Skip to content

Commit 9e3f46c

Browse files
authored
Merge pull request #294472 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents b26ccff + 762beeb commit 9e3f46c

File tree

10 files changed

+62
-12
lines changed

10 files changed

+62
-12
lines changed

articles/api-center/set-up-api-center.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To register the resource provider using the portal:
2626

2727
1. Select the subscription where you want to create the API center.
2828

29-
1. In the left menu, under **Resources**, select **Resource providers**.
29+
1. In the left menu, under **Settings** > **Resources**, select **Resource providers**.
3030

3131
1. Search for **Microsoft.ApiCenter** in the list of resource providers. If it's not registered, select **Register**.
3232

articles/api-management/api-management-api-import-restrictions.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -147,6 +147,7 @@ The following fields are included in either [OpenAPI version 3.0.x](https://swag
147147
| **PathItem** | <ul><li>`trace`</li><li>`servers`</li></ul> |
148148
| **Operation** | <ul><li>`externalDocs`</li><li>`callbacks`</li><li>`security`</li><li>`servers`</li></ul> |
149149
| **Parameter** | <ul><li>`allowEmptyValue`</li><li>`style`</li><li>`explode`</li><li>`allowReserved`</li></ul> |
150+
| **Server templating** | <ul><li>`API Server and Base URL`</li></ul> |
150151

151152
## OpenAPI import, update, and export mechanisms
152153

articles/api-management/azure-openai-enable-semantic-caching.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ If the request is successful, the response includes a vector representation of t
115115

116116
## Configure semantic caching policies
117117

118-
Configure the following policies to enable semantic caching for Azure OpenAI APIs in Azure API Management:
118+
To enable semantic caching for Azure OpenAI APIs in Azure API Management, apply the following policies: one to check the cache before sending requests (lookup) and another to store responses for future reuse (store):
119119
* In the **Inbound processing** section for the API, add the [azure-openai-semantic-cache-lookup](azure-openai-semantic-cache-lookup-policy.md) policy. In the `embeddings-backend-id` attribute, specify the Embeddings API backend you created.
120120

121121
> [!NOTE]

articles/api-management/backends.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -271,3 +271,4 @@ Include a JSON snippet similar to the following in your ARM template for a backe
271271

272272
* Blog: [Using Azure API Management circuit breaker and load balancing with Azure OpenAI Service](https://techcommunity.microsoft.com/t5/fasttrack-for-azure/using-azure-api-management-circuit-breaker-and-load-balancing/ba-p/4041003)
273273
* Set up a [Service Fabric backend](how-to-configure-service-fabric-backend.yml) using the Azure portal.
274+
* Quickstart [Create a Backend Pool in Azure API Management using Bicep for load balance OpenAI requests](https://github.com/Azure-Samples/apim-lbpool-openai-quickstart)

articles/azure-functions/durable/durable-functions-perf-and-scale.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ On a premium plan, automatic scaling can help to keep the number of workers (and
3131

3232
### CPU usage
3333

34-
**Orchestrator functions** are executed on a single thread to ensure that execution can be deterministic across many replays. Because of this single-threaded execution, it's important that orchestrator function threads do not perform CPU-intensive tasks, do I/O, or block for any reason. Any work that may require I/O, blocking, or multiple threads should be moved into activity functions.
34+
**Orchestrator functions** run their logic multiple times due to their replaying behavior. It's therefore important that orchestrator function threads do not perform CPU-intensive tasks, do I/O, or block for any reason. Any work that may require I/O, blocking, or multiple threads should be moved into activity functions.
3535

3636
**Activity functions** have all the same behaviors as regular queue-triggered functions. They can safely do I/O, execute CPU intensive operations, and use multiple threads. Because activity triggers are stateless, they can freely scale out to an unbounded number of VMs.
3737

articles/container-apps/revisions.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: conceptual
8-
ms.date: 02/01/2024
8+
ms.date: 02/10/2025
99
ms.author: cshoe
1010
ms.custom: build-2023
1111
---
@@ -26,7 +26,7 @@ Key characteristics of revisions include:
2626

2727
- **Scoped changes**: While revisions remain static, [application-scope](#change-types) changes can affect all revisions, while [revision-scope](#change-types) changes create a new revision.
2828

29-
- **Historical record**: By default, you have access to 100 inactive revisions, but you can [adjust this threshold manually](#change-inactive-revision-limit).
29+
- **Historical record**: By default, you have access to 100 inactive revisions, but you can [adjust this threshold manually](#change-inactive-revision-limit-preview).
3030

3131
- **Multiple revisions**: You can run multiple revisions concurrently. This feature is especially beneficial when you need to manage different versions of your app simultaneously.
3232

@@ -65,10 +65,16 @@ After a container app is successfully provisioned, a revision enters its operati
6565

6666
Revisions can also enter an inactive state. These revisions don't possess provisioning or running states. However, Azure Container Apps maintains a list of these revisions, accommodating up to 100 inactive entries. You can activate a revision at any time.
6767

68-
### Change inactive revision limit
68+
### Change inactive revision limit (preview)
6969

7070
You can use the `--max-inactive-revisions` parameter with the `containerapp create` or `containerapp update` commands to control the number of inactive revisions tracked by Container Apps.
7171

72+
First, make sure you have installed the Container Apps extension, with preview features enabled, for the Azure CLI:
73+
74+
```azurecli
75+
az extension add --name containerapp --upgrade --allow-preview true
76+
```
77+
7278
This example demonstrates how to create a new container app that tracks 50 inactive revisions:
7379

7480
```azurecli

articles/role-based-access-control/built-in-roles.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -446,6 +446,7 @@ The following table provides a brief description of each built-in role. Click th
446446
> | <a name='security-assessment-contributor'></a>[Security Assessment Contributor](./built-in-roles/security.md#security-assessment-contributor) | Lets you push assessments to Microsoft Defender for Cloud | 612c2aa1-cb24-443b-ac28-3ab7272de6f5 |
447447
> | <a name='security-manager-legacy'></a>[Security Manager (Legacy)](./built-in-roles/security.md#security-manager-legacy) | This is a legacy role. Please use Security Admin instead. | e3d13bf0-dd5a-482e-ba6b-9b8433878d10 |
448448
> | <a name='security-reader'></a>[Security Reader](./built-in-roles/security.md#security-reader) | View permissions for Microsoft Defender for Cloud. Can view recommendations, alerts, a security policy, and security states, but cannot make changes.<br><br>For Microsoft Defender for IoT, see [Azure user roles for OT and Enterprise IoT monitoring](/azure/defender-for-iot/organizations/roles-azure). | 39bc4728-0917-49c7-9d2c-d95423bc2eb4 |
449+
> | <a name='locks-contributor'></a>[Locks Contributor](./built-in-roles/security.md#locks-contributor) | Lets you manage locks operations | 28bf596f-4eb7-45ce-b5bc-6cf482fec137 |
449450
450451
## DevOps
451452

articles/role-based-access-control/built-in-roles/security.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1559,7 +1559,49 @@ View permissions for Microsoft Defender for Cloud. Can view recommendations, ale
15591559
"type": "Microsoft.Authorization/roleDefinitions"
15601560
}
15611561
```
1562+
## Locks Contributor
1563+
1564+
Manage locks operations.
1565+
1566+
> [!div class="mx-tableFixed"]
1567+
> | Actions | Description |
1568+
> | --- | --- |
1569+
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/locks/read | Gets locks at the specified scope |
1570+
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/locks/write | Add locks at the specified scope |
1571+
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/locks/delete | Delete locks at the specified scope |
1572+
> | **NotActions** | |
1573+
> | *none* | |
1574+
> | **DataActions** | |
1575+
> | *none* | |
1576+
> | **NotDataActions** | |
1577+
> | *none* | |
1578+
1579+
```json
1580+
{
1581+
"assignableScopes": [
1582+
"/"
1583+
],
1584+
"description": "Can Manage Locks Operations.",
1585+
"id": "/providers/Microsoft.Authorization/roleDefinitions/28bf596f-4eb7-45ce-b5bc-6cf482fec137",
1586+
"name": "28bf596f-4eb7-45ce-b5bc-6cf482fec137",
1587+
"permissions": [
1588+
{
1589+
"actions": [
1590+
"Microsoft.Authorization/locks/read",
1591+
"Microsoft.Authorization/locks/write",
1592+
"Microsoft.Authorization/locks/delete"
1593+
],
1594+
"notActions": [],
1595+
"dataActions": [],
1596+
"notDataActions": []
1597+
}
1598+
],
1599+
"roleName": "Locks Contributor",
1600+
"roleType": "BuiltInRole",
1601+
"type": "Microsoft.Authorization/roleDefinitions"
1602+
}
1603+
```
15621604

15631605
## Next steps
15641606

1565-
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)
1607+
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)

includes/api-management-authorization-azure-ad-provider.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,9 @@ ms.author: danlep
1010
| Provider name | Name of credential provider resource in API Management |Yes | N/A |
1111
| Identity provider | Select **Azure Active Directory v1** |Yes | N/A |
1212
| Grant type | The OAuth 2.0 authorization grant type to use<br/><br/>Depending on your scenario, select either **Authorization code** or **Client credentials**. |Yes | Authorization code |
13-
|**Authorization URL** | `https://graph.microsoft.com` | Yes | N/A |
13+
|**Authorization URL** | Authorization URL | No | `https://login.microsoftonline.com` |
1414
| Client ID | The application (client) ID used to identify the Microsoft Entra app | Yes | N/A |
1515
| Client secret | The client secret used for the Microsoft Entra app | Yes | N/A |
16-
| Login URL | The Microsoft Entra login URL | No | `https://login.windows.net` |
1716
| Resource URL | The URL of the resource that requires authorization<br/><br/> Example: `https://graph.microsoft.com` | Yes | N/A |
1817
| Tenant ID | The tenant ID of your Microsoft Entra app | No | common |
1918
| Scopes | One or more API permissions for your Microsoft Entra app, separated by the " " character <br/><br/>Example: `ChannelMessage.Read.All User.Read` | No | API permissions set in Microsoft Entra app |

includes/api-management-recommended-nsg-rules.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,12 @@ Configure custom network rules in the API Management subnet to filter traffic to
2222
|-------|--------------|----------|---------|------------|-----------|-----|--------|-----|
2323
| Inbound | Internet | * | VirtualNetwork | [80], 443 | TCP | Allow | Client communication to API Management | External only |
2424
| Inbound | ApiManagement | * | VirtualNetwork | 3443 | TCP | Allow | Management endpoint for Azure portal and PowerShell | External & Internal |
25-
| Inbound | AzureLoadBalancer | * | Virtual Network | 6390 | TCP | Allow | Azure Infrastructure Load Balancer | External & Internal |
25+
| Inbound | AzureLoadBalancer | * | VirtualNetwork | 6390 | TCP | Allow | Azure Infrastructure Load Balancer | External & Internal |
2626
| Inbound | AzureTrafficManager | * | VirtualNetwork | 443 | TCP | Allow | Azure Traffic Manager routing for multi-region deployment | External only |
2727
| Outbound | VirtualNetwork | * | Storage | 443 | TCP | Allow | Dependency on Azure Storage for core service functionality | External & Internal |
2828
| Outbound | VirtualNetwork| * | SQL | 1433 | TCP | Allow | Access to Azure SQL endpoints for core service functionality | External & Internal |
2929
| Outbound | VirtualNetwork | * | AzureKeyVault | 443 | TCP | Allow | Access to Azure Key Vault for core service functionality | External & Internal |
30-
| Outbound | VirtualNetwork | * | Azure Monitor | 1886, 443 | TCP | Allow | Publish [Diagnostics Logs and Metrics](../articles/api-management/api-management-howto-use-azure-monitor.md), [Resource Health](/azure/service-health/resource-health-overview), and [Application Insights](../articles/api-management/api-management-howto-app-insights.md) | External & Internal |
30+
| Outbound | VirtualNetwork | * | AzureMonitor | 1886, 443 | TCP | Allow | Publish [Diagnostics Logs and Metrics](../articles/api-management/api-management-howto-use-azure-monitor.md), [Resource Health](/azure/service-health/resource-health-overview), and [Application Insights](../articles/api-management/api-management-howto-app-insights.md) | External & Internal |
3131

3232

3333
### [stv1](#tab/stv1)
@@ -40,7 +40,7 @@ Configure custom network rules in the API Management subnet to filter traffic to
4040
| Inbound | AzureTrafficManager | * | VirtualNetwork | 443 | TCP | Allow | Azure Traffic Manager routing for multi-region deployment | External only |
4141
| Outbound | VirtualNetwork | * | Storage | 443 | TCP | Allow | Dependency on Azure Storage for core service functionality | External & Internal |
4242
| Outbound | VirtualNetwork| * | SQL | 1433 | TCP | Allow | Access to Azure SQL endpoints for core service functionality | External & Internal |
43-
| Outbound | VirtualNetwork | * | Azure Monitor | 1886, 443 | TCP | Allow | Publish [Diagnostics Logs and Metrics](../articles/api-management/api-management-howto-use-azure-monitor.md), [Resource Health](/azure/service-health/resource-health-overview), and [Application Insights](../articles/api-management/api-management-howto-app-insights.md) | External & Internal |
43+
| Outbound | VirtualNetwork | * | AzureMonitor | 1886, 443 | TCP | Allow | Publish [Diagnostics Logs and Metrics](../articles/api-management/api-management-howto-use-azure-monitor.md), [Resource Health](/azure/service-health/resource-health-overview), and [Application Insights](../articles/api-management/api-management-howto-app-insights.md) | External & Internal |
4444

4545

4646
---

0 commit comments

Comments
 (0)