Skip to content

Commit af62e80

Browse files
authored
Merge pull request #125308 from ArieHein/Spelling-52
Spelling Fixes
2 parents 98da40c + 877283e commit af62e80

15 files changed

+17
-17
lines changed

articles/databox-online/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ Follow these steps to configure the network for your device.
121121

122122

123123
> [!NOTE]
124-
> We recommend that you do not switch the local IP address of the network interface from static to DCHP, unless you have another IP address to connect to the device. If using one network interface and you switch to DHCP, there would be no way to determine the DHCP address. If you want to change to a DHCP address, wait until after the device has activated with the service, and then change. You can then view the IPs of all the adapters in the **Device properties** in the Azure portal for your service.
124+
> We recommend that you do not switch the local IP address of the network interface from static to DHCP, unless you have another IP address to connect to the device. If using one network interface and you switch to DHCP, there would be no way to determine the DHCP address. If you want to change to a DHCP address, wait until after the device has activated with the service, and then change. You can then view the IPs of all the adapters in the **Device properties** in the Azure portal for your service.
125125
126126

127127
After you configure and apply the network settings, select **Next: Advanced networking** to configure compute network.

articles/databox-online/azure-stack-edge-gpu-deploy-virtual-machine-install-gpu-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -279,9 +279,9 @@ Try the new cross-platform PowerShell https://aka.ms/pscore6
279279
PS C:\WINDOWS\system32> $templateFile = "C:\12-09-2020\ExtensionTemplates\addGPUextensiontoVM.json"
280280
PS C:\WINDOWS\system32> $templateParameterFile = "C:\12-09-2020\ExtensionTemplates\addGPUExtLinuxVM.parameters.json"
281281
PS C:\WINDOWS\system32> $RGName = "rg2"
282-
PS C:\WINDOWS\system32> New-AzureRmResourceGroupDeployment -ResourceGroupName $RGName -TemplateFile $templateFile -TemplateParameterFile $templateParameterFile -Name "delpoyment7"
282+
PS C:\WINDOWS\system32> New-AzureRmResourceGroupDeployment -ResourceGroupName $RGName -TemplateFile $templateFile -TemplateParameterFile $templateParameterFile -Name "deployment7"
283283
284-
DeploymentName : delpoyment7
284+
DeploymentName : deployment7
285285
ResourceGroupName : rg2
286286
ProvisioningState : Succeeded
287287
Timestamp : 12/10/2020 10:43:23 PM

articles/databox-online/azure-stack-edge-gpu-deploy-virtual-machine-powershell-script.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ Before you begin creating and managing a VM on your Azure Stack Edge Pro device
205205
206206
Using Vnet /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/ASERG/providers/Microsoft.Network/virtualNetworks/ASEVNET
207207
208-
Creating a new Newtork Interface
208+
Creating a new Network Interface
209209
WARNING: The output object type of this cmdlet will be modified in a future release.
210210
211211
VirtualMachine :

articles/databox-online/azure-stack-edge-gpu-deploy-virtual-machine-templates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -582,7 +582,7 @@ Assign appropriate parameters in `CreateVM.parameters.json` for your Azure Stack
582582
583583
Use ASEVNET for Vnet name, ASEVNETsubNet for Subnet name, and ASERG for Vnet resource group name.
584584
585-
1. Now you’ll need a static IP address to assign to the VM that is in the subnet network defined above. Replace **PrivateIPAddress** with this address in the parameter file. To have the VM get an IP address from your local DCHP server, leave the `privateIPAddress` value blank.
585+
1. Now you’ll need a static IP address to assign to the VM that is in the subnet network defined above. Replace **PrivateIPAddress** with this address in the parameter file. To have the VM get an IP address from your local DHCP server, leave the `privateIPAddress` value blank.
586586
587587
```json
588588
"privateIPAddress": {
@@ -730,7 +730,7 @@ Assign appropriate parameters in `CreateVM.parameters.json` for your Azure Stack
730730
731731
Use ASEVNET for Vnet name, ASEVNETsubNet for Subnet name, and ASERG for Vnet resource group name.
732732
733-
1. Now you’ll need a static IP address to assign to the VM that is in the subnet network defined above. Replace **PrivateIPAddress** with this address in the parameter file. To have the VM get an IP address from your local DCHP server, leave the `privateIPAddress` value blank.
733+
1. Now you’ll need a static IP address to assign to the VM that is in the subnet network defined above. Replace **PrivateIPAddress** with this address in the parameter file. To have the VM get an IP address from your local DHCP server, leave the `privateIPAddress` value blank.
734734
735735
```json
736736
"privateIPAddress": {

articles/databox/data-box-deploy-copy-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ ms.author: shaas
2929
> [!IMPORTANT]
3030
> Azure Data Box now supports access tier assignment at the blob level. The steps contained within this tutorial reflect the updated data copy process and are specific to block blobs.
3131
>
32-
>For help with determining the appropriate access tier for your block blob data, refer to the [Determine appropriate access tiers for block blobs](#determine-appropriate-access-tiers-for-block-blobs) section. Follow the steps containined within the [Copy data to Azure Data Box](#copy-data-to-azure-data-box) section to copy your data to the appropriate access tier.
32+
>For help with determining the appropriate access tier for your block blob data, refer to the [Determine appropriate access tiers for block blobs](#determine-appropriate-access-tiers-for-block-blobs) section. Follow the steps contained within the [Copy data to Azure Data Box](#copy-data-to-azure-data-box) section to copy your data to the appropriate access tier.
3333
>
3434
> The information contained within this section applies to orders placed after April 1, 2024.
3535

articles/databox/data-box-next-gen-quickstart-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ When you receive the Data Box, perform the following steps to cable, connect, an
108108

109109
1. Connect the power cable to the device.
110110
2. Use the RJ-45 CAT 6 network cable to connect your host computer to the management port (MGMT) on the device.
111-
3. Use the QFSP28 copper cable to connect at least one 100 Gbps (preferred over 10 Gbps or 1 Gbps) network interface, DATA 1 or DATA 2 for data.
111+
3. Use the QSFP28 copper cable to connect at least one 100 Gbps (preferred over 10 Gbps or 1 Gbps) network interface, DATA 1 or DATA 2 for data.
112112
4. Turn on the device. The power button is on the front panel of the device.
113113

114114

articles/dev-box/how-to-connect-dev-box-virtual-switch.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This article provides guidance on how to set up and use dev box with virtual swi
1717
Dev box supports nested virtualization. You can create virtual machines inside a dev box and connect them to the default virtual switch *Default Switch*. If you want to create another virtual switch with internet access, set up a NAT network with an internal virtual switch. Use an IP address range that suits your required configuration.
1818

1919
> [!WARNING]
20-
> Incorrect configuration of virtual switch will cause you to lose the connection to dev box immediately and this is NOT reversable. Please setup with extreme care.
20+
> Incorrect configuration of virtual switch will cause you to lose the connection to dev box immediately and this is NOT reversible. Please setup with extreme care.
2121
2222
## Prerequisites
2323
- A dev box with Hyper-V and Virtual Machine Platform installed.

articles/dns/dns-private-resolver-get-started-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ Add or remove specific rules your DNS forwarding ruleset as desired, such as:
156156
- A wildcard rule to forward unmatched DNS queries to a protective DNS service.
157157

158158
> [!IMPORTANT]
159-
> The rules shown in this quickstart are examples of rules that can be used for specific scenarios. None of the fowarding rules described in this article are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.<br><br>
159+
> The rules shown in this quickstart are examples of rules that can be used for specific scenarios. None of the forwarding rules described in this article are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.<br><br>
160160
> **If you include a wildcard rule in your ruleset, ensure that the target DNS service can resolve public DNS names. Some Azure services have dependencies on public name resolution.**
161161
162162
### Delete a rule from the forwarding ruleset

articles/dns/dns-private-resolver-get-started-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ In this example:
250250
- 10.5.5.5 is a protective DNS service.
251251

252252
> [!IMPORTANT]
253-
> The rules shown in this quickstart are examples of rules that can be used for specific scenarios. None of the fowarding rules described in this article are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.<br><br>
253+
> The rules shown in this quickstart are examples of rules that can be used for specific scenarios. None of the forwarding rules described in this article are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.<br><br>
254254
> **If you include a wildcard rule in your ruleset, ensure that the target DNS service can resolve public DNS names. Some Azure services have dependencies on public name resolution.**
255255
256256
## Test the private resolver

articles/dns/dns-reverse-dns-for-azure-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ azure network public-ip set -n PublicIp -g MyResourceGroup -d contosoapp1 -f con
9292

9393
To update reverse DNS on a public IP address with an existing PTR:
9494

95-
```azurecli-interacgive
95+
```azurecli-interactive
9696
az network public-ip update --resource-group MyResourceGroup --name PublicIp --reverse-fqdn contosoapp1.westus.cloudapp.azure.com.
9797
```
9898

0 commit comments

Comments
 (0)