Skip to content

Commit c6d82d4

Browse files
authored
Merge pull request #288968 from MicrosoftDocs/main
10/22/2024 AM Publish
2 parents d4e77cc + f645bda commit c6d82d4

14 files changed

+58
-54
lines changed

articles/app-service/overview-managed-identity.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -304,8 +304,8 @@ For .NET apps and functions, the simplest way to work with a managed identity is
304304
See the respective documentation headings of the client library for information:
305305

306306
- [Add Azure Identity client library to your project](/dotnet/api/overview/azure/identity-readme#getting-started)
307-
- [Access Azure service with a system-assigned identity](/dotnet/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
308-
- [Access Azure service with a user-assigned identity](/dotnet/api/overview/azure/identity-readme#specifying-a-user-assigned-managed-identity-with-the-defaultazurecredential)
307+
- [Access Azure service with a system-assigned identity](/dotnet/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
308+
- [Access Azure service with a user-assigned identity](/dotnet/api/overview/azure/identity-readme#specify-a-user-assigned-managed-identity-with-defaultazurecredential)
309309

310310
The linked examples use [`DefaultAzureCredential`](/dotnet/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
311311

@@ -316,8 +316,8 @@ For Node.js apps and JavaScript functions, the simplest way to work with a manag
316316
See the respective documentation headings of the client library for information:
317317

318318
- [Add Azure Identity client library to your project](/javascript/api/overview/azure/identity-readme#install-the-package)
319-
- [Access Azure service with a system-assigned identity](/javascript/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
320-
- [Access Azure service with a user-assigned identity](/javascript/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
319+
- [Access Azure service with a system-assigned identity](/javascript/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
320+
- [Access Azure service with a user-assigned identity](/javascript/api/overview/azure/identity-readme#specify-a-user-assigned-managed-identity-with-defaultazurecredential)
321321

322322
The linked examples use [`DefaultAzureCredential`](/javascript/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
323323

@@ -330,8 +330,8 @@ For Python apps and functions, the simplest way to work with a managed identity
330330
See the respective documentation headings of the client library for information:
331331

332332
- [Add Azure Identity client library to your project](/python/api/overview/azure/identity-readme#getting-started)
333-
- [Access Azure service with a system-assigned identity](/python/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
334-
- [Access Azure service with a user-assigned identity](/python/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
333+
- [Access Azure service with a system-assigned identity](/python/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
334+
- [Access Azure service with a user-assigned identity](/python/api/overview/azure/identity-readme#authenticate-with-a-user-assigned-managed-identity)
335335

336336
The linked examples use [`DefaultAzureCredential`](/python/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
337337

@@ -342,8 +342,8 @@ For Java apps and functions, the simplest way to work with a managed identity is
342342
See the respective documentation headings of the client library for information:
343343

344344
- [Add Azure Identity client library to your project](/java/api/overview/azure/identity-readme#include-the-package)
345-
- [Access Azure service with a system-assigned identity](/java/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
346-
- [Access Azure service with a user-assigned identity](/java/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
345+
- [Access Azure service with a system-assigned identity](/java/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
346+
- [Access Azure service with a user-assigned identity](/java/api/overview/azure/identity-readme#authenticate-a-user-assigned-managed-identity-with-defaultazurecredential)
347347

348348
The linked examples use [`DefaultAzureCredential`](/azure/developer/java/sdk/identity-azure-hosted-auth#default-azure-credential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
349349

articles/azure-netapp-files/use-availability-zones.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Use availability zones zonal placement for application high availability with Azure NetApp Files
2+
title: Use availability zone placement for application high availability with Azure NetApp Files
33
description: Azure availability zones are highly available, fault tolerant, and more scalable than traditional single or multiple data center infrastructures.
44
services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.topic: conceptual
8-
ms.date: 05/22/2024
8+
ms.date: 10/22/2024
99
ms.author: anfdocs
1010
---
11-
# Use availability zones zonal placement for application high availability with Azure NetApp Files
11+
# Use availability zone placement for application high availability with Azure NetApp Files
1212

1313
Azure [availability zones](../availability-zones/az-overview.md#availability-zones) are physically separate locations within each supporting Azure region that are tolerant to local failures. Failures can range from software and hardware failures to events such as earthquakes, floods, and fires. Tolerance to failures is achieved because of redundancy and logical isolation of Azure services. To ensure resiliency, a minimum of three separate availability zones are present in all [availability zone-enabled regions](../availability-zones/az-overview.md#azure-regions-with-availability-zones).
1414

1515
>[!IMPORTANT]
16-
> Availability zones are referred to as _logical zones_. Each data center is assigned to a physical zone. Physical zones are mapped to logical zones in your Azure subscription, and the mapping is different with different subscriptions. Azure subscriptions are automatically assigned this mapping when a subscription is created. Azure NetApp Files aligns with the generic logical-to-physical availability zone mapping for all Azure services for the subscription.
16+
> Availability zones are referred to as _logical zones_. Each data center is assigned to a physical zone. [Physical zones are mapped to logical zones in your Azure subscription](/azure/reliability/availability-zones-overview#physical-and-logical-availability-zones), and the mapping is different with different subscriptions. Azure subscriptions are automatically assigned this mapping when a subscription is created. Azure NetApp Files aligns with the generic logical-to-physical availability zone mapping for all Azure services for the subscription.
1717
1818
Azure availability zones are highly available, fault tolerant, and more scalable than traditional single or multiple data center infrastructures. Azure availability zones let you design and operate applications and databases that automatically transition between zones without interruption. You can design resilient solutions by using Azure services that use availability zones.
1919

articles/cost-management-billing/manage/avoid-unused-subscriptions.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.reviewer: mijeffer
66
ms.service: cost-management-billing
77
ms.subservice: billing
88
ms.topic: concept-article
9-
ms.date: 10/08/2024
9+
ms.date: 10/22/2024
1010
ms.author: banders
1111
# customer intent: As a billing administrator, I want to prevent my subscriptions from getting blocked or deleted.
1212
---
@@ -16,7 +16,11 @@ ms.author: banders
1616
Unused and abandoned subscriptions can increase potential security risks to your Azure account. To reduce this risk, Microsoft takes measures to secure, protect, and ultimately delete unused Azure subscriptions.
1717

1818
>[!NOTE]
19-
> This article only applies to Microsoft Online Service Program (MOSP) and Cloud Solution Provider (CSP) subscriptions.
19+
> This article only applies to the following subscription types:
20+
> - Microsoft Online Service Program (MOSP)
21+
> - Cloud Solution Provider (CSP)
22+
> - Microsoft Customer Agreement (MCA) that you bought through the Azure website or Azure portal
23+
> - Microsoft Customer Agreement (MCA) that you bought through a Microsoft representative
2024
2125
## What is an unused subscription?
2226

articles/expressroute/expressroute-troubleshooting-arp-classic.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,8 @@ The following section provides information about how to view the ARP tables that
5050
## Prerequisites for using ARP tables
5151
Ensure that you have the following before you continue:
5252

53-
* A valid ExpressRoute circuit that's configured with at least one peering. The circuit must be fully configured by the connectivity provider. You (or your connectivity provider) must configure at least one of the peerings (Azure private, Azure public, or Microsoft) on this circuit.
54-
* IP address ranges that are used for configuring the peerings (Azure private, Azure public, and Microsoft). Review the IP address assignment examples in the [ExpressRoute routing requirements page](expressroute-routing.md) to get an understanding of how IP addresses are mapped to interfaces on your side and on the ExpressRoute side. You can get information about the peering configuration by reviewing the [ExpressRoute peering configuration page](expressroute-howto-routing-classic.md).
53+
* A valid ExpressRoute circuit that's configured with at least one peering. The circuit must be fully configured by the connectivity provider. You (or your connectivity provider) must configure at least one of the peerings (Azure private or Microsoft) on this circuit.
54+
* IP address ranges that are used for configuring the peerings (Azure private and Microsoft). Review the IP address assignment examples in the [ExpressRoute routing requirements page](expressroute-routing.md) to get an understanding of how IP addresses are mapped to interfaces on your side and on the ExpressRoute side. You can get information about the peering configuration by reviewing the [ExpressRoute peering configuration page](expressroute-howto-routing-classic.md).
5555
* Information from your networking team or connectivity provider about the MAC addresses of the interfaces that are used with these IP addresses.
5656
* The latest Windows PowerShell module for Azure (version 1.50 or later).
5757

@@ -63,7 +63,7 @@ The following cmdlet provides the ARP tables for Azure private peering:
6363

6464
```azurepowershell
6565
# Required variables
66-
$ckt = "<your Service Key here>
66+
$ckt = "<your Service Key here>"
6767
6868
# ARP table for Azure private peering--primary path
6969
Get-AzureDedicatedCircuitPeeringArpInfo -ServiceKey $ckt -AccessType Private -Path Primary
@@ -110,7 +110,7 @@ The ARP table of a peering can be used to validate Layer 2 configuration and con
110110
* The ARP table has an entry for the on-premises side with a valid IP and MAC address, and a similar entry for the Microsoft side.
111111
* The last octet of the on-premises IP address is always an odd number.
112112
* The last octet of the Microsoft IP address is always an even number.
113-
* The same MAC address appears on the Microsoft side for all three peerings (primary/secondary).
113+
* The same MAC address appears on the Microsoft side for the peerings (Azure private and Microsoft).
114114

115115
```output
116116
Age InterfaceProperty IpAddress MacAddress

articles/iot-central/core/concepts-private-endpoints.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Network security using private endpoints in IoT Central
33
description: Use private endpoints to limit and secure device connectivity to your IoT Central application instead of using public URLs.
44
author: dominicbetts
55
ms.author: dobett
6-
ms.date: 05/22/2023
6+
ms.date: 10/22/2024
77
ms.topic: conceptual
88
ms.service: azure-iot-central
99
services: iot-central
@@ -51,7 +51,7 @@ IoT Central creates multiple customer visible FQDNs as part of a private endpoin
5151

5252
:::image type="content" source="media/concepts-private-endpoints/visible-fqdns.png" alt-text="Screenshot from the Azure portal that shows the customer visible FQDNs.":::
5353

54-
The IoT Central private endpoint uses multiple IP addresses from your virtual network and subnet. Also, based on application's load profile, IoT Central [autoscales its underlying IoT Hubs](/azure/iot-central/core/concepts-scalability-availability) so the number of IP addresses used by a private endpoint may increase. Plan for this possible increase when you determine the size for the subnet.
54+
The IoT Central private endpoint uses multiple IP addresses from your virtual network and subnet. Also, based on application's load profile, IoT Central [autoscales its underlying IoT Hubs](/azure/iot-central/core/concepts-scalability-availability) so the number of IP addresses used by a private endpoint might increase. Plan for this possible increase when you determine the size for the subnet.
5555

5656
Use the following information to help determine the total number of IP addresses required in your subnet:
5757

articles/iot-central/core/howto-create-organizations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: iot-central
55
ms.service: azure-iot-central
66
author: dominicbetts
77
ms.author: dobett
8-
ms.date: 06/14/2023
8+
ms.date: 10/22/2024
99
ms.topic: how-to
1010
---
1111

@@ -99,7 +99,7 @@ Then select the permissions for the role.
9999

100100
## Invite users
101101

102-
After you've created your organization hierarchy and assigned devices to organizations, invite users to your application and assign them to organizations.
102+
After you create your organization hierarchy and assigned devices to organizations, invite users to your application and assign them to organizations.
103103

104104
To invite a user, navigate to **Permissions > Users**. Enter their email address, the organization they're assigned to, and the role or roles they're a member of. The organization you select filters the list of available roles to make sure you assign the user to a valid role:
105105

@@ -112,13 +112,13 @@ You can assign the same user to multiple organizations. The user can have a diff
112112
| [email protected] | Org Administrator | Custom app |
113113
| [email protected] | Org Viewer | Custom app |
114114

115-
When you invite a new user, you need to share the application URL with them and ask them to sign in. After the user has signed in for the first time, the application appears on the user's [My apps](https://apps.azureiotcentral.com/myapps) page.
115+
When you invite a new user, you need to share the application URL with them and ask them to sign in. After the user signs in for the first time, the application appears on the user's [My apps](https://apps.azureiotcentral.com/myapps) page.
116116

117117
To access the application for the first time, an invited user must first navigate to the application using the link they receive from the administrator. The application isn't visible on the [My apps](https://apps.azureiotcentral.com/myapps) page on the Azure IoT Central site until then.
118118

119119
## Use organizations
120120

121-
After you've created your organization hierarchy, you can use organizations in areas of your application such as:
121+
After you create your organization hierarchy, you can use organizations in areas of your application such as:
122122

123123
- [Organization dashboards](howto-manage-dashboards.md) that show information to users about devices in their organization.
124124
- [Device groups](tutorial-use-device-groups.md) for devices in specific organizations.
@@ -139,7 +139,7 @@ To set the default organization, select **Settings** on the top menu bar:
139139

140140
## Add organizations to an existing application
141141

142-
An application may contain devices, users, and experiences such as dashboards, device groups, and jobs before you add an organization hierarchy.
142+
An application might contain devices, users, and experiences such as dashboards, device groups, and jobs before you add an organization hierarchy.
143143

144144
When you start adding organizations, all existing devices, users, and experiences remain associated with the root organization in the application:
145145

articles/iot-central/core/howto-create-private-endpoint.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create a private endpoint for Azure IoT Central
33
description: Learn how to create and configure a private endpoint to securely connect your devices to IoT Central over a private virtual network.
44
author: dominicbetts
55
ms.author: dobett
6-
ms.date: 05/19/2023
6+
ms.date: 10/22/2024
77
ms.topic: how-to
88
ms.service: azure-iot-central
99
services: iot-central
@@ -73,7 +73,7 @@ To see all the private endpoints created for your application:
7373

7474
### Use a custom DNS server
7575

76-
In some situations, you may not be able to integrate with the private DNS zone of the virtual network. For example, you may use your own DNS server or create DNS records using the host files on your virtual machines. This section describes how to get to the DNS zones.
76+
In some situations, you might not be able to integrate with the private DNS zone of the virtual network. For example, you might use your own DNS server or create DNS records using the host files on your virtual machines. This section describes how to get to the DNS zones.
7777

7878
1. Install [chocolatey](https://chocolatey.org/install).
7979
1. Install ARMClient:
@@ -160,9 +160,9 @@ Update your device code to use the direct DPS endpoint.
160160
161161
- Don't use private link subdomain URLs to connect your devices to IoT Central. Always use the DPS URL shown in your IoT Central application after you create the private endpoint.
162162
163-
- Using Azure provided private DNS zones for DNS management. Avoid using your own DNS server because you would need to constantly update your DNS configuration to keep up as IoT Central autoscales its resources.
163+
- Use Azure provided private DNS zones for DNS management. Avoid using your own DNS server because you would need to constantly update your DNS configuration to keep up as IoT Central autoscales its resources.
164164
165-
- If you create multiple private endpoints for same IoT Central resource, the DNS Zone may overwrite the FQDNs so you should add them again.
165+
- If you create multiple private endpoints for same IoT Central resource, the DNS Zone might overwrite the FQDNs so you should add them again.
166166
167167
## Limitations
168168
@@ -226,9 +226,9 @@ If you find an FQDN that doesn't match its corresponding IP address, fix your cu
226226
DNS configuration can be overwritten if you create or delete multiple private endpoints for a single IoT Central application:
227227

228228
- In the Azure portal, navigate to the private endpoint resource.
229-
- In the DNS section, make sure there are entries for all required resources: IoT Hubs, Event Hubs, DPS and IoT Central FQDNs.
229+
- In the DNS section, make sure there are entries for all required resources: IoT Hubs, Event Hubs, DPS, and IoT Central FQDNs.
230230
- Verify that the IPs (and IPs for other private endpoints using this DNS zone) are reflected in the A record of the DNS.
231-
- Remove any A records for IPs from older private endpoints that have already been deleted.
231+
- Remove any A records for IPs from older private endpoints that were previously deleted.
232232

233233
### Other troubleshooting tips
234234

0 commit comments

Comments
 (0)