Skip to content

Commit 990db9d

Browse files
authored
Merge pull request #101518 from MicrosoftDocs/master
1/17 AM Publish
2 parents d29e7d0 + 8fe81ce commit 990db9d

File tree

94 files changed

+1563
-391
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

94 files changed

+1563
-391
lines changed

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ The technical profile also returns claims, that aren't returned by the identity
122122
| --------- | -------- | ----------- |
123123
| ServiceUrl | Yes | The URL of the REST API endpoint. |
124124
| AuthenticationType | Yes | The type of authentication being performed by the RESTful claims provider. Possible values: `None`, `Basic`, `Bearer`, or `ClientCertificate`. The `None` value indicates that the REST API is not anonymous. The `Basic` value indicates that the REST API is secured with HTTP basic authentication. Only verified users, including Azure AD B2C, can access your API. The `ClientCertificate` (recommended) value indicates that the REST API restricts access by using client certificate authentication. Only services that have the appropriate certificates, for example Azure AD B2C, can access your API. The `Bearer` value indicates that the REST API restricts access using client OAuth2 Bearer token. |
125-
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. |
125+
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126126
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127127
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
128128
| DebugMode | No | Runs the technical profile in debug mode. In debug mode, the REST API can return more information. See the returning error message section. |

articles/active-directory/user-help/active-directory-passwords-reset-register.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,6 @@ ms.workload: identity
1313
ms.topic: conceptual
1414
ms.date: 01/15/2020
1515
ms.author: lizross
16-
ms.collection: M365-identity-device-management
1716
---
1817

1918
# Register your verification method info to reset your own password
@@ -66,4 +65,4 @@ Your administrator must turn on this feature for you to be able to register your
6665

6766
- [Password reset portal](https://passwordreset.microsoftonline.com/)
6867

69-
- [When you can't sign in to your Microsoft account](https://support.microsoft.com/help/12429/microsoft-account-sign-in-cant)
68+
- [When you can't sign in to your Microsoft account](https://support.microsoft.com/help/12429/microsoft-account-sign-in-cant)

articles/active-directory/user-help/active-directory-passwords-update-your-own-password.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ ms.subservice: user-help
1212
ms.topic: conceptual
1313
ms.date: 01/15/2020
1414
ms.author: lizross
15-
ms.collection: M365-identity-device-management
1615
---
1716

1817
# Reset your work or school password using security info

articles/aks/ingress-static-ip.md

Lines changed: 26 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ You can also:
2929

3030
This article assumes that you have an existing AKS cluster. If you need an AKS cluster, see the AKS quickstart [using the Azure CLI][aks-quickstart-cli] or [using the Azure portal][aks-quickstart-portal].
3131

32-
This article uses Helm to install the NGINX ingress controller, cert-manager, and a sample web app. You need to have Helm initialized within your AKS cluster and using a service account for Tiller. Make sure that you are using the latest release of Helm. For upgrade instructions, see the [Helm install docs][helm-install]. For more information on configuring and using Helm, see [Install applications with Helm in Azure Kubernetes Service (AKS)][use-helm].
32+
This article uses Helm to install the NGINX ingress controller, cert-manager, and a sample web app. You need to have Helm initialized within your AKS cluster and using a service account for Tiller. Make sure that you are using the latest release of Helm 3. For upgrade instructions, see the [Helm install docs][helm-install]. For more information on configuring and using Helm, see [Install applications with Helm in Azure Kubernetes Service (AKS)][use-helm].
3333

3434
This article also requires that you are running the Azure CLI version 2.0.64 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
3535

@@ -64,7 +64,7 @@ The ingress controller also needs to be scheduled on a Linux node. Windows Serve
6464
kubectl create namespace ingress-basic
6565

6666
# Use Helm to deploy an NGINX ingress controller
67-
helm install stable/nginx-ingress \
67+
helm install nginx-ingress stable/nginx-ingress \
6868
--namespace ingress-basic \
6969
--set controller.replicaCount=2 \
7070
--set controller.nodeSelector."beta\.kubernetes\.io/os"=linux \
@@ -78,8 +78,8 @@ When the Kubernetes load balancer service is created for the NGINX ingress contr
7878
$ kubectl get service -l app=nginx-ingress --namespace ingress-basic
7979
8080
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
81-
dinky-panda-nginx-ingress-controller LoadBalancer 10.0.232.56 40.121.63.72 80:31978/TCP,443:32037/TCP 3m
82-
dinky-panda-nginx-ingress-default-backend ClusterIP 10.0.95.248 <none> 80/TCP 3m
81+
nginx-ingress-controller LoadBalancer 10.0.232.56 40.121.63.72 80:31978/TCP,443:32037/TCP 3m
82+
nginx-ingress-default-backend ClusterIP 10.0.95.248 <none> 80/TCP 3m
8383
```
8484

8585
No ingress rules have been created yet, so the NGINX ingress controller's default 404 page is displayed if you browse to the public IP address. Ingress rules are configured in the following steps.
@@ -117,7 +117,7 @@ To install the cert-manager controller in an RBAC-enabled cluster, use the follo
117117

118118
```console
119119
# Install the CustomResourceDefinition resources separately
120-
kubectl apply --validate=false -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.11/deploy/manifests/00-crds.yaml
120+
kubectl apply --validate=false -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.12/deploy/manifests/00-crds.yaml
121121

122122
# Create the namespace for cert-manager
123123
kubectl create namespace cert-manager
@@ -133,9 +133,9 @@ helm repo update
133133

134134
# Install the cert-manager Helm chart
135135
helm install \
136-
--name cert-manager \
136+
cert-manager \
137137
--namespace cert-manager \
138-
--version v0.11.0 \
138+
--version v0.12.0 \
139139
jetstack/cert-manager
140140
```
141141

@@ -186,13 +186,13 @@ helm repo add azure-samples https://azure-samples.github.io/helm-charts/
186186
Create the first demo application from a Helm chart with the following command:
187187

188188
```console
189-
helm install azure-samples/aks-helloworld --namespace ingress-basic
189+
helm install aks-helloworld azure-samples/aks-helloworld --namespace ingress-basic
190190
```
191191

192192
Now install a second instance of the demo application. For the second instance, you specify a new title so that the two applications are visually distinct. You also specify a unique service name:
193193

194194
```console
195-
helm install azure-samples/aks-helloworld \
195+
helm install aks-helloworld-2 azure-samples/aks-helloworld \
196196
--namespace ingress-basic \
197197
--set title="AKS Ingress Demo" \
198198
--set serviceName="ingress-demo"
@@ -211,7 +211,6 @@ apiVersion: extensions/v1beta1
211211
kind: Ingress
212212
metadata:
213213
name: hello-world-ingress
214-
namespace: ingress-basic
215214
annotations:
216215
kubernetes.io/ingress.class: nginx
217216
cert-manager.io/cluster-issuer: letsencrypt-staging
@@ -235,10 +234,10 @@ spec:
235234
path: /hello-world-two(/|$)(.*)
236235
```
237236
238-
Create the ingress resource using the `kubectl apply -f hello-world-ingress.yaml` command.
237+
Create the ingress resource using the `kubectl apply -f hello-world-ingress.yaml --namespace ingress-basic` command.
239238

240239
```
241-
$ kubectl apply -f hello-world-ingress.yaml
240+
$ kubectl apply -f hello-world-ingress.yaml --namespace ingress-basic
242241

243242
ingress.extensions/hello-world-ingress created
244243
```
@@ -343,36 +342,33 @@ kubectl delete -f cluster-issuer.yaml
343342
Now list the Helm releases with the `helm list` command. Look for charts named *nginx-ingress*, *cert-manager*, and *aks-helloworld*, as shown in the following example output:
344343

345344
```
346-
$ helm list
345+
$ helm list --all-namespaces
347346
348-
NAME REVISION UPDATED STATUS CHART APP VERSION NAMESPACE
349-
waxen-hamster 1 Wed Mar 6 23:16:00 2019 DEPLOYED nginx-ingress-1.3.1 0.22.0 kube-system
350-
alliterating-peacock 1 Wed Mar 6 23:17:37 2019 DEPLOYED cert-manager-v0.6.6 v0.6.2 kube-system
351-
mollified-armadillo 1 Wed Mar 6 23:26:04 2019 DEPLOYED aks-helloworld-0.1.0 default
352-
wondering-clam 1 Wed Mar 6 23:26:07 2019 DEPLOYED aks-helloworld-0.1.0 default
347+
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
348+
aks-helloworld ingress-basic 1 2020-01-11 15:02:21.51172346 deployed aks-helloworld-0.1.0
349+
aks-helloworld-2 ingress-basic 1 2020-01-11 15:03:10.533465598 deployed aks-helloworld-0.1.0
350+
nginx-ingress ingress-basic 1 2020-01-11 14:51:03.454165006 deployed nginx-ingress-1.28.2 0.26.2
351+
cert-manager cert-manager 1 2020-01-06 21:19:03.866212286 deployed cert-manager-v0.12.0 v0.12.0
353352
```
354353

355-
Delete the releases with the `helm delete` command. The following example deletes the NGINX ingress deployment, certificate manager, and the two sample AKS hello world apps.
354+
Delete the releases with the `helm uninstall` command. The following example deletes the NGINX ingress deployment, certificate manager, and the two sample AKS hello world apps.
356355

357356
```
358-
$ helm delete waxen-hamster alliterating-peacock mollified-armadillo wondering-clam
357+
$ helm uninstall aks-helloworld aks-helloworld-2 nginx-ingress -n ingress-basic
359358
360-
release "billowing-kitten" deleted
361-
release "loitering-waterbuffalo" deleted
362-
release "flabby-deer" deleted
363-
release "linting-echidna" deleted
364-
```
359+
release "aks-helloworld" deleted
360+
release "aks-helloworld-2" deleted
361+
release "nginx-ingress" deleted
365362
366-
Next, remove the Helm repo for the AKS hello world app:
363+
$ helm uninstall cert-manager -n cert-manager
367364
368-
```console
369-
helm repo remove azure-samples
365+
release "cert-manager" deleted
370366
```
371367

372-
Remove the ingress route that directed traffic to the sample apps:
368+
Next, remove the Helm repo for the AKS hello world app:
373369

374370
```console
375-
kubectl delete -f hello-world-ingress.yaml
371+
helm repo remove azure-samples
376372
```
377373

378374
Delete the itself namespace. Use the `kubectl delete` command and specify your namespace name:
78.2 KB
Loading
Loading
Loading
Loading
57.5 KB
Loading

articles/azure-databricks/quickstart-create-databricks-workspace-portal.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -49,11 +49,8 @@ In this section, you create an Azure Databricks workspace using the Azure portal
4949
|**Resource group** | Specify whether you want to create a new resource group or use an existing one. A resource group is a container that holds related resources for an Azure solution. For more information, see [Azure Resource Group overview](../azure-resource-manager/management/overview.md). |
5050
|**Location** | Select **West US 2**. For other available regions, see [Azure services available by region](https://azure.microsoft.com/regions/services/). |
5151
|**Pricing Tier** | Choose between **Standard**, **Premium**, or **Trial**. For more information on these tiers, see [Databricks pricing page](https://azure.microsoft.com/pricing/details/databricks/). |
52-
|**Virtual Network** | Choose to deploy an Azure Databricks workspace in your own Virtual Network (VNet). For more information, see [Deploy Azure Databricks in your Azure Virtual Network (VNet Injection)](/azure/databricks/administration-guide/cloud-configurations/azure/vnet-inject). |
5352

54-
Select **Create**.
55-
56-
4. The workspace creation takes a few minutes. During workspace creation, you can view the deployment status in **Notifications**.
53+
4. Select **Review + Create**, and then **Create**. The workspace creation takes a few minutes. During workspace creation, you can view the deployment status in **Notifications**.
5754

5855
![Databricks deployment tile](./media/quickstart-create-databricks-workspace-portal/databricks-deployment-tile.png "Databricks deployment tile")
5956

0 commit comments

Comments
 (0)