Skip to content

Commit 983cd9e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into lb-rules-freshness
2 parents fa0df33 + 30806c2 commit 983cd9e

File tree

11 files changed

+201
-40
lines changed

11 files changed

+201
-40
lines changed

articles/applied-ai-services/form-recognizer/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ December 2022
3939

4040
* **Custom model labeling**:
4141

42-
* **Batch OCR**. You can opt to run batch OCR in the setup wizard for custom model on all documents in your blob storage.
42+
* **Run Layout API automatically**. You can opt to run the Layout API for all documents automatically in your blob storage during the setup process for custom model.
4343

4444
* **Search**. The Studio now includes search functionality to locate words within a document. This improvement allows for easier navigation while labeling.
4545

articles/azure-arc/data/includes/azure-arc-data-preview-release.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,10 @@ ms.topic: include
66
ms.date: 12/7/2022
77
---
88

9-
<!---
109

1110
At this time, a test or preview build is not available for the next release.
1211

13-
-->
12+
<!---
1413
December 2022 preview release is now available.
1514
1615
|Component|Value|
@@ -28,3 +27,4 @@ New for this release:
2827
- Arc-enabled PostgreSQL server
2928
- Switch to Ubuntu based images
3029
30+
--->

articles/azure-arc/data/release-notes.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,29 @@ ms.custom: references_regions, devx-track-azurecli, event-tier1-build-2022
1717

1818
This article highlights capabilities, features, and enhancements recently released or improved for Azure Arc-enabled data services.
1919

20+
## December 13, 2022
21+
22+
### Image tag
23+
24+
`v1.14.0_2022-12-13`
25+
26+
For complete release version information, see [Version log](version-log.md#december-13-2022).
27+
28+
New for this release:
29+
30+
- Arc data controller.
31+
Added defaults on HA supervisor pod to support resource quotas.
32+
33+
- Arc-enabled PostgreSQL server
34+
- Switch to Ubuntu based images.
35+
36+
- Arc-enabled SQL Server
37+
- Database as a resource compatibility for SQL Server 2014 and SQL Server 2016. See [View databases](/sql/sql-server/azure-arc/view-databases).
38+
39+
- Bug fixes and optimizations in the following areas:
40+
- Arc enabling SQL Server onboarding.
41+
- Fixed confusing error messages when DBMail is configured.
42+
2043
## November 8, 2022
2144

2245
### Image tag

articles/azure-arc/data/version-log.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,17 @@ ms.topic: conceptual
1717

1818
This article identifies the component versions with each release of Azure Arc-enabled data services.
1919

20+
## December 13, 2022
21+
22+
|Component|Value|
23+
|-----------|-----------|
24+
|Container images tag |`v1.14.0_2022-12-13`|
25+
|CRD names and version|`datacontrollers.arcdata.microsoft.com`: v1beta1, v1 through v6<br/>`exporttasks.tasks.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`kafkas.arcdata.microsoft.com`: v1beta1, v1beta2<br/>`monitors.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`sqlmanagedinstances.sql.arcdata.microsoft.com`: v1beta1, v1 through v7<br/>`postgresqls.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3<br/>`sqlmanagedinstancerestoretasks.tasks.sql.arcdata.microsoft.com`: v1beta1, v1<br/>`failovergroups.sql.arcdata.microsoft.com`: v1beta1, v1beta2, v1 through v2<br/>`activedirectoryconnectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1<br/>`sqlmanagedinstancereprovisionreplicatask.tasks.sql.arcdata.microsoft.com`: v1beta1<br/>`telemetrycollectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3 *use to be otelcollectors*<br/>`telemetryrouters.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3, v1beta4<br/>`sqlmanagedinstancemonitoringprofiles.arcdata.microsoft.com`: v1beta1, v1beta2<br/>|
26+
|Azure Resource Manager (ARM) API version|2022-06-15-preview|
27+
|`arcdata` Azure CLI extension version|1.4.9 ([Download](https://aka.ms/az-cli-arcdata-ext))|
28+
|Arc-enabled Kubernetes helm chart extension version|1.14.0|
29+
|Azure Arc Extension for Azure Data Studio<br/>`arc`<br/>`azcli`|*No Changes*<br/>1.7.0 ([Download](https://aka.ms/ads-arcdata-ext))</br>1.7.0 ([Download](https://aka.ms/ads-azcli-ext))|
30+
2031
## November 8, 2022
2132

2233

articles/azure-monitor/logs/logs-dedicated-clusters.md

Lines changed: 49 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,8 @@ You can have up to five active clusters per subscription per region. If the clus
6969
> - A list of initial workspace to be linked to cluster is identified
7070
> - You have permissions to subscription intended for the cluster and any workspace to be linked
7171
72-
**CLI**
72+
#### [CLI](#tab/cli)
73+
7374
```azurecli
7475
az account set --subscription "cluster-subscription-id"
7576
@@ -80,7 +81,7 @@ $clusterResourceId = az monitor log-analytics cluster list --resource-group "res
8081
az resource wait --created --ids $clusterResourceId --include-response-body true
8182
```
8283

83-
**PowerShell**
84+
#### [PowerShell](#tab/powershell)
8485

8586
```powershell
8687
Select-AzSubscription "cluster-subscription-id"
@@ -91,7 +92,7 @@ New-AzOperationalInsightsCluster -ResourceGroupName "resource-group-name" -Clust
9192
Get-Job -Command "New-AzOperationalInsightsCluster*" | Format-List -Property *
9293
```
9394

94-
**REST API**
95+
#### [REST API](#tab/restapi)
9596

9697
*Call*
9798

@@ -119,27 +120,29 @@ Content-type: application/json
119120

120121
Should be 202 (Accepted) and a header.
121122

123+
---
124+
122125
### Check cluster provisioning status
123126

124127
The provisioning of the Log Analytics cluster takes a while to complete. Use one of the following methods to check the *ProvisioningState* property. The value is *ProvisioningAccount* while provisioning and *Succeeded* when completed.
125128

126-
**CLI**
129+
#### [CLI](#tab/cli)
127130

128131
```azurecli
129132
az account set --subscription "cluster-subscription-id"
130133
131134
az monitor log-analytics cluster show --resource-group "resource-group-name" --name "cluster-name"
132135
```
133136

134-
**PowerShell**
137+
#### [PowerShell](#tab/powershell)
135138

136139
```powershell
137140
Select-AzSubscription "cluster-subscription-id"
138141
139142
Get-AzOperationalInsightsCluster -ResourceGroupName "resource-group-name" -ClusterName "cluster-name"
140143
```
141144

142-
**REST API**
145+
#### [REST API](#tab/restapi)
143146

144147
Send a GET request on the cluster resource and look at the *provisioningState* value. The value is *ProvisioningAccount* while provisioning and *Succeeded* when completed.
145148

@@ -208,7 +211,8 @@ Linking a workspace can be performed only after the completion of the Log Analyt
208211
209212
Use the following commands to link a workspace to a cluster:
210213

211-
**CLI**
214+
#### [CLI](#tab/cli)
215+
212216
```azurecli
213217
# Find cluster resource ID
214218
az account set --subscription "cluster-subscription-id"
@@ -223,7 +227,7 @@ $workspaceResourceId = az monitor log-analytics workspace list --resource-group
223227
az resource wait --deleted --ids $workspaceResourceId --include-response-body true
224228
```
225229

226-
**PowerShell**
230+
#### [PowerShell](#tab/powershell)
227231

228232
```powershell
229233
Select-AzSubscription "cluster-subscription-id"
@@ -240,7 +244,7 @@ Set-AzOperationalInsightsLinkedService -ResourceGroupName "resource-group-name"
240244
Get-Job -Command "Set-AzOperationalInsightsLinkedService" | Format-List -Property *
241245
```
242246

243-
**REST API**
247+
#### [REST API](#tab/restapi)
244248

245249
Use the following REST call to link to a cluster:
246250

@@ -268,22 +272,23 @@ Content-type: application/json
268272

269273
When a cluster is configured with customer-managed keys, data ingested to the workspaces after the link operation completion is stored encrypted with your managed key. The workspace link operation can take up to 90 minutes to complete and you can check the state by sending Get request to workspace and observe if *clusterResourceId* property is present in the response under *features*.
270274

271-
**CLI**
275+
#### [CLI](#tab/cli)
276+
272277
```azurecli
273278
az account set --subscription "workspace-subscription-id"
274279
275280
az monitor log-analytics workspace show --resource-group "resource-group-name" --workspace-name "workspace-name"
276281
```
277282

278-
**PowerShell**
283+
#### [PowerShell](#tab/powershell)
279284

280285
```powershell
281286
Select-AzSubscription "workspace-subscription-id"
282287
283288
Get-AzOperationalInsightsWorkspace -ResourceGroupName "resource-group-name" -Name "workspace-name"
284289
```
285290

286-
**REST API**
291+
#### [REST API](#tab/restapi)
287292

288293
*Call*
289294

@@ -346,23 +351,23 @@ After you create your cluster resource and it's fully provisioned, you can edit
346351
347352
## Get all clusters in resource group
348353

349-
**CLI**
354+
#### [CLI](#tab/cli)
350355

351356
```azurecli
352357
az account set --subscription "cluster-subscription-id"
353358
354359
az monitor log-analytics cluster list --resource-group "resource-group-name"
355360
```
356361

357-
**PowerShell**
362+
#### [PowerShell](#tab/powershell)
358363

359364
```powershell
360365
Select-AzSubscription "cluster-subscription-id"
361366
362367
Get-AzOperationalInsightsCluster -ResourceGroupName "resource-group-name"
363368
```
364369

365-
**REST API**
370+
#### [REST API](#tab/restapi)
366371

367372
*Call*
368373

@@ -414,22 +419,22 @@ Authorization: Bearer <token>
414419

415420
## Get all clusters in subscription
416421

417-
**CLI**
422+
#### [CLI](#tab/cli)
418423

419424
```azurecli
420425
az account set --subscription "cluster-subscription-id"
421426
422427
az monitor log-analytics cluster list
423428
```
424429

425-
**PowerShell**
430+
#### [PowerShell](#tab/powershell)
426431

427432
```powershell
428433
Select-AzSubscription "cluster-subscription-id"
429434
430435
Get-AzOperationalInsightsCluster
431436
```
432-
**REST API**
437+
#### [REST API](#tab/restapi)
433438

434439
*Call*
435440

@@ -449,23 +454,23 @@ The same as for 'clusters in a resource group', but in subscription scope.
449454

450455
When the data volume to your linked workspaces change over time and you want to update the Commitment Tier level appropriately. The tier is specified in units of GB and can have values of 500, 1000, 2000 or 5000 GB/day. Note that you don't have to provide the full REST request body but should include the sku.
451456

452-
**CLI**
457+
#### [CLI](#tab/cli)
453458

454459
```azurecli
455460
az account set --subscription "cluster-subscription-id"
456461
457462
az monitor log-analytics cluster update --resource-group "resource-group-name" --name "cluster-name" --sku-capacity 500
458463
```
459464

460-
### PowerShell
465+
#### [PowerShell](#tab/powershell)
461466

462467
```powershell
463468
Select-AzSubscription "cluster-subscription-id"
464469
465470
Update-AzOperationalInsightsCluster -ResourceGroupName "resource-group-name" -ClusterName "cluster-name" -SkuCapacity 500
466471
```
467472

468-
### REST API
473+
#### [REST API](#tab/restapi)
469474

470475
*Call*
471476

@@ -487,19 +492,23 @@ Content-type: application/json
487492

488493
### Update billingType in cluster
489494

490-
### PowerShell
495+
The *billingType* property determines the billing attribution for the cluster and its data:
496+
- *Cluster* (default) -- billing is attributed to the Cluster resource
497+
- *Workspaces* -- billing is attributed to linked workspaces proportionally. When data volume from all linked workspaces is below Commitment Tier level, the bill for the remaining volume is attributed to the cluster
498+
499+
#### [CLI](#tab/cli)
500+
501+
N/A
502+
503+
#### [PowerShell](#tab/powershell)
491504

492505
```powershell
493506
Select-AzSubscription "cluster-subscription-id"
494507
495508
Update-AzOperationalInsightsCluster -ResourceGroupName "resource-group-name" -ClusterName "cluster-name" -BillingType "Workspaces"
496509
```
497510

498-
The *billingType* property determines the billing attribution for the cluster and its data:
499-
- *Cluster* (default) -- billing is attributed to the Cluster resource
500-
- *Workspaces* -- billing is attributed to linked workspaces proportionally. When data volume from all linked workspaces is below Commitment Tier level, the bill for the remaining volume is attributed to the cluster
501-
502-
**REST**
511+
#### [REST API](#tab/restapi)
503512

504513
*Call*
505514

@@ -516,24 +525,26 @@ Content-type: application/json
516525
}
517526
```
518527

528+
---
529+
519530
### Unlink a workspace from cluster
520531

521532
You can unlink a workspace from a cluster at any time. The workspace pricing tier is changed to per-GB, data ingested to cluster before the unlink operation remains in the cluster, and new data to workspace get ingested to Log Analytics. You can query data as usual and the service performs cross-cluster queries seamlessly. If cluster was configured with Customer-managed key (CMK), data remains encrypted with your key and accessible, while your key and permissions to Key Vault remain.
522533

523-
> [!NOT]
534+
> [!NOTE]
524535
> There is a limit of two link operations for a specific workspace within a month to prevent data distribution across clusters. Contact support if you reach limit.
525536
526537
Use the following commands to unlink a workspace from cluster:
527538

528-
**CLI**
539+
#### [CLI](#tab/cli)
529540

530541
```azurecli
531542
az account set --subscription "workspace-subscription-id"
532543
533544
az monitor log-analytics workspace linked-service delete --resource-group "resource-group-name" --workspace-name "workspace-name" --name cluster
534545
```
535546

536-
**PowerShell**
547+
#### [PowerShell](#tab/powershell)
537548

538549
```powershell
539550
Select-AzSubscription "workspace-subscription-id"
@@ -542,6 +553,10 @@ Select-AzSubscription "workspace-subscription-id"
542553
Remove-AzOperationalInsightsLinkedService -ResourceGroupName "resource-group-name" -WorkspaceName {workspace-name} -LinkedServiceName cluster
543554
```
544555

556+
#### [REST API](#tab/restapi)
557+
558+
N/A
559+
545560
---
546561

547562

@@ -560,22 +575,23 @@ If you delete your cluster while workspaces are linked, Workspaces get automatic
560575
561576
Use the following commands to delete a cluster:
562577

563-
**CLI**
578+
#### [CLI](#tab/cli)
579+
564580
```azurecli
565581
az account set --subscription "cluster-subscription-id"
566582
567583
az monitor log-analytics cluster delete --resource-group "resource-group-name" --name $clusterName
568584
```
569585

570-
**PowerShell**
586+
#### [PowerShell](#tab/powershell)
571587

572588
```powershell
573589
Select-AzSubscription "cluster-subscription-id"
574590
575591
Remove-AzOperationalInsightsCluster -ResourceGroupName "resource-group-name" -ClusterName "cluster-name"
576592
```
577593

578-
**REST API**
594+
#### [REST API](#tab/restapi)
579595

580596
Use the following REST call to delete a cluster:
581597

articles/azure-video-indexer/includes/limited-access-account-types.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ services: azure-video-indexer
55
manager: femila
66
ms.service: azure-video-indexer
77
ms.topic: include
8-
ms.date: 10/14/2022
8+
ms.date: 12/13/2022
99
ms.author: juliako
1010
---
1111

1212
This section talks about limited access features in Azure Video Indexer.
1313

1414
|When did I create the account?|Trial account (free)| Paid account <br/>(classic or ARM-based)|
1515
|---|---|---|
16-
|Existing VI accounts <br/><br/>created before June 21, 2022|Able to access face identification, customization and celebrities recognition till June 2023. <br/><br/>**Recommended**: Move to a paid account and afterward fill in the [intake form](https://aka.ms/facerecognition) and based on the eligibility criteria we will enable the features also after the grace period. |Able to access face identification, customization and celebrities recognition till June 2023\*.<br/><br/>**Recommended**: fill in the [intake form](https://aka.ms/facerecognition) and based on the eligibility criteria we will enable the features also after the grace period. <br/><br/>We proactively sent emails to these customers + AEs.|
16+
|Existing VI accounts <br/><br/>created before June 21, 2022|Able to access face identification, customization and celebrities recognition till June 2023. <br/><br/>**Recommended**: Move to a paid account and afterward fill in the [intake form](https://aka.ms/facerecognition) and based on the eligibility criteria we will enable the features also after the grace period. |Able to access face identification, customization and celebrities recognition till June 2023\*.<br/><br/>**Recommended**: fill in the [intake form](https://aka.ms/facerecognition) and based on the eligibility criteria we will enable the features also after the grace period.|
1717
|New VI accounts <br/><br/>created after June 21, 2022 |Not able the access face identification, customization and celebrities recognition as of today. <br/><br/>**Recommended**: Move to a paid account and afterward fill in the [intake form](https://aka.ms/facerecognition). Based on the eligibility criteria we will enable the features (after max 10 days).|Azure Video Indexer disables the access face identification, customization and celebrities recognition as of today by default, but gives the option to enable it. <br/><br/>**Recommended**: Fill in the [intake form](https://aka.ms/facerecognition) and based on the eligibility criteria we will enable the features (after max 10 days).|
1818

1919
\*In Brazil South we also disabled the face detection.

articles/frontdoor/scenario-storage-blobs.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,8 @@ To use Private Link in this solution, you must deploy the premium tier of Front
101101

102102
To deploy this scenario by using Bicep or JSON ARM templates, [see this quickstart](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.cdn/front-door-premium-storage-blobs-private-link).
103103

104+
To deploy this scenario by using Terraform, [see this quickstart](https://github.com/Azure/terraform/tree/master/quickstart/101-front-door-premium-storage-blobs-private-link).
105+
104106
## Next steps
105107

106108
Learn how to [create a Front Door profile](create-front-door-portal.md).

0 commit comments

Comments
 (0)