Skip to content

Commit ab46746

Browse files
authored
Merge pull request #99217 from MicrosoftDocs/master
12/17 AM Publish
2 parents c378664 + fab165c commit ab46746

File tree

60 files changed

+742
-384
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+742
-384
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -555,6 +555,11 @@
555555
"redirect_url": "/azure/machine-learning",
556556
"redirect_document_id": false
557557
},
558+
{
559+
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs.md",
560+
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/publish-kb-nodejs",
561+
"redirect_document_id": false
562+
},
558563
{
559564
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-postman.md",
560565
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
@@ -24668,7 +24673,7 @@
2466824673
"source_path": "articles/storage/common/storage-security-guide.md",
2466924674
"redirect_url": "/azure/storage/blobs/security-recommendations",
2467024675
"redirect_document_id": true
24671-
},
24676+
},
2467224677
{
2467324678
"source_path": "articles/storage/storage-service-encryption-customer-managed-keys.md",
2467424679
"redirect_url": "/azure/storage/common/storage-service-encryption-customer-managed-keys",
@@ -31769,11 +31774,6 @@
3176931774
"redirect_url": "/azure/cognitive-services/QnAMaker/concepts/knowledge-base",
3177031775
"redirect_document_id": false
3177131776
},
31772-
{
31773-
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/publish-kb-nodejs.md",
31774-
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs#publish-a-knowledge-base",
31775-
"redirect_document_id": false
31776-
},
3177731777
{
3177831778
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-new-kb-nodejs.md",
3177931779
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs",

articles/active-directory-b2c/active-directory-b2c-custom-guide-eventlogger-appins.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Track user behavior with Application Insights
33
titleSuffix: Azure AD B2C
4-
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies (preview).
4+
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
@@ -29,7 +29,7 @@ When you use Azure Active Directory B2C (Azure AD B2C) together with Azure Appli
2929

3030
The Identity Experience Framework in Azure AD B2C includes the provider `Handler="Web.TPEngine.Providers.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0`. It sends event data directly to Application Insights by using the instrumentation key provided to Azure AD B2C.
3131

32-
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step`, or as a `validation technical profile` in a custom user journey.
32+
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step` in a custom user journey.
3333

3434
Application Insights can unify the events by using a correlation ID to record a user session. Application Insights makes the event and session available within seconds and presents many visualization, export, and analytical tools.
3535

articles/active-directory-b2c/custom-email.md

Lines changed: 29 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: Custom email verifications
33
titleSuffix: Azure AD B2C
4-
description: Learn how to customize email verification when customers sign up to use your Azure AD B2C-enabled applications.
4+
description: Learn how to customize the verification email sent to your customers when they sign up to use your Azure AD B2C-enabled applications.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/10/2019
12+
ms.date: 12/18/2019
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -148,6 +148,8 @@ With a SendGrid account created and SendGrid API key stored in a Azure AD B2C po
148148
```
149149

150150
1. Select **Save Template**.
151+
1. Return to the **Transactional Templates** page by selecting the back arrow.
152+
1. Record the **ID** of template you created for use in a later step. For example, `d-989077fbba9746e89f3f6411f596fb96`. You specify this ID when you [add the claims transformation](#add-the-claims-transformation).
151153

152154
## Add Azure AD B2C claim types
153155

@@ -257,7 +259,7 @@ The `GenerateOtp` technical profile generates a code for the email address. The
257259
</InputClaims>
258260
</TechnicalProfile>
259261
</TechnicalProfiles>
260-
</ClaimsProviders>
262+
</ClaimsProvider>
261263
```
262264

263265
## Add a REST API technical profile
@@ -278,7 +280,7 @@ This REST API technical profile generates the email content (using the SendGrid
278280
<Item Key="ClaimUsedForRequestPayload">sendGridReqBody</Item>
279281
</Metadata>
280282
<CryptographicKeys>
281-
<Key Id="BearerAuthenticationToken" StorageReferenceId="B2C_1A_SendGridApiKey" />
283+
<Key Id="BearerAuthenticationToken" StorageReferenceId="B2C_1A_SendGridSecret" />
282284
</CryptographicKeys>
283285
<InputClaimsTransformations>
284286
<InputClaimsTransformation ReferenceId="GenerateSendGridRequestBody" />
@@ -293,7 +295,10 @@ This REST API technical profile generates the email content (using the SendGrid
293295

294296
## Add the claims transformation
295297

296-
Add the following claims transformation to output a JSON string claim that will be the body of the request sent to SendGrid.
298+
Add the following claims transformation to output a JSON string claim that will be the body of the request sent to SendGrid. Make the following updates to the claims transformation XML:
299+
300+
* Update the `template_id` InputParameter value with the ID of the SendGrid transactional template you created earlier in [Create SendGrid template](#create-sendgrid-template).
301+
* Update the value of the `personalizations.0.dynamic_template_data.subject` subject line input parameter with a subject line appropriate for your organization.
297302

298303
The JSON object's structure is defined by the IDs in dot notation of the InputParameters and the TransformationClaimTypes of the InputClaims. Numbers in the dot notation imply arrays. The values come from the InputClaims' values and the InputParameters' "Value" properties. For more information about JSON claims transformations, see [JSON claims transformations](json-transformations.md).
299304

@@ -305,16 +310,30 @@ The JSON object's structure is defined by the IDs in dot notation of the InputPa
305310
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.email" />
306311
</InputClaims>
307312
<InputParameters>
313+
<!-- Update the template_id value with the ID of your SendGrid template. -->
308314
<InputParameter Id="template_id" DataType="string" Value="d-989077fbba9746e89f3f6411f596fb96"/>
309315
<InputParameter Id="from.email" DataType="string" Value="[email protected]"/>
310-
<InputParameter Id="personalizations.0.subject" DataType="string" Value="Contoso account email verification code"/>
316+
<!-- Update with a subject line appropriate for your organization. -->
317+
<InputParameter Id="personalizations.0.dynamic_template_data.subject" DataType="string" Value="Contoso account email verification code"/>
311318
</InputParameters>
312319
<OutputClaims>
313320
<OutputClaim ClaimTypeReferenceId="sendGridReqBody" TransformationClaimType="outputClaim"/>
314321
</OutputClaims>
315322
</ClaimsTransformation>
316323
```
317324

325+
## Add DataUri content definition
326+
327+
Add the following ContentDefinition within BuildingBlocks to reference the version 2.0.0 data URI:
328+
329+
```XML
330+
<ContentDefinitions>
331+
<ContentDefinition Id="api.localaccountsignup">
332+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
333+
</ContentDefinition>
334+
</ContentDefinitions>
335+
```
336+
318337
## Make a reference to the DisplayControl
319338

320339
In the final step, add a reference to the DisplayControl you created. Replace your existing `LocalAccountSignUpWithLogonEmail` self-asserted technical profile with the following if you used an earlier version of Azure AD B2C policy. This technical profile uses `DisplayClaims` with a reference to the DisplayControl.
@@ -335,7 +354,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
335354
</InputClaims>
336355
<DisplayClaims>
337356
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
338-
<DisplayClaim DisplayControlReferenceId="SecondaryEmailVerificationControl" />
339357
<DisplayClaim ClaimTypeReferenceId="displayName" Required="true" />
340358
<DisplayClaim ClaimTypeReferenceId="givenName" Required="true" />
341359
<DisplayClaim ClaimTypeReferenceId="surName" Required="true" />
@@ -358,4 +376,8 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
358376

359377
## Next steps
360378

379+
You can find an example of a custom email verification policy on GitHub:
380+
381+
[Custom email verification - DisplayControls](https://github.com/azure-ad-b2c/samples/tree/master/policies/custom-email-verifcation-displaycontrol)
382+
361383
For information about using a custom REST API or any HTTP-based SMTP email provider, see [Define a RESTful technical profile in an Azure AD B2C custom policy](restful-technical-profile.md).

articles/active-directory/cloud-provisioning/tutorial-pilot-aadc-aadccp.md

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -127,21 +127,6 @@ Same steps need to be followed for all object types (user, group and contact).
127127
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
128128
![Welcome screen](media/how-to-install/install4.png)</br>
129129

130-
7. Once this operation completes you should see a notice **Your was successfully verified.** You can click **Exit**.</br>
131-
![Welcome screen](media/how-to-install/install5.png)</br>
132-
8. If you still see the initial splash screen, click **Close**.1. Sign in to the server you will use with enterprise admin permissions.
133-
2. Download the Azure AD Connect cloud provisioning agent [here](https://go.microsoft.com/fwlink/?linkid=2109037).
134-
3. Run the Azure AD Connect cloud provisioning (AADConnectProvisioningAgent.Installer)
135-
3. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
136-
![Welcome screen](media/how-to-install/install1.png)</br>
137-
138-
4. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account.
139-
5. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory administrator account. This operation will add your on-premises directory. Click **Next**.</br>
140-
![Welcome screen](media/how-to-install/install3.png)</br>
141-
142-
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
143-
![Welcome screen](media/how-to-install/install4.png)</br>
144-
145130
7. Once this operation completes you should see a notice **Your was successfully verified.** You can click **Exit**.</br>
146131
![Welcome screen](media/how-to-install/install5.png)</br>
147132
8. If you still see the initial splash screen, click **Close**.

articles/aks/private-clusters.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.author: mlearned
1414

1515
In a private cluster, the Control Plane/API server will have internal IP addresses defined in [RFC1918](https://tools.ietf.org/html/rfc1918). By using a private cluster, you can ensure network traffic between your API server and your node pools remains on the private network only.
1616

17-
The communication between the control plane/API server, which is in an AKS-managed Azure subscription, and the customers cluster/node pool, which is in a customer subscription, can communicate with each other through the private link service in the API server VNET and a private endpoint exposed in the subnet of the customer AKS cluster.
17+
The communication between the control plane/API server, which is in an AKS-managed Azure subscription, and the customers cluster/node pool, which is in a customer subscription, can communicate with each other through the [private link service][private-link-service] in the API server VNET and a private endpoint exposed in the subnet of the customer AKS cluster.
1818

1919
> [!IMPORTANT]
2020
> AKS preview features are self-service opt-in. Previews are provided "as-is" and "as available" and are excluded from the service level agreements and limited warranty. AKS Previews are partially covered by customer support on best effort basis. As such, these features are not meant for production use. For additional infromation, please see the following support articles:
@@ -111,6 +111,7 @@ The API server end point has no public IP address. Consequently, users will need
111111
* Standard LB Only - no support for basic load balancer
112112

113113
## Limitations
114+
* The same [Azure Private Link service limitations][private-link-service] apply to private clusters, Azure Private Endpoints and Virtual Network service endpoints are not currently supported in the same VNET
114115
* No support for virtual nodes in a private cluster to spin private ACI instances in a private Azure VNET
115116
* No support for Azure DevOps integration out of the box with private clusters
116117
* If customers need to enable ACR to work with private AKS, then the ACR's VNET will need to be peered with the agent cluster VNET
@@ -120,8 +121,10 @@ The API server end point has no public IP address. Consequently, users will need
120121
* Azure Monitor for containers Live Data isn't currently supported
121122
* Bring your own DNS isn't currently supported
122123

124+
123125
<!-- LINKS - internal -->
124126
[az-provider-register]: /cli/azure/provider?view=azure-cli-latest#az-provider-register
125127
[az-feature-list]: /cli/azure/feature?view=azure-cli-latest#az-feature-list
126128
[az-extension-add]: /cli/azure/extension#az-extension-add
127129
[az-extension-update]: /cli/azure/extension#az-extension-update
130+
[private-link-service]: https://docs.microsoft.com/azure/private-link/private-link-service-overview

articles/aks/troubleshooting.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: sauryadas
66

77
ms.service: container-service
88
ms.topic: troubleshooting
9-
ms.date: 08/13/2018
9+
ms.date: 12/13/2019
1010
ms.author: saudas
1111
---
1212

@@ -478,3 +478,17 @@ kubectl edit secret azure-storage-account-{storage-account-name}-secret
478478
```
479479

480480
After a few minutes, the agent node will retry the azure file mount with the updated storage key.
481+
482+
### Cluster autoscaler fails to scale with error failed to fix node group sizes
483+
484+
If your cluster autoscaler is not scaling up/down and you see an error like the below on the [cluster autoscaler logs][view-master-logs].
485+
486+
```console
487+
E1114 09:58:55.367731 1 static_autoscaler.go:239] Failed to fix node group sizes: failed to decrease aks-default-35246781-vmss: attempt to delete existing nodes
488+
```
489+
490+
This error is due to an upstream cluster autoscaler race condition where the cluster autoscaler ends with a different value than the one that is actually in the cluster. To get out of this state, simply disable and re-enable the [cluster autoscaler][cluster-autoscaler].
491+
492+
<!-- LINKS - internal -->
493+
[view-master-logs]: view-master-logs.md
494+
[cluster-autoscaler]: cluster-autoscaler.md

articles/azure-monitor/platform/design-logs-deployment.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,9 @@ To learn how to change the access control mode in the portal, with PowerShell, o
124124

125125
## Ingestion volume rate limit
126126

127-
Azure Monitor is a high scale data service that serves thousands of customers sending terabytes of data each month at a growing pace. The default ingestion rate threshold is set to **500 MB/min** per workspace. If you send data at a higher rate to a single workspace, some data is dropped, and an event is sent to the *Operation* table in your workspace every 6 hours while the threshold continues to be exceeded. If your ingestion volume continues to exceed the rate limit or you are expecting to reach it sometime soon, you can request an increase to your workspace by opening a support request.
127+
Azure Monitor is a high scale data service that serves thousands of customers sending terabytes of data each month at a growing pace. The default ingestion rate threshold is set to **6 GB/min** per workspace. This is an approximate value since the actual size can vary between data types depending on the log length and its compression ratio. This limit does not apply to data that is sent from agents or [Data Collector API](data-collector-api.md).
128+
129+
If you send data at a higher rate to a single workspace, some data is dropped, and an event is sent to the *Operation* table in your workspace every 6 hours while the threshold continues to be exceeded. If your ingestion volume continues to exceed the rate limit or you are expecting to reach it sometime soon, you can request an increase to your workspace by opening a support request.
128130

129131
To be notified on such an event in your workspace, create a [log alert rule](alerts-log.md) using the following query with alert logic base on number of results grater than zero.
130132

articles/azure-resource-manager/vs-resource-groups-project-devops-pipelines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ There are several parts of this task to revise for your environment.
196196
ConnectedServiceName: '<your-connection-name>'
197197
```
198198

199-
- `subscriptionName`: Provide the target subscription ID. This property only applies to the Resource Group deployment scope and the subscription deployment scoop.
199+
- `subscriptionName`: Provide the target subscription ID. This property only applies to the Resource Group deployment scope and the subscription deployment scope.
200200

201201
- `resourceGroupName` and `location`: provide the name and location of the resource group you want to deploy to. The task creates the resource group if it doesn't exist.
202202

articles/backup/backup-configure-vault.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@ If your machine has limited internet access, ensure that firewall settings on th
5858
* 20.190.128.0/18
5959
* 40.126.0.0/18
6060

61+
Access to all of the URLs and IP addresses listed above uses the HTTPS protocol on port 443.
62+
6163
## Create a Recovery Services vault
6264

6365
A Recovery Services vault stores all the backups and recovery points you create over time, and contains the backup policy applied to backed up machines. Create a vault as follows:

articles/backup/backup-sql-server-database-azure-vms.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -226,9 +226,7 @@ To create a backup policy:
226226

227227
![Edit the log backup policy](./media/backup-azure-sql-database/log-backup-policy-editor.png)
228228

229-
13. On the **Backup policy** menu, choose whether to enable **SQL Backup Compression**.
230-
* Compression is disabled by default.
231-
* On the back end, Azure Backup uses SQL native backup compression.
229+
13. On the **Backup policy** menu, choose whether to enable **SQL Backup Compression** or not. This option is disabled by default. If enabled, SQL Server will send a compressed backup stream to the VDI. Please note that Azure Backup overrides instance level defaults with COMPRESSION / NO_COMPRESSION clause depending on the value of this control.
232230

233231
14. After you complete the edits to the backup policy, select **OK**.
234232

0 commit comments

Comments
 (0)