Skip to content

Commit 98547ff

Browse files
authored
Merge pull request #269248 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 3/17
2 parents 8c9c03e + 7a69c08 commit 98547ff

File tree

123 files changed

+1462
-890
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

123 files changed

+1462
-890
lines changed

articles/ai-services/openai/concepts/models.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure OpenAI
44
description: Learn about the different model capabilities that are available with Azure OpenAI.
55
ms.service: azure-ai-openai
66
ms.topic: conceptual
7-
ms.date: 03/12/2024
7+
ms.date: 03/14/2024
88
ms.custom: references_regions, build-2023, build-2023-dataai, refefences_regions
99
manager: nitinme
1010
author: mrbullwinkle #ChrisHMSFT
@@ -239,13 +239,18 @@ The following Embeddings models are available with [Azure Government](/azure/azu
239239

240240
For Assistants you need a combination of a supported model, and a supported region. Certain tools and capabilities require the latest models. For example [parallel function](../how-to/assistant-functions.md) calling requires the latest 1106 models.
241241

242+
| Region | `gpt-35-turbo (0613)` | `gpt-35-turbo (1106)` | `gpt-4 (0613)` | `gpt-4 (1106)` | `gpt-4 (0125)` |
243+
|-----|---|---|---|---|---|
244+
| Australia East ||||| |
245+
| East US 2 || ||| |
246+
| Sweden Central ||||| |
242247

243-
| Region | `gpt-35-turbo (0613)` | `gpt-35-turbo (1106)` | `gpt-4 (0613)` | `gpt-4 (1106)` |
244-
|-----|---|---|---|---|
245-
| Australia East |||||
246-
| East US 2 |||||
247-
| Sweden Central |||||
248+
Provisioned Throughput Unit (PTU) availability
248249

250+
| Region | `gpt-35-turbo (1106)` | `gpt-4 (1106)` | `gpt-4 (0125)` |
251+
|-----|---|---|---|
252+
| East US 2 | |||
253+
| Sweden Central ||||
249254

250255
## Next steps
251256

articles/azure-resource-manager/management/request-limits-and-throttling.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Request limits and throttling
33
description: Describes how to use throttling with Azure Resource Manager requests when subscription limits are reached.
44
ms.topic: conceptual
5-
ms.date: 03/01/2024
5+
ms.date: 03/15/2024
66
ms.custom: devx-track-arm-template
77
---
88

@@ -111,7 +111,7 @@ In addition to those general limits, the following limits apply to DNS operation
111111
| --------- | ----- |
112112
| Create or Update | 200 per minute |
113113
| Delete | 200 per minute |
114-
| Get | 1000 per minute |
114+
| Get | 2000 per minute |
115115
| List By DNS Zone | 60 per minute |
116116
| List By Type | 60 per minute |
117117
| Update | 200 per minute |

articles/batch/automatic-certificate-rotation.md

Lines changed: 87 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,32 @@
11
---
22
title: Enable automatic certificate rotation in a Batch pool
3-
description: You can create a Batch pool with a managed identity and a certificate that will automatically be renewed.
3+
description: You can create a Batch pool with a managed identity and a certificate that can automatically be renewed.
44
ms.topic: conceptual
55
ms.custom: linux-related-content
66
ms.date: 12/05/2023
77
---
8+
89
# Enable automatic certificate rotation in a Batch pool
910

10-
You can create a Batch pool with a certificate that will automatically be renewed. To do so, your pool must be created with a [user-assigned managed identity](managed-identity-pools.md) that will have access to the certificate in [Azure Key Vault](../key-vault/general/overview.md).
11+
You can create a Batch pool with a certificate that can automatically be renewed. To do so, your pool must be created with a [user-assigned managed identity](managed-identity-pools.md) that has access to the certificate in [Azure Key Vault](../key-vault/general/overview.md).
1112

1213
## Create a user-assigned identity
1314

1415
First, [create your user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md#create-a-user-assigned-managed-identity) in the same tenant as your Batch account. This managed identity doesn't need to be in the same resource group or even in the same subscription.
1516

16-
Be sure to note the **Client ID** of the user-assigned managed identity. You'll need this value later.
17+
Be sure to note the **Client ID** of the user-assigned managed identity. You need this value later.
1718

1819
:::image type="content" source="media/automatic-certificate-rotation/client-id.png" alt-text="Screenshot showing the client ID of a user-assigned managed identity in the Azure portal.":::
1920

2021
## Create your certificate
2122

22-
Next, you'll need to create a certificate and add it to Azure Key Vault. If you haven't already created a key vault, you'll need to do that first. For instructions, see [Quickstart: Set and retrieve a certificate from Azure Key Vault using the Azure portal](../key-vault/certificates/quick-create-portal.md).
23+
Next, you need to create a certificate and add it to Azure Key Vault. If you haven't already created a key vault, you need to do that first. For instructions, see [Quickstart: Set and retrieve a certificate from Azure Key Vault using the Azure portal](../key-vault/certificates/quick-create-portal.md).
2324

2425
When creating your certificate, be sure to set **Lifetime Action Type** to automatically renew, and specify the number of days after which the certificate should renew.
2526

2627
:::image type="content" source="media/automatic-certificate-rotation/certificate.png" alt-text="Screenshot of the certificate creation screen in the Azure portal.":::
2728

28-
After your certificate has been created, make note of its **Secret Identifier**. You'll need this value later.
29+
After your certificate has been created, make note of its **Secret Identifier**. You need this value later.
2930

3031
:::image type="content" source="media/automatic-certificate-rotation/secret-identifier.png" alt-text="Screenshot showing the Secret Identifier of a certificate.":::
3132

@@ -48,7 +49,68 @@ REST API URI
4849
PUT https://management.azure.com/subscriptions/<subscriptionid>/resourceGroups/<resourcegroupName>/providers/Microsoft.Batch/batchAccounts/<batchaccountname>/pools/<poolname>?api-version=2021-01-01
4950
```
5051

51-
Request Body
52+
Request Body for Linux node
53+
54+
```json
55+
{
56+
"name": "test2",
57+
"type": "Microsoft.Batch/batchAccounts/pools",
58+
"properties": {
59+
"vmSize": "STANDARD_DS2_V2",
60+
"taskSchedulingPolicy": {
61+
"nodeFillType": "Pack"
62+
},
63+
"deploymentConfiguration": {
64+
"virtualMachineConfiguration": {
65+
"imageReference": {
66+
"publisher": "canonical",
67+
"offer": "ubuntuserver",
68+
"sku": "20.04-lts",
69+
"version": "latest"
70+
},
71+
"nodeAgentSkuId": "batch.node.ubuntu 20.04",
72+
"extensions": [
73+
{
74+
"name": "KVExtensions",
75+
"type": "KeyVaultForLinux",
76+
"publisher": "Microsoft.Azure.KeyVault",
77+
"typeHandlerVersion": "3.0",
78+
"autoUpgradeMinorVersion": true,
79+
"settings": {
80+
"secretsManagementSettings": {
81+
"pollingIntervalInS": "300",
82+
"certificateStoreLocation": "/var/lib/waagent/Microsoft.Azure.KeyVault",
83+
"requireInitialSync": true,
84+
"observedCertificates": [
85+
"https://testkvwestus2s.vault.azure.net/secrets/authcertforumatesting/8f5f3f491afd48cb99286ba2aacd39af"
86+
]
87+
},
88+
"authenticationSettings": {
89+
"msiEndpoint": "http://169.254.169.254/metadata/identity",
90+
"msiClientId": "b9f6dd56-d2d6-4967-99d7-8062d56fd84c"
91+
}
92+
}
93+
}
94+
]
95+
}
96+
},
97+
"scaleSettings": {
98+
"fixedScale": {
99+
"targetDedicatedNodes": 1,
100+
"resizeTimeout": "PT15M"
101+
}
102+
}
103+
},
104+
"identity": {
105+
"type": "UserAssigned",
106+
"userAssignedIdentities": {
107+
"/subscriptions/042998e4-36dc-4b7d-8ce3-a7a2c4877d33/resourceGroups/ACR/providers/Microsoft.ManagedIdentity/userAssignedIdentities/testumaforpools": {}
108+
}
109+
}
110+
}
111+
```
112+
113+
Request Body for Windows node
52114

53115
```json
54116
{
@@ -62,26 +124,29 @@ Request Body
62124
"deploymentConfiguration": {
63125
"virtualMachineConfiguration": {
64126
"imageReference": {
65-
"publisher": "canonical",
66-
"offer": "ubuntuserver",
67-
"sku": "20.04-lts",
127+
"publisher": "microsoftwindowsserver",
128+
"offer": "windowsserver",
129+
"sku": "2022-datacenter",
68130
"version": "latest"
69131
},
70-
"nodeAgentSkuId": "batch.node.ubuntu 20.04",
132+
"nodeAgentSkuId": "batch.node.windows amd64",
71133
"extensions": [
72134
{
73135
"name": "KVExtensions",
74-
"type": "KeyVaultForLinux",
136+
"type": "KeyVaultForWindows",
75137
"publisher": "Microsoft.Azure.KeyVault",
76-
"typeHandlerVersion": "1.0",
138+
"typeHandlerVersion": "3.0",
77139
"autoUpgradeMinorVersion": true,
78140
"settings": {
79141
"secretsManagementSettings": {
80142
"pollingIntervalInS": "300",
81-
"certificateStoreLocation": "/var/lib/waagent/Microsoft.Azure.KeyVault",
82143
"requireInitialSync": true,
83144
"observedCertificates": [
84-
"https://testkvwestus2s.vault.azure.net/secrets/authcertforumatesting/8f5f3f491afd48cb99286ba2aacd39af"
145+
{
146+
"https://testkvwestus2s.vault.azure.net/secrets/authcertforumatesting/8f5f3f491afd48cb99286ba2aacd39af",
147+
"certificateStoreLocation": "LocalMachine",
148+
"keyExportable": true
149+
}
85150
]
86151
},
87152
"authenticationSettings": {
@@ -112,13 +177,20 @@ Request Body
112177

113178
## Validate the certificate
114179

115-
To confirm that the certificate has been successfully deployed, log in to the compute node. You should see output similar to the following:
180+
To confirm that the certificate is successfully deployed, log in to the compute node. You should see output similar to the following:
116181

117182
```
118183
root@74773db5fe1b42ab9a4b6cf679d929da000000:/var/lib/waagent/Microsoft.Azure.KeyVault.KeyVaultForLinux-1.0.1363.13/status# cat 1.status
119184
[{"status":{"code":0,"formattedMessage":{"lang":"en","message":"Successfully started Key Vault extension service. 2021-03-03T23:12:23Z"},"operation":"Service start.","status":"success"},"timestampUTC":"2021-03-03T23:12:23Z","version":"1.0"}]root@74773db5fe1b42ab9a4b6cf679d929da000000:/var/lib/waagent/Microsoft.Azure.KeyVault.KeyVaultForLinux-1.0.1363.13/status#
120185
```
121186

187+
## Troubleshooting Key Vault Extension
188+
189+
If Key Vault extension is configured incorrectly, the compute node might be in usuable state. To troubleshoot Key Vault extension failure, you can temporarily set requireInitialSync to false and redeploy your pool, then the compute node is in idle state, you can log in to the compute node to check KeyVault extension logs for errors and fix the configuration issues. Visit following Key Vault extension doc link for more information.
190+
191+
- [Azure Key Vault extension for Linux](../virtual-machines/extensions/key-vault-linux.md)
192+
- [Azure Key Vault extension for Windows](../virtual-machines/extensions/key-vault-windows.md)
193+
122194
## Next steps
123195

124196
- Learn more about [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).

articles/batch/batch-account-create-portal.md

Lines changed: 3 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -120,13 +120,13 @@ For detailed steps, see [Assign Azure roles by using the Azure portal](../role-b
120120

121121
### Create a key vault
122122

123-
User subscription mode requires [Azure Key Vault](/azure/key-vault/general/overview). The key vault must be in the same subscription and region as the Batch account.
123+
User subscription mode requires [Azure Key Vault](/azure/key-vault/general/overview). The key vault must be in the same subscription and region as the Batch account and use a [Vault Access Policy](/azure/key-vault/general/assign-access-policy).
124124

125125
To create a new key vault:
126126

127127
1. Search for and select **key vaults** from the Azure Search box, and then select **Create** on the **Key vaults** page.
128128
1. On the **Create a key vault** page, enter a name for the key vault, and choose an existing resource group or create a new one in the same region as your Batch account.
129-
1. On the **Access configuration** tab, select either **Azure role-based access control** or **Vault access policy** under **Permission model**, and under **Resource access**, check all 3 checkboxes for **Azure Virtual Machine for deployment**, **Azure Resource Manager for template deployment** and **Azure Disk Encryption for volume encryption**.
129+
1. On the **Access configuration** tab, select **Vault access policy** under **Permission model**.
130130
1. Leave the remaining settings at default values, select **Review + create**, and then select **Create**.
131131

132132
### Create a Batch account in user subscription mode
@@ -140,18 +140,8 @@ To create a Batch account in user subscription mode:
140140

141141
### Grant access to the key vault manually
142142

143-
You can also grant access to the key vault manually in [Azure portal](https://portal.azure.com).
143+
You can also grant access to the key vault manually.
144144

145-
#### If the Key Vault permission model is **Azure role-based access control**:
146-
1. Select **Access control (IAM)** from the left navigation of the key vault page.
147-
1. At the top of the **Access control (IAM)** page, select **Add** > **Add role assignment**.
148-
1. On the **Add role assignment** screen, under **Role** tab, under **Job function roles** sub tab, select either **Key Vault Secrets Officer** or **Key Vault Administrator** role for the Batch account, and then select **Next**.
149-
1. On the **Members** tab, select **Select members**. On the **Select members** screen, search for and select **Microsoft Azure Batch**, and then select **Select**.
150-
1. Click the **Review + create** button on the bottom to go to **Review + assign** tab, and click the **Review + create** button on the bottom again.
151-
152-
For detailed steps, see [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.md).
153-
154-
#### If the Key Vault permission model is **Vault access policy**:
155145
1. Select **Access policies** from the left navigation of the key vault page.
156146
1. On the **Access policies** page, select **Create**.
157147
1. On the **Create an access policy** screen, select a minimum of **Get**, **List**, **Set**, and **Delete** permissions under **Secret permissions**. For [key vaults with soft-delete enabled](/azure/key-vault/general/soft-delete-overview), also select **Recover**.

0 commit comments

Comments
 (0)