Skip to content

Commit e6f766e

Browse files
authored
Merge pull request #266875 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents f16ab93 + ee2174b commit e6f766e

File tree

9 files changed

+31
-29
lines changed

9 files changed

+31
-29
lines changed

articles/ai-services/language-service/concepts/migrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ On November 2nd 2021, Azure AI Language was released into public preview. This l
1616

1717
## Do I need to migrate to the language service if I am using Text Analytics?
1818

19-
Text Analytics has been incorporated into the language service, and its features are still available. If you were using Text Analytics, your applications should continue to work without breaking changes. You can also see the [Text Analytics migration guide](migrate-language-service-latest.md), if you need to update an older application.
19+
Text Analytics has been incorporated into the language service, and its features are still available. If you were using Text Analytics features, your applications should continue to work without breaking changes. If you are using Text Analytics API (v2.x or v3), see the [Text Analytics migration guide](migrate-language-service-latest.md) to migrate your applications to the unified Language endpoint and the latest client library.
2020

2121
Consider using one of the available quickstart articles to see the latest information on service endpoints, and API calls.
2222

articles/aks/image-cleaner.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Use Image Cleaner on Azure Kubernetes Service (AKS)
3-
description: Learn how to use Image Cleaner to clean up stale images on Azure Kubernetes Service (AKS)
3+
description: Learn how to use Image Cleaner to clean up vulnerable stale images on Azure Kubernetes Service (AKS)
44
ms.author: nickoman
55
author: nickomang
66
ms.topic: article
77
ms.custom: devx-track-azurecli
88
ms.date: 01/22/2024
99
---
1010

11-
# Use Image Cleaner to clean up stale images on your Azure Kubernetes Service (AKS) cluster
11+
# Use Image Cleaner to clean up vulnerable stale images on your Azure Kubernetes Service (AKS) cluster
1212

1313
It's common to use pipelines to build and deploy images on Azure Kubernetes Service (AKS) clusters. While great for image creation, this process often doesn't account for the stale images left behind and can lead to image bloat on cluster nodes. These images might contain vulnerabilities, which might create security issues. To remove security risks in your clusters, you can clean these unreferenced images. Manually cleaning images can be time intensive. Image Cleaner performs automatic image identification and removal, which mitigates the risk of stale images and reduces the time required to clean them up.
1414

articles/azure-monitor/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -263,7 +263,7 @@ No. Azure Monitor is a scalable cloud service that processes and stores large am
263263

264264
You can connect your existing System Center Operations Manager management group to Azure Monitor to collect data from agents into Azure Monitor Logs. This capability allows you to use log queries and solutions to analyze data collected from agents. You can also configure existing System Center Operations Manager agents to send data directly to Azure Monitor. See [Connect Operations Manager to Azure Monitor](agents/om-agents.md).
265265

266-
Microsoft also offers System Center Operations Manager Managed Instance (SCOM MI) as an option to migrate a traditional SCOM setup into the cloud with minimal changes. For more information see [About Azure Monitor SCOM Managed Instance][/system-center/scom/operations-manager-managed-instance-overview].
266+
Microsoft also offers System Center Operations Manager Managed Instance (SCOM MI) as an option to migrate a traditional SCOM setup into the cloud with minimal changes. For more information see [About Azure Monitor SCOM Managed Instance](/system-center/scom/operations-manager-managed-instance-overview).
267267

268268

269269
## Next steps

articles/container-registry/container-registry-transfer-images.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Please complete the prerequisites outlined [here](./container-registry-transfer-
2121
- You have a recent version of Az CLI installed in both clouds.
2222

2323
> [!IMPORTANT]
24-
- The ACR Transfer supports artifacts with the layer size limits to 8 GB due to the technical limitations.
24+
> The ACR Transfer supports artifacts with the layer size limits to 8 GB due to the technical limitations.
2525
2626
## Consider using the Az CLI extension
2727

@@ -31,7 +31,7 @@ For most nonautomated use-cases, we recommend using the Az CLI Extension if poss
3131

3232
Create an ExportPipeline resource for your source container registry using Azure Resource Manager template deployment.
3333

34-
Copy ExportPipeline Resource Manager [template files](https://github.com/Azure/acr/tree/master/docs/image-transfer/ExportPipelines) to a local folder.
34+
Copy ExportPipeline Resource Manager [template files](https://github.com/Azure/acr/tree/main/docs/image-transfer/ExportPipelines) to a local folder.
3535

3636
Enter the following parameter values in the file `azuredeploy.parameters.json`:
3737

@@ -96,7 +96,7 @@ EXPORT_RES_ID=$(az deployment group show \
9696

9797
Create an ImportPipeline resource in your target container registry using Azure Resource Manager template deployment. By default, the pipeline is enabled to import automatically when the storage account in the target environment has an artifact blob.
9898

99-
Copy ImportPipeline Resource Manager [template files](https://github.com/Azure/acr/tree/master/docs/image-transfer/ImportPipelines) to a local folder.
99+
Copy ImportPipeline Resource Manager [template files](https://github.com/Azure/acr/tree/main/docs/image-transfer/ImportPipelines) to a local folder.
100100

101101
Enter the following parameter values in the file `azuredeploy.parameters.json`:
102102

@@ -161,7 +161,7 @@ IMPORT_RES_ID=$(az deployment group show \
161161

162162
Create a PipelineRun resource for your source container registry using Azure Resource Manager template deployment. This resource runs the ExportPipeline resource you created previously, and exports specified artifacts from your container registry as a blob to your source storage account.
163163

164-
Copy PipelineRun Resource Manager [template files](https://github.com/Azure/acr/tree/master/docs/image-transfer/PipelineRun/PipelineRun-Export) to a local folder.
164+
Copy PipelineRun Resource Manager [template files](https://github.com/Azure/acr/tree/main/docs/image-transfer/PipelineRun/PipelineRun-Export) to a local folder.
165165

166166
Enter the following parameter values in the file `azuredeploy.parameters.json`:
167167

@@ -234,7 +234,7 @@ If you didn't enable the `sourceTriggerStatus` parameter of the import pipeline,
234234

235235
You can also use a PipelineRun resource to trigger an ImportPipeline for artifact import to your target container registry.
236236

237-
Copy PipelineRun Resource Manager [template files](https://github.com/Azure/acr/tree/master/docs/image-transfer/PipelineRun/PipelineRun-Import) to a local folder.
237+
Copy PipelineRun Resource Manager [template files](https://github.com/Azure/acr/tree/main/docs/image-transfer/PipelineRun/PipelineRun-Import) to a local folder.
238238

239239
Enter the following parameter values in the file `azuredeploy.parameters.json`:
240240

@@ -323,15 +323,15 @@ View [ACR Transfer Troubleshooting](container-registry-transfer-troubleshooting.
323323

324324
<!-- LINKS - Internal -->
325325
[azure-cli]: /cli/azure/install-azure-cli
326-
[az-login]: /cli/azure/reference-index#az_login
327-
[az-keyvault-secret-set]: /cli/azure/keyvault/secret#az_keyvault_secret_set
328-
[az-keyvault-secret-show]: /cli/azure/keyvault/secret#az_keyvault_secret_show
329-
[az-keyvault-set-policy]: /cli/azure/keyvault#az_keyvault_set_policy
330-
[az-storage-container-generate-sas]: /cli/azure/storage/container#az_storage_container_generate_sas
331-
[az-storage-blob-list]: /cli/azure/storage/blob#az_storage-blob-list
332-
[az-deployment-group-create]: /cli/azure/deployment/group#az_deployment_group_create
333-
[az-deployment-group-delete]: /cli/azure/deployment/group#az_deployment_group_delete
334-
[az-deployment-group-show]: /cli/azure/deployment/group#az_deployment_group_show
335-
[az-acr-repository-list]: /cli/azure/acr/repository#az_acr_repository_list
336-
[az-acr-import]: /cli/azure/acr#az_acr_import
337-
[az-resource-delete]: /cli/azure/resource#az_resource_delete
326+
[az-login]: /cli/azure/reference-index#az-login
327+
[az-keyvault-secret-set]: /cli/azure/keyvault/secret#az-keyvault-secret-set
328+
[az-keyvault-secret-show]: /cli/azure/keyvault/secret#az-keyvault-secret-show
329+
[az-keyvault-set-policy]: /cli/azure/keyvault#az-keyvault-set-policy
330+
[az-storage-container-generate-sas]: /cli/azure/storage/container#az-storage-container-generate-sas
331+
[az-storage-blob-list]: /cli/azure/storage/blob#az-storage-blob-list
332+
[az-deployment-group-create]: /cli/azure/deployment/group#az-deployment-group-create
333+
[az-deployment-group-delete]: /cli/azure/deployment/group#az-deployment-group-delete
334+
[az-deployment-group-show]: /cli/azure/deployment/group#az-deployment-group-show
335+
[az-acr-repository-list]: /cli/azure/acr/repository#az-acr-repository-list
336+
[az-acr-import]: /cli/azure/acr#az-acr-import
337+
[az-resource-delete]: /cli/azure/resource#az-resource-delete

articles/container-registry/container-registry-transfer-prerequisites.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -80,14 +80,14 @@ Transfer uses shared access signature (SAS) tokens to access the storage account
8080

8181
### Generate SAS token for export
8282

83-
Run the [az storage account generate-sas][az-storage-account-generate-sas] command to generate a SAS token for the container in the source storage account, used for artifact export.
83+
Run the [az storage container generate-sas][az-storage-container-generate-sas] command to generate a SAS token for the container in the source storage account, used for artifact export.
8484

8585
*Recommended token permissions*: Read, Write, List, Add.
8686

8787
In the following example, command output is assigned to the EXPORT_SAS environment variable, prefixed with the '?' character. Update the `--expiry` value for your environment:
8888

8989
```azurecli
90-
EXPORT_SAS=?$(az storage account generate-sas \
90+
EXPORT_SAS=?$(az storage container generate-sas \
9191
--name transfer \
9292
--account-name $SOURCE_SA \
9393
--expiry 2021-01-01 \
@@ -162,4 +162,3 @@ az keyvault secret set \
162162
[az-acr-import]: /cli/azure/acr#az_acr_import
163163
[az-resource-delete]: /cli/azure/resource#az_resource_delete
164164
[kv-managed-sas]: ../key-vault/secrets/overview-storage-keys.md
165-
[az-storage-account-generate-sas]: /cli/azure/storage/account#az-storage-account-generate-sas

articles/private-link/private-endpoint-dns.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ For Azure services, use the recommended zone names as described in the following
111111
>| Azure Cosmos DB (Microsoft.DocumentDB/databaseAccounts) | Analytical | privatelink.analytics.cosmos.azure.com | analytics.cosmos.azure.com |
112112
>| Azure Cosmos DB (Microsoft.DBforPostgreSQL/serverGroupsv2) | coordinator | privatelink.postgres.cosmos.azure.com | postgres.cosmos.azure.com |
113113
>| Azure Database for PostgreSQL - Single server (Microsoft.DBforPostgreSQL/servers) | postgresqlServer | privatelink.postgres.database.azure.com | postgres.database.azure.com |
114+
>| Azure Database for PostgreSQL - Flexible server (Microsoft.DBforPostgreSQL/flexibleServers) | postgresqlServer | privatelink.postgres.database.azure.com | postgres.database.azure.com |
114115
>| Azure Database for MySQL - Single Server (Microsoft.DBforMySQL/servers) | mysqlServer | privatelink.mysql.database.azure.com | mysql.database.azure.com |
115116
>| Azure Database for MySQL - Flexible Server (Microsoft.DBforMySQL/flexibleServers) | mysqlServer | privatelink.mysql.database.azure.com | mysql.database.azure.com |
116117
>| Azure Database for MariaDB (Microsoft.DBforMariaDB/servers) | mariadbServer | privatelink.mariadb.database.azure.com | mariadb.database.azure.com |
@@ -269,6 +270,7 @@ For Azure services, use the recommended zone names as described in the following
269270
>| Azure Cosmos DB (Microsoft.DocumentDB/databaseAccounts) | Sql | privatelink.documents.azure.us | documents.azure.us |
270271
>| Azure Cosmos DB (Microsoft.DocumentDB/databaseAccounts) | MongoDB | privatelink.mongo.cosmos.azure.us | mongo.cosmos.azure.us |
271272
>| Azure Database for PostgreSQL - Single server (Microsoft.DBforPostgreSQL/servers) | postgresqlServer | privatelink.postgres.database.usgovcloudapi.net | postgres.database.usgovcloudapi.net |
273+
>| Azure Database for PostgreSQL - Flexible server (Microsoft.DBforPostgreSQL/flexibleServers) | postgresqlServer | privatelink.postgres.database.usgovcloudapi.net | postgres.database.usgovcloudapi.net |
272274
>| Azure Database for MySQL - Single Server (Microsoft.DBforMySQL/servers) | mysqlServer | privatelink.mysql.database.usgovcloudapi.net | mysql.database.usgovcloudapi.net |
273275
>| Azure Database for MySQL - Flexible Server (Microsoft.DBforMySQL/flexibleServers) | mysqlServer | privatelink.mysql.database.usgovcloudapi.net | mysql.database.usgovcloudapi.net |
274276
>| Azure Database for MariaDB (Microsoft.DBforMariaDB/servers) | mariadbServer | privatelink.mariadb.database.usgovcloudapi.net| mariadb.database.usgovcloudapi.net |
@@ -400,6 +402,7 @@ For Azure services, use the recommended zone names as described in the following
400402
>| Azure Cosmos DB (Microsoft.DocumentDB/databaseAccounts) | Gremlin | privatelink.gremlin.cosmos.azure.cn | gremlin.cosmos.azure.cn |
401403
>| Azure Cosmos DB (Microsoft.DocumentDB/databaseAccounts) | Table | privatelink.table.cosmos.azure.cn | table.cosmos.azure.cn |
402404
>| Azure Database for PostgreSQL - Single server (Microsoft.DBforPostgreSQL/servers) | postgresqlServer | privatelink.postgres.database.chinacloudapi.cn | postgres.database.chinacloudapi.cn |
405+
>| Azure Database for PostgreSQL - Flexible server (Microsoft.DBforPostgreSQL/flexibleServers) | postgresqlServer | privatelink.postgres.database.chinacloudapi.cn | postgres.database.chinacloudapi.cn |
403406
>| Azure Database for MySQL - Single Server (Microsoft.DBforMySQL/servers) | mysqlServer | privatelink.mysql.database.chinacloudapi.cn | mysql.database.chinacloudapi.cn |
404407
>| Azure Database for MySQL - Flexible Server (Microsoft.DBforMySQL/flexibleServers) | mysqlServer | privatelink.mysql.database.chinacloudapi.cn | mysql.database.chinacloudapi.cn |
405408
>| Azure Database for MariaDB (Microsoft.DBforMariaDB/servers) | mariadbServer | privatelink.mariadb.database.chinacloudapi.cn | mariadb.database.chinacloudapi.cn |

articles/sentinel/work-with-threat-indicators.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,4 +145,4 @@ In this article, you learned all the ways to work with threat intelligence indic
145145
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md).
146146
- Connect Microsoft Sentinel to [STIX/TAXII threat intelligence feeds](./connect-threat-intelligence-taxii.md).
147147
- [Connect threat intelligence platforms](./connect-threat-intelligence-tip.md) to Microsoft Sentinel.
148-
- See which [TIP platforms, TAXII feeds, and enrichments](threat-intelligence-integration.md) can be readily integrated with Microsoft Sentinel.
148+
- See which [TIPs, TAXII feeds, and enrichments](threat-intelligence-integration.md) can be readily integrated with Microsoft Sentinel.

articles/storage/blobs/archive-rehydrate-to-online-tier.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@ ms.custom: devx-track-azurecli, devx-track-azurepowershell
1616

1717
# Rehydrate an archived blob to an online tier
1818

19-
To read a blob that is in the archive tier, you must first rehydrate the blob to an online tier (hot or cool) tier. You can rehydrate a blob in one of two ways:
19+
To read a blob that is in the archive tier, you must first rehydrate the blob to an online (hot, cool, or cold) tier. You can rehydrate a blob in one of two ways:
2020

21-
- By copying it to a new blob in the hot or cool tier with the [Copy Blob](/rest/api/storageservices/copy-blob) operation.
22-
- By changing its tier from archive to hot or cool with the [Set Blob Tier](/rest/api/storageservices/set-blob-tier) operation.
21+
- By copying it to a new blob in the hot, cool, or cold tier with the [Copy Blob](/rest/api/storageservices/copy-blob) operation.
22+
- By changing its tier from archive to hot, cool, or cold tier with the [Set Blob Tier](/rest/api/storageservices/set-blob-tier) operation.
2323

2424
When you rehydrate a blob, you can specify the priority for the operation to either standard priority or high priority. A standard-priority rehydration operation may take up to 15 hours to complete. A high-priority operation is prioritized over standard-priority requests and may complete in less than one hour for objects under 10 GB in size. You can change the rehydration priority from *Standard* to *High* while the operation is pending.
2525

articles/virtual-wan/virtual-wan-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Virtual WAN supports up to 20-Gbps aggregate throughput both for VPN and Express
149149

150150
### How is Virtual WAN different from an Azure virtual network gateway?
151151

152-
A virtual network gateway VPN is limited to 30 tunnels. For connections, you should use Virtual WAN for large-scale VPN. You can connect up to 1,000 branch connections per virtual hub with aggregate of 20 Gbps per hub. A connection is an active-active tunnel from the on-premises VPN device to the virtual hub. You can also have multiple virtual hubs per region, which means you can connect more than 1,000 branches to a single Azure Region by deploying multiple Virtual WAN hubs in that Azure Region, each with its own site-to-site VPN gateway.
152+
A virtual network gateway VPN is limited to 100 tunnels. For connections, you should use Virtual WAN for large-scale VPN. You can connect up to 1,000 branch connections per virtual hub with aggregate of 20 Gbps per hub. A connection is an active-active tunnel from the on-premises VPN device to the virtual hub. You can also have multiple virtual hubs per region, which means you can connect more than 1,000 branches to a single Azure Region by deploying multiple Virtual WAN hubs in that Azure Region, each with its own site-to-site VPN gateway.
153153

154154
### <a name="packets"></a>What is the recommended algorithm and Packets per second per site-to-site instance in Virtual WAN hub? How many tunnels is support per instance? What is the max throughput supported in a single tunnel?
155155

0 commit comments

Comments
 (0)