Skip to content

Commit a0da5d9

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-role-assignments-count
2 parents dff7b37 + 9473366 commit a0da5d9

File tree

38 files changed

+150
-442
lines changed

38 files changed

+150
-442
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16944,6 +16944,11 @@
1694416944
"redirect_url": "/azure/storage/common/storage-quickstart-create-account?tabs=powershell",
1694516945
"redirect_document_id": false
1694616946
},
16947+
{
16948+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries.md",
16949+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy",
16950+
"redirect_document_id": false
16951+
},
1694716952
{
1694816953
"source_path": "articles/storage/blobs/data-lake-storage-evaluation.md",
1694916954
"redirect_url": "/azure/storage/blobs/data-lake-storage-upgrade",

articles/automation/automation-dsc-compile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ The **Composite Resources** feature allows you to use DSC configurations as nest
125125
### Manage ConfigurationData when compiling configurations in Azure Automation
126126

127127
**ConfigurationData** allows you to separate structural configuration from any environment-specific
128-
configuration while using PowerShell DSC. For more information, see [Separating "What" from "Where" in PowerShell DSC](https://blogs.msdn.com/b/powershell/archive/2014/01/09/continuous-deployment-using-dsc-with-minimal-change.aspx).
128+
configuration while using PowerShell DSC. For more information, see [Separating "What" from "Where" in PowerShell DSC](https://devblogs.microsoft.com/powershell/separating-what-from-where-in-powershell-dsc/).
129129

130130
> [!NOTE]
131131
> When compiling in Azure Automation State Configuration, you can use **ConfigurationData** in Azure PowerShell but not in the Azure portal.

articles/azure-app-configuration/howto-labels-aspnet-core.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@ titleSuffix: Azure App Configuration
44
description: Use labels to provide per-environment configuration values
55
ms.service: azure-app-configuration
66
author: lisaguthrie
7-
8-
ms.service: azure-app-configuration
97
ms.topic: conceptual
108
ms.date: 3/12/2020
119
ms.author: lcozzens
@@ -82,4 +80,4 @@ Now update `launchSettings.json` to set the `ASPNETCORE_ENVIRONMENT` variable to
8280
## Next steps
8381

8482
> [!div class="nextstepaction"]
85-
> [Configuration in ASP.NET Core](/aspnet/core/fundamentals/configuration/)
83+
> [Configuration in ASP.NET Core](/aspnet/core/fundamentals/configuration/)

articles/batch/batch-compute-node-environment-variables.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,7 @@ The command lines executed by tasks on compute nodes do not run under a shell. T
4444
|-----------------------------------|--------------------------------------------------------------------------|--------------|---------|
4545
| AZ_BATCH_ACCOUNT_NAME | The name of the Batch account that the task belongs to. | All tasks. | mybatchaccount |
4646
| AZ_BATCH_ACCOUNT_URL | The URL of the Batch account. | All tasks. | `https://myaccount.westus.batch.azure.com` |
47-
AZ_BATCH_APP_PACKAGE_FOO_1 points to the location that the package was downloaded (a folder). When using the default version of the app package, use the AZ_BATCH_APP_PACKAGE environment variable without the version numbers. | Any task with an associated app package. Also available for all tasks if the node itself has application packages. | AZ_BATCH_APP_PACKAGE_FOO_1 |
48-
| AZ_BATCH_APP_PACKAGE | A prefix of all the app package environment variables. For example, if Application "FOO" version "1" is installed onto a pool, the environment variable is AZ_BATCH_APP_PACKAGE_FOO_1. AZ_BATCH_APP_PACKAGE_FOO_1 points to the location that the package was downloaded (a folder). When using the default version of the app package, use the AZ_BATCH_APP_PACKAGE environment variable without the version numbers. If in Linux, and he application package name is "Agent-linux-x64" and the version is "1.1.46.0, the environment name is actually: AZ_BATCH_APP_PACKAGE_agent_linux_x64_1_1_46_0, using underscores and lower case. | Any task with an associated app package. Also available for all tasks if the node itself has application packages. | AZ_BATCH_APP_PACKAGE_FOO_1 |
47+
| AZ_BATCH_APP_PACKAGE | A prefix of all the app package environment variables. For example, if Application "FOO" version "1" is installed onto a pool, the environment variable is AZ_BATCH_APP_PACKAGE_FOO_1 (on Linux) or AZ_BATCH_APP_PACKAGE_FOO#1 (on Windows). AZ_BATCH_APP_PACKAGE_FOO_1 points to the location that the package was downloaded (a folder). When using the default version of the app package, use the AZ_BATCH_APP_PACKAGE environment variable without the version numbers. If in Linux, and the application package name is "Agent-linux-x64" and the version is "1.1.46.0, the environment name is actually: AZ_BATCH_APP_PACKAGE_agent_linux_x64_1_1_46_0, using underscores and lower case. See [here](https://docs.microsoft.com/azure/batch/batch-application-packages#execute-the-installed-applications) for more details. | Any task with an associated app package. Also available for all tasks if the node itself has application packages. | AZ_BATCH_APP_PACKAGE_FOO_1 (Linux) or AZ_BATCH_APP_PACKAGE_FOO#1 (Windows) |
4948
| AZ_BATCH_AUTHENTICATION_TOKEN | An authentication token that grants access to a limited set of Batch service operations. This environment variable is only present if the [authenticationTokenSettings](/rest/api/batchservice/task/add#authenticationtokensettings) are set when the [task is added](/rest/api/batchservice/task/add#request-body). The token value is used in the Batch APIs as credentials to create a Batch client, such as in the [BatchClient.Open() .NET API](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.batchclient.open#Microsoft_Azure_Batch_BatchClient_Open_Microsoft_Azure_Batch_Auth_BatchTokenCredentials_). | All tasks. | OAuth2 access token |
5049
| AZ_BATCH_CERTIFICATES_DIR | A directory within the [task working directory][files_dirs] in which certificates are stored for Linux compute nodes. This environment variable does not apply to Windows compute nodes. | All tasks. | /mnt/batch/tasks/workitems/batchjob001/job-1/task001/certs |
5150
| AZ_BATCH_HOST_LIST | The list of nodes that are allocated to a [multi-instance task][multi_instance] in the format `nodeIP,nodeIP`. | Multi-instance primary and subtasks. | `10.0.0.4,10.0.0.5` |

articles/cognitive-services/Encryption/cognitive-services-encryption-keys-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,3 +105,4 @@ When you disable customer-managed keys, your Cognitive Services resource is then
105105
* [Language Understanding service encryption of data at rest](../LUIS/luis-encryption-of-data-at-rest.md)
106106
* [Content Moderator encryption of data at rest](../Content-Moderator/content-moderator-encryption-of-data-at-rest.md)
107107
* [Translator encryption of data at rest](../translator/translator-encryption-of-data-at-rest.md)
108+
* [Personalizer encryption of data at rest](../personalizer/personalizer-encryption-of-data-at-rest.md)
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
title: Personalizer service encryption of data at rest
3+
titleSuffix: Azure Cognitive Services
4+
description: Personalizer service encryption of data at rest.
5+
author: erindormier
6+
manager: venkyv
7+
ms.service: cognitive-services
8+
ms.subservice: personalizer
9+
ms.topic: conceptual
10+
ms.date: 03/11/2020
11+
ms.author: egeaney
12+
#Customer intent: As a user of the Personalizer service, I want to learn how encryption at rest works.
13+
---
14+
15+
# Personalizer service encryption of data at rest
16+
17+
The Personalizer service automatically encrypts your data when persisted it to the cloud. The Personalizer service encryption protects your data and to help you to meet your organizational security and compliance commitments.
18+
19+
[!INCLUDE [cognitive-services-about-encryption](../../../includes/cognitive-services-about-encryption.md)]
20+
21+
> [!IMPORTANT]
22+
> Customer-managed keys are only available on the E0 pricing tier. To request the ability to use customer-managed keys, fill out and submit the [Personalizer Service Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk). It will take approximately 3-5 business days to hear back on the status of your request. Depending on demand, you may be placed in a queue and approved as space becomes available. Once approved for using CMK with the Personalizer service, you will need to create a new Personalizer resource and select E0 as the Pricing Tier. Once your Personalizer resource with the E0 pricing tier is created, you can use Azure Key Vault to set up your managed identity.
23+
24+
[!INCLUDE [cognitive-services-cmk](../../../includes/cognitive-services-cmk-regions.md)]
25+
26+
[!INCLUDE [cognitive-services-cmk](../../../includes/cognitive-services-cmk.md)]
27+
28+
## Next steps
29+
30+
* [Personalizer Service Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk)
31+
* [Learn more about Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-overview)

articles/cognitive-services/personalizer/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,8 @@
107107
href: https://azure.microsoft.com/global-infrastructure/services/?products=cognitive-services
108108
- name: Compliance
109109
href: https://azure.microsoft.com/support/legal/cognitive-services-compliance-and-privacy/
110+
- name: Encryption
111+
href: personalizer-encryption-of-data-at-rest.md
110112
- name: Azure Roadmap
111113
href: https://go.microsoft.com/fwlink/?linkid=2092153
112114
- name: Pricing

articles/cognitive-services/text-analytics/includes/quickstarts/csharp-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Using the Visual Studio IDE, create a new .NET Core console app. This will creat
3939

4040
#### [Version 3.0-preview](#tab/version-3)
4141

42-
Install the client library by right-clicking on the solution in the **Solution Explorer** and selecting **Manage NuGet Packages**. In the package manager that opens select **Browse**, check **Include prerelease**, and search for `Azure.AI.TextAnalytics`. Select version `1.0.0-preview.2`, and then **Install**. You can also use the [Package Manager Console](https://docs.microsoft.com/nuget/consume-packages/install-use-packages-powershell#find-and-install-a-package).
42+
Install the client library by right-clicking on the solution in the **Solution Explorer** and selecting **Manage NuGet Packages**. In the package manager that opens select **Browse**, check **Include prerelease**, and search for `Azure.AI.TextAnalytics`. Select version `1.0.0-preview.3`, and then **Install**. You can also use the [Package Manager Console](https://docs.microsoft.com/nuget/consume-packages/install-use-packages-powershell#find-and-install-a-package).
4343

4444
> [!TIP]
4545
> Want to view the whole quickstart code file at once? You can find it [on GitHub](https://github.com/Azure-Samples/cognitive-services-quickstart-code/blob/master/dotnet/TextAnalytics/program.cs), which contains the code examples in this quickstart.

articles/container-registry/container-registry-import-images.md

Lines changed: 44 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Import container images
33
description: Import container images to an Azure container registry by using Azure APIs, without needing to run Docker commands.
44
ms.topic: article
5-
ms.date: 02/06/2019
5+
ms.date: 03/16/2020
66
---
77

88
# Import container images to a container registry
@@ -19,14 +19,14 @@ Azure Container Registry handles a number of common scenarios to copy images fro
1919

2020
Image import into an Azure container registry has the following benefits over using Docker CLI commands:
2121

22-
* Because your client environment doesnt need a local Docker installation, import any container image, regardless of the supported OS type.
22+
* Because your client environment doesn't need a local Docker installation, import any container image, regardless of the supported OS type.
2323

2424
* When you import multi-architecture images (such as official Docker images), images for all architectures and platforms specified in the manifest list get copied.
2525

2626
To import container images, this article requires that you run the Azure CLI in Azure Cloud Shell or locally (version 2.0.55 or later recommended). Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][azure-cli].
2727

2828
> [!NOTE]
29-
> If you need to distribute identical container images across multiple Azure regions, Azure Container Registry also supports [geo-replication](container-registry-geo-replication.md). By geo-replicating a registry (Premium SKU required), you can serve multiple regions with identical image and tag names from a single registry.
29+
> If you need to distribute identical container images across multiple Azure regions, Azure Container Registry also supports [geo-replication](container-registry-geo-replication.md). By geo-replicating a registry (Premium service tier required), you can serve multiple regions with identical image and tag names from a single registry.
3030
>
3131
3232
## Prerequisites
@@ -42,27 +42,38 @@ To import an image to an Azure container registry, your identity must have write
4242
For example, use the [az acr import][az-acr-import] command to import the multi-architecture `hello-world:latest` image from Docker Hub to a registry named *myregistry*. Because `hello-world` is an official image from Docker Hub, this image is in the default `library` repository. Include the repository name and optionally a tag in the value of the `--source` image parameter. (You can optionally identify an image by its manifest digest instead of by tag, which guarantees a particular version of an image.)
4343

4444
```azurecli
45-
az acr import --name myregistry --source docker.io/library/hello-world:latest --image hello-world:latest
45+
az acr import \
46+
--name myregistry \
47+
--source docker.io/library/hello-world:latest \
48+
--image hello-world:latest
4649
```
4750

4851
You can verify that multiple manifests are associated with this image by running the `az acr repository show-manifests` command:
4952

5053
```azurecli
51-
az acr repository show-manifests --name myregistry --repository hello-world
54+
az acr repository show-manifests \
55+
--name myregistry \
56+
--repository hello-world
5257
```
5358

5459
The following example imports a public image from the `tensorflow` repository in Docker Hub:
5560

5661
```azurecli
57-
az acr import --name myregistry --source docker.io/tensorflow/tensorflow:latest-gpu --image tensorflow:latest-gpu
62+
az acr import \
63+
--name myregistry \
64+
--source docker.io/tensorflow/tensorflow:latest-gpu \
65+
--image tensorflow:latest-gpu
5866
```
5967

6068
### Import from Microsoft Container Registry
6169

6270
For example, import the latest Windows Server Core image from the `windows` repository in Microsoft Container Registry.
6371

6472
```azurecli
65-
az acr import --name myregistry --source mcr.microsoft.com/windows/servercore:latest --image servercore:latest
73+
az acr import \
74+
--name myregistry \
75+
--source mcr.microsoft.com/windows/servercore:latest \
76+
--image servercore:latest
6677
```
6778

6879
## Import from another Azure container registry
@@ -78,37 +89,56 @@ You can import an image from another Azure container registry using integrated A
7889
For example, import the `aci-helloworld:latest` image from a source registry *mysourceregistry* to *myregistry* in the same Azure subscription.
7990

8091
```azurecli
81-
az acr import --name myregistry --source mysourceregistry.azurecr.io/aci-helloworld:latest --image hello-world:latest
92+
az acr import \
93+
--name myregistry \
94+
--source mysourceregistry.azurecr.io/aci-helloworld:latest \
95+
--image aci-helloworld:latest
8296
```
8397

8498
The following example imports an image by manifest digest (SHA-256 hash, represented as `sha256:...`) instead of by tag:
8599

86100
```azurecli
87-
az acr import --name myregistry --source mysourceregistry.azurecr.io/aci-helloworld@sha256:123456abcdefg
101+
az acr import \
102+
--name myregistry \
103+
--source mysourceregistry.azurecr.io/aci-helloworld@sha256:123456abcdefg
88104
```
89105

90106
### Import from a registry in a different subscription
91107

92-
In the following example, *mysourceregistry* is in a different subscription from *myregistry* in the same Active Directory tenant. Supply the resource ID of the source registry with the `--registry` parameter. Notice that the `--source` parameter specifies only the source repository and image name, not the registry login server name.
93-
108+
In the following example, *mysourceregistry* is in a different subscription from *myregistry* in the same Active Directory tenant. Supply the resource ID of the source registry with the `--registry` parameter. Notice that the `--source` parameter specifies only the source repository and tag, not the registry login server name.
109+
94110
```azurecli
95-
az acr import --name myregistry --source sourcerepo/aci-helloworld:latest --image aci-hello-world:latest --registry /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/sourceResourceGroup/providers/Microsoft.ContainerRegistry/registries/mysourceregistry
111+
az acr import \
112+
--name myregistry \
113+
--source samples/aci-helloworld:latest \
114+
--image aci-hello-world:latest \
115+
--registry /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/sourceResourceGroup/providers/Microsoft.ContainerRegistry/registries/mysourceregistry
96116
```
97117

98118
### Import from a registry using service principal credentials
99119

100120
To import from a registry that you can't access using Active Directory permissions, you can use service principal credentials (if available). Supply the appID and password of an Active Directory [service principal](container-registry-auth-service-principal.md) that has ACRPull access to the source registry. Using a service principal is useful for build systems and other unattended systems that need to import images to your registry.
101121

102122
```azurecli
103-
az acr import --name myregistry --source sourceregistry.azurecr.io/sourcerepo/sourceimage:tag --image targetimage:tag --username <SP_App_ID> –-password <SP_Passwd>
123+
az acr import \
124+
--name myregistry \
125+
--source sourceregistry.azurecr.io/sourcerrepo:tag \
126+
--image targetimage:tag \
127+
--username <SP_App_ID> \
128+
–-password <SP_Passwd>
104129
```
105130

106131
## Import from a non-Azure private container registry
107132

108133
Import an image from a private registry by specifying credentials that enable pull access to the registry. For example, pull an image from a private Docker registry:
109134

110135
```azurecli
111-
az acr import --name myregistry --source docker.io/sourcerepo/sourceimage:tag --image sourceimage:tag --username <username> --password <password>
136+
az acr import \
137+
--name myregistry \
138+
--source docker.io/sourcerepo/sourceimage:tag \
139+
--image sourceimage:tag \
140+
--username <username> \
141+
--password <password>
112142
```
113143

114144
## Next steps

articles/mysql/connect-cpp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: mysql
77
ms.custom: mvc
88
ms.devlang: cpp
99
ms.topic: quickstart
10-
ms.date: 12/02/2019
10+
ms.date: 3/18/2020
1111
---
1212

1313
# Azure Database for MySQL: Use Connector/C++ to connect and query data

0 commit comments

Comments
 (0)