Skip to content

Commit b1473b6

Browse files
committed
Merge branch 'main' into release-postgres-flexible
2 parents 5e3d37c + 065a71f commit b1473b6

File tree

126 files changed

+755
-450
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

126 files changed

+755
-450
lines changed

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 10 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 12/01/2023
4+
ms.date: 01/05/2024
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,15 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
1717

18+
## December 2023
19+
20+
### Updated articles
21+
22+
- [Set up a resource owner password credentials flow in Azure Active Directory B2C](add-ropc-policy.md) - Updated ROPC flow limitations
23+
- [Add user attributes and customize user input in Azure Active Directory B2C](configure-user-input.md) - Updated instructional steps
24+
- [Set up sign-up and sign-in with a Google account using Azure Active Directory B2C](identity-provider-google.md) - Editorial updates
25+
- [Localization string IDs](localization-string-ids.md) - Updated the localization string IDs
26+
1827
## November 2023
1928

2029
### Updated articles
@@ -41,25 +50,5 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
4150
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Editorial updates
4251
- [Enable JavaScript and page layout versions in Azure Active Directory B2C](javascript-and-page-layout.md) - Added breaking change on script tags
4352

44-
## September 2023
45-
46-
### Updated articles
47-
48-
- [Supported Microsoft Entra ID features](supported-azure-ad-features.md) - Editorial updates
49-
- [Publish your Azure Active Directory B2C app to the Microsoft Entra app gallery](publish-app-to-azure-ad-app-gallery.md) - Editorial updates
50-
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md) - Editorial updates
51-
- [Azure AD B2C: Frequently asked questions (FAQ)'](faq.yml) - Editorial updates
52-
- [Define an ID token hint technical profile in an Azure Active Directory B2C custom policy](id-token-hint.md) - Editorial updates
53-
- [Set up sign-in for multitenant Microsoft Entra ID using custom policies in Azure Active Directory B2C](identity-provider-azure-ad-multi-tenant.md) - Editorial updates
54-
- [Set up sign-in for a specific Microsoft Entra organization in Azure Active Directory B2C](identity-provider-azure-ad-single-tenant.md) - Editorial updates
55-
- [Localization string IDs](localization-string-ids.md) - Editorial updates
56-
- [Define a Microsoft Entra ID multifactor authentication technical profile in an Azure AD B2C custom policy](multi-factor-auth-technical-profile.md) - Editorial updates
57-
- [Define a Microsoft Entra ID SSPR technical profile in an Azure AD B2C custom policy](aad-sspr-technical-profile.md) - Editorial updates
58-
- [Define a Microsoft Entra technical profile in an Azure Active Directory B2C custom policy](active-directory-technical-profile.md) - Editorial updates
59-
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md) - Editorial updates
60-
- [Billing model for Azure Active Directory B2C](billing.md) - Editorial updates
61-
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md) - Editorial updates
62-
- [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md) - Editorial updates
63-
- [Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md) - Editorial updates
6453

6554

articles/ai-services/openai/concepts/models.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure OpenAI
44
description: Learn about the different model capabilities that are available with Azure OpenAI.
55
ms.service: azure-ai-openai
66
ms.topic: conceptual
7-
ms.date: 01/03/2024
7+
ms.date: 01/05/2024
88
ms.custom: event-tier1-build-2022, references_regions, build-2023, build-2023-dataai, refefences_regions
99
manager: nitinme
1010
author: mrbullwinkle #ChrisHMSFT
@@ -145,7 +145,7 @@ These models can only be used with Embedding API requests.
145145
146146
| Model ID | Model Availability | Max Request (tokens) | Training Data (up to) | Output Dimensions |
147147
|---|---| :---:|:---:|:---:|
148-
| `text-embedding-ada-002` (version 2) | Australia East <br> Canada East <br> East US <br> East US2 <br> France Central <br> Japan East <br> North Central US <br> South Central US <br> Sweden Central <br> Switzerland North <br> UK South <br> West Europe |8,191 | Sep 2021 | 1,536 |
148+
| `text-embedding-ada-002` (version 2) | Australia East <br> Canada East <br> East US <br> East US2 <br> France Central <br> Japan East <br> North Central US <br> Norway East <br> South Central US <br> Sweden Central <br> Switzerland North <br> UK South <br> West Europe <br> West US |8,191 | Sep 2021 | 1,536 |
149149
| `text-embedding-ada-002` (version 1) | East US <br> South Central US <br> West Europe |2,046 | Sep 2021 | 1,536 |
150150

151151
### DALL-E models (Preview)

articles/ai-services/openai/reference.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -379,9 +379,9 @@ curl -i -X POST YOUR_RESOURCE_NAME/openai/deployments/YOUR_DEPLOYMENT_NAME/exten
379379
{
380380
"type": "AzureCognitiveSearch",
381381
"parameters": {
382-
"endpoint": "'YOUR_AZURE_COGNITIVE_SEARCH_ENDPOINT'",
383-
"key": "'YOUR_AZURE_COGNITIVE_SEARCH_KEY'",
384-
"indexName": "'YOUR_AZURE_COGNITIVE_SEARCH_INDEX_NAME'"
382+
"endpoint": "YOUR_AZURE_COGNITIVE_SEARCH_ENDPOINT",
383+
"key": "YOUR_AZURE_COGNITIVE_SEARCH_KEY",
384+
"indexName": "YOUR_AZURE_COGNITIVE_SEARCH_INDEX_NAME"
385385
}
386386
}
387387
],

articles/app-service/configure-ssl-certificate.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -309,6 +309,12 @@ After the certificate renews inside your key vault, App Service automatically sy
309309
- [Azure CLI: Bind a custom TLS/SSL certificate to a web app](scripts/cli-configure-ssl-certificate.md)
310310
- [Azure PowerShell Bind a custom TLS/SSL certificate to a web app using PowerShell](scripts/powershell-configure-ssl-certificate.md)
311311

312+
#### Can I configure a private CA certificate on my app?
313+
314+
App Service has a list of Trusted Root Certificates which you cannot modify in the multi-tenant variant version of App Service, but you can load your own CA certificate in the Trusted Root Store in an App Service Environment (ASE), which is a single-tenant environment in App Service. (The Free, Basic, Standard, and Premium App Service Plans are all multi-tenant, and the Isolated Plans are single-tenant.)
315+
- [Private client certificate](environment/overview-certificates.md)
316+
317+
312318
## More resources
313319

314320
* [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md)

articles/app-service/troubleshoot-diagnostic-logs.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -219,6 +219,8 @@ The following table shows the supported log types and descriptions:
219219
220220
## Networking considerations
221221
222+
- App Service logs aren't supported using Regional VNet integration, our recommendation is to use the Diagnostic settings feature.
223+
222224
If you secure your Azure Storage account by [only allowing selected networks](../storage/common/storage-network-security.md#change-the-default-network-access-rule), it can receive logs from App Service only if both of the following are true:
223225
224226
- The Azure Storage account is in a different Azure region from the App Service app.
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: Enable virtual hardware and VM CRUD capabilities in an SCVMM machine with Arc agent installed
3+
description: Enable virtual hardware and VM CRUD capabilities in an SCVMM machine with Arc agent installed
4+
ms.topic: how-to
5+
ms.date: 01/05/2024
6+
ms.service: azure-arc
7+
ms.subservice: azure-arc-scvmm
8+
author: Farha-Bano
9+
ms.author: v-farhabano
10+
manager: jsuri
11+
ms.custom:
12+
---
13+
14+
# Enable virtual hardware and VM CRUD capabilities in an SCVMM machine with Arc agent installed
15+
16+
In this article, you learn how to enable virtual hardware management and VM CRUD operational ability on an SCVMM VM that has Arc agents installed via the Arc-enabled Servers route.
17+
18+
>[!IMPORTANT]
19+
> This article is applicable only if you've installed Arc agents directly in SCVMM machines before onboarding to Azure Arc-enabled SCVMM by deploying Arc resource bridge.
20+
21+
## Prerequisites
22+
23+
- An Azure subscription and resource group where you have *Arc ScVmm VM Administrator* role.
24+
- Your SCVMM management server instance must be [onboarded](quickstart-connect-system-center-virtual-machine-manager-to-arc.md) to Azure Arc.
25+
26+
## Enable virtual hardware management and self-service access to SCVMM VMs with Arc agent installed
27+
28+
1. From your browser, go to [Azure portal](https://portal.azure.com/).
29+
30+
1. Navigate to the Virtual machines inventory page of your SCVMM management servers. The virtual machines that have Arc agent installed via the Arc-enabled Servers route will have **Link to SCVMM management server** status under virtual hardware management.
31+
32+
1. Select **Link to SCVMM management server** to view the pane with the list of all the machines under SCVMM management server with Arc agent installed but not linked to the SCVMM management server in Azure Arc.
33+
34+
1. Choose all the machines that need to be enabled in Azure, and select **Link** to link the machines to SCVMM management server.
35+
36+
1. After you link to SCVMM management server, the virtual hardware status will reflect as **Enabled** for all the VMs, and you can perform virtual hardware operations.
37+
38+
## Next steps
39+
40+
[Set up and manage self-service access to SCVMM resources](set-up-and-manage-self-service-access-scvmm.md).
41+

articles/azure-arc/system-center-virtual-machine-manager/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@
2424
items:
2525
- name: Enable SCVMM inventory resources in Azure
2626
href: enable-scvmm-inventory-resources.md
27+
- name: Enable virtual hardware and VM CRUD capabilities in an SCVMM machine with Arc agent installed
28+
href: enable-virtual-hardware-scvmm.md
2729
- name: Use VM lifecycle and self-serve capabilities
2830
items:
2931
- name: Set up and manage self-service access to SCVMM resources

articles/azure-monitor/agents/azure-monitor-agent-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom:
1515
[Azure Monitor Agent (AMA)](./agents-overview.md) replaces the Log Analytics agent (also known as MMA and OMS) for Windows and Linux machines, in Azure and non-Azure environments, including on-premises and third-party clouds. The agent introduces a simplified, flexible method of configuring data collection using [data collection rules (DCRs)](../essentials/data-collection-rule-overview.md). This article provides guidance on how to implement a successful migration from the Log Analytics agent to Azure Monitor Agent.
1616

1717
> [!IMPORTANT]
18-
> The Log Analytics agent will be [retired on **August 31, 2024**](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). After this date, Microsoft will no longer provide any support for the Log Analytics agent. If you're currently using the Log Analytics agent with Azure Monitor or [other supported features and services](#migrate-additional-services-and-features), start planning your migration to Azure Monitor Agent by using the information in this article.
18+
> The Log Analytics agent will be [retired on **August 31, 2024**](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). After this date, Microsoft will no longer provide any support for the Log Analytics agent. If you're currently using the Log Analytics agent with Azure Monitor or [other supported features and services](#migrate-additional-services-and-features), start planning your migration to Azure Monitor Agent by using the information in this article. If you are using the Log Analytics Agent for SCOM you will need to [migrate to the SCOM Agent](../vm/scom-managed-instance-overview.md)
1919
2020
## Benefits
2121

articles/azure-monitor/app/java-standalone-sampling-overrides.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,8 @@ Span attribute names are based on the OpenTelemetry semantic conventions. (HTTP,
192192

193193
https://github.com/open-telemetry/semantic-conventions/blob/main/docs/README.md
194194

195-
To see the exact set of attributes captured by Application Insights Java for your application, set the
195+
>[!Note]
196+
> To see the exact set of attributes captured by Application Insights Java for your application, set the
196197
[self-diagnostics level to debug](./java-standalone-config.md#self-diagnostics), and look for debug messages starting
197198
with the text "exporting span".
198199

articles/azure-monitor/app/opentelemetry-add-modify.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2222,7 +2222,7 @@ Use the add [custom property example](#add-a-custom-property-to-a-span), but rep
22222222
class SpanFilteringProcessor(SpanProcessor):
22232223

22242224
# Prevents exporting spans from internal activities.
2225-
def on_start(self, span):
2225+
def on_start(self, span, parent_context):
22262226
# Check if the span is an internal activity.
22272227
if span._kind is SpanKind.INTERNAL:
22282228
# Create a new span context with the following properties:
@@ -2235,7 +2235,7 @@ Use the add [custom property example](#add-a-custom-property-to-a-span), but rep
22352235
span.context.trace_id,
22362236
span.context.span_id,
22372237
span.context.is_remote,
2238-
TraceFlags.DEFAULT,
2238+
TraceFlags(TraceFlags.DEFAULT),
22392239
span.context.trace_state,
22402240
)
22412241

0 commit comments

Comments
 (0)