Skip to content

Commit aa4f5e2

Browse files
authored
Merge pull request #269367 from MeeraDi/validation-0318
Bulk update: Global effort to fix validation errors
2 parents 680e090 + d822361 commit aa4f5e2

9 files changed

+19
-17
lines changed

articles/hdinsight-aks/flink/change-data-capture-connectors-for-apache-flink.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The SQLServer CDC connector is a Flink source connector, which reads database sn
2828

2929
### Single Thread Reading
3030

31-
The SQLServer CDC source can’t work in parallel reading, because there's only one task, which can receive change events. For more information, refer [SQLServer CDC Connector](https://ververica.github.io/flink-cdc-connectors/master/content/connectors/sqlserver-cdc.html).
31+
The SQLServer CDC source can’t work in parallel reading, because there's only one task, which can receive change events. For more information, refer [SQLServer CDC Connector](https://github.com/apache/flink-cdc).
3232

3333
### DataStream Source
3434

articles/hdinsight-aks/flink/monitor-changes-postgres-table-flink.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,5 +160,5 @@ Now, let's learn how to monitor changes on PostgreSQL table using Flink-SQL CDC.
160160
### Reference
161161
162162
- [Apache Flink Website](https://flink.apache.org/)
163-
- [PostgreSQL CDC Connector](https://ververica.github.io/flink-cdc-connectors/release-2.1/content/connectors/postgres-cdc.html) is licensed under [Apache 2.0 License](https://github.com/ververica/flink-cdc-connectors/blob/master/LICENSE)
163+
- [PostgreSQL CDC Connector](https://github.com/apache/flink-cdc) is licensed under [Apache 2.0 License](https://github.com/ververica/flink-cdc-connectors/blob/master/LICENSE)
164164
- Apache, Apache Flink, Flink, and associated open source project names are [trademarks](../trademarks.md) of the [Apache Software Foundation](https://www.apache.org/) (ASF).

articles/hdinsight-aks/flink/sink-sql-server-table-using-flink-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,5 +170,5 @@ Monitor the table on Flink SQL
170170

171171

172172
### Reference
173-
* [SQLServer CDC Connector](https://ververica.github.io/flink-cdc-connectors/master/content/connectors/sqlserver-cdc.html) is licensed under [Apache 2.0 License](https://github.com/ververica/flink-cdc-connectors/blob/master/LICENSE)
173+
* [SQLServer CDC Connector](https://github.com/apache/flink-cdc) is licensed under [Apache 2.0 License](https://github.com/ververica/flink-cdc-connectors/blob/master/LICENSE)
174174
* Apache, Apache Flink, Flink, and associated open source project names are [trademarks](../trademarks.md) of the [Apache Software Foundation](https://www.apache.org/) (ASF).

articles/openshift/howto-update-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,4 +28,4 @@ where:
2828
Running this command restarts worker machines and updates the cluster certificates, setting the cluster to a known, proper state.
2929

3030
> [!NOTE]
31-
> Certificates for custom domains need to be updated manually. For more information, see the [Red Hat OpenShift documentation](https://docs.openshift.com/rosa/rosa_install_access_delete_clusters/rosa_getting_started_iam/rosa-getting-started-workflow.html).
31+
> Certificates for custom domains need to be updated manually. For more information, see the [Red Hat OpenShift documentation](https://docs.openshift.com).

articles/operator-nexus/howto-run-instance-readiness-testing.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,9 @@ You can provide the network information in a `networks-blueprint.yml` file, simi
143143
## One time setup
144144

145145
### Download IRT
146-
IRT is distributed via tarball from the release section of the [nexus-samples](https://aka.ms/nexus-irt) GitHub repo.
146+
147+
IRT is distributed via tarball from the release section of the nexus-samples GitHub repo.
148+
147149
1. Find the release package marked with 'Latest', download it, extract it, and navigate to the `irt` directory.
148150
1. Extract the tarball to the local file system: `mkdir -p irt && tar xf nexus-irt.tar.gz --directory ./irt`.
149151
1. Switch to the new directory `cd irt`.

articles/sentinel/data-connectors/flare.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.author: cwatson
1818
| --- | --- |
1919
| **Log Analytics table(s)** | Firework_CL<br/> |
2020
| **Data collection rules support** | Not currently supported |
21-
| **Supported by** | [Flare](https://flare.io/contact/) |
21+
| **Supported by** | [Flare](https://flare.io/) |
2222

2323
## Query samples
2424

articles/sentinel/data-connectors/vmware-carbon-black-cloud-using-azure-functions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ The [VMware Carbon Black Cloud](https://www.vmware.com/products/carbon-black-clo
1717
| Connector attribute | Description |
1818
| --- | --- |
1919
| **Application settings** | apiId<br/>apiKey<br/>workspaceID<br/>workspaceKey<br/>uri<br/>timeInterval<br/>CarbonBlackOrgKey<br/>CarbonBlackLogTypes<br/>s3BucketName<br/>EventPrefixFolderName<br/>AlertPrefixFolderName<br/>AWSAccessKeyId<br/>AWSSecretAccessKey<br/>SIEMapiId (Optional)<br/>SIEMapiKey (Optional)<br/>logAnalyticsUri (optional) |
20-
| **Azure function app code** | https://aka.ms/sentinelcarbonblackazurefunctioncode |
20+
| **Azure function app code** | Download: https://aka.ms/sentinelcarbonblackazurefunctioncode |
2121
| **Log Analytics table(s)** | CarbonBlackEvents_CL<br/> CarbonBlackAuditLogs_CL<br/> CarbonBlackNotifications_CL<br/> |
2222
| **Data collection rules support** | Not currently supported |
2323
| **Supported by** | [Microsoft](https://support.microsoft.com/) |
@@ -87,7 +87,7 @@ To integrate with VMware Carbon Black Cloud (using Azure Functions) make sure yo
8787

8888
Option 1 - Azure Resource Manager (ARM) Template
8989

90-
This method provides an automated deployment of the VMware Carbon Black connector using an ARM Tempate.
90+
This method provides an automated deployment of the VMware Carbon Black connector using an ARM Template.
9191

9292
1. Click the **Deploy to Azure** button below.
9393

@@ -96,7 +96,7 @@ This method provides an automated deployment of the VMware Carbon Black connecto
9696
3. Enter the **Workspace ID**, **Workspace Key**, **Log Types**, **API ID(s)**, **API Key(s)**, **Carbon Black Org Key**, **S3 Bucket Name**, **AWS Access Key Id**, **AWS Secret Access Key**, **EventPrefixFolderName**,**AlertPrefixFolderName**, and validate the **URI**.
9797
> - Enter the URI that corresponds to your region. The complete list of API URLs can be [found here](https://community.carbonblack.com/t5/Knowledge-Base/PSC-What-URLs-are-used-to-access-the-APIs/ta-p/67346)
9898
- The default **Time Interval** is set to pull the last five (5) minutes of data. If the time interval needs to be modified, it is recommended to change the Function App Timer Trigger accordingly (in the function.json file, post deployment) to prevent overlapping data ingestion.
99-
- Carbon Black requires a seperate set of API ID/Keys to ingest Notification alerts. Enter the SIEM API ID/Key values or leave blank, if not required.
99+
- Carbon Black requires a separate set of API ID/Keys to ingest Notification alerts. Enter the SIEM API ID/Key values or leave blank, if not required.
100100
> - Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.
101101
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
102102
5. Click **Purchase** to deploy.
@@ -108,10 +108,10 @@ Use the following step-by-step instructions to deploy the VMware Carbon Black co
108108

109109
**1. Create a Function App**
110110

111-
1. From the Azure Portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp), and select **+ Add**.
111+
1. From the Azure portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp), and select **+ Add**.
112112
2. In the **Basics** tab, ensure Runtime stack is set to **Powershell Core**.
113113
3. In the **Hosting** tab, ensure the **Consumption (Serverless)** plan type is selected.
114-
4. Make other preferrable configuration changes, if needed, then click **Create**.
114+
4. Make other preferable configuration changes, if needed, then click **Create**.
115115

116116

117117
**2. Import Function App Code**
@@ -120,7 +120,7 @@ Use the following step-by-step instructions to deploy the VMware Carbon Black co
120120
2. Select **Timer Trigger**.
121121
3. Enter a unique Function **Name** and modify the cron schedule, if needed. The default value is set to run the Function App every 5 minutes. (Note: the Timer trigger should match the `timeInterval` value below to prevent overlapping data), click **Create**.
122122
4. Click on **Code + Test** on the left pane.
123-
5. Copy the [Function App Code]((https://aka.ms/sentinelcarbonblackazurefunctioncode) and paste into the Function App `run.ps1` editor.
123+
5. Copy the Function App Code from the downloaded - https://aka.ms/sentinelcarbonblackazurefunctioncode and paste into the Function App `run.ps1` editor.
124124
5. Click **Save**.
125125

126126

articles/sentinel/sentinel-solution.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,19 @@ ms.collection:
1313

1414
[!INCLUDE [zero-trust-principles](../../includes/security/zero-trust-principles.md)]
1515

16-
This article describes how to use the Microsoft Sentinel **Zero Trust (TIC 3.0)** solution, which helps governance and compliance teams monitor and respond to Zero Trust requirements according to the [TRUSTED INTERNET CONNECTIONS (TIC) 3.0](https://www.cisa.gov/tic) initiative.
16+
This article describes how to use the Microsoft Sentinel **Zero Trust (TIC 3.0)** solution, which helps governance and compliance teams monitor and respond to Zero Trust requirements according to the [TRUSTED INTERNET CONNECTIONS (TIC) 3.0](https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic) initiative.
1717

1818
[Microsoft Sentinel solutions](sentinel-solutions.md) are sets of bundled content, pre-configured for a specific set of data. The **Zero Trust (TIC 3.0)** solution includes a workbook, analytics rules, and a playbook, which provide an automated visualization of Zero Trust principles, cross-walked to the Trust Internet Connections framework, helping organizations to monitor configurations over time.
1919

2020
## The Zero Trust solution and the TIC 3.0 framework
2121

22-
Zero Trust and TIC 3.0 are not the same, but they share many common themes and together provide a common story. The Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** offers detailed crosswalks between Microsoft Sentinel and the Zero Trust model with the TIC 3.0 framework. These crosswalks help users to better understand the overlaps between the two.
22+
Zero Trust and TIC 3.0 aren't the same, but they share many common themes and together provide a common story. The Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** offers detailed crosswalks between Microsoft Sentinel and the Zero Trust model with the TIC 3.0 framework. These crosswalks help users to better understand the overlaps between the two.
2323

24-
While the Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** provides best practice guidance, Microsoft does not guarantee nor imply compliance. All Trusted Internet Connection (TIC) requirements, validations, and controls are governed by the [Cybersecurity & Infrastructure Security Agency](https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic).
24+
While the Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** provides best practice guidance, Microsoft doesn't guarantee nor imply compliance. All Trusted Internet Connection (TIC) requirements, validations, and controls are governed by the [Cybersecurity & Infrastructure Security Agency](https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic).
2525

2626
The **Zero Trust (TIC 3.0)** solution provides visibility and situational awareness for control requirements delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user, and some panes may require additional configurations and query modification for operation.
2727

28-
Recommendations do not imply coverage of respective controls, as they are often one of several courses of action for approaching requirements, which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective control requirements.
28+
Recommendations don't imply coverage of respective controls, as they're often one of several courses of action for approaching requirements, which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective control requirements.
2929

3030
The Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** is useful for any of the following users and use cases:
3131

articles/virtual-machines/workloads/redhat/redhat-in-place-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Instructions for an in-place upgrade from Red Hat Enterprise Linux 8 VMs to Red
3636
Instructions for an in-place upgrade from Red Hat Enterprise Linux 7 SAP VMs to Red Hat Enterprise Linux 8 SAP VMs on Azure is provided at the [Red Hat upgrading from RHEL 7 SAP to RHEL 8 SAP documentation here.](https://access.redhat.com/solutions/5154031)
3737

3838
## Upgrade SAP environments from RHEL 8 VMs to RHEL 9 VMs
39-
Instructions for an in-place upgrade from Red Hat Enterprise Linux 8 SAP VMs to Red Hat Enterprise Linux 9 SAP VMs on Azure is provided at the [Red Hat upgrading from RHEL 8 SAP to RHEL 9 SAP documentation here.](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux_for_sap_solutions/9/html/upgrading_sap_environments_from_rhel_8_to_rhel_9/asmb_supported-upgrade-paths_how-to-in-place-upgrade-sap-environments-from-rhel8-to-rhel9)
39+
Instructions for an in-place upgrade from Red Hat Enterprise Linux 8 SAP VMs to Red Hat Enterprise Linux 9 SAP VMs on Azure is provided at the [Red Hat upgrading from RHEL 8 SAP to RHEL 9 SAP documentation here.](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux_for_sap_solutions/9/html/upgrading_sap_environments_from_rhel_8_to_rhel_9/index)
4040

4141

4242

0 commit comments

Comments
 (0)