Skip to content

Commit 966a2d1

Browse files
committed
remaining
1 parent 3176063 commit 966a2d1

File tree

8 files changed

+14
-14
lines changed

8 files changed

+14
-14
lines changed

articles/event-grid/communication-services-voice-video-events.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -275,10 +275,10 @@ This section contains an example of what that data would look like for each even
275275
```
276276

277277
## Limitations
278-
Aside from `IncomingCall`, Calling events are only available for ACS VoIP users. PSTN, bots, echo bot and Teams users events are excluded.
279-
No calling events will be available for ACS - Teams meeting interop call.
278+
Aside from `IncomingCall`, Calling events are only available for Azure Communication Services VoIP users. PSTN, bots, echo bot and Teams users events are excluded.
279+
No calling events will be available for Azure Communication Services - Teams meeting interop call.
280280

281-
`IncomingCall` events have support for ACS VoIP users and PSTN numbers. For more details on which scenarios can trigger `IncomingCall` events, see the following [Incoming call concepts](../communication-services/concepts/call-automation/incoming-call-notification.md) documentation.
281+
`IncomingCall` events have support for Azure Communication Services VoIP users and PSTN numbers. For more details on which scenarios can trigger `IncomingCall` events, see the following [Incoming call concepts](../communication-services/concepts/call-automation/incoming-call-notification.md) documentation.
282282

283283
## Next steps
284284
See the following tutorial: [Quickstart: Handle voice and video calling events](../communication-services/quickstarts/voice-video-calling/handle-calling-events.md).

articles/machine-learning/how-to-secure-rag-workflows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ If you're using an **Allow only approved outbound** Managed Vnet workspace and a
7070

7171
- If your workspace runs into network related issues where your compute is unable to create or start a compute, try adding a placeholder FQDN rule in the **Networking** tab of your workspace in the Azure portal, in order to initiate a managed network update. Then, re-create the Compute in the Azure Machine Learning workspace.
7272

73-
- You might see an error message related to `< Resource > is not registered with Microsoft.Network resource provider.` In which case, you should **ensure the subscription which your AOAI/ACS resource is registered with a Microsoft Network resource provider**. To do so, navigate to **Subscription**, then **Resource Providers** for the same tenant as your Managed Vnet Workspace.
73+
- You might see an error message related to `< Resource > is not registered with Microsoft.Network resource provider.` In which case, you should **ensure the subscription which your AOAI/Azure AI Search resource is registered with a Microsoft Network resource provider**. To do so, navigate to **Subscription**, then **Resource Providers** for the same tenant as your Managed Vnet Workspace.
7474

7575
> [!NOTE]
7676
> It's expected for a first-time serverless job in the workspace to be Queued an additional 10-15 minutes while Managed Network is provisioning Private Endpoints for the first time. With Compute Instance and Compute Cluster, this process happens during the compute creation.

articles/role-based-access-control/includes/resource-provider-operations/analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ Azure service: [Event Hubs](../../../event-hubs/index.yml)
186186
> | Microsoft.EventHub/namespaces/read | Get the list of Namespace Resource Description |
187187
> | Microsoft.EventHub/namespaces/Delete | Delete Namespace Resource |
188188
> | Microsoft.EventHub/namespaces/authorizationRules/action | Updates Namespace Authorization Rule. This API is deprecated. Please use a PUT call to update the Namespace Authorization Rule instead.. This operation is not supported on API version 2017-04-01. |
189-
> | Microsoft.EventHub/namespaces/removeAcsNamepsace/action | Remove ACS namespace |
189+
> | Microsoft.EventHub/namespaces/removeAcsNamespace/action | Remove Access Control Service namespace |
190190
> | Microsoft.EventHub/namespaces/privateEndpointConnectionsApproval/action | Approve Private Endpoint Connection |
191191
> | Microsoft.EventHub/namespaces/joinPerimeter/action | Action to Join the Network Security Perimeter. This action is used to perform linked access by NSP RP. |
192192
> | Microsoft.EventHub/namespaces/authorizationRules/read | Get the list of Namespaces Authorization Rules description. |

articles/role-based-access-control/includes/resource-provider-operations/integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1111,7 +1111,7 @@ Azure service: [Azure Relay](../../../azure-relay/relay-what-is-it.md)
11111111
> | Microsoft.Relay/namespaces/read | Get the list of Namespace Resource Description |
11121112
> | Microsoft.Relay/namespaces/Delete | Delete Namespace Resource |
11131113
> | Microsoft.Relay/namespaces/authorizationRules/action | Updates Namespace Authorization Rule. This API is deprecated. Please use a PUT call to update the Namespace Authorization Rule instead.. This operation is not supported on API version 2017-04-01. |
1114-
> | Microsoft.Relay/namespaces/removeAcsNamepsace/action | Remove ACS namespace |
1114+
> | Microsoft.Relay/namespaces/removeAcsNamespace/action | Remove Access Control Service namespace |
11151115
> | Microsoft.Relay/namespaces/privateEndpointConnectionsApproval/action | Approve Private Endpoint Connection |
11161116
> | Microsoft.Relay/namespaces/authorizationRules/read | Get the list of Namespaces Authorization Rules description. |
11171117
> | Microsoft.Relay/namespaces/authorizationRules/write | Create a Namespace level Authorization Rules and update its properties. The Authorization Rules Access Rights, the Primary and Secondary Keys can be updated. |
@@ -1186,7 +1186,7 @@ Azure service: [Service Bus](../../../service-bus-messaging/index.yml)
11861186
> | Microsoft.ServiceBus/namespaces/Delete | Delete Namespace Resource |
11871187
> | Microsoft.ServiceBus/namespaces/authorizationRules/action | Updates Namespace Authorization Rule. This API is deprecated. Please use a PUT call to update the Namespace Authorization Rule instead.. This operation is not supported on API version 2017-04-01. |
11881188
> | Microsoft.ServiceBus/namespaces/migrate/action | Migrate namespace operation |
1189-
> | Microsoft.ServiceBus/namespaces/removeAcsNamepsace/action | Remove ACS namespace |
1189+
> | Microsoft.ServiceBus/namespaces/removeAcsNamespace/action | Remove Access Control Service namespace |
11901190
> | Microsoft.ServiceBus/namespaces/privateEndpointConnectionsApproval/action | Approve Private Endpoint Connection |
11911191
> | Microsoft.ServiceBus/namespaces/authorizationRules/write | Create a Namespace level Authorization Rules and update its properties. The Authorization Rules Access Rights, the Primary and Secondary Keys can be updated. |
11921192
> | Microsoft.ServiceBus/namespaces/authorizationRules/read | Get the list of Namespaces Authorization Rules description. |

articles/role-based-access-control/includes/resource-provider-operations/web.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -285,8 +285,8 @@ Azure service: [Media Services](/azure/media-services/)
285285
> | Microsoft.Media/mediaservices/read | Read any Media Services Account |
286286
> | Microsoft.Media/mediaservices/write | Create or Update any Media Services Account |
287287
> | Microsoft.Media/mediaservices/delete | Delete any Media Services Account |
288-
> | Microsoft.Media/mediaservices/regenerateKey/action | Regenerate a Media Services ACS key |
289-
> | Microsoft.Media/mediaservices/listKeys/action | List the ACS keys for the Media Services account |
288+
> | Microsoft.Media/mediaservices/regenerateKey/action | Regenerate a Media Services Access Control Services key |
289+
> | Microsoft.Media/mediaservices/listKeys/action | List the Access Control Services keys for the Media Services account |
290290
> | Microsoft.Media/mediaservices/syncStorageKeys/action | Synchronize the Storage Keys for an attached Azure Storage account |
291291
> | Microsoft.Media/mediaservices/listEdgePolicies/action | List policies for an edge device. |
292292
> | Microsoft.Media/mediaservices/PrivateEndpointConnectionsApproval/action | Approve Private Endpoint Connections |

articles/security/fundamentals/azure-domains.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This page is a partial list of the Azure domains in use. Some of them are REST A
3131
|[Azure Cloud Services](../../cloud-services/cloud-services-choose-me.md) and [Azure Virtual Machines](../../virtual-machines/index.yml)|*.cloudapp.net|
3232
|[Azure Cloud Services](../../cloud-services/cloud-services-choose-me.md) and [Azure Virtual Machines](../../virtual-machines/index.yml)|*.cloudapp.azure.com|
3333
|[Azure Container Registry](https://azure.microsoft.com/services/container-registry/)|*.azurecr.io|
34-
|Azure Container Service (ACS) (deprecated)|*.azurecontainer.io|
34+
|Azure Container Service (deprecated)|*.azurecontainer.io|
3535
|[Azure Content Delivery Network (CDN)](https://azure.microsoft.com/services/cdn/)|*.vo.msecnd.net|
3636
|[Azure Cosmos DB](../../cosmos-db/index.yml)|*.cosmos.azure.com|
3737
|[Azure Cosmos DB](../../cosmos-db/index.yml)|*.documents.azure.com|

articles/spring-apps/how-to-migrate-standard-tier-to-enterprise-tier.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,14 +135,14 @@ The app creation steps are the same as Standard plan.
135135

136136
## Use Application Configuration Service for external configuration
137137

138-
For externalized configuration in a distributed system, managed Spring Cloud Config Server (OSS) is available only in the Basic and Standard plans. In the Enterprise plan, Application Configuration Service for Tanzu (ACS) provides similar functions for your apps. The following table describes some differences in usage between the OSS config server and ACS.
138+
For externalized configuration in a distributed system, managed Spring Cloud Config Server (OSS) is available only in the Basic and Standard plans. In the Enterprise plan, Application Configuration Service for Tanzu provides similar functions for your apps. The following table describes some differences in usage between the OSS config server and Application Configuration Service.
139139

140140
| Component | Support plans | Enabled | Bind to app | Profile |
141141
|---------------------------------------------|----------------|-------------------|-------------|-----------------------------------------------------------------------|
142142
| Spring Cloud Config Server | Basic/Standard | Always enabled. | Auto bound | Configured in app's source code. |
143143
| Application Configuration Service for Tanzu | Enterprise | Enable on demand. | Manual bind | Provided as `config-file-pattern` in an Azure Spring Apps deployment. |
144144

145-
Unlike the client-server mode in the OSS config server, ACS manages configuration by using the Kubernetes-native `ConfigMap`, which is populated from properties defined in backend Git repositories. ACS can't get the active profile configured in the app's source code to match the right configuration, so the explicit configuration `config-file-pattern` should be specified at the Azure Spring Apps deployment level.
145+
Unlike the client-server mode in the OSS config server, Application Configuration Service manages configuration by using the Kubernetes-native `ConfigMap`, which is populated from properties defined in backend Git repositories. Application Configuration Service can't get the active profile configured in the app's source code to match the right configuration, so the explicit configuration `config-file-pattern` should be specified at the Azure Spring Apps deployment level.
146146

147147
## Configure Application Configuration Service for Tanzu
148148

articles/virtual-network/deploy-container-networking.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.author: allensu
1212

1313
The Azure Virtual Network container network interface (CNI) plug-in installs in an Azure virtual machine and brings virtual network capabilities to Kubernetes Pods and Docker containers. To learn more about the plug-in, see [Enable containers to use Azure Virtual Network capabilities](container-networking-overview.md). Additionally, the plug-in can be used with the Azure Kubernetes Service (AKS) by choosing the [Advanced Networking](../aks/configure-azure-cni.md?toc=%2fazure%2fvirtual-network%2ftoc.json) option, which automatically places AKS containers in a virtual network.
1414

15-
## Deploy plug-in for ACS-Engine Kubernetes cluster
15+
## Deploy plug-in for Azure Container Service-Engine Kubernetes cluster
1616

17-
The ACS-Engine deploys a Kubernetes cluster with an Azure Resource Manager template. The cluster configuration is specified in a JSON file that is passed to the tool when generating the template. To learn more about the entire list of supported cluster settings and their descriptions, see [Microsoft Azure Container Service Engine - Cluster Definition](https://github.com/Azure/acs-engine/blob/master/docs/clusterdefinition.md). The plug-in is the default networking plug-in for clusters created using the ACS-Engine. The following network configuration settings are important when configuring the plug-in:
17+
The Azure Container Service-Engine deploys a Kubernetes cluster with an Azure Resource Manager template. The cluster configuration is specified in a JSON file that is passed to the tool when generating the template. To learn more about the entire list of supported cluster settings and their descriptions, see [Microsoft Azure Container Service Engine - Cluster Definition](https://github.com/Azure/acs-engine/blob/master/docs/clusterdefinition.md). The plug-in is the default networking plug-in for clusters created using the Azure Container Service-Engine. The following network configuration settings are important when configuring the plug-in:
1818

1919
| Setting | Description |
2020
|--------------------------------------|------------------------------------------------------------------------------------------------------ |

0 commit comments

Comments
 (0)