Skip to content

Commit daaa7af

Browse files
Merge branch 'main' into patch-22
2 parents 16468ca + f930e18 commit daaa7af

File tree

445 files changed

+1787
-1597
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

445 files changed

+1787
-1597
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1290,7 +1290,6 @@
12901290
".openpublishing.redirection.availability-zones.json",
12911291
".openpublishing.redirection.azure-app-configuration.json",
12921292
".openpublishing.redirection.azure-arc-data.json",
1293-
".openpublishing.redirection.azure-attestation.json",
12941293
".openpublishing.redirection.azure-australia.json",
12951294
".openpublishing.redirection.azure-databricks.json",
12961295
".openpublishing.redirection.azure-datalake-storage-gen1.json",
@@ -1307,7 +1306,6 @@
13071306
".openpublishing.redirection.cognitive-services.json",
13081307
".openpublishing.redirection.container-service.json",
13091308
".openpublishing.redirection.data-lake-analytics.json",
1310-
".openpublishing.redirection.defender-for-cloud.json",
13111309
".openpublishing.redirection.defender-for-iot.json",
13121310
".openpublishing.redirection.dev-spaces.json",
13131311
".openpublishing.redirection.devops-project.json",
@@ -1321,7 +1319,6 @@
13211319
".openpublishing.redirection.iot-develop.json",
13221320
".openpublishing.redirection.iot-hub-device-update.json",
13231321
".openpublishing.redirection.json",
1324-
".openpublishing.redirection.key-vault.json",
13251322
".openpublishing.redirection.machine-configuration.json",
13261323
".openpublishing.redirection.marketplace.json",
13271324
".openpublishing.redirection.openshift.json",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 0 additions & 654 deletions
This file was deleted.

.openpublishing.redirection.security-center.json

Lines changed: 1086 additions & 436 deletions
Large diffs are not rendered by default.

articles/ai-services/speech-service/text-to-speech-avatar/avatar-gestures-with-ssml.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The full list of prebuilt avatar supported gestures provided here can also be fo
5959
| Meg | casual | a-little-bit<br>click-the-link<br>cross-hand<br>display-number<br>encourage-1<br>encourage-2<br>five-star-praise<br>front-left<br>front-right<br>good-1<br>good-2<br>handclap<br>introduction-to-products-1<br>introduction-to-products-2<br>introduction-to-products-3<br>left<br>length<br>lower-left<br>lower-right<br>number-one<br>press-both-hands-down<br>right<br>say-hi<br>shrug-ones-shoulders<br>slide-from-right-to-left<br>slide-to-the-left<br>spread-hands<br>the-front<br>top-middle-and-bottom-left<br>top-middle-and-bottom-right<br>upper-left<br>upper-right |
6060
| Meg | business | a-little-bit<br>encourage-1<br>encourage-2<br>five-star-praise<br>front-left<br>front-right<br>good-1<br>good-2<br>introduction-to-products-1<br>introduction-to-products-2<br>introduction-to-products-3<br>left<br>length<br>number-one<br>press-both-hands-down-1<br>press-both-hands-down-2<br>raise-ones-hand<br>right<br>say-hi<br>shrug-ones-shoulders<br>slide-from-left-to-right<br>slide-to-the-left<br>spread-hands<br>thanks<br>the-front<br>upper-left |
6161

62-
Only the `casual-sitting` style is supported via the real-time text to speech API. Gestures are only supported with the batch synthesis API and aren't supported via the real-time API.
62+
All styles except `lisa-graceful-sitting`, `lisa-graceful-standing`, `lisa-technical-sitting`, and `lisa-technical-standing` are supported via the real-time text to speech API. Gestures are only supported with the batch synthesis API and aren't supported via the real-time API.
6363

6464
## Next steps
6565

articles/application-gateway/configuration-frontend-ip.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,6 @@ A frontend IP address is associated to a *listener*, which checks for incoming r
3838

3939
You can create private and public listeners with the same port number. However, be aware of any network security group (NSG) associated with the Application Gateway subnet. Depending on your NSG's configuration, you might need an allow-inbound rule with **Destination IP addresses** as your application gateway's public and private frontend IPs. When you use the same port, your application gateway changes the **Destination** of the inbound flow to the frontend IPs of your gateway.
4040

41-
> [!NOTE]
42-
> Currently, the use of the same port number for public and private TCP/TLS protocol or IPv6 listeners is not supported.
43-
4441
**Inbound rule**:
4542

4643
- **Source**: According to your requirement

articles/application-gateway/ingress-controller-autoscale-pods.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ Use following two components:
3030
1. First, create a Microsoft Entra service principal and assign it `Monitoring Reader` access over Application Gateway's resource group.
3131

3232
```azurecli
33-
applicationGatewayGroupName="<application-gateway-group-id>"
34-
applicationGatewayGroupId=$(az group show -g $applicationGatewayGroupName -o tsv --query "id")
35-
az ad sp create-for-rbac -n "azure-k8s-metric-adapter-sp" --role "Monitoring Reader" --scopes applicationGatewayGroupId
33+
applicationGatewayGroupName="<application-gateway-group-id>"
34+
applicationGatewayGroupId=$(az group show -g $applicationGatewayGroupName -o tsv --query "id")
35+
az ad sp create-for-rbac -n "azure-k8s-metric-adapter-sp" --role "Monitoring Reader" --scopes applicationGatewayGroupId
3636
```
3737
3838
1. Now, deploy the [`Azure Kubernetes Metric Adapter`](https://github.com/Azure/azure-k8s-metrics-adapter) using the Microsoft Entra service principal created previously.
@@ -98,7 +98,7 @@ In following example, we target a sample deployment `aspnet`. We scale up Pods w
9898

9999
Replace your target deployment name and apply the following auto scale configuration:
100100
```yaml
101-
apiVersion: autoscaling/v2beta1
101+
apiVersion: autoscaling/v2
102102
kind: HorizontalPodAutoscaler
103103
metadata:
104104
name: deployment-scaler

articles/azure-app-configuration/quickstart-azure-kubernetes-service.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -351,7 +351,24 @@ If the phase is not `COMPLETE`, the data isn't downloaded from your App Configur
351351
kubectl logs deployment/az-appconfig-k8s-provider -n azappconfig-system
352352
```
353353

354-
Use the logs for further troubleshooting. For example, if you see requests to your App Configuration store are responded with *RESPONSE 403: 403 Forbidden*, it may indicate the App Configuration Kubernetes Provider doesn't have the necessary permission to access your App Configuration store. Follow the instructions in [use workload identity](./reference-kubernetes-provider.md#use-workload-identity) to ensure associated managed identity is assigned proper permission.
354+
Use the logs for further troubleshooting. Refer to the [FAQ](#faq) section for common issues.
355+
356+
## FAQ
357+
358+
#### Why isn’t the ConfigMap or Secret being generated?
359+
360+
You can follow the steps in the [Troubleshooting](#troubleshooting) guide to collect logs for detailed error information. Here are some common causes.
361+
362+
- **RESPONSE 403: 403 Forbidden**: The configured identity lacks the necessary permissions to access the App Configuration store. Refer to the [Authentication](./reference-kubernetes-provider.md#authentication) section for examples that match the identity you are using.
363+
- **A Key Vault reference is found in App Configuration, but 'spec.secret' was not configured**: One or more Key Vault references are included in the selected key-values, but the authentication information for Key Vaults is not provided. To maintain the integrity of the configuration, the entire configuration fails to load. Configure the `spec.secret` section to provide the necessary authentication information. For examples and more information, see [Key Vault reference](./reference-kubernetes-provider.md#key-vault-references) .
364+
365+
#### Why does the generated ConfigMap not contain the expected data?
366+
367+
Ensure that you specify the correct key-value selectors to match the expected data. If no selectors are specified, all key-values without a label will be downloaded from your App Configuration store. When using a key filter, verify that it matches the prefix of your expected key-values. If your key-values have labels, make sure to specify the label filter in the selectors. For more examples, refer to the [key-value selection](./reference-kubernetes-provider.md#key-value-selection) documentation.
368+
369+
#### How can I customize the installation of the Azure App Configuration Kubernetes Provider?
370+
371+
You can customize the installation by providing additional Helm values when installing the Azure App Configuration Kubernetes Provider. For example, you can set the log level, configure the provider to run on a specific node, or disable the workload identity. Refer to the [installation guide](./reference-kubernetes-provider.md#installation) for more information.
355372

356373
## Clean up resources
357374

articles/azure-arc/vmware-vsphere/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Azure Arc-enabled VMware vSphere doesn't store/process customer data outside the
107107

108108
## Azure Kubernetes Service (AKS) Arc on VMware (preview)
109109

110-
Starting in March 2024, Azure Kubernetes Service (AKS) enabled by Azure Arc on VMware is available for preview. AKS Arc on VMware enables you to use Azure Arc to create new Kubernetes clusters on VMware vSphere. For more information, see [What is AKS enabled by Arc on VMware?](/azure/aks/hybrid/aks-vmware-overview).
110+
Starting March 2024, Azure Kubernetes Service (AKS) enabled by Azure Arc on VMware is available for preview. AKS Arc on VMware enables you to use Azure Arc to create new Kubernetes clusters on VMware vSphere. For more information, see [What is AKS enabled by Arc on VMware?](/azure/aks/hybrid/aks-vmware-overview).
111111

112112
The following capabilities are available in the AKS Arc on VMware preview:
113113

articles/azure-boost/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Overview of Azure Boost
33
description: Learn more about how Azure Boost can Learn more about how Azure Boost can improve security and performance of your virtual machines.
44
author: mattmcinnes
5-
ms.service: virtual-machines
5+
ms.service: azure-virtual-machines
66
ms.topic: conceptual
77
ms.custom:
88
- ignite-2023

articles/azure-functions/functions-app-settings.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ Application settings in a function app contain configuration options that affect
1414

1515
In this article, example connection string values are truncated for readability.
1616

17+
Because Azure Functions leverages the Azure App Service platform for hosting, you might find some settings relevant to your function app hosting documented in [Environment variables and app settings in Azure App Service](../app-service/reference-app-settings.md).
18+
1719
## App setting considerations
1820

1921
When using app settings, you should be aware of the following considerations:

0 commit comments

Comments
 (0)