Skip to content

Commit 950d5dc

Browse files
authored
Merge pull request #93519 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents bf9d151 + 02da8ff commit 950d5dc

File tree

4 files changed

+35
-35
lines changed

4 files changed

+35
-35
lines changed

articles/azure-monitor/platform/alerts-automatic-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: alerts
1111
# Understand the automatic migration process for your classic alert rules
1212

1313
As [previously announced](monitoring-classic-retirement.md), classic alerts in Azure Monitor are being retired in September 2019 (was originally July 2019). As part of the retirement process, [a migration tool](alerts-using-migration-tool.md) is available in the Azure portal for customers to trigger migration themselves. If you haven't used the migration tool by August 31, 2019, Azure Monitor will start the process of automatic migration of your classic alerts starting September 1, 2019.
14-
This article walks you through the the automatic migration process and help you resolve any issues you might run into.
14+
This article walks you through the automatic migration process and help you resolve any issues you might run into.
1515

1616
> [!NOTE]
1717
> This article only applies to Azure public cloud. Retirement process for Azure Monitor classic alerts in Azure Government cloud and Azure China 21Vianet will be announced at future date.

articles/azure-signalr/signalr-quickstart-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: zhshang
1010
---
1111
# Quickstart: Create a chat room with ASP.NET and SignalR Service
1212

13-
Azure SignalR Service is based on [SignalR for ASP.NET Core 2.0](https://docs.microsoft.com/aspnet/core/signalr/introduction), which is **not** 100% compatible with ASP.NET SignalR. Azure SignalR Service re-implemented ASP.NET SignalR data protocol based on the latest ASP.NET Core technologies. When using Azure SignalR Service for ASP.NET SignalR, some ASP.NET SignalR features are no longer supported, for example, Azure SignalR does not replay messages when the client reconnects. Also, the Forever Frame transport and JSONP are not support. Some code changes and proper version of dependent libraries are needed to make ASP.NET SignalR application work with SignalR Service.
13+
Azure SignalR Service is based on [SignalR for ASP.NET Core 2.0](https://docs.microsoft.com/aspnet/core/signalr/introduction), which is **not** 100% compatible with ASP.NET SignalR. Azure SignalR Service re-implemented ASP.NET SignalR data protocol based on the latest ASP.NET Core technologies. When using Azure SignalR Service for ASP.NET SignalR, some ASP.NET SignalR features are no longer supported, for example, Azure SignalR does not replay messages when the client reconnects. Also, the Forever Frame transport and JSONP are not supported. Some code changes and proper version of dependent libraries are needed to make ASP.NET SignalR application work with SignalR Service.
1414

1515
Refer to the [version differences doc](https://docs.microsoft.com/aspnet/core/signalr/version-differences?view=aspnetcore-2.2) for a complete list of feature comparison between ASP.NET SignalR and ASP.NET Core SignalR.
1616

articles/virtual-machines/linux/terraform-create-complete-vm.md

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ resource "azurerm_virtual_network" "myterraformnetwork" {
6262
name = "myVnet"
6363
address_space = ["10.0.0.0/16"]
6464
location = "eastus"
65-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
65+
resource_group_name = azurerm_resource_group.myterraformgroup.name
6666
6767
tags = {
6868
environment = "Terraform Demo"
@@ -75,8 +75,8 @@ The following section creates a subnet named *mySubnet* in the *myVnet* virtual
7575
```hcl
7676
resource "azurerm_subnet" "myterraformsubnet" {
7777
name = "mySubnet"
78-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
79-
virtual_network_name = "${azurerm_virtual_network.myterraformnetwork.name}"
78+
resource_group_name = azurerm_resource_group.myterraformgroup.name
79+
virtual_network_name = azurerm_virtual_network.myterraformnetwork.name
8080
address_prefix = "10.0.2.0/24"
8181
}
8282
```
@@ -89,7 +89,7 @@ To access resources across the Internet, create and assign a public IP address t
8989
resource "azurerm_public_ip" "myterraformpublicip" {
9090
name = "myPublicIP"
9191
location = "eastus"
92-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
92+
resource_group_name = azurerm_resource_group.myterraformgroup.name
9393
allocation_method = "Dynamic"
9494
9595
tags = {
@@ -106,7 +106,7 @@ Network Security Groups control the flow of network traffic in and out of your V
106106
resource "azurerm_network_security_group" "myterraformnsg" {
107107
name = "myNetworkSecurityGroup"
108108
location = "eastus"
109-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
109+
resource_group_name = azurerm_resource_group.myterraformgroup.name
110110
111111
security_rule {
112112
name = "SSH"
@@ -132,10 +132,10 @@ A virtual network interface card (NIC) connects your VM to a given virtual netwo
132132

133133
```hcl
134134
resource "azurerm_network_interface" "myterraformnic" {
135-
name = "myNIC"
136-
location = "eastus"
137-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
138-
network_security_group_id = "${azurerm_network_security_group.myterraformnsg.id}"
135+
name = "myNIC"
136+
location = "eastus"
137+
resource_group_name = azurerm_resource_group.myterraformgroup.name
138+
network_security_group_id = azurerm_network_security_group.myterraformnsg.id
139139
140140
ip_configuration {
141141
name = "myNicConfiguration"
@@ -158,7 +158,7 @@ To store boot diagnostics for a VM, you need a storage account. These boot diagn
158158
resource "random_id" "randomId" {
159159
keepers = {
160160
# Generate a new ID only when a new resource group is defined
161-
resource_group = "${azurerm_resource_group.myterraformgroup.name}"
161+
resource_group = azurerm_resource_group.myterraformgroup.name
162162
}
163163
164164
byte_length = 8
@@ -169,11 +169,11 @@ Now you can create a storage account. The following section creates a storage ac
169169

170170
```hcl
171171
resource "azurerm_storage_account" "mystorageaccount" {
172-
name = "diag${random_id.randomId.hex}"
173-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
174-
location = "eastus"
175-
account_replication_type = "LRS"
176-
account_tier = "Standard"
172+
name = "diag${random_id.randomId.hex}"
173+
resource_group_name = azurerm_resource_group.myterraformgroup.name
174+
location = "eastus"
175+
account_replication_type = "LRS"
176+
account_tier = "Standard"
177177
178178
tags = {
179179
environment = "Terraform Demo"
@@ -192,8 +192,8 @@ The final step is to create a VM and use all the resources created. The followin
192192
resource "azurerm_virtual_machine" "myterraformvm" {
193193
name = "myVM"
194194
location = "eastus"
195-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
196-
network_interface_ids = ["${azurerm_network_interface.myterraformnic.id}"]
195+
resource_group_name = azurerm_resource_group.myterraformgroup.name
196+
network_interface_ids = [azurerm_network_interface.myterraformnic.id]
197197
vm_size = "Standard_DS1_v2"
198198
199199
storage_os_disk {
@@ -225,7 +225,7 @@ resource "azurerm_virtual_machine" "myterraformvm" {
225225
226226
boot_diagnostics {
227227
enabled = "true"
228-
storage_uri = "${azurerm_storage_account.mystorageaccount.primary_blob_endpoint}"
228+
storage_uri = azurerm_storage_account.mystorageaccount.primary_blob_endpoint
229229
}
230230
231231
tags = {
@@ -262,7 +262,7 @@ resource "azurerm_virtual_network" "myterraformnetwork" {
262262
name = "myVnet"
263263
address_space = ["10.0.0.0/16"]
264264
location = "eastus"
265-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
265+
resource_group_name = azurerm_resource_group.myterraformgroup.name
266266
267267
tags = {
268268
environment = "Terraform Demo"
@@ -272,16 +272,16 @@ resource "azurerm_virtual_network" "myterraformnetwork" {
272272
# Create subnet
273273
resource "azurerm_subnet" "myterraformsubnet" {
274274
name = "mySubnet"
275-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
276-
virtual_network_name = "${azurerm_virtual_network.myterraformnetwork.name}"
275+
resource_group_name = azurerm_resource_group.myterraformgroup.name
276+
virtual_network_name = azurerm_virtual_network.myterraformnetwork.name
277277
address_prefix = "10.0.1.0/24"
278278
}
279279
280280
# Create public IPs
281281
resource "azurerm_public_ip" "myterraformpublicip" {
282282
name = "myPublicIP"
283283
location = "eastus"
284-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
284+
resource_group_name = azurerm_resource_group.myterraformgroup.name
285285
allocation_method = "Dynamic"
286286
287287
tags = {
@@ -293,7 +293,7 @@ resource "azurerm_public_ip" "myterraformpublicip" {
293293
resource "azurerm_network_security_group" "myterraformnsg" {
294294
name = "myNetworkSecurityGroup"
295295
location = "eastus"
296-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
296+
resource_group_name = azurerm_resource_group.myterraformgroup.name
297297
298298
security_rule {
299299
name = "SSH"
@@ -316,14 +316,14 @@ resource "azurerm_network_security_group" "myterraformnsg" {
316316
resource "azurerm_network_interface" "myterraformnic" {
317317
name = "myNIC"
318318
location = "eastus"
319-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
320-
network_security_group_id = "${azurerm_network_security_group.myterraformnsg.id}"
319+
resource_group_name = azurerm_resource_group.myterraformgroup.name
320+
network_security_group_id = azurerm_network_security_group.myterraformnsg.id
321321
322322
ip_configuration {
323323
name = "myNicConfiguration"
324-
subnet_id = "${azurerm_subnet.myterraformsubnet.id}"
324+
subnet_id = azurerm_subnet.myterraformsubnet.id
325325
private_ip_address_allocation = "Dynamic"
326-
public_ip_address_id = "${azurerm_public_ip.myterraformpublicip.id}"
326+
public_ip_address_id = azurerm_public_ip.myterraformpublicip.id
327327
}
328328
329329
tags = {
@@ -335,7 +335,7 @@ resource "azurerm_network_interface" "myterraformnic" {
335335
resource "random_id" "randomId" {
336336
keepers = {
337337
# Generate a new ID only when a new resource group is defined
338-
resource_group = "${azurerm_resource_group.myterraformgroup.name}"
338+
resource_group = azurerm_resource_group.myterraformgroup.name
339339
}
340340
341341
byte_length = 8
@@ -344,7 +344,7 @@ resource "random_id" "randomId" {
344344
# Create storage account for boot diagnostics
345345
resource "azurerm_storage_account" "mystorageaccount" {
346346
name = "diag${random_id.randomId.hex}"
347-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
347+
resource_group_name = azurerm_resource_group.myterraformgroup.name
348348
location = "eastus"
349349
account_tier = "Standard"
350350
account_replication_type = "LRS"
@@ -358,8 +358,8 @@ resource "azurerm_storage_account" "mystorageaccount" {
358358
resource "azurerm_virtual_machine" "myterraformvm" {
359359
name = "myVM"
360360
location = "eastus"
361-
resource_group_name = "${azurerm_resource_group.myterraformgroup.name}"
362-
network_interface_ids = ["${azurerm_network_interface.myterraformnic.id}"]
361+
resource_group_name = azurerm_resource_group.myterraformgroup.name
362+
network_interface_ids = [azurerm_network_interface.myterraformnic.id]
363363
vm_size = "Standard_DS1_v2"
364364
365365
storage_os_disk {
@@ -391,7 +391,7 @@ resource "azurerm_virtual_machine" "myterraformvm" {
391391
392392
boot_diagnostics {
393393
enabled = "true"
394-
storage_uri = "${azurerm_storage_account.mystorageaccount.primary_blob_endpoint}"
394+
storage_uri = azurerm_storage_account.mystorageaccount.primary_blob_endpoint
395395
}
396396
397397
tags = {

articles/virtual-machines/windows/prepare-for-upload-vhd-image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@ The following settings don't affect VHD uploading. However, we strongly recommen
443443
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management' -Name "PagingFiles" -Value "D:\pagefile.sys" -Type MultiString -Force
444444
```
445445
If a data disk is attached to the VM, the temporal drive volume's letter is typically *D*. This designation could be different, depending on your settings and the number of available drives.
446-
* We recommend disabling script blockers that might be provided by anti-virus software. They might interfer and block the Windows Provisioning Agent scripts executed when you deploy a new VM from your image.
446+
* We recommend disabling script blockers that might be provided by anti-virus software. They might interfere and block the Windows Provisioning Agent scripts executed when you deploy a new VM from your image.
447447

448448
## Next steps
449449
* [Upload a Windows VM image to Azure for Resource Manager deployments](upload-generalized-managed.md)

0 commit comments

Comments
 (0)