Skip to content

Commit bfa2450

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 6df52dc + 14c733c commit bfa2450

File tree

86 files changed

+935
-3212
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+935
-3212
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 110 deletions
Original file line numberDiff line numberDiff line change
@@ -2020,21 +2020,6 @@
20202020
"redirect_url": "/azure/migrate/migrate-services-overview",
20212021
"redirect_document_id": false
20222022
},
2023-
{
2024-
"source_path_from_root": "/articles/monitoring/management-overview-monitoring.md",
2025-
"redirect_url": "/azure/monitoring/",
2026-
"redirect_document_id": false
2027-
},
2028-
{
2029-
"source_path_from_root": "/articles/monitoring/monitoring-container-health.md",
2030-
"redirect_url": "/azure/monitoring/monitoring-container-insights-overview",
2031-
"redirect_document_id": false
2032-
},
2033-
{
2034-
"source_path_from_root": "/articles/monitoring/monitoring-walkthrough-servicemap.md",
2035-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2036-
"redirect_document_id": false
2037-
},
20382023
{
20392024
"source_path_from_root": "/articles/multi-factor-authentication/end-user/index.md",
20402025
"redirect_url": "/azure/multi-factor-authentication/end-user/multi-factor-authentication-end-user",
@@ -2220,101 +2205,6 @@
22202205
"redirect_url": "/azure/openshift/delete-cluster",
22212206
"redirect_document_id": false
22222207
},
2223-
{
2224-
"source_path_from_root": "/articles/operations-management-suite/index.md",
2225-
"redirect_url": "/azure/monitoring",
2226-
"redirect_document_id": false
2227-
},
2228-
{
2229-
"source_path_from_root": "/articles/operations-management-suite/oms-solution-agenthealth.md",
2230-
"redirect_url": "/azure/monitoring/monitoring-solution-agenthealth",
2231-
"redirect_document_id": false
2232-
},
2233-
{
2234-
"source_path_from_root": "/articles/operations-management-suite/oms-solution-office-365.md",
2235-
"redirect_url": "/azure/monitoring/monitoring-solution-office-365",
2236-
"redirect_document_id": false
2237-
},
2238-
{
2239-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-architecture.md",
2240-
"redirect_url": "/azure/monitoring",
2241-
"redirect_document_id": false
2242-
},
2243-
{
2244-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-integration.md",
2245-
"redirect_url": "/azure/monitoring",
2246-
"redirect_document_id": false
2247-
},
2248-
{
2249-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-overview.md",
2250-
"redirect_url": "/azure/monitoring",
2251-
"redirect_document_id": false
2252-
},
2253-
{
2254-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-runbook-datacollect.md",
2255-
"redirect_url": "/azure/monitoring/monitoring-runbook-datacollect",
2256-
"redirect_document_id": false
2257-
},
2258-
{
2259-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-sdk.md",
2260-
"redirect_url": "/azure/monitoring",
2261-
"redirect_document_id": false
2262-
},
2263-
{
2264-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-service-map-scom.md",
2265-
"redirect_url": "/azure/monitoring/monitoring-service-map-scom",
2266-
"redirect_document_id": false
2267-
},
2268-
{
2269-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-service-map.md",
2270-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2271-
"redirect_document_id": false
2272-
},
2273-
{
2274-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solution-targeting.md",
2275-
"redirect_url": "/azure/monitoring/monitoring-solution-targeting",
2276-
"redirect_document_id": false
2277-
},
2278-
{
2279-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-best-practices.md",
2280-
"redirect_url": "/azure/monitoring/monitoring-solutions-best-practices",
2281-
"redirect_document_id": false
2282-
},
2283-
{
2284-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-creating.md",
2285-
"redirect_url": "/azure/monitoring/monitoring-solutions-creating",
2286-
"redirect_document_id": false
2287-
},
2288-
{
2289-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-automation.md",
2290-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-automation",
2291-
"redirect_document_id": false
2292-
},
2293-
{
2294-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-searches-alerts.md",
2295-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-searches-alerts",
2296-
"redirect_document_id": false
2297-
},
2298-
{
2299-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-views.md",
2300-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-views",
2301-
"redirect_document_id": false
2302-
},
2303-
{
2304-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-solution-file.md",
2305-
"redirect_url": "/azure/monitoring/monitoring-solutions-solution-file",
2306-
"redirect_document_id": false
2307-
},
2308-
{
2309-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions.md",
2310-
"redirect_url": "/azure/monitoring/monitoring-solutions",
2311-
"redirect_document_id": false
2312-
},
2313-
{
2314-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-walkthrough-servicemap.md",
2315-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2316-
"redirect_document_id": false
2317-
},
23182208
{
23192209
"source_path_from_root": "/articles/operator-service-manager/overview.md",
23202210
"redirect_url": "azure/operator-service-manager/azure-operator-service-manager-overview",

articles/active-directory-b2c/identity-provider-ping-one.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ zone_pivot_groups: b2c-policy-type
2525

2626
## Create a PingOne application
2727

28-
To enable sign-in for users with a PingOne (Ping Identity) account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in the Ping Identity Administrator Console. For more information, see [Adding or updating an OIDC application](https://docs.pingidentity.com/access/sources/dita/topic?resourceid=p14e_add_update_oidc_application) in the Ping Identity documentation. If you don't already have a PingOne account, you can sign up at [`https://admin.pingone.com/web-portal/register`](https://admin.pingone.com/web-portal/register).
28+
To enable sign-in for users with a PingOne (Ping Identity) account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in the Ping Identity Administrator Console. If you don't already have a PingOne account, you can sign up at [`https://admin.pingone.com/web-portal/register`](https://admin.pingone.com/web-portal/register).
2929

3030
1. Sign in to the Ping Identity Administrator Console with your PingOne account credentials.
3131
1. In the left menu of the page, select **Connections**, then next to **Applications**, select **+**.

articles/active-directory-b2c/partner-grit-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Biometric authentication has the following benefits:
3232

3333
To get started, you'll need:
3434

35-
- License to [Grit's Visual IEF builder](https://www.gritiefedit.com/). Contact [Grit support](mailto:[email protected]) for licensing details. For this tutorial you don't need a license.
35+
- License to [Grit's Visual IEF builder](/azure/active-directory-b2c/partner-grit-editor). Contact [Grit support](mailto:[email protected]) for licensing details. For this tutorial you don't need a license.
3636

3737
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/).
3838

@@ -62,7 +62,7 @@ Contact [Grit support](mailto:[email protected]) for details to get o
6262

6363
### Configure Grit's biometric authentication with Azure AD B2C
6464

65-
1. Navigate to <https://www.gritiefedit.com> and enter your email if you're asked for it.
65+
1. Navigate to </azure/active-directory-b2c/partner-grit-editor> and enter your email if you're asked for it.
6666

6767
1. Press cancel in the quick start wizard.
6868

articles/active-directory-b2c/partner-grit-editor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To get started with the IEF Editor, ensure the following prerequisites are met:
3131

3232
- A Microsoft Entra subscription. If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/).
3333
- An Azure AD B2C tenant linked to the Azure subscription. Learn more at [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
34-
- [Visual IEF Editor](https://www.gritiefedit.com) is free and works only with Google Chrome browser.
34+
- [Visual IEF Editor](/azure/active-directory-b2c/partner-grit-editor) is free and works only with Google Chrome browser.
3535
- Review and download policies from [Azure AD B2C customer policies starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack)
3636
- Install Google Chrome browser
3737

@@ -43,7 +43,7 @@ The following illustration shows a sample code-development workflow from XML fil
4343

4444
| Step | Description |
4545
|:-----|:------|
46-
| 1. | Go to https://www.gritiefedit.com and upload the policies from [Azure AD B2C customer policies starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack) using the upload policy button in the user interface.|
46+
| 1. | Go to /azure/active-directory-b2c/partner-grit-editor and upload the policies from [Azure AD B2C customer policies starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack) using the upload policy button in the user interface.|
4747
| 2. | Using the Visual IEF editor tool, select and edit any user journey and self asserted profile that needs update/modification.|
4848
|3. | Once the files are updated, select the download button. All the policies will be downloaded to the local machine.|
4949
|4. | Check in the files in GitHub or CI/CD pipeline. |

articles/active-directory-b2c/partner-ping-identity.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,16 +107,14 @@ Use the instructions in the following sections to configure PingAccess and PingF
107107

108108
To configure PingFederate as the token provider for PingAccess, ensure connectivity from PingFederate to PingAccess. Confirm connectivity from PingAccess to PingFederate.
109109

110-
For more information, see [Configure PingFederate as the token provider for PingAccess](https://docs.pingidentity.com/access/sources/dita/topic?category=pingaccess&Releasestatus_ce=Current&resourceid=pa_configure_pf_as_the_token_provider_for_pa) in the Ping Identity documentation.
111-
112110
### Configure a PingAccess application for header-based authentication
113111

114112
Use the following instructions to create a PingAccess application for the target web application, for header-based authentication.
115113

116114
#### Create a virtual host
117115

118116
>[!IMPORTANT]
119-
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?](https://docs.pingidentity.com/access/sources/dita/topic?category=pingaccess&Releasestatus_ce=Current&resourceid=pa_what_can_I_configure_with_pa) in the Ping Identity documentation.
117+
>Create a virtual host for every application.
120118
121119
To create a virtual host:
122120

articles/application-gateway/for-containers/custom-health-probe.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: greg-lindsay
66
ms.service: azure-appgw-for-containers
77
ms.topic: conceptual
8-
ms.date: 9/16/2024
8+
ms.date: 10/28/2024
99
ms.author: greglin
1010
---
1111

@@ -35,7 +35,7 @@ The following properties make up custom health probes:
3535
| (http) host | The hostname specified in the request to the backend target. |
3636
| (http) path | The specific path of the request. If a single file should be loaded, the path might be /index.html. |
3737
| (http -> match) statusCodes | Contains two properties, `start` and `end`, that define the range of valid HTTP status codes returned from the backend. |
38-
| UseTLS | UseTLS indicates whether health check should enforce TLS. If not specified, health check uses the same protocol as the service if the same port is used for health check. If the port is different, health check is cleartext. |
38+
| useTLS | Specifies if the health check should enforce TLS. If not specified, health check uses the same protocol as the service if the same port is used for health check. If the port is different, health check is cleartext. |
3939

4040
[![A diagram showing the Application Gateway for Containers using custom health probes to determine backend health.](./media/custom-health-probe/custom-health-probe.png)](./media/custom-health-probe/custom-health-probe.png#lightbox)
4141

@@ -56,7 +56,7 @@ When the default health probe is used, the following values for each health prob
5656
| port | The port number used is defined by the backend port number in the Ingress resource or HttpRoute backend port in the HttpRoute resource. |
5757
| (http) host | localhost |
5858
| (http) path | / |
59-
| UseTLS | HTTP for HTTP and HTTPS when TLS is specified. |
59+
| useTLS | HTTP for HTTP and HTTPS when TLS is specified. |
6060

6161
<sup>1</sup> HTTPS is used when a backendTLSPolicy references a target backend service (for Gateway API implementation) or IngressExtension with a backendSetting protocol of HTTPS (for Ingress API implementation) is specified.
6262

@@ -96,6 +96,6 @@ spec:
9696
statusCodes:
9797
- start: 200
9898
end: 299
99-
UseTLS: true
99+
useTLS: true
100100
EOF
101101
```

articles/application-gateway/for-containers/migrate-from-agic-to-agc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: greg-lindsay
66
ms.service: azure-appgw-for-containers
77
ms.topic: conceptual
8-
ms.date: 9/16/2024
8+
ms.date: 10/28/2024
99
ms.author: greglin
1010
---
1111

@@ -66,7 +66,7 @@ Here's a summarized list of AGIC annotations and whether Application Gateway for
6666
| [Private frontend](migrate-from-agic-to-agc.md#private-frontend) | appgw.ingress.kubernetes.io/use-private-ip | Not supported | Not supported |
6767
| [WAF](migrate-from-agic-to-agc.md#waf) | appgw.ingress.kubernetes.io/waf-policy-for-path | Not supported | Not supported |
6868
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-hostname | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
69-
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-port | Not supported | Not supported |
69+
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-port | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
7070
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-path | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
7171
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-status-codes | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
7272
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-interval | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |

articles/azure-app-configuration/enable-dynamic-configuration-aspnet-core.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ A *sentinel key* is a key that you update after you complete the change of all o
8181

8282
1. Call the `UseAzureAppConfiguration` method. It enables your app to use the App Configuration middleware to update the configuration for you automatically.
8383

84-
Update *Program.cs* withe the following code.
84+
Update *Program.cs* with the following code.
8585

8686
```csharp
8787
// Existing code in Program.cs

articles/azure-app-configuration/feature-management-dotnet-reference.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ In the above example, `FeatureW` specifies a `RequirementType` of `All`, meaning
165165

166166
#### Microsoft Feature Management Schema
167167

168-
The feature management library also supports the usage of the [`Microsoft Feature Management schema`](https://github.com/Azure/AppConfiguration/blob/main/docs/FeatureManagement/FeatureManagement.v1.0.0.schema.json) to declare feature flags. This schema is language agnostic in origin and is supported by all Microsoft feature management libraries.
168+
The feature management library also supports the usage of the [`Microsoft Feature Management schema`](https://github.com/microsoft/FeatureManagement/blob/main/Schema/FeatureManagement.v1.0.0.schema.json) to declare feature flags. This schema is language agnostic in origin and is supported by all Microsoft feature management libraries.
169169

170170
``` JavaScript
171171
{
@@ -198,7 +198,7 @@ The feature management library also supports the usage of the [`Microsoft Featur
198198

199199
:::zone target="docs" pivot="preview-version"
200200

201-
The feature management library supports appsettings.json as a feature flag source since it's a provider for .NET Core's `IConfiguration` system. Feature flags are declared using the [`Microsoft Feature Management schema`](https://github.com/Azure/AppConfiguration/blob/main/docs/FeatureManagement/FeatureManagement.v2.0.0.schema.json). This schema is language agnostic in origin and is supported by all Microsoft feature management libraries.
201+
The feature management library supports appsettings.json as a feature flag source since it's a provider for .NET Core's `IConfiguration` system. Feature flags are declared using the [`Microsoft Feature Management schema`](https://github.com/microsoft/FeatureManagement/blob/main/Schema/FeatureManagement.v2.0.0.schema.json). This schema is language agnostic in origin and is supported by all Microsoft feature management libraries.
202202

203203
Below we have an example of declaring feature flags in a json file.
204204

@@ -1407,11 +1407,13 @@ To enable persistance of targeting context in the current activity, you can use
14071407
app.UseMiddleware<TargetingHttpContextMiddleware>();
14081408
```
14091409

1410-
An example of its usage can be found in the [EvaluationDataToApplicationInsights](https://github.com/microsoft/FeatureManagement-Dotnet/tree/preview/examples/EvaluationDataToApplicationInsights) example.
1410+
An example of its usage can be found in the [VariantAndTelemetryDemo](https://github.com/microsoft/FeatureManagement-Dotnet/tree/preview/examples/VariantAndTelemetryDemo) example.
14111411

14121412
#### Prerequisite
14131413

1414-
This telemetry publisher depends on Application Insights already being [setup](/azure/azure-monitor/app/asp-net-core#enable-application-insights-server-side-telemetry-no-visual-studio) and registered as an application service. For example, that is done [here](https://github.com/microsoft/FeatureManagement-Dotnet/blob/preview/examples/EvaluationDataToApplicationInsights/Program.cs#L20C1-L20C54) in the example application.
1414+
This telemetry publisher depends on Application Insights already being setup registered as an application service. For example, that is done [here](https://github.com/microsoft/FeatureManagement-Dotnet/blob/preview/examples/VariantAndTelemetryDemo/Program.cs#L22-L32) in the example application.
1415+
1416+
This telemetry publisher depends on Application Insights already being [setup](/azure/azure-monitor/app/asp-net-core#enable-application-insights-server-side-telemetry-no-visual-studio) and registered as an application service.
14151417

14161418
:::zone-end
14171419

0 commit comments

Comments
 (0)