Skip to content

Commit d3560e3

Browse files
author
craigcaseyMSFT
committed
fix broken links from OPS report
1 parent 70a0b8e commit d3560e3

15 files changed

+18
-18
lines changed

articles/azure-monitor/platform/rest-api-walkthrough.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -307,7 +307,7 @@ Use the metric’s name ‘value’ (not the ‘localizedValue’) for any filte
307307
308308
**Method**: GET
309309

310-
**Request URI**: https://management.azure.com/subscriptions/*{subscription-id}*/resourceGroups/*{resource-group-name}*/providers/*{resource-provider-namespace}*/*{resource-type}*/*{resource-name}*/providers/microsoft.insights/metrics?metricnames=*{metric}*&timespan=*{starttime/endtime}*&$filter=*{filter}*&interval=*{timeGrain}*&aggregation=*{aggreation}*&api-version=*{apiVersion}*
310+
**Request URI**: https:\//management.azure.com/subscriptions/*{subscription-id}*/resourceGroups/*{resource-group-name}*/providers/*{resource-provider-namespace}*/*{resource-type}*/*{resource-name}*/providers/microsoft.insights/metrics?metricnames=*{metric}*&timespan=*{starttime/endtime}*&$filter=*{filter}*&interval=*{timeGrain}*&aggregation=*{aggreation}*&api-version=*{apiVersion}*
311311

312312
For example, to retrieve the top 3 APIs, in descending value, by the number of 'Transactions' during a 5 min range, where the GeotType was 'Primary', the request would be as follows:
313313

@@ -459,7 +459,7 @@ Once the available metric definitions are known, it is then possible to retrieve
459459
460460
**Method**: GET
461461

462-
**Request URI**: `https://management.azure.com/subscriptions/\*{subscription-id}*/resourceGroups/*{resource-group-name}*/providers/*{resource-provider-namespace}*/*{resource-type}*/*{resource-name}*/providers/microsoft.insights/metrics?$filter=*{filter}*&api-version=*{apiVersion}*`
462+
**Request URI**: `https:\//management.azure.com/subscriptions/\*{subscription-id}*/resourceGroups/*{resource-group-name}*/providers/*{resource-provider-namespace}*/*{resource-type}*/*{resource-name}*/providers/microsoft.insights/metrics?$filter=*{filter}*&api-version=*{apiVersion}*`
463463

464464
For example, to retrieve the RunsSucceeded metric data points for the given time range and for a time grain of 1 hour, the request would be as follows:
465465

articles/cdn/create-profile-resource-manager-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@ az cdn endpoint list --profile-name standard-microsoft --resource-group cdn -o t
207207

208208
![View CDN Endpoint](./media/create-profile-resource-manager-template/cdn-view-endpoint.png)
209209

210-
Use the HostName to view the content. For example, access https://cdndemo-azurewebsites-net.azureedge.net using your browser.
210+
Use the HostName to view the content. For example, access https:\//cdndemo-azurewebsites-net.azureedge.net using your browser.
211211

212212
## Clean up
213213

articles/container-instances/container-instances-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ token=$(curl 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=
184184

185185
```
186186

187-
Now use the access token to authenticate to key vault and read a secret. Be sure to substitute the name of your key vault in the URL (*https://mykeyvault.vault.azure.net/...*):
187+
Now use the access token to authenticate to key vault and read a secret. Be sure to substitute the name of your key vault in the URL (*https:\//mykeyvault.vault.azure.net/...*):
188188

189189
```bash
190190
curl https://mykeyvault.vault.azure.net/secrets/SampleSecret/?api-version=2016-10-01 -H "Authorization: Bearer $token"

articles/container-service/kubernetes/container-service-kubernetes-coscale.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ az acs kubernetes install-cli
5858
[DaemonSets](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) are used by Kubernetes to run a single instance of a container on each host in the cluster.
5959
They're perfect for running monitoring agents such as the CoScale agent.
6060

61-
After you log in to CoScale, go to the [agent page](https://app.coscale.com/)
61+
After you log in to CoScale, go to the [agent page](https://developer.newrelic.com/)
6262
to install CoScale agents on your cluster using a DaemonSet. The CoScale UI provides guided configuration steps to create an agent and start monitoring your complete Kubernetes cluster.
6363

6464
![CoScale agent configuration](./media/container-service-kubernetes-coscale/installation.png)
@@ -68,7 +68,7 @@ To start the agent on the cluster, run the supplied command:
6868
![Start the CoScale agent](./media/container-service-kubernetes-coscale/agent_script.png)
6969

7070
That's it! Once the agents are up and running, you should see data in the console in a few minutes. Visit
71-
the [agent page](https://app.coscale.com/) to see a summary of your cluster, perform additional configuration steps, and see dashboards such as the **Kubernetes cluster overview**.
71+
the [agent page](https://developer.newrelic.com/) to see a summary of your cluster, perform additional configuration steps, and see dashboards such as the **Kubernetes cluster overview**.
7272

7373
![Kubernetes cluster overview](./media/container-service-kubernetes-coscale/dashboard_clusteroverview.png)
7474

articles/databox-online/data-box-gateway-deploy-connect-setup-activate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Before you configure and set up your Data Box Gateway, make sure that:
3737

3838
1. Open a browser window and access the local web UI of the device at:
3939

40-
[https://ip-address-of-network-interface](https://ip-address-of-network-interface)
40+
https:\//ip-address-of-network-interface
4141

4242
Use the connection URL noted in the previous tutorial. You see an error or a warning indicating that there is a problem with the website's security certificate.
4343

articles/dev-spaces/how-to/setup-cicd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ An automated release process will now begin, deploying the *mywebapi* and *webfr
127127
The release is done when all tasks are complete.
128128

129129
> [!TIP]
130-
> If your release fails with an error message like *UPGRADE FAILED: timed out waiting for the condition*, try inspecting the pods in your cluster [using the Kubernetes dashboard](../../aks/kubernetes-dashboard.md). If you see the pods are failing to start with error messages like *Failed to pull image "azdsexample.azurecr.io/mywebapi:122": rpc error: code = Unknown desc = Error response from daemon: Get https://azdsexample.azurecr.io/v2/mywebapi/manifests/122: unauthorized: authentication required*, it may be because your cluster has not been authorized to pull from your Azure Container Registry. Make sure you have completed the [Authorize your AKS cluster to pull from your Azure Container Registry](../../aks/cluster-container-registry-integration.md) prerequisite.
130+
> If your release fails with an error message like *UPGRADE FAILED: timed out waiting for the condition*, try inspecting the pods in your cluster [using the Kubernetes dashboard](../../aks/kubernetes-dashboard.md). If you see the pods are failing to start with error messages like *Failed to pull image "azdsexample.azurecr.io/mywebapi:122": rpc error: code = Unknown desc = Error response from daemon: Get https:\//azdsexample.azurecr.io/v2/mywebapi/manifests/122: unauthorized: authentication required*, it may be because your cluster has not been authorized to pull from your Azure Container Registry. Make sure you have completed the [Authorize your AKS cluster to pull from your Azure Container Registry](../../aks/cluster-container-registry-integration.md) prerequisite.
131131
132132
You now have a fully automated CI/CD pipeline for your GitHub fork of the Dev Spaces sample apps. Each time you commit and push code, the build pipeline will build and push the *mywebapi* and *webfrontend* images to your custom ACR instance. Then the release pipeline will deploy the Helm chart for each app into the _dev_ space on your Dev Spaces-enabled cluster.
133133

articles/event-hubs/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@ How to use Azure Policy: https://docs.microsoft.com/azure/governance/policy/tuto
332332

333333
### 3.4: Use single sign-on (SSO) with Azure Active Directory
334334

335-
**Guidance**: Microsoft Azure provides integrated access control management for resources and applications based on Azure Active Directory (AD). A key advantage of using Azure AD with Azure Event Hubs is that you don't need to store your credentials in the code anymore. Instead, you can request an OAuth 2.0 access token from the Microsoft Identity platform. The resource name to request a token is https://eventhubs.azure.net/. Azure AD authenticates the security principal (a user, group, or service principal) running the application. If the authentication succeeds, Azure AD returns an access token to the application, and the application can then use the access token to authorize request to Azure Event Hubs resources.
335+
**Guidance**: Microsoft Azure provides integrated access control management for resources and applications based on Azure Active Directory (AD). A key advantage of using Azure AD with Azure Event Hubs is that you don't need to store your credentials in the code anymore. Instead, you can request an OAuth 2.0 access token from the Microsoft Identity platform. The resource name to request a token is https:\//eventhubs.azure.net/. Azure AD authenticates the security principal (a user, group, or service principal) running the application. If the authentication succeeds, Azure AD returns an access token to the application, and the application can then use the access token to authorize request to Azure Event Hubs resources.
336336

337337
How to authenticate an application with Azure AD to access Event Hubs resources: https://docs.microsoft.com/azure/event-hubs/authenticate-application
338338

articles/expressroute/expressroute-locations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,7 @@ If you are remote and don't have fiber connectivity or you want to explore other
275275
| **[RETN](https://retn.net/services/cloud-connect/)** | Equinix | Amsterdam |
276276
| **Rogers** | Cologix, Equinix | Montreal, Toronto |
277277
| **[Spectrum Enterprise](https://enterprise.spectrum.com/services/cloud/cloud-connect.html)** | Equinix | Chicago, Dallas, Los Angeles, New York, Silicon Valley |
278-
| **[Tamares Telecom](https://www.tamarestelecom.com/our-services/#Connectivity)** | Equinix | London |
278+
| **[Tamares Telecom](http://www.tamarestelecom.com/our-services/#Connectivity)** | Equinix | London |
279279
| **[TDC Erhverv](https://tdc.dk/Produkter/cloudaccessplus)** | Equinix | Amsterdam |
280280
| **[Telecom Italia Sparkle](https://www.tisparkle.com/our-platform/corporate-platform/sparkle-cloud-connect#catalogue)**| Equinix | Amsterdam |
281281
| **[Telekom Deutschland GmbH](https://cloud.telekom.de/de/infrastruktur/managed-it-services/managed-hybrid-infrastructure-mit-microsoft-azure)** | Interxion | Amsterdam, Frankfurt |

articles/iot-accelerators/howto-opc-vault-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Use a short and simple resource group name. The name is also used to name resour
103103

104104
### Website name already in use
105105

106-
It's possible that the name of the website is already in use. You need to use a different resource group name. The hostnames in use by the deployment script are: https://resourcegroupname.azurewebsites.net and https://resourgroupname-service.azurewebsites.net.
106+
It's possible that the name of the website is already in use. You need to use a different resource group name. The hostnames in use by the deployment script are: https:\//resourcegroupname.azurewebsites.net and https:\//resourgroupname-service.azurewebsites.net.
107107
Other names of services are built by the combination of short name hashes, and are unlikely to conflict with other services.
108108

109109
### Azure AD registration

articles/key-vault/general/service-to-service-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ To use Azure CLI:
8585

8686
1. Sign in to the Azure portal: *az login* to sign in to Azure.
8787

88-
1. Verify access by entering *az account get-access-token --resource https://vault.azure.net*. If you receive an error, check that the right version of Azure CLI is correctly installed.
88+
1. Verify access by entering *az account get-access-token --resource https:\//vault.azure.net*. If you receive an error, check that the right version of Azure CLI is correctly installed.
8989

9090
If Azure CLI isn't installed to the default directory, you may receive an error reporting that `AzureServiceTokenProvider` can't find the path for Azure CLI. Use the **AzureCLIPath** environment variable to define the Azure CLI installation folder. `AzureServiceTokenProvider` adds the directory specified in the **AzureCLIPath** environment variable to the **Path** environment variable when necessary.
9191

0 commit comments

Comments
 (0)