publicIPAddressConfiguration": {

articles/cognitive-services/openai/concepts/models.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@ GPT-3.5 models can understand and generate natural language or code. The most ca
4444

4545
The `gpt-35-turbo` model supports 4096 max input tokens and the `gpt-35-turbo-16k` model supports up to 16,384 tokens.
4646

47+
`gpt-35-turbo` and `gpt-35-turbo-16k` share the same [quota](../how-to/quota.md).
48+
4749
Like GPT-4, use the Chat Completions API to use GPT-3.5 Turbo. To learn more about how to interact with GPT-3.5 Turbo and the Chat Completions API check out our [in-depth how-to](../how-to/chatgpt.md).
4850

4951
## Embeddings models

articles/cognitive-services/openai/how-to/integrate-synapseml.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ recommendations: false
1616

1717
# Use Azure OpenAI with large datasets
1818

19-
Azure OpenAI can be used to solve a large number of natural language tasks through prompting the completion API. To make it easier to scale your prompting workflows from a few examples to large datasets of examples, we have integrated the Azure OpenAI service with the distributed machine learning library [SynapseML](https://www.microsoft.com/research/blog/synapseml-a-simple-multilingual-and-massively-parallel-machine-learning-library/). This integration makes it easy to use the [Apache Spark](https://spark.apache.org/) distributed computing framework to process millions of prompts with the OpenAI service. This tutorial shows how to apply large language models at a distributed scale using Azure Open AI and Azure Synapse Analytics.
19+
Azure OpenAI can be used to solve a large number of natural language tasks through prompting the completion API. To make it easier to scale your prompting workflows from a few examples to large datasets of examples, we have integrated the Azure OpenAI Service with the distributed machine learning library [SynapseML](https://www.microsoft.com/research/blog/synapseml-a-simple-multilingual-and-massively-parallel-machine-learning-library/). This integration makes it easy to use the [Apache Spark](https://spark.apache.org/) distributed computing framework to process millions of prompts with the OpenAI service. This tutorial shows how to apply large language models at a distributed scale using Azure Open AI and Azure Synapse Analytics.
2020

2121
## Prerequisites
2222

articles/container-instances/container-instances-tutorial-deploy-confidential-container-default-portal.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,10 @@ Open the overview for the container group by navigating to **Resource Groups** >
6565

6666
2. Once its status is *Running*, navigate to the IP address in your browser.
6767

68-
:::image type="content" source="media/container-instances-confidential-containers-tutorials/confidential-containers-aci-hello-world.png" alt-text="Screenshot of the hello world application running, PNG.":::
68+
:::image type="content" source="media/container-instances-confidential-containers-tutorials/confidential-containers-aci-hello-world.png" alt-text="Screenshot of the hello world application running, PNG.":::
69+
70+
The presence of the attestation report below the Azure Container Instances logo confirms that the container is running on hardware that supports a hardware-based and attested trusted execution environment (TEE).
71+
If you deploy to hardware that does not support a TEE, for example by choosing a region where the [ACI Confidential SKU is not available](./container-instances-region-availability.md#linux-container-groups), no attestation report will be shown.
6972

7073
Congratulations! You have deployed a confidential container on Azure Container Instances which is displaying a hardware attestation report in your browser.
7174

articles/container-instances/container-instances-tutorial-deploy-confidential-containers-cce-arm.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ With the ARM template that you've crafted and the Azure CLI confcom extension, y
194194

195195
* **Subscription**: select an Azure subscription.
196196
* **Resource group**: select **Create new**, enter a unique name for the resource group, and then select **OK**.
197-
* **Location**: select a location for the resource group. Example: **North Europe**.
197+
* **Location**: select a location for the resource group. Choose a region where the [Confidential SKU is supported](./container-instances-region-availability.md#linux-container-groups). Example: **North Europe**.
198198
* **Name**: accept the generated name for the instance, or enter a name.
199199
* **Image**: accept the default image name. This sample Linux image displays a hardware attestation.
200200

@@ -224,6 +224,9 @@ Use the Azure portal or a tool such as the [Azure CLI](container-instances-quick
224224

225225
![Screenshot of browser view of app deployed using Azure Container Instances, PNG.](media/container-instances-confidential-containers-tutorials/confidential-containers-aci-hello-world.png)
226226

227+
The presence of the attestation report below the Azure Container Instances logo confirms that the container is running on hardware that supports a TEE.
228+
If you deploy to hardware that does not support a TEE, for example by choosing a region where the ACI Confidential SKU is not available, no attestation report will be shown.
229+
227230
## Next Steps
228231

229232
Now that you have deployed a confidential container group on ACI, you can learn more about how policies are enforced.

articles/cosmos-db/introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ adobe-target: true
1818

1919
Today's applications are required to be highly responsive and always online. To achieve low latency and high availability, instances of these applications need to be deployed in datacenters that are close to their users. Applications need to respond in real time to large changes in usage at peak hours, store ever increasing volumes of data, and make this data available to users in milliseconds.
2020

21-
Azure Cosmos DB is a fully managed NoSQL and relational database for modern app development. Azure Cosmos DB offers single-digit millisecond response times, automatic and instant scalability, along with guarantee speed at any scale. Business continuity is assured with [SLA-backed](https://azure.microsoft.com/support/legal/sla/cosmos-db) availability and enterprise-grade security.
21+
Azure Cosmos DB is a fully managed NoSQL and relational database for modern app development. Azure Cosmos DB offers single-digit millisecond response times, automatic and instant scalability, along with guaranteed speed at any scale. Business continuity is assured with [SLA-backed](https://azure.microsoft.com/support/legal/sla/cosmos-db) availability and enterprise-grade security.
2222

2323
App development is faster and more productive thanks to:
2424

0 commit comments

Comments
 (0)