You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation-create-trust-gcp.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,14 +9,14 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: how-to
11
11
ms.workload: identity
12
-
ms.date: 07/18/2022
12
+
ms.date: 08/07/2022
13
13
ms.author: ryanwi
14
14
ms.custom: aaddev
15
15
ms.reviewer: udayh
16
16
#Customer intent: As an application developer, I want to create a trust relationship with a Google Cloud identity so my service in Google Cloud can access Azure AD protected resources without managing secrets.
17
17
---
18
18
19
-
# Access Azure AD protected resources from an app in Google Cloud (preview)
19
+
# Access Azure AD protected resources from an app in Google Cloud
20
20
21
21
Software workloads running in Google Cloud need an Azure Active Directory (Azure AD) application to authenticate and access Azure AD protected resources. A common practice is to configure that application with credentials (a secret or certificate). The credentials are used by a Google Cloud workload to request an access token from Microsoft identity platform. These credentials pose a security risk and have to be stored securely and rotated regularly. You also run the risk of service downtime if the credentials expire.
Copy file name to clipboardExpand all lines: articles/api-management/self-hosted-gateway-migration-guide.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,6 +103,15 @@ securityContext:
103
103
> [!WARNING]
104
104
> Running the self-hosted gateway with read-only filesystem (`readOnlyRootFilesystem: true`) is not supported.
105
105
106
+
## Assessing impact with Azure Advisor
107
+
108
+
In order to make the migration easier, we have introduced new Azure Advisor recommendations:
109
+
110
+
- **Use self-hosted gateway v2** recommendation - Identifies Azure API Management instances where the usage of self-hosted gateway v0.x or v1.x was identified.
111
+
- **Use Configuration API v2 for self-hosted gateways** recommendation - Identifies Azure API Management instances where the usage of Configuration API v1 for self-hosted gateway was identified.
112
+
113
+
We highly recommend customers to use ["All Recommendations" overview in Azure Advisor](https://portal.azure.com/#view/Microsoft_Azure_Expert/AdvisorMenuBlade/~/All) to determine if a migration is required. Use the filtering options to see if one of the above recommendations is present.
114
+
106
115
## Known limitations
107
116
108
117
Here's a list of known limitations for the self-hosted gateway v2:
Copy file name to clipboardExpand all lines: articles/api-management/self-hosted-gateway-overview.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -214,6 +214,7 @@ As of v2.1.1 and above, you can manage the ciphers that are being used through t
214
214
215
215
## Next steps
216
216
217
+
- Learn more about the various gateways in our [API gateway overview](api-management-gateways-overview.md)
217
218
- Learn more about [API Management in a Hybrid and Multi-Cloud World](https://aka.ms/hybrid-and-multi-cloud-api-management)
218
219
- Learn more about guidance for [running the self-hosted gateway on Kubernetes in production](how-to-self-hosted-gateway-on-kubernetes-in-production.md)
219
220
-[Deploy self-hosted gateway to Docker](how-to-deploy-self-hosted-gateway-docker.md)
| Virtual machines, scale sets |[Virtual machine extension](./azure-monitor-agent-manage.md#virtual-machine-extension-details)| Installs the agent by using Azure extension framework. |
43
43
| On-premises servers (Azure Arc-enabled servers) |[Virtual machine extension](./azure-monitor-agent-manage.md#virtual-machine-extension-details) (after installing the [Azure Arc agent](../../azure-arc/servers/deployment-options.md)) | Installs the agent by using Azure extension framework, provided for on-premises by first installing [Azure Arc agent](../../azure-arc/servers/deployment-options.md). |
44
-
| Windows 10, 11 desktops, workstations |[Client installer (preview)](./azure-monitor-agent-windows-client.md)| Installs the agent by using a Windows MSI installer. |
45
-
| Windows 10, 11 laptops |[Client installer (preview)](./azure-monitor-agent-windows-client.md)| Installs the agent by using a Windows MSI installer. The installer works on laptops, but the agent *isn't optimized yet* for battery or network consumption. |
44
+
| Windows 10, 11 desktops, workstations |[Client installer (Public preview)](./azure-monitor-agent-windows-client.md)| Installs the agent by using a Windows MSI installer. |
45
+
| Windows 10, 11 laptops |[Client installer (Public preview)](./azure-monitor-agent-windows-client.md)| Installs the agent by using a Windows MSI installer. The installer works on laptops, but the agent *isn't optimized yet* for battery or network consumption. |
46
46
47
47
1. Define a data collection rule and associate the resource to the rule.
48
48
49
49
The table below lists the types of data you can currently collect with the Azure Monitor Agent and where you can send that data.
50
50
51
51
| Data source | Destinations | Description |
52
52
|:---|:---|:---|
53
-
| Performance | Azure Monitor Metrics (preview)<sup>1</sup> - Insights.virtualmachine namespace<br>Log Analytics workspace - [Perf](/azure/azure-monitor/reference/tables/perf) table | Numerical values measuring performance of different aspects of operating system and workloads |
53
+
| Performance | Azure Monitor Metrics (Public preview)<sup>1</sup> - Insights.virtualmachine namespace<br>Log Analytics workspace - [Perf](/azure/azure-monitor/reference/tables/perf) table | Numerical values measuring performance of different aspects of operating system and workloads |
54
54
| Windows event logs | Log Analytics workspace - [Event](/azure/azure-monitor/reference/tables/Event) table | Information sent to the Windows event logging system |
55
55
| Syslog | Log Analytics workspace - [Syslog](/azure/azure-monitor/reference/tables/syslog)<sup>2</sup> table | Information sent to the Linux event logging system |
56
56
| Text logs | Log Analytics workspace - custom table | Events sent to log file on agent machine |
@@ -64,7 +64,7 @@ Azure Monitor Agent currently supports these Azure Monitor features:
64
64
65
65
| Azure Monitor feature | Current support | Other extensions installed | More information |
66
66
| :--- | :--- | :--- | :--- |
67
-
| Text logs and Windows IIS logs | Public preview | None |[Collect text logs with Azure Monitor Agent (preview)](data-collection-text-log.md)|
67
+
| Text logs and Windows IIS logs | Public preview | None |[Collect text logs with Azure Monitor Agent (Public preview)](data-collection-text-log.md)|
68
68
| Windows client installer | Public preview | None |[Set up Azure Monitor Agent on Windows client devices](azure-monitor-agent-windows-client.md)|
69
69
|[VM insights](../vm/vminsights-overview.md)| Preview | Dependency Agent extension, if you’re using the Map Services feature |[Sign-up link](https://aka.ms/amadcr-privatepreviews)|
70
70
@@ -75,7 +75,7 @@ Azure Monitor Agent currently supports these Azure services:
|[Microsoft Sentinel](../../sentinel/overview.md)| <ul><li>Windows DNS logs: Preview</li><li>Linux Syslog CEF: Preview</li><li>Windows Forwarding Event (WEF): [Public preview](../../sentinel/data-connectors-reference.md#windows-forwarded-events-preview)</li><li>Windows Security Events: [Generally available](../../sentinel/connect-windows-security-events.md?tabs=AMA)</li></ul> | Sentinel DNS extension, if you’re collecting DNS logs. For all other data types, you just need the Azure Monitor Agent extension. | <ul><li>[Sign-up link for Windows DNS logs](https://aka.ms/AMAgent)</li><li>[Sign-up link for Linux Syslog CEF](https://aka.ms/AMAgent)</li><li>No sign-up needed for Windows Forwarding Event (WEF) and Windows Security Events</li></ul> |
77
77
|[Change Tracking](../../automation/change-tracking/overview.md) (part of Defender) | Supported as File Integrity Monitoring in the Microsoft Defender for Cloud: Preview. | Change Tracking extension |[Sign-up link](https://aka.ms/AMAgent)|
78
-
|[Update Management](../../automation/update-management/overview.md) (available without Azure Monitor Agent) | Use Update Management v2 - Public preview | None |[Update management center (preview) documentation](/azure/update-center/)|
78
+
|[Update Management](../../automation/update-management/overview.md) (available without Azure Monitor Agent) | Use Update Management v2 - Public preview | None |[Update management center (Public preview) documentation](/azure/update-center/)|
@@ -109,7 +109,7 @@ If the machine connects through a proxy server to communicate over the internet,
109
109
The Azure Monitor Agent extensions for Windows and Linux can communicate either through a proxy server or a [Log Analytics gateway](./gateway.md) to Azure Monitor by using the HTTPS protocol. Use it for Azure virtual machines, Azure virtual machine scale sets, and Azure Arc for servers. Use the extensions settings for configuration as described in the following steps. Both anonymous and basic authentication by using a username and password are supported.
110
110
111
111
> [!IMPORTANT]
112
-
> Proxy configuration is not supported for [Azure Monitor Metrics (preview)](../essentials/metrics-custom-overview.md) as a destination. If you're sending metrics to this destination, it will use the public internet without any proxy.
112
+
> Proxy configuration is not supported for [Azure Monitor Metrics (Public preview)](../essentials/metrics-custom-overview.md) as a destination. If you're sending metrics to this destination, it will use the public internet without any proxy.
113
113
114
114
1. Use this flowchart to determine the values of the *`Settings` and `ProtectedSettings` parameters first.
115
115
@@ -184,12 +184,12 @@ The tables below provide a comparison of Azure Monitor Agent with the legacy the
184
184
|| Azure | X | X | X |
185
185
|| Other cloud (Azure Arc) | X | X ||
186
186
|| On-premises (Azure Arc) | X | X ||
187
-
|| Windows Client OS | X (Preview) |||
187
+
|| Windows Client OS | X (Public preview) |||
188
188
|**Data collected**|||||
189
189
|| Event Logs | X | X | X |
190
190
|| Performance | X | X | X |
191
-
|| File based logs | X (Preview) | X | X |
192
-
|| IIS logs | X (Preview) | X | X |
191
+
|| File based logs | X (Public preview) | X | X |
192
+
|| IIS logs | X (Public preview) | X | X |
193
193
|| ETW events ||| X |
194
194
|| .NET app logs ||| X |
195
195
|| Crash dumps ||| X |
@@ -201,7 +201,7 @@ The tables below provide a comparison of Azure Monitor Agent with the legacy the
201
201
|| Event Hub ||| X |
202
202
|**Services and features supported**|||||
203
203
|| Microsoft Sentinel | X ([View scope](#supported-services-and-features)) | X ||
204
-
|| VM Insights || X (Preview) ||
204
+
|| VM Insights || X (Public preview) ||
205
205
|| Azure Automation || X ||
206
206
|| Microsoft Defender for Cloud || X ||
207
207
@@ -216,16 +216,16 @@ The tables below provide a comparison of Azure Monitor Agent with the legacy the
216
216
|**Data collected**||||||
217
217
|| Syslog | X | X | X ||
218
218
|| Performance | X | X | X | X |
219
-
|| File based logs | X (Preview) ||||
219
+
|| File based logs | X (Public preview) ||||
220
220
|**Data sent to**||||||
221
221
|| Azure Monitor Logs | X | X |||
222
222
|| Azure Monitor Metrics<sup>1</sup> | X ||| X |
223
223
|| Azure Storage ||| X ||
224
224
|| Event Hub ||| X ||
225
225
|**Services and features supported**||||||
226
226
|| Microsoft Sentinel | X ([View scope](#supported-services-and-features)) | X |||
227
-
|| VM Insights | X (Preview) | X |||
228
-
|| Container Insights | X (Preview) | X |||
227
+
|| VM Insights | X (Public preview) | X |||
228
+
|| Container Insights | X (Public preview) | X |||
229
229
|| Azure Automation || X |||
230
230
|| Microsoft Defender for Cloud || X |||
231
231
@@ -258,7 +258,7 @@ The following tables list the operating systems that Azure Monitor Agent and the
258
258
| Azure Stack HCI || X ||
259
259
260
260
<sup>1</sup> Running the OS on server hardware, for example, machines that are always connected, always turned on, and not running other workloads (PC, office, browser)<br>
261
-
<sup>2</sup> Using the Azure Monitor agent [client installer (preview)](./azure-monitor-agent-windows-client.md)
261
+
<sup>2</sup> Using the Azure Monitor agent [client installer (Public preview)](./azure-monitor-agent-windows-client.md)
Copy file name to clipboardExpand all lines: articles/azure-video-indexer/accounts-overview.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,12 +16,13 @@ Classic and ARM (Azure Resource Manager) are both paid accounts with similar dat
16
16
Going forward, ARM account support more Azure native features and integrations such as: Azure Monitor, Private endpoints, Service tag and CMK (Customer managed key).
17
17
**The recommended paid account type is the ARM-based account**
Copy file name to clipboardExpand all lines: articles/cognitive-services/Speech-Service/includes/release-notes/release-notes-tts.md
+30Lines changed: 30 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,36 @@ ms.topic: include
5
5
ms.date: 01/24/2022
6
6
ms.author: eur
7
7
---
8
+
### 2022-July release
9
+
10
+
#### Prebuilt Neural TTS Voice
11
+
12
+
* Added 5 new voices of `zh-CN` Chinese (Mandarin, Simplified) and 1 new voice of `en-US` English (United States) in Public Preview. See [full language and voice list](../../language-support.md#prebuilt-neural-voices).
| Chinese (Mandarin, Simplified) |`zh-CN`| Female |`zh-CN-XiaomengNeural` <sup>New</sup> | General, multiple styles available [using SSML](../../speech-synthesis-markup.md#adjust-speaking-styles)|
17
+
| Chinese (Mandarin, Simplified) |`zh-CN`| Female |`zh-CN-XiaoyiNeural` <sup>New</sup> | General, multiple styles available [using SSML](../../speech-synthesis-markup.md#adjust-speaking-styles)|
18
+
| Chinese (Mandarin, Simplified) |`zh-CN`| Female |`zh-CN-XiaozhenNeural` <sup>New</sup> | General, multiple styles available [using SSML](../../speech-synthesis-markup.md#adjust-speaking-styles)|
19
+
| Chinese (Mandarin, Simplified) |`zh-CN`| Male |`zh-CN-YunxiaNeural` <sup>New</sup> | General, multiple styles available [using SSML](../../speech-synthesis-markup.md#adjust-speaking-styles)|
20
+
| Chinese (Mandarin, Simplified) |`zh-CN`| Male |`zh-CN-YunzeNeural` <sup>New</sup> | General, multiple styles available [using SSML](../../speech-synthesis-markup.md#adjust-speaking-styles)|
21
+
| English (United States) |`en-US`| Male |`en-US-RogerNeural` <sup>New</sup> | General|
22
+
23
+
* Supported styles and roles for the added neural voices.
* Added support for blend shapes to drive the facial movements of a 3D character that you designed. Learn more at [how to get facial position with viseme](../../how-to-speech-synthesis-viseme.md).
36
+
* SSML updated to support viseme element. See [speech synthesis markup](../../speech-synthesis-markup.md#viseme-element).
Copy file name to clipboardExpand all lines: articles/container-apps/managed-identity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -125,7 +125,7 @@ First, you'll need to create a user-assigned identity resource.
125
125
126
126
Note the `id` property of the new identity.
127
127
128
-
1. Run the `az containerapps identity assign` command to assign the identity to the app. The identities parameter is a space separated list.
128
+
1. Run the `az containerapp identity assign` command to assign the identity to the app. The identities parameter is a space separated list.
129
129
130
130
```azurecli
131
131
az containerapp identity assign --resource-group <GROUP_NAME> --name <APP_NAME> \
@@ -289,7 +289,7 @@ For more information on the REST endpoint, see [REST endpoint reference](#rest-e
289
289
You can show the system-assigned and user-assigned managed identities using the following Azure CLI command. The output will show the managed identity type, tenant IDs and principal IDs of all managed identities assigned to your container app.
290
290
291
291
```azurecli
292
-
az containerapps identity show --name <APP_NAME> --resource-group <GROUP_NAME>
292
+
az containerapp identity show --name <APP_NAME> --resource-group <GROUP_NAME>
>- If want to use the public Azure integration runtime to connect to your Blob storage by leveraging the **Allow trusted Microsoft services to access this storage account** option enabled on Azure Storage firewall, you must use [managed identity authentication](#managed-identity).
90
+
>- If want to use the public Azure integration runtime to connect to your Blob storage by leveraging the **Allow trusted Microsoft services to access this storage account** option enabled on Azure Storage firewall, you must use [managed identity authentication](#managed-identity). For more information about the Azure Storage firewalls settings, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md).
91
91
>- When you use PolyBase or COPY statement to load data into Azure Synapse Analytics, if your source or staging Blob storage is configured with an Azure Virtual Network endpoint, you must use managed identity authentication as required by Azure Synapse. See the [Managed identity authentication](#managed-identity) section for more configuration prerequisites.
>- If want to use the public Azure integration runtime to connect to the Data Lake Storage Gen2 by leveraging the **Allow trusted Microsoft services to access this storage account** option enabled on Azure Storage firewall, you must use [managed identity authentication](#managed-identity).
89
+
>- If want to use the public Azure integration runtime to connect to the Data Lake Storage Gen2 by leveraging the **Allow trusted Microsoft services to access this storage account** option enabled on Azure Storage firewall, you must use [managed identity authentication](#managed-identity). For more information about the Azure Storage firewalls settings, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md).
90
90
>- When you use PolyBase or COPY statement to load data into Azure Synapse Analytics, if your source or staging Data Lake Storage Gen2 is configured with an Azure Virtual Network endpoint, you must use managed identity authentication as required by Azure Synapse. See the [managed identity authentication](#managed-identity) section with more configuration prerequisites.
0 commit comments