Skip to content

Commit e46409d

Browse files
authored
Merge pull request #244666 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents d1435d4 + 7a3701d commit e46409d

File tree

19 files changed

+47
-34
lines changed

19 files changed

+47
-34
lines changed

articles/active-directory-b2c/partner-xid.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -182,8 +182,8 @@ Get the custom policy starter packs from GitHub, then update the XML files in th
182182
</InputClaims>
183183
<OutputClaims>
184184
<!-- Claims parsed from your REST API -->
185-
<OutputClaim ClaimTypeReferenceId="last_name" PartnerClaimType="givenName" />
186-
<OutputClaim ClaimTypeReferenceId="first_name" PartnerClaimType="surname" />
185+
<OutputClaim ClaimTypeReferenceId="last_name" />
186+
<OutputClaim ClaimTypeReferenceId="first_name" />
187187
<OutputClaim ClaimTypeReferenceId="previous_name" />
188188
<OutputClaim ClaimTypeReferenceId="year" />
189189
<OutputClaim ClaimTypeReferenceId="month" />

articles/active-directory/authentication/tutorial-enable-sspr.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,9 @@ An administrator can manually provide this contact information, or users can go
9494

9595
1. To apply the registration settings, select **Save**.
9696

97+
> [!NOTE]
98+
> The interruption to request to register contact information during signing in, will only occur, if the conditions configured on the settings are met, and will only apply to users and admin accounts that are enabled to reset passwords using Azure Active Directory self-service password reset.
99+
97100
## Set up notifications and customizations
98101

99102
To keep users informed about account activity, you can set up Azure AD to send email notifications when an SSPR event happens. These notifications can cover both regular user accounts and admin accounts. For admin accounts, this notification provides another layer of awareness when a privileged administrator account password is reset using SSPR. Azure AD will notify all global admins when someone uses SSPR on an admin account.

articles/active-directory/hybrid/connect/how-to-connect-install-prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,8 @@ To read more about securing your Active Directory environment, see [Best practic
5757

5858
#### Installation prerequisites
5959

60-
- Azure AD Connect must be installed on a domain-joined Windows Server 2016 or later. You can deploy Azure AD Connect on Windows Server 2016 but since Windows Server 2016 is in extended support, you may require [a paid support program](/lifecycle/policies/fixed#extended-support) if you require support for this configuration. We recommend the usage of domain joined Windows Server 2022.
61-
- The minimum .NET Framework version required is 4.6.2, and newer versions of .NET are also supported.
60+
- Azure AD Connect must be installed on a domain-joined Windows Server 2016 or later. We recommend using domain-joined Windows Server 2022. You can deploy Azure AD Connect on Windows Server 2016 but since Windows Server 2016 is in extended support, you may require [a paid support program](/lifecycle/policies/fixed#extended-support) if you require support for this configuration.
61+
- The minimum .NET Framework version required is 4.6.2, and newer versions of .NET are also supported. .NET version 4.8 and greater offers the best accessibility compliance.
6262
- Azure AD Connect can't be installed on Small Business Server or Windows Server Essentials before 2019 (Windows Server Essentials 2019 is supported). The server must be using Windows Server standard or better.
6363
- The Azure AD Connect server must have a full GUI installed. Installing Azure AD Connect on Windows Server Core isn't supported.
6464
- The Azure AD Connect server must not have PowerShell Transcription Group Policy enabled if you use the Azure AD Connect wizard to manage Active Directory Federation Services (AD FS) configuration. You can enable PowerShell transcription if you use the Azure AD Connect wizard to manage sync configuration.

articles/active-directory/hybrid/connect/whatis-azure-ad-connect-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Azure AD Connect cloud sync is the future of synchronization for Microsoft. It
2727

2828
> [!VIDEO https://www.youtube.com/embed/9T6lKEloq0Q]
2929
30-
Before moving the Azure AD Connect V2.0, you should consider moving to cloud sync. You can see if cloud sync is right for you, by accessing the [Check sync tool](https://aka.ms/M365Wizard) from the portal or via the link provided.
30+
Before moving the Azure AD Connect V2.0, you should consider moving to cloud sync. You can see if cloud sync is right for you, by accessing the [Check sync tool](https://aka.ms/EvaluateSyncOptions) from the portal or via the link provided.
3131

3232
For more information, see [What is cloud sync?](../cloud-sync/what-is-cloud-sync.md)
3333

articles/aks/concepts-storage.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -154,8 +154,7 @@ For clusters using the [Container Storage Interface (CSI) drivers][csi-storage-d
154154
|---|---|
155155
| `managed-csi` | Uses Azure StandardSSD locally redundant storage (LRS) to create a Managed Disk. The reclaim policy ensures that the underlying Azure Disk is deleted when the persistent volume that used it's deleted. The storage class also configures the persistent volumes to be expandable, you just need to edit the persistent volume claim with the new size. |
156156
| `managed-csi-premium` | Uses Azure Premium locally redundant storage (LRS) to create a Managed Disk. The reclaim policy again ensures that the underlying Azure Disk is deleted when the persistent volume that used it's deleted. Similarly, this storage class allows for persistent volumes to be expanded. |
157-
| `azurefile-csi` | Uses Azure Standard storage to create an Azure file share. The reclaim policy ensures that the underlying Azure file share is deleted when the persistent volume that used it
158-
s deleted. |
157+
| `azurefile-csi` | Uses Azure Standard storage to create an Azure file share. The reclaim policy ensures that the underlying Azure file share is deleted when the persistent volume that used it is deleted. |
159158
| `azurefile-csi-premium` | Uses Azure Premium storage to create an Azure file share. The reclaim policy ensures that the underlying Azure file share is deleted when the persistent volume that used it's deleted.|
160159
| `azureblob-nfs-premium` | Uses Azure Premium storage to create an Azure Blob storage container and connect using the NFS v3 protocol. The reclaim policy ensures that the underlying Azure Blob storage container is deleted when the persistent volume that used it's deleted. |
161160
| `azureblob-fuse-premium` | Uses Azure Premium storage to create an Azure Blob storage container and connect using BlobFuse. The reclaim policy ensures that the underlying Azure Blob storage container is deleted when the persistent volume that used it's deleted. |
@@ -292,4 +291,4 @@ For more information on core Kubernetes and AKS concepts, see the following arti
292291
[azure-blob-csi]: azure-blob-csi.md
293292
[general-purpose-machine-sizes]: ../virtual-machines/sizes-general.md
294293
[azure-files-azure-netapp-comparison]: ../storage/files/storage-files-netapp-comparison.md
295-
[azure-disk-customer-managed-key]: azure-disk-customer-managed-keys.md
294+
[azure-disk-customer-managed-key]: azure-disk-customer-managed-keys.md

articles/aks/workload-identity-deploy-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -132,11 +132,11 @@ apiVersion: v1
132132
kind: Pod
133133
metadata:
134134
name: quick-start
135-
namespace: SERVICE_ACCOUNT_NAMESPACE
135+
namespace: "${SERVICE_ACCOUNT_NAMESPACE}"
136136
labels:
137137
azure.workload.identity/use: "true"
138138
spec:
139-
serviceAccountName: workload-identity-sa
139+
serviceAccountName: "${SERVICE_ACCOUNT_NAME}"
140140
EOF
141141
```
142142

articles/api-management/api-management-howto-app-insights.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,11 @@ To improve performance issues, skip:
174174
>
175175
>
176176
177+
## Troubleshooting
178+
179+
Addressing the issue of telemetry data flow from API Management to Application Insights:
180+
+ Investigate whether a linked Azure Monitor Private Link Scope (AMPLS) resource exists within the VNet where the API Management resource is connected. AMPLS resources have a global scope across subscriptions and are responsible for managing data query and ingestion for all Azure Monitor resources. It's possible that the AMPLS has been configured with a Private-Only access mode specifically for data ingestion. In such instances, include the Application Insights resource and its associated Log Analytics resource in the AMPLS. Once this addition is made, the API Management data will be successfully ingested into the Application Insights resource, resolving the telemetry data transmission issue.
181+
177182
## Next steps
178183
179184
+ Learn more about [Azure Application Insights](/azure/application-insights/).

articles/attestation/quickstart-powershell.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,21 +76,21 @@ New-AzAttestation creates an attestation provider.
7676

7777
```powershell
7878
$attestationProvider = "<attestation provider name>"
79-
New-AzAttestation -Name $attestationProvider -ResourceGroupName $attestationResourceGroup -Location $location
79+
New-AzAttestationProvider -Name $attestationProvider -ResourceGroupName $attestationResourceGroup -Location $location
8080
```
8181

8282
PolicySignerCertificateFile is a file specifying a set of trusted signing keys. If a filename is specified for the PolicySignerCertificateFile parameter, attestation provider can be configured only with policies in signed JWT format. Else policy can be configured in text or an unsigned JWT format.
8383

8484
```powershell
85-
New-AzAttestation -Name $attestationProvider -ResourceGroupName $attestationResourceGroup -Location $location -PolicySignersCertificateFile "C:\test\policySignersCertificates.pem"
85+
New-AzAttestationProvider -Name $attestationProvider -ResourceGroupName $attestationResourceGroup -Location $location -PolicySignersCertificateFile "C:\test\policySignersCertificates.pem"
8686
```
8787

8888
For PolicySignersCertificateFile sample, see [examples of policy signer certificate](policy-signer-examples.md).
8989

9090
Get-AzAttestation retrieves the attestation provider properties like status and AttestURI. Take a note of AttestURI, as it will be needed later.
9191

9292
```azurepowershell
93-
Get-AzAttestation -Name $attestationProvider -ResourceGroupName $attestationResourceGroup
93+
Get-AzAttestationProvider -Name $attestationProvider -ResourceGroupName $attestationResourceGroup
9494
```
9595

9696
The above command should produce output in this format:
@@ -110,7 +110,7 @@ TagsTable:
110110
Attestation providers can be deleted using the Remove-AzAttestation cmdlet.
111111

112112
```powershell
113-
Remove-AzAttestation -Name $attestationProvider -ResourceGroupName $attestationResourceGroup
113+
Remove-AzAttestationProvider -Name $attestationProvider -ResourceGroupName $attestationResourceGroup
114114
```
115115

116116
## Policy management
41.7 KB
Loading

articles/azure-monitor/alerts/tutorial-log-alert.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,9 @@ On the **Condition** tab, the **Log query** will already be filled in. The **Mea
6565

6666
:::image type="content" source="media/tutorial-log-alert/alert-rule-dimensions.png" lightbox="media/tutorial-log-alert/alert-rule-dimensions.png"alt-text="Alert rule dimensions":::
6767

68+
If you need a certain dimension(s) included in the alert notification email, you can specify a dimension (e.g. "Computer"), the alert notification email will include the computer name that triggered the alert. The alerting engine uses the alert query to determine the available dimensions. If you do not see the dimension you want in the drop-down list for the "Dimension name", it is because the alert query does not expose that column in the results. You can easily add the dimensions you want by adding a Project line to your query that includes the columns you want to use. You can also use the Summarize line to add additional columns to the query results.
69+
70+
:::image type="content" source="media/tutorial-log-alert/alert-rule-condition-2.png" lightbox="media/tutorial-log-alert/alert-rule-condition-2.png" alt-text="Screenshot showing the Alert rule dimensions with a dimension called Computer set.":::
6871

6972
## Configure alert logic
7073
In the alert logic, configure the **Operator** and **Threshold value** to compare to the value returned from the measurement. An alert is created when this value is true. Select a value for **Frequency of evaluation** which defines how often the log query is run and evaluated. The cost for the alert rule increases with a lower frequency. When you select a frequency, the estimated monthly cost is displayed in addition to a preview of the query results over a time period.

0 commit comments

Comments
 (0)