Skip to content

Commit a9b1f7d

Browse files
authored
Merge pull request #101823 from MicrosoftDocs/master
1/21 PM Publish
2 parents 7221918 + b51077c commit a9b1f7d

File tree

186 files changed

+1041
-1491
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

186 files changed

+1041
-1491
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14694,9 +14694,14 @@
1469414694
},
1469514695
{
1469614696
"source_path": "articles/machine-learning/machine-learning-algorithm-choice.md",
14697-
"redirect_url": "/azure/machine-learning/studio/algorithm-choice",
14697+
"redirect_url": "/azure/machine-learning/how-to-select-algorithms",
1469814698
"redirect_document_id": false
1469914699
},
14700+
{
14701+
"source_path": "articles/machine-learning/studio/algorithm-choice.md",
14702+
"redirect_url": "/azure/machine-learning/how-to-select-algorithms",
14703+
"redirect_document_id": false
14704+
},
1470014705
{
1470114706
"source_path": "articles/machine-learning/machine-learning-algorithm-parameters-optimize.md",
1470214707
"redirect_url": "/azure/machine-learning/studio/algorithm-parameters-optimize",

articles/active-directory/cloud-provisioning/reference-cloud-provisioning-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Yes, cloud provisioning creates a service principal for the provisioning configu
5252

5353
**Q: What happens when a synced user is required to change password on next logon?**
5454

55-
If password hash sync is enabled in cloud provisioning and the synced user is required to change password on next logon in on-premises AD, cloud provisioning does not provisioned the to be changed password hash to Azure AD. Once the user changes the password, the user password hash is provisioned from AD to Azure AD.
55+
If password hash sync is enabled in cloud provisioning and the synced user is required to change password on next logon in on-premises AD, cloud provisioning does not provision the to be changed password hash to Azure AD. Once the user changes the password, the user password hash is provisioned from AD to Azure AD.
5656

5757
**Q: Does cloud provisioning support writeback of ms-ds-consistencyGUID for any object?**
5858

articles/aks/kubernetes-walkthrough-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mlearned
66

77
ms.service: container-service
88
ms.topic: quickstart
9-
ms.date: 5/31/2019
9+
ms.date: 01/21/2020
1010
ms.author: mlearned
1111
ms.custom: mvc, seo-javascript-october2019
1212

@@ -93,7 +93,7 @@ A Kubernetes manifest file defines a desired state for the cluster, such as what
9393
> [!TIP]
9494
> In this quickstart, you manually create and deploy your application manifests to the AKS cluster. In more real-world scenarios, you can use [Azure Dev Spaces][azure-dev-spaces] to rapidly iterate and debug your code directly in the AKS cluster. You can use Dev Spaces across OS platforms and development environments, and work together with others on your team.
9595
96-
In the cloud shell, use `nano` or `vi` to create a file named `azure-vote.yaml` and copy in the following YAML definition:
96+
In the cloud shell, use either the `nano azure-vote.yaml` or `vi azure-vote.yaml` command to create a file named `azure-vote.yaml`. Then copy in the following YAML definition:
9797

9898
```yaml
9999
apiVersion: apps/v1

articles/aks/limit-egress-traffic.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mlearned
66

77
ms.service: container-service
88
ms.topic: article
9-
ms.date: 08/29/2019
9+
ms.date: 01/21/2020
1010
ms.author: mlearned
1111

1212
#Customer intent: As an cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
@@ -53,6 +53,7 @@ The following outbound ports / network rules are required for an AKS cluster:
5353
* TCP [IPAddrOfYourAPIServer]:443 is required if you have an app that needs to talk to the API server. This change can be set after the cluster is created.
5454
* TCP port *9000* and TCP port *22* for the tunnel front pod to communicate with the tunnel end on the API server.
5555
* To get more specific, see the **.hcp.\<location\>.azmk8s.io* and **.tun.\<location\>.azmk8s.io* addresses in the following table.
56+
* UDP port *123* for Network Time Protocol (NTP) time synchronization (Linux nodes).
5657
* UDP port *53* for DNS is also required if you have pods directly accessing the API server.
5758

5859
The following FQDN / application rules are required:
@@ -71,15 +72,15 @@ The following FQDN / application rules are required:
7172
| ntp.ubuntu.com | UDP:123 | This address is required for NTP time synchronization on Linux nodes. |
7273
| packages.microsoft.com | HTTPS:443 | This address is the Microsoft packages repository used for cached *apt-get* operations. Example packages include Moby, PowerShell, and Azure CLI. |
7374
| acs-mirror.azureedge.net | HTTPS:443 | This address is for the repository required to install required binaries like kubenet and Azure CNI. |
74-
- Azure China
75+
- Azure China 21Vianet
7576

7677
| FQDN | Port | Use |
7778
|----------------------------|-----------|----------|
7879
| *.hcp.\<location\>.cx.prod.service.azk8s.cn | HTTPS:443, TCP:22, TCP:9000 | This address is the API server endpoint. Replace *\<location\>* with the region where your AKS cluster is deployed. |
7980
| *.tun.\<location\>.cx.prod.service.azk8s.cn | HTTPS:443, TCP:22, TCP:9000 | This address is the API server endpoint. Replace *\<location\>* with the region where your AKS cluster is deployed. |
8081
| *.azk8s.cn | HTTPS:443 | This address is required to download required binaries and images|
8182
| mcr.microsoft.com | HTTPS:443 | This address is required to access images in Microsoft Container Registry (MCR). This registry contains first-party images/charts(for example, moby, etc.) required for the functioning of the cluster during upgrade and scale of the cluster |
82-
| *.cdn.mscr.io | HTTPS:443 | This address is required for MCR storage backed by the Azure content delivery network (CDN). |
83+
| *.cdn.mscr.io | HTTPS:443 | This address is required for MCR storage backed by the Azure Content Delivery Network (CDN). |
8384
| management.chinacloudapi.cn | HTTPS:443 | This address is required for Kubernetes GET/PUT operations. |
8485
| login.chinacloudapi.cn | HTTPS:443 | This address is required for Azure Active Directory authentication. |
8586
| ntp.ubuntu.com | UDP:123 | This address is required for NTP time synchronization on Linux nodes. |
@@ -93,7 +94,7 @@ The following FQDN / application rules are required:
9394
| aksrepos.azurecr.io | HTTPS:443 | This address is required to access images in Azure Container Registry (ACR). This registry contains third-party images/charts (for example, metrics server, core dns, etc.) required for the functioning of the cluster during upgrade and scale of the cluster|
9495
| *.blob.core.windows.net | HTTPS:443 | This address is the backend store for images stored in ACR. |
9596
| mcr.microsoft.com | HTTPS:443 | This address is required to access images in Microsoft Container Registry (MCR). This registry contains first-party images/charts(for example, moby, etc.) required for the functioning of the cluster during upgrade and scale of the cluster |
96-
| *.cdn.mscr.io | HTTPS:443 | This address is required for MCR storage backed by the Azure content delivery network (CDN). |
97+
| *.cdn.mscr.io | HTTPS:443 | This address is required for MCR storage backed by the Azure Content Delivery Network (CDN). |
9798
| management.usgovcloudapi.net | HTTPS:443 | This address is required for Kubernetes GET/PUT operations. |
9899
| login.microsoftonline.us | HTTPS:443 | This address is required for Azure Active Directory authentication. |
99100
| ntp.ubuntu.com | UDP:123 | This address is required for NTP time synchronization on Linux nodes. |
@@ -153,15 +154,15 @@ The following FQDN / application rules are required for AKS clusters that have t
153154
|-----------------------------------------|-----------|----------|
154155
| gov-prod-policy-data.trafficmanager.net | HTTPS:443 | This address is used for correct operation of Azure Policy. (currently in preview in AKS) |
155156
| raw.githubusercontent.com | HTTPS:443 | This address is used to pull the built-in policies from GitHub to ensure correct operation of Azure Policy. (currently in preview in AKS) |
156-
| *.gk.<location>.azmk8s.io | HTTPS:443 | Azure policy add-on talks to Gatekeeper audit endpoint running in master server to get the audit results. |
157-
| dc.services.visualstudio.com | HTTPS:443 | Azure policy add-on sends telemetry data to applications insights endpoint. |
157+
| *.gk.<location>.azmk8s.io | HTTPS:443 | Azure policy add-on that talks to Gatekeeper audit endpoint running in master server to get the audit results. |
158+
| dc.services.visualstudio.com | HTTPS:443 | Azure policy add-on that sends telemetry data to applications insights endpoint. |
158159

159160
## Required by Windows Server based nodes (in public preview) enabled
160161

161162
> [!CAUTION]
162163
> Some of the features below are in preview. The suggestions in this article are subject to change as the feature moves to public preview and future release stages.
163164
164-
The following FQDN / application rules are required for Windows server based AKS clusters:
165+
The following FQDN / application rules are required for Windows Server based AKS clusters:
165166

166167
| FQDN | Port | Use |
167168
|-----------------------------------------|-----------|----------|

articles/analysis-services/analysis-services-gateway.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: An On-premises gateway is necessary if your Analysis Services serve
44
author: minewiskan
55
ms.service: azure-analysis-services
66
ms.topic: conceptual
7-
ms.date: 01/17/2020
7+
ms.date: 01/21/2020
88
ms.author: owend
99
ms.reviewer: minewiskan
1010
---
@@ -18,11 +18,11 @@ For Azure Analysis Services, getting setup with the gateway the first time is a
1818

1919
- **Download and run setup** - This step installs a gateway service on a computer in your organization. You also sign in to Azure using an account in your [tenant's](/previous-versions/azure/azure-services/jj573650(v=azure.100)#what-is-an-azure-ad-tenant) Azure AD. Azure B2B (guest) accounts are not supported.
2020

21-
- **Register your gateway** - In this step, you specify a name and recovery key for your gateway and select a region, registering your gateway with the Gateway Cloud Service. Your gateway resource can be registered in any region, but we recommend it be in the same region as your Analysis Services servers.
21+
- **Register your gateway** - In this step, you specify a name and recovery key for your gateway and select a region, registering your gateway with the Gateway Cloud Service. Your gateway resource can be registered in any region, but it's recommended it be in the same region as your Analysis Services servers.
2222

23-
- **Create a gateway resource in Azure** - In this step, you create a gateway resource in an Azure.
23+
- **Create a gateway resource in Azure** - In this step, you create a gateway resource in Azure.
2424

25-
- **Connect your servers to your gateway resource** - Once you have a gateway resource, you can begin connecting your servers to it. You can connect multiple servers and other resources, provided they are in the same region.
25+
- **Connect your servers to your gateway resource** - Once you have a gateway resource, you can begin connecting servers to it. You can connect multiple servers and other resources provided they are in the same region.
2626

2727

2828

@@ -48,7 +48,7 @@ When installing for an Azure Analysis Services environment, it's important you f
4848

4949
The gateway creates an outbound connection to Azure Service Bus. It communicates on outbound ports: TCP 443 (default), 5671, 5672, 9350 through 9354. The gateway does not require inbound ports.
5050

51-
You may need to include IP addresses for your data region in your firewall. You can download the [Microsoft Azure Datacenter IP list](https://www.microsoft.com/download/details.aspx?id=41653). This list is updated weekly. The IP Addresses listed in the Azure Datacenter IP list are in CIDR notation. To learn more, see [Classless Inter-Domain Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).
51+
You may need to include IP addresses for your data region in your firewall. You can download the [Microsoft Azure Datacenter IP list](https://www.microsoft.com/download/details.aspx?id=56519). This list is updated weekly. The IP Addresses listed in the Azure Datacenter IP list are in CIDR notation. To learn more, see [Classless Inter-Domain Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).
5252

5353
The following are fully qualified domain names used by the gateway.
5454

articles/analysis-services/analysis-services-scale-out.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ When performing a subsequent scale-out operation, for example, increasing the nu
4545

4646
### Synchronization mode
4747

48-
By default, query replicas are rehydrated in full, not incrementally. Rehydration happens in stages. They are detached and attached two at a time (assuming there are at least three replicas) to ensure at least one replica is kept online for queries at any given time. In some cases, clients may need to reconnect to one of the online replicas while this process is taking place. By using the **ReplicaSyncMode** setting, you can now specify query replica synchronization occurs in parallel. Parallel synchronization provides the following benefits:
48+
By default, query replicas are rehydrated in full, not incrementally. Rehydration happens in stages. They are detached and attached two at a time (assuming there are at least three replicas) to ensure at least one replica is kept online for queries at any given time. In some cases, clients may need to reconnect to one of the online replicas while this process is taking place. By using the (in Preview) **ReplicaSyncMode** setting, you can now specify query replica synchronization occurs in parallel. Parallel synchronization provides the following benefits:
4949

5050
- Significant reduction in synchronization time.
5151
- Data across replicas are more likely to be consistent during the synchronization process.

articles/automation/automation-tutorial-update-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides an overview of how to use Azure Automation Up
44
services: automation
55
ms.subservice: update-management
66
ms.topic: tutorial
7-
ms.date: 12/03/2019
7+
ms.date: 01/21/2020
88
ms.custom: mvc
99
---
1010
# Manage updates and patches for your Azure VMs
@@ -135,7 +135,7 @@ Under **New update deployment**, specify the following information:
135135

136136
* **Machines to update**: Select a Saved search, Imported group, or pick Machine from the drop-down and select individual machines. If you choose **Machines**, the readiness of the machine is shown in the **UPDATE AGENT READINESS** column. To learn about the different methods of creating computer groups in Azure Monitor logs, see [Computer groups in Azure Monitor logs](../azure-monitor/platform/computer-groups.md)
137137

138-
* **Update classification**: Select the types of software that the update deployment included in the deployment. For this tutorial, leave all types selected.
138+
* **Update classification**: Select the supported update classifications available for each product that can be included in the update deployment. For this tutorial, leave all types selected.
139139

140140
The classification types are:
141141

0 commit comments

Comments
 (0)