Skip to content

Commit 996dca4

Browse files
authored
Merge pull request #125087 from ArieHein/Spelling-Wave-16
Spelling Fixes
2 parents efefb59 + 724c6aa commit 996dca4

22 files changed

+34
-34
lines changed

articles/confidential-computing/confidential-containers-on-aks-preview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ In alignment with the guidelines set by the [Confidential Computing Consortium](
3030
* Code integrity: Runtime enforcement is always available through customer defined policies for containers and container configuration, such as immutable policies and container signing.
3131
* Isolation from operator: Security designs that assume least privilege and highest isolation shielding from all untrusted parties including customer/tenant admins. It includes hardening existing Kubernetes control plane access (kubelet) to confidential pods.
3232

33-
But with these features of confidentiality, the product should additioanally its ease of use: it supports all unmodified Linux containers with high Kubernetes feature conformance. Additionally, it supports heterogenous node pools (GPU, general-purpose nodes) in a single cluster to optimize for cost.
33+
But with these features of confidentiality, the product should additionally its ease of use: it supports all unmodified Linux containers with high Kubernetes feature conformance. Additionally, it supports heterogenous node pools (GPU, general-purpose nodes) in a single cluster to optimize for cost.
3434

3535
## What forms Confidential Containers on AKS?
3636

articles/confidential-computing/skr-flow-confidential-containers-azure-container-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: ananyagarg
1111

1212
# Secure Key Release with Confidential containers on Azure Container Instance (ACI)
1313

14-
Secure Key Release (SKR) flow with Azure Key Vault (AKV) with confidential container offerings can implement in couple of ways. Confidential containers run a guest enlightened exposting AMD SEV-SNP device through a Linux Kernel that uses an in guest firmware with necessary Hyper-V related patches that we refer as Direct Linux Boot (DLB). This platform doesn't use vTPM and HCL based that Confidential VMs with AMD SEV-SNP support. This concept document assumes you plan to run the containers in [Azure Container Support choosing a confidential computing SKU](/azure/container-instances/container-instances-tutorial-deploy-confidential-containers-cce-arm)
14+
Secure Key Release (SKR) flow with Azure Key Vault (AKV) with confidential container offerings can implement in couple of ways. Confidential containers run a guest enlightened exposing AMD SEV-SNP device through a Linux Kernel that uses an in guest firmware with necessary Hyper-V related patches that we refer as Direct Linux Boot (DLB). This platform doesn't use vTPM and HCL based that Confidential VMs with AMD SEV-SNP support. This concept document assumes you plan to run the containers in [Azure Container Support choosing a confidential computing SKU](/azure/container-instances/container-instances-tutorial-deploy-confidential-containers-cce-arm)
1515

1616
- Side-Car Helper Container provided by Azure
1717
- Custom implementation with your container application

articles/confidential-computing/vmss-deployment-from-hardened-linux-image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Steps to deploy a scale set using VMSS and a hardened image are as follows:
6868
For the admin credentials, you will be able to use the credentials that you set from the hardened image while you create the vm.
6969
7070
> [!NOTE]
71-
> For specalized images, [osprofile properties](/azure/virtual-machines/shared-image-galleries) are handled differently than generalized images.
71+
> For specialized images, [osprofile properties](/azure/virtual-machines/shared-image-galleries) are handled differently than generalized images.
7272
> Using a [load balancer](/azure/load-balancer/load-balancer-overview) is optional but is encouraged for these reasons.
7373
7474
```azurecli-interactive

articles/connectors/connectors-create-api-cosmos-db.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ In a **Logic App (Consumption)** workflow, an Azure Cosmos DB connection require
193193
| **Connection name** | Yes | <*connection-name*> | The name to use for your connection. |
194194
| **Authentication Type** | Yes | <*connection-type*> | The authentication type that you want to use. This example uses **Access key**. <p><p>- If you select **Access Key**, provide the remaining required property values to create the connection. <p><p>- If you select **Microsoft Entra integrated**, no other property values are required, but you have to configure your connection by following the steps for [Microsoft Entra authentication and Azure Cosmos DB connector](/connectors/documentdb/#azure-ad-authentication-and-cosmos-db-connector). |
195195
| **Access key to your Azure Cosmos DB account** | Yes | <*access-key*> | The access key for the Azure Cosmos DB account to use for this connection. This value is either a read-write key or a read-only key. <p><p>**Note**: To find the key, go to the Azure Cosmos DB account page. In the navigation menu, under **Settings**, select **Keys**. Copy one of the available key values. |
196-
| **Account Id** | Yes | <*acccount-ID*> | The name for the Azure Cosmos DB account to use for this connection. |
196+
| **Account Id** | Yes | <*account-ID*> | The name for the Azure Cosmos DB account to use for this connection. |
197197
|||||
198198

199199
The following image shows an example connection:

articles/connectors/connectors-create-api-servicebus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -336,7 +336,7 @@ The steps to add and use a Service Bus trigger differ based on whether you want
336336

337337
#### Built-in connector trigger
338338

339-
By default, the Service Bus built-in connector is a stateless connector. To run this connector's operations in stateful mode, see [Enable stateful mode for stateless built-in connectors](enable-stateful-affinity-built-in-connectors.md). Also, Service Bus built-in non-session triggers follow the [*push trigger* pattern](introduction.md#triggers), while session-based triggers provide polling capabilty.
339+
By default, the Service Bus built-in connector is a stateless connector. To run this connector's operations in stateful mode, see [Enable stateful mode for stateless built-in connectors](enable-stateful-affinity-built-in-connectors.md). Also, Service Bus built-in non-session triggers follow the [*push trigger* pattern](introduction.md#triggers), while session-based triggers provide polling capability.
340340

341341
1. In the [Azure portal](https://portal.azure.com), and open your Standard logic app resource with blank workflow in the designer.
342342

articles/connectors/connectors-native-reqres.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ The **Request** trigger creates a manually callable endpoint that handles *only*
146146

147147
1. To check that the inbound call has a request body that matches your specified schema, follow these steps:
148148

149-
1. To enforce the inbound message to have the same exact fields that your schema describes, in your schema, add the **`required`** property and specify the required fields. Add the **`addtionalProperties`** property, and set the value to **`false`**.
149+
1. To enforce the inbound message to have the same exact fields that your schema describes, in your schema, add the **`required`** property and specify the required fields. Add the **`additionalProperties`** property, and set the value to **`false`**.
150150

151151
For example, the following schema specifies that the inbound message must have the **`msg`** field and not any other fields:
152152

@@ -301,7 +301,7 @@ The **Request** trigger creates a manually callable endpoint that handles *only*
301301

302302
1. To check that the inbound call has a request body that matches your specified schema, follow these steps:
303303

304-
1. To enforce the inbound message to have the same exact fields that your schema describes, in your schema, add the **`required`** property and specify the required fields. Add the **`addtionalProperties`** property, and set the value to **`false`**.
304+
1. To enforce the inbound message to have the same exact fields that your schema describes, in your schema, add the **`required`** property and specify the required fields. Add the **`additionalProperties`** property, and set the value to **`false`**.
305305

306306
For example, the following schema specifies that the inbound message must have the **`msg`** field and not any other fields:
307307

articles/connectors/connectors-native-webhook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ This built-in trigger calls the subscribe endpoint on the target service and reg
8282

8383
> [!NOTE]
8484
>
85-
> For the **Unsubsubscribe - Method** and **Unsubscribe - URI** properties, add them
85+
> For the **Unsubscribe - Method** and **Unsubscribe - URI** properties, add them
8686
> to your action by opening the **Advanced parameters** list.
8787
8888
For example, the following trigger includes the methods, URIs, and message bodies to use when performing the subscribe and unsubscribe operations.
@@ -159,7 +159,7 @@ This example uses the **HTTP Webhook** trigger as the first step.
159159

160160
> [!NOTE]
161161
>
162-
> For the **Unsubsubscribe - Method** and **Unsubscribe - URI** properties, add them
162+
> For the **Unsubscribe - Method** and **Unsubscribe - URI** properties, add them
163163
> to your action by opening the **Advanced parameters** list.
164164
165165
For example, the following action includes the methods, URIs, and message bodies to use when performing the subscribe and unsubscribe operations.

articles/container-apps/blue-green-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -282,10 +282,10 @@ export APP_DOMAIN=$(az containerapp env show -g $RESOURCE_GROUP -n $APP_ENVIRONM
282282
#Test the production FQDN
283283
curl -s https://$APP_NAME.$APP_DOMAIN/api/env | jq | grep COMMIT
284284
285-
#Test the blue lable FQDN
285+
#Test the blue label FQDN
286286
curl -s https://$APP_NAME---blue.$APP_DOMAIN/api/env | jq | grep COMMIT
287287
288-
#Test the green lable FQDN
288+
#Test the green label FQDN
289289
curl -s https://$APP_NAME---green.$APP_DOMAIN/api/env | jq | grep COMMIT
290290
```
291291

articles/container-apps/enable-dapr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ When using an IaC template, specify the following arguments in the `properties.c
6161
"dapr": {
6262
"enabled": true,
6363
"appId": "nodeapp",
64-
"appProcotol": "http",
64+
"appProtocol": "http",
6565
"appPort": 3000
6666
}
6767
```

articles/container-apps/environment-variables.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ If you're creating a new Container App through the [Azure portal](https://portal
3030

3131
### [Azure CLI](#tab/cli)
3232

33-
You can create your Container App with enviroment variables using the [az containerapp create](/cli/azure/containerapp#az-containerapp-create) command by passing the environment variables as space-separated 'key=value' entries using the `--env-vars` parameter.
33+
You can create your Container App with environment variables using the [az containerapp create](/cli/azure/containerapp#az-containerapp-create) command by passing the environment variables as space-separated 'key=value' entries using the `--env-vars` parameter.
3434

3535
```azurecli
3636
az containerapp create -n my-containerapp -g MyResourceGroup \

0 commit comments

Comments
 (0)