Skip to content

Commit bd9cc2e

Browse files
authored
Merge pull request #209852 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 2327641 + 5b9a36a commit bd9cc2e

File tree

16 files changed

+66
-67
lines changed

16 files changed

+66
-67
lines changed

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@ Under the project root folder, create a *config.json* file, and then add to it t
443443
```json
444444
{
445445
"credentials": {
446-
"tenantName": "<your-tenant-name>",
446+
"tenantName": "<your-tenant-name>.onmicrosoft.com",
447447
"clientID": "<your-webapi-application-ID>",
448448
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
449449
},
@@ -470,7 +470,7 @@ In the *config.json* file, update the following properties:
470470

471471
|Section |Key |Value |
472472
|---------|---------|---------|
473-
| credentials | tenantName | The first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `contoso`).|
473+
| credentials | tenantName | Your Azure AD B2C [tenant name/domain name](tenant-management.md#get-your-tenant-name) (for example, `contoso.onmicrosoft.com`).|
474474
| credentials |clientID | The web API application ID. In the [preceding diagram](#app-registration-overview), it's the application with *App ID: 2*. To learn how to get your web API application registration ID, see [Prerequisites](#prerequisites). |
475475
| credentials | issuer| The token issuer `iss` claim value. By default, Azure AD B2C returns the token in the following format: `https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/`. Replace `<your-tenant-name>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). Replace `<your-tenant-ID>` with your [Azure AD B2C tenant ID](tenant-management.md#get-your-tenant-id). |
476476
| policies | policyName | The user flows, or custom policy. To learn how to get your user flow or policy, see [Prerequisites](#prerequisites).|

articles/automanage/tutorial-create-assignment-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ client.configuration_profile_assignments.create_or_update(
130130
"default", rg, vm, assignment)
131131
```
132132

133-
Run the python file:
133+
Run the Python file:
134134

135135
`python app.py`
136136

articles/azure-cache-for-redis/cache-troubleshoot-timeouts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Monitor how your `ThreadPool` statistics change over time using [an example `Thr
5050
In the preceding exception, there are several issues that are interesting:
5151

5252
- Notice that in the `IOCP` section and the `WORKER` section you have a `Busy` value that is greater than the `Min` value. This difference means your `ThreadPool` settings need adjusting.
53-
- You can also see `in: 64221`. This value indicates that 64,211 bytes have been received at the client's kernel socket layer but haven't been read by the application. This difference typically means that your application (for example, StackExchange.Redis) isn't reading data from the network as quickly as the server is sending it to you.
53+
- You can also see `in: 64221`. This value indicates that 64,221 bytes have been received at the client's kernel socket layer but haven't been read by the application. This difference typically means that your application (for example, StackExchange.Redis) isn't reading data from the network as quickly as the server is sending it to you.
5454

5555
You can [configure your `ThreadPool` Settings](cache-management-faq.yml#important-details-about-threadpool-growth) to make sure that your thread pool scales up quickly under burst scenarios.
5656

articles/azure-resource-manager/bicep/deploy-what-if.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -407,7 +407,7 @@ You can use the what-if operation through the Azure SDKs.
407407

408408
* For Python, use [what-if](/python/api/azure-mgmt-resource/azure.mgmt.resource.resources.v2019_10_01.operations.deploymentsoperations#what-if-resource-group-name--deployment-name--properties--location-none--custom-headers-none--raw-false--polling-true----operation-config-).
409409

410-
* For Java, use [DeploymentWhatIf Class](/java/api/com.microsoft.azure.management.resources.deploymentwhatif).
410+
* For Java, use [DeploymentWhatIf Class](/java/api/com.azure.resourcemanager.resources.models.deploymentwhatif).
411411

412412
* For .NET, use [DeploymentWhatIf Class](/dotnet/api/microsoft.azure.management.resourcemanager.models.deploymentwhatif).
413413

articles/container-instances/container-instances-managed-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ spID=$(az identity show \
102102
resourceID=$(az identity show \
103103
--resource-group myResourceGroup \
104104
--name myACIId \
105-
--query id --output none)
105+
--query id --output tsv)
106106
```
107107

108108
### Grant user-assigned identity access to the key vault
@@ -172,7 +172,7 @@ az container exec \
172172
Run the following commands in the bash shell in the container. To get an access token to use Azure Active Directory to authenticate to key vault, run the following command:
173173

174174
```bash
175-
client_id="CLIENT ID (xxxxxxxx-5523-45fc-9f49-xxxxxxxxxxxx)"
175+
client_id="xxxxxxxx-5523-45fc-9f49-xxxxxxxxxxxx"
176176
curl "http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https%3A%2F%2Fvault.azure.net&client_id=$client_id" -H Metadata:true -s
177177
```
178178

articles/hdinsight/hdinsight-hadoop-customize-cluster-bootstrap.md

Lines changed: 48 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -54,22 +54,22 @@ The following PowerShell code customizes an [Apache Hive](https://hive.apache.or
5454
$hiveConfigValues = @{ "hive.metastore.client.socket.timeout"="90s" }
5555
5656
$config = New-AzHDInsightClusterConfig `
57+
-ClusterType "Spark" `
5758
| Set-AzHDInsightDefaultStorage `
58-
-StorageAccountName "$defaultStorageAccountName.blob.core.windows.net" `
59+
-StorageAccountResourceId "$storageAccountResourceId" `
5960
-StorageAccountKey $defaultStorageAccountKey `
6061
| Add-AzHDInsightConfigValue `
6162
-HiveSite $hiveConfigValues `
6263
-Spark2Defaults @{}
6364
6465
New-AzHDInsightCluster `
65-
-ResourceGroupName $existingResourceGroupName `
66-
-ClusterName $clusterName `
66+
-ResourceGroupName $resourceGroupName `
67+
-ClusterName $hdinsightClusterName `
6768
-Location $location `
68-
-ClusterSizeInNodes $clusterSizeInNodes `
69-
-ClusterType Hadoop `
70-
-OSType Linux `
71-
-Version "3.6" `
69+
-ClusterSizeInNodes 2 `
70+
-Version "4.0" `
7271
-HttpCredential $httpCredential `
72+
-SshCredential $sshCredential `
7373
-Config $config
7474
```
7575

@@ -143,60 +143,45 @@ This PowerShell script creates an HDInsight cluster and customizes a Hive settin
143143

144144
```powershell
145145
####################################
146-
# Set these variables
146+
# Service names and variables
147147
####################################
148-
#region - used for creating Azure service names
149-
$nameToken = "<ENTER AN ALIAS>"
150-
#endregion
151-
152-
#region - cluster user accounts
153-
$httpUserName = "admin" #HDInsight cluster username
154-
$httpPassword = '<ENTER A PASSWORD>'
155-
156-
$sshUserName = "sshuser" #HDInsight ssh user name
157-
$sshPassword = '<ENTER A PASSWORD>'
158-
#endregion
159148
160-
####################################
161-
# Service names and varialbes
162-
####################################
163-
#region - service names
149+
$nameToken = "<ENTER AN ALIAS>"
164150
$namePrefix = $nameToken.ToLower() + (Get-Date -Format "MMdd")
165-
166151
$resourceGroupName = $namePrefix + "rg"
167152
$hdinsightClusterName = $namePrefix + "hdi"
168153
$defaultStorageAccountName = $namePrefix + "store"
169154
$defaultBlobContainerName = $hdinsightClusterName
170-
171155
$location = "East US"
172-
#endregion
173-
174156
175157
####################################
176158
# Connect to Azure
177159
####################################
178-
#region - Connect to Azure subscription
179-
Write-Host "`nConnecting to your Azure subscription ..." -ForegroundColor Green
160+
161+
Write-Host "Connecting to your Azure subscription ..." -ForegroundColor Green
180162
$sub = Get-AzSubscription -ErrorAction SilentlyContinue
181163
if(-not($sub))
182164
{
183165
Connect-AzAccount
184166
}
185167
186168
# If you have multiple subscriptions, set the one to use
187-
# Select-AzSubscription -SubscriptionId "<SUBSCRIPTIONID>"
188-
189-
#endregion
169+
#$context = Get-AzSubscription -SubscriptionId "<subscriptionID>"
170+
#Set-AzContext $context
190171
191-
#region - Create an HDInsight cluster
192172
####################################
193-
# Create dependent components
173+
# Create a resource group
194174
####################################
175+
195176
Write-Host "Creating a resource group ..." -ForegroundColor Green
196177
New-AzResourceGroup `
197178
-Name $resourceGroupName `
198179
-Location $location
199180
181+
####################################
182+
# Create a storage account and container
183+
####################################
184+
200185
Write-Host "Creating the default storage account and default blob container ..." -ForegroundColor Green
201186
New-AzStorageAccount `
202187
-ResourceGroupName $resourceGroupName `
@@ -205,60 +190,74 @@ New-AzStorageAccount `
205190
-SkuName Standard_LRS `
206191
-Kind StorageV2 `
207192
-EnableHttpsTrafficOnly 1
208-
209-
# Note: Storage account kind BlobStorage cannot be used as primary storage.
210-
193+
211194
$defaultStorageAccountKey = (Get-AzStorageAccountKey `
212195
-ResourceGroupName $resourceGroupName `
213196
-Name $defaultStorageAccountName)[0].Value
214197
215198
$defaultStorageContext = New-AzStorageContext `
216199
-StorageAccountName $defaultStorageAccountName `
217200
-StorageAccountKey $defaultStorageAccountKey
218-
201+
219202
New-AzStorageContainer `
220203
-Name $defaultBlobContainerName `
221204
-Context $defaultStorageContext #use the cluster name as the container name
222205
223206
####################################
224207
# Create a configuration object
225208
####################################
209+
226210
$hiveConfigValues = @{"hive.metastore.client.socket.timeout"="90s"}
211+
$storageAccountResourceId = (Get-AzStorageAccount -ResourceGroupName $resourceGroupName ` -Name $defaultStorageAccountName).Id
227212
228213
$config = New-AzHDInsightClusterConfig `
214+
-ClusterType "Spark" `
229215
| Set-AzHDInsightDefaultStorage `
230-
-StorageAccountName "$defaultStorageAccountName.blob.core.windows.net" `
216+
-StorageAccountResourceId "$storageAccountResourceId" `
231217
-StorageAccountKey $defaultStorageAccountKey `
232218
| Add-AzHDInsightConfigValue `
233219
-HiveSite $hiveConfigValues `
234-
-Spark2Defaults @{}
235-
220+
-Spark2Defaults @{}
221+
236222
####################################
237-
# Create an HDInsight cluster
223+
# Set Ambari admin username/password
238224
####################################
225+
226+
$httpUserName = "admin" #HDInsight cluster username
227+
$httpPassword = '<ENTER A PASSWORD>'
228+
239229
$httpPW = ConvertTo-SecureString -String $httpPassword -AsPlainText -Force
240230
$httpCredential = New-Object System.Management.Automation.PSCredential($httpUserName,$httpPW)
241231
232+
####################################
233+
# Set ssh username/password
234+
####################################
235+
236+
$sshUserName = "sshuser" #HDInsight ssh user name
237+
$sshPassword = '<ENTER A PASSWORD>'
238+
242239
$sshPW = ConvertTo-SecureString -String $sshPassword -AsPlainText -Force
243240
$sshCredential = New-Object System.Management.Automation.PSCredential($sshUserName,$sshPW)
244241
242+
####################################
243+
# Create an HDInsight cluster
244+
####################################
245+
245246
New-AzHDInsightCluster `
246247
-ResourceGroupName $resourceGroupName `
247248
-ClusterName $hdinsightClusterName `
248249
-Location $location `
249-
-ClusterSizeInNodes 1 `
250-
-ClusterType Hadoop `
251-
-OSType Linux `
252-
-Version "3.6" `
250+
-ClusterSizeInNodes 2 `
251+
-Version "4.0" `
253252
-HttpCredential $httpCredential `
254253
-SshCredential $sshCredential `
255254
-Config $config
256-
255+
257256
####################################
258257
# Verify the cluster
259258
####################################
259+
260260
Get-AzHDInsightCluster `
261261
-ClusterName $hdinsightClusterName
262-
263-
#endregion
262+
264263
```

articles/key-vault/general/client-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Each SDK has separate client libraries for key vault, secrets, keys, and certifi
2626
|--|--|--|--|--|
2727
| .NET | - [API Reference](/dotnet/api/azure.security.keyvault.secrets)<br>- [NuGet package](https://www.nuget.org/packages/Azure.Security.KeyVault.Secrets/)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-net/tree/master/sdk/keyvault/Azure.Security.KeyVault.Secrets)<br>- [Quickstart](../secrets/quick-create-net.md) | - [API Reference](/dotnet/api/azure.security.keyvault.keys)<br>- [NuGet package](https://www.nuget.org/packages/Azure.Security.KeyVault.Keys/)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-net/tree/master/sdk/keyvault/Azure.Security.KeyVault.Keys)<br>- [Quickstart](../keys/quick-create-net.md) | - [API Reference](/dotnet/api/azure.security.keyvault.certificates)<br>- [NuGet package](https://www.nuget.org/packages/Azure.Security.KeyVault.Certificates/)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-net/tree/master/sdk/keyvault/Azure.Security.KeyVault.Certificates)<br>- [Quickstart](../certificates/quick-create-net.md) | - [API Reference](/dotnet/api/microsoft.azure.management.keyvault)<br>- [NuGet Package](https://www.nuget.org/packages/Microsoft.Azure.Management.KeyVault/)<br> - [Library source code](https://github.com/Azure/azure-sdk-for-net/tree/master/sdk/keyvault/Microsoft.Azure.Management.KeyVault)|
2828
| Python| - [API Reference](/python/api/overview/azure/keyvault-secrets-readme)<br>- [PyPi package](https://pypi.org/project/azure-keyvault-secrets/)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets)<br>- [Quickstart](../secrets/quick-create-python.md) |- [API Reference](/python/api/overview/azure/keyvault-keys-readme)<br>- [PyPi package](https://pypi.org/project/azure-keyvault-keys/)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-keys)<br>- [Quickstart](../keys/quick-create-python.md) | - [API Reference](/python/api/overview/azure/keyvault-certificates-readme)<br>- [PyPi package](https://pypi.org/project/azure-keyvault-certificates/)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates)<br>- [Quickstart](../certificates/quick-create-python.md) | - [API Reference](/python/api/azure-mgmt-keyvault/azure.mgmt.keyvault)<br> - [PyPi package](https://pypi.org/project/azure-mgmt-keyvault/)<br> - [Library source code](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-mgmt-keyvault)|
29-
| Java | - [API Reference](https://azuresdkdocs.blob.core.windows.net/$web/java/azure-security-keyvault-secrets/4.2.0/index.html)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/keyvault/azure-security-keyvault-secrets)<br>- [Quickstart](../secrets/quick-create-java.md) |- [API Reference](https://azuresdkdocs.blob.core.windows.net/$web/java/azure-security-keyvault-keys/4.2.0/index.html)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/keyvault/azure-security-keyvault-keys)<br>- [Quickstart](../keys/quick-create-java.md) | - [API Reference](https://azuresdkdocs.blob.core.windows.net/$web/java/azure-security-keyvault-certificates/4.1.0/index.html)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/keyvault/azure-security-keyvault-certificates)<br>- [Quickstart](../certificates/quick-create-java.md) |- [API Reference](/java/api/com.microsoft.azure.management.keyvault)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/keyvault/microsoft-azure-keyvault)|
29+
| Java | - [API Reference](https://azuresdkdocs.blob.core.windows.net/$web/java/azure-security-keyvault-secrets/4.2.0/index.html)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/keyvault/azure-security-keyvault-secrets)<br>- [Quickstart](../secrets/quick-create-java.md) |- [API Reference](https://azuresdkdocs.blob.core.windows.net/$web/java/azure-security-keyvault-keys/4.2.0/index.html)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/keyvault/azure-security-keyvault-keys)<br>- [Quickstart](../keys/quick-create-java.md) | - [API Reference](https://azuresdkdocs.blob.core.windows.net/$web/java/azure-security-keyvault-certificates/4.1.0/index.html)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/keyvault/azure-security-keyvault-certificates)<br>- [Quickstart](../certificates/quick-create-java.md) |- [API Reference](/java/api/overview/azure/resourcemanager-keyvault-readme?view=azure-java-stable)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/resourcemanager/azure-resourcemanager-keyvault)|
3030
| Spring | - [Reference](/azure/developer/java/spring-framework/spring-cloud-azure?tabs=maven#secret-management)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/spring)<br>- [Quickstart](/azure/developer/java/spring-framework/configure-spring-boot-starter-java-app-with-azure-key-vault) | | - [Reference](/azure/developer/java/spring-framework/spring-cloud-azure-appendix#azure-key-vault-certificates-properties)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/spring)<br>- [Quickstart](/azure/developer/java/spring-framework/configure-spring-boot-starter-java-app-with-azure-key-vault-certificates) | |
3131
| Node.js | - [API Reference](/javascript/api/@azure/keyvault-secrets/)<br>- [npm package](https://www.npmjs.com/package/@azure/keyvault-secrets)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-js/tree/master/sdk/keyvault/keyvault-secrets)<br>- [Quickstart](../secrets/quick-create-node.md) |- [API Reference](/javascript/api/@azure/keyvault-keys/)<br>- [npm package](https://www.npmjs.com/package/@azure/keyvault-keys)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-js/tree/master/sdk/keyvault/keyvault-keys)<br>- [Quickstart](../keys/quick-create-node.md)| - [API Reference](/javascript/api/@azure/keyvault-certificates/)<br>- [npm package](https://www.npmjs.com/package/@azure/keyvault-certificates)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-js/tree/master/sdk/keyvault/keyvault-certificates)<br>- [Quickstart](../certificates/quick-create-node.md) | - [API Reference](/javascript/api/@azure/arm-keyvault/)<br>- [npm package](https://www.npmjs.com/package/@azure/arm-keyvault)<br>- [Library source code](https://github.com/Azure/azure-sdk-for-js/tree/master/sdk/keyvault/arm-keyvault)
3232

articles/key-vault/general/developers-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ You can use the predefined Key Vault Contributor role to grant management access
3737

3838
| Azure CLI | PowerShell | REST API | Resource Manager | .NET | Python | Java | JavaScript |
3939
|--|--|--|--|--|--|--|--|
40-
|[Reference](/cli/azure/keyvault)<br>[Quickstart](quick-create-cli.md)|[Reference](/powershell/module/az.keyvault)<br>[Quickstart](quick-create-powershell.md)|[Reference](/rest/api/keyvault/)|[Reference](/azure/templates/microsoft.keyvault/vaults)<br>[Quickstart](./vault-create-template.md)|[Reference](/dotnet/api/microsoft.azure.management.keyvault)|[Reference](/python/api/azure-mgmt-keyvault/azure.mgmt.keyvault)|[Reference](/java/api/com.microsoft.azure.management.keyvault)|[Reference](/javascript/api/@azure/arm-keyvault)|
40+
|[Reference](/cli/azure/keyvault)<br>[Quickstart](quick-create-cli.md)|[Reference](/powershell/module/az.keyvault)<br>[Quickstart](quick-create-powershell.md)|[Reference](/rest/api/keyvault/)|[Reference](/azure/templates/microsoft.keyvault/vaults)<br>[Quickstart](./vault-create-template.md)|[Reference](/dotnet/api/microsoft.azure.management.keyvault)|[Reference](/python/api/azure-mgmt-keyvault/azure.mgmt.keyvault)|[Reference](/java/api/overview/azure/resourcemanager-keyvault-readme?view=azure-java-stable)|[Reference](/javascript/api/@azure/arm-keyvault)|
4141

4242
For installation packages and source code, see [Client libraries](client-libraries.md).
4343

articles/key-vault/general/monitor-key-vault.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ Here are some queries that you can enter into the **Log search** bar to help you
168168
AzureDiagnostics
169169
| where TimeGenerated > ago(30d) // Time range specified in the query. Overrides time picker in portal.
170170
| where ResourceProvider =="MICROSOFT.KEYVAULT"
171-
| where OperationName == "VaultPut" or OperationName = "VaultPatch"
171+
| where OperationName == "VaultPut" or OperationName == "VaultPatch"
172172
| sort by TimeGenerated desc
173173
```
174174

0 commit comments

Comments
 (0)