Skip to content

Commit 89ace94

Browse files
authored
Merge branch 'MicrosoftDocs:main' into Spelling-Wave-12
2 parents 0e27fb4 + 6bc4ee9 commit 89ace94

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

articles/azure-vmware/faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -275,8 +275,8 @@ sections:
275275
- name: Hosts, clusters, and private clouds
276276
questions:
277277

278-
- question: Is there more than one type of host available?
279-
answer: No. There's only one type available.
278+
- question: Is there more than one type of host available per private cloud? Is it possible to combine different host types in a cluster or private cloud?
279+
answer: With the exception of AV64 cluster requiring a separate 3-node cluster minimum of AV36, AV36P, or AV52, you cannot combine different host types in a private cloud. In all scenarios, clusters require the same host type. Multiple clusters can be deployed within a single private cloud. All hosts must be the same type within a private cloud. If different host types are required to meet use case needs, additional private clouds must be deployed.
280280

281281
- question: Do I use the same tools that I use now to manage private cloud resources?
282282
answer: Yes. The Azure portal is used for deployment and several management operations. vCenter Server and NSX Manager are used to manage vSphere and NSX resources.

articles/iot-edge/how-to-create-test-certificates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -241,8 +241,8 @@ The **Edge CA** certificate is also responsible for creating certificates for mo
241241

242242
3. This command creates several certificate and key files. The following certificate and key pair need to be copied over to an IoT Edge device and referenced in the config file:
243243

244-
* `certs\iot-edge-device-ca-<CA cert name>-full-chain.cert.pem`
245-
* `private\iot-edge-device-ca-<CA cert name>.key.pem`
244+
* `certs\iot-edge-device-<CA cert name>-full-chain.cert.pem`
245+
* `private\iot-edge-device-<CA cert name>.key.pem`
246246

247247

248248
# [Linux](#tab/linux)

articles/service-bus-messaging/test-locally-with-service-bus-emulator.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,7 @@ CONFIG_PATH="<Replace with path to Config.json file>"
213213
# SQL Edge EULA : https://go.microsoft.com/fwlink/?linkid=2139274
214214
ACCEPT_EULA="N"
215215
216-
# 3. MSSQL_SA_PASSWORD to be filled by user as per policy : https://learn.microsoft.com/en-us/sql/relational-databases/security/strong-passwords?view=sql-server-linux-ver16
216+
# 3. MSSQL_SA_PASSWORD to be filled by user as per policy : https://learn.microsoft.com/sql/relational-databases/security/strong-passwords?view=sql-server-linux-ver16
217217
MSSQL_SA_PASSWORD: ""
218218
```
219219

0 commit comments

Comments
 (0)