Skip to content

Commit ed24331

Browse files
authored
Merge pull request #201318 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 5cbf1cc + 8f66a8b commit ed24331

File tree

80 files changed

+1021
-662
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+1021
-662
lines changed

articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -278,4 +278,5 @@ Read the [client credentials overview documentation](https://aka.ms/msal-net-cli
278278
| Sample | Platform |Description |
279279
|--------|----------|------------|
280280
|[active-directory-dotnetcore-daemon-v2](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2) | .NET Core 2.1 Console | A simple .NET Core application that displays the users of a tenant querying the Microsoft Graph using the identity of the application, instead of on behalf of a user. The sample also illustrates the variation using certificates for authentication. |
281-
|[active-directory-dotnet-daemon-v2](https://github.com/Azure-Samples/active-directory-dotnet-daemon-v2)|ASP.NET MVC | A web application that syncs data from the Microsoft Graph using the identity of the application, instead of on behalf of a user. |
281+
|[active-directory-dotnet-daemon-v2](https://github.com/Azure-Samples/active-directory-dotnet-daemon-v2)| ASP.NET MVC | A web application that syncs data from the Microsoft Graph using the identity of the application, instead of on behalf of a user. |
282+
|[ms-identity-javascript-nodejs-console](https://github.com/Azure-Samples/ms-identity-javascript-nodejs-console)| Node.js Console | A simple Node.js application that displays the users of a tenant by querying the Microsoft Graph using the identity of the application |

articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -90,13 +90,13 @@ Typical personas for workbooks are:
9090

9191
## How to use it
9292

93-
All workbooks are stored in the workbook [gallery](../../azure-monitor/visualize/workbooks-overview.md#gallery)
94-
You have two options for working with workbooks:
93+
When working with workbooks, you can either start with an empty workbook, or use an existing template. Workbook templates enable you to quickly get started using workbooks without needing to build from scratch.
9594

96-
- Create a new workbook from scratch
97-
- Start with an existing workbook template from the gallery
95+
There are:
96+
97+
- **Public templates** published to a [gallery](../../azure-monitor/visualize/workbooks-overview.md#gallery) that serve as a good starting point when you are just getting started with workbooks.
98+
- **Private templates** when you start building your own workbooks and want to save one as a template to serve as the foundation for multiple workbooks in your tenant.
9899

99-
By using an already existing template from the gallery, you can benefit from the work others have already invested into solving the same business problem as you.
100100

101101

102102
## Prerequisites

articles/aks/cluster-configuration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,9 @@ This enables an OIDC Issuer URL of the provider which allows the API server to d
126126

127127
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
128128

129+
> [!WARNING]
130+
> Enable/disable OIDC Issuer will change the current service account token issuer to a new value, which causes some down time and make API server restart. If the application pods based on service account token keep in failed status after enable/disable OIDC Issuer, it's recommended to restart the pods manually.
131+
129132
### Before you begin
130133

131134
You must have the following resource installed:

articles/aks/release-tracker.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,6 @@ ms.custom: mvc
1212

1313
# AKS release tracker
1414

15-
> [!NOTE]
16-
> The AKS release tracker is currently not accessible. When the feature is fully released, this article will be updated to include access instructions.
17-
1815
AKS releases weekly rounds of fixes and feature and component updates that affect all clusters and customers. However, these releases can take up to two weeks to roll out to all regions from the initial time of shipping due to Azure Safe Deployment Practices (SDP). It is important for customers to know when a particular AKS release is hitting their region, and the AKS release tracker provides these details in real time by versions and regions.
1916

2017
## Why release tracker?
@@ -23,6 +20,8 @@ With AKS release tracker, customers can follow specific component updates presen
2320

2421
## How to use the release tracker
2522

23+
To view the release tracker, visit the [AKS release status webpage][release-tracker-webpage].
24+
2625
The top half of the tracker shows the latest and 3 previously available release versions for each region, and links to the corresponding release notes entry. This view is helpful when you want to track the available versions by region.
2726

2827
:::image type="content" source="./media/release-tracker/regional-status.png" alt-text="Screenshot of the A K S release tracker's regional status table displayed in a web browser.":::
@@ -32,4 +31,5 @@ The bottom half of the tracker shows the SDP process. The table has two views: o
3231
:::image type="content" source="./media/release-tracker/sdp-process.png" alt-text="Screenshot of the A K S release tracker's S D P process table displayed in a web browser.":::
3332

3433
<!-- LINKS - external -->
35-
[aks-release]: https://github.com/Azure/AKS/releases
34+
[aks-release]: https://github.com/Azure/AKS/releases
35+
[release-tracker-webpage]: https://releases.aks.azure.com/webpage/index.html

articles/app-service/environment/using-an-ase.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ To configure DNS in Azure DNS Private zones:
139139

140140
The DNS settings for your ASE default domain suffix do not restrict your apps to only being accessible by those names. You can set a custom domain name without any validation on your apps in an ILB ASE. If you then want to create a zone named *contoso.net*, you could do so and point it to the ILB IP address. The custom domain name works for app requests but doesn't for the scm site. The scm site is only available at *&lt;appname&gt;.scm.&lt;asename&gt;.appserviceenvironment.net*.
141141

142-
The zone named *.&lt;asename&gt;.appserviceenvironment.net* is globally unique. Before May 2019, customers were able to specify the domain suffix of the ILB ASE. If you wanted to use *.contoso.com* for the domain suffix, you were able do so and that would include the scm site. There were challenges with that model including; managing the default TLS/SSL certificate, lack of single sign-on with the scm site, and the requirement to use a wildcard certificate. The ILB ASE default certificate upgrade process was also disruptive and caused application restarts. To solve these problems, the ILB ASE behavior was changed to use a domain suffix based on the name of the ASE and with a Microsoft owned suffix. The change to the ILB ASE behavior only affects ILB ASEs made after May 2019. Pre-existing ILB ASEs must still manage the default certificate of the ASE and their DNS configuration.
142+
The zone named *.&lt;asename&gt;.appserviceenvironment.net* is globally unique. Before May 2019, customers were able to specify the domain suffix of the ILB ASE. If you wanted to use *.contoso.com* for the domain suffix, you were able do so and that would include the scm site. There were challenges with that model including; managing the default TLS/SSL certificate, lack of single sign-on with the scm site, and the requirement to use a wildcard certificate. The ILB ASE default certificate upgrade process was also disruptive and caused application restarts. To solve these problems, the ILB ASE behavior was changed to use a domain suffix based on the name of the ASE and with a Microsoft owned suffix. The change to the ILB ASE behavior only affects ILB ASEs made after May 2019. Pre-existing ILB ASEs must still manage the default certificate of the ASE and their DNS configuration. If your ILB ASE V2 was created after May 2019, you do not need to manage the ILB default certificate as it is managed by Microsoft.
143143

144144
## Publishing
145145

@@ -304,4 +304,4 @@ For more specific examples, use: az find "az appservice ase"
304304
[AppDeploy]: ../deploy-local-git.md
305305
[ASEWAF]: ./integrate-with-application-gateway.md
306306
[AppGW]: ../../web-application-firewall/ag/ag-overview.md
307-
[logalerts]: ../../azure-monitor/alerts/alerts-log.md
307+
[logalerts]: ../../azure-monitor/alerts/alerts-log.md

articles/app-service/webjobs-sdk-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -716,7 +716,7 @@ The attribute can be declared at the parameter, method, or class level. The sett
716716

717717
### Timeout attribute
718718

719-
The [`Timeout`](https://github.com/Azure/azure-webjobs-sdk/blob/master/src/Microsoft.Azure.WebJobs/TimeoutAttribute.cs) attribute causes a function to be canceled if it doesn't finish within a specified amount of time. In the following example, the function would run for one day without the Timeout attribute. Timeout causes the function to be canceled after 15 seconds.
719+
The [`Timeout`](https://github.com/Azure/azure-webjobs-sdk/blob/master/src/Microsoft.Azure.WebJobs/TimeoutAttribute.cs) attribute causes a function to be canceled if it doesn't finish within a specified amount of time. In the following example, the function would run for one day without the Timeout attribute. Timeout causes the function to be canceled after 15 seconds. When the Timeout attribute's "throwOnError" parameter is set to "true", the function invocation is terminated by having an exception thrown by the webjobs SDK when the timeout inverval is exceeded. The default value of "throwOnError" is "false". When the Timeout attribute is used, the default behavior is to cancel the function invocation by setting the cancellation token while allowing the invocation to run indefinitely until the function code returns or throws an exception.
720720

721721
```cs
722722
[Timeout("00:00:15")]
10.4 KB
Loading
30.1 KB
Loading
Loading
Loading

0 commit comments

Comments
 (0)