Skip to content

Commit f55b506

Browse files
committed
status
1 parent d4a5ebb commit f55b506

File tree

9 files changed

+46
-117
lines changed

9 files changed

+46
-117
lines changed

articles/azure-resource-manager/custom-providers/create-custom-provider-quickstart-powershell.md

Lines changed: 10 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,12 @@ In this quickstart, you learn how to create your own Azure custom resource provi
2222
2323
## Requirements
2424

25-
If you don't have an Azure subscription, create a [free](https://azure.microsoft.com/free/) account
26-
before you begin.
25+
If you don't have an Azure subscription, create a [free](https://azure.microsoft.com/free/) account before you begin.
2726

28-
If you choose to use PowerShell locally, this article requires that you install the Az PowerShell
29-
module and connect to your Azure account using the
30-
[Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount) cmdlet. For more information
31-
about installing the Az PowerShell module, see
27+
If you choose to use PowerShell locally, this article requires that you install the Az PowerShell module and connect to your Azure account using the
28+
[Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount) cmdlet. For more information about installing the Az PowerShell module, see
3229
[Install Azure PowerShell](/powershell/azure/install-azure-powershell). If you choose to use Cloud Shell, see
33-
[Overview of Azure Cloud Shell](../../cloud-shell/overview.md) for
34-
more information.
30+
[Overview of Azure Cloud Shell](../../cloud-shell/overview.md) for more information.
3531

3632
> [!IMPORTANT]
3733
> While the **Az.CustomProviders** PowerShell module is in preview, you must install it separately using
@@ -42,8 +38,7 @@ more information.
4238
Install-Module -Name Az.CustomProviders
4339
```
4440

45-
If you have multiple Azure subscriptions, choose the appropriate subscription in which the resources
46-
should be billed. Select a specific subscription using the
41+
If you have multiple Azure subscriptions, choose the appropriate subscription in which the resources should be billed. Select a specific subscription using the
4742
[Set-AzContext](/powershell/module/az.accounts/set-azcontext) cmdlet.
4843

4944
```azurepowershell-interactive
@@ -52,10 +47,8 @@ Set-AzContext -SubscriptionId 00000000-0000-0000-0000-000000000000
5247

5348
## Create a resource group
5449

55-
Create an [Azure resource group](../../azure-resource-manager/management/overview.md)
56-
using the [New-AzResourceGroup](/powershell/module/az.resources/new-azresourcegroup)
57-
cmdlet. A resource group is a logical container in which Azure resources are deployed and managed as
58-
a group.
50+
Create an [Azure resource group](../../azure-resource-manager/management/overview.md) using the [New-AzResourceGroup](/powershell/module/az.resources/new-azresourcegroup)
51+
cmdlet. A resource group is a logical container in which Azure resources are deployed and managed as a group.
5952

6053
The following example creates a resource group with the specified name and in the specified location.
6154

@@ -66,8 +59,7 @@ New-AzResourceGroup -Name myResourceGroup -Location westus2
6659
## Create a custom resource provider
6760

6861
To create or update a custom resource provider, you use the
69-
[New-AzCustomProvider](/powershell/module/az.customproviders/new-azcustomprovider) cmdlet as shown
70-
in the following example.
62+
[New-AzCustomProvider](/powershell/module/az.customproviders/new-azcustomprovider) cmdlet as shown in the following example.
7163

7264
```azurepowershell-interactive
7365
New-AzCustomProvider -ResourceGroupName myResourceGroup -Name Namespace.Type -Location westus2 -ResourceType @{Name='CustomRoute1'; Endpoint='https://www.contoso.com/'}
@@ -76,8 +68,7 @@ New-AzCustomProvider -ResourceGroupName myResourceGroup -Name Namespace.Type -Lo
7668
## Get the custom resource provider manifest
7769

7870
To retrieve information about the custom resource provider manifest, you use the
79-
[Get-AzCustomProvider](/powershell/module/az.customproviders/get-azcustomprovider) cmdlet as shown
80-
in the following example.
71+
[Get-AzCustomProvider](/powershell/module/az.customproviders/get-azcustomprovider) cmdlet as shown in the following example.
8172

8273
```azurepowershell-interactive
8374
Get-AzCustomProvider -ResourceGroupName myResourceGroup -Name Namespace.Type | Format-List
@@ -106,8 +97,7 @@ Get-AzCustomProviderAssociation -Scope $resourceId -Name MyAssoc
10697

10798
## Clean up resources
10899

109-
If the resources created in this article aren't needed, you can delete them by running the following
110-
examples.
100+
If the resources created in this article aren't needed, you can delete them by running the following examples.
111101

112102
### Delete an association
113103

articles/azure-resource-manager/management/resource-graph-samples.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,8 @@ ms.custom: subject-resourcegraph-sample, devx-track-azurepowershell, devx-track-
88

99
# Azure Resource Graph sample queries for Azure Resource Manager
1010

11-
This page is a collection of [Azure Resource Graph](../../governance/resource-graph/overview.md)
12-
sample queries for Azure Resource Manager. For a complete list of Azure Resource Graph samples, see
13-
[Resource Graph samples by Category](../../governance/resource-graph/samples/samples-by-category.md)
14-
and [Resource Graph samples by Table](../../governance/resource-graph/samples/samples-by-table.md).
11+
This page is a collection of [Azure Resource Graph](../../governance/resource-graph/overview.md) sample queries for Azure Resource Manager. For a complete list of Azure Resource Graph samples, see
12+
[Resource Graph samples by Category](../../governance/resource-graph/samples/samples-by-category.md) and [Resource Graph samples by Table](../../governance/resource-graph/samples/samples-by-table.md).
1513

1614
## Sample queries for tags
1715

articles/batch/batch-virtual-network.md

Lines changed: 10 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,7 @@ When you create an Azure Batch pool, you can provision the pool in a subnet of a
1111

1212
## Why use a Virtual Network?
1313

14-
Compute nodes in a pool can communicate with each other, such as to run multi-instance tasks, without requiring a
15-
separate Virtual Network. However, by default, nodes in a pool can't communicate with any virtual machine (VM) that is outside of the pool, such as license or file servers.
14+
Compute nodes in a pool can communicate with each other, such as to run multi-instance tasks, without requiring a separate Virtual Network. However, by default, nodes in a pool can't communicate with any virtual machine (VM) that is outside of the pool, such as license or file servers.
1615

1716
To allow compute nodes to communicate securely with other virtual machines, or with an on-premises network, you can provision the pool in a subnet of a Virtual Network.
1817

@@ -33,8 +32,7 @@ To allow compute nodes to communicate securely with other virtual machines, or w
3332

3433
* The subnet specified for the pool must have enough unassigned IP addresses to accommodate the number of VMs targeted for the pool, enough to accommodate the `targetDedicatedNodes` and `targetLowPriorityNodes` properties of the pool. If the subnet doesn't have enough unassigned IP addresses, the pool partially allocates the compute nodes, and a resize error occurs.
3534

36-
* If you aren't using [Simplified Compute Node Communication](simplified-compute-node-communication.md), you need to resolve your Azure Storage endpoints by using any custom DNS servers that serve your virtual network. Specifically,
37-
URLs of the form `<account>.table.core.windows.net`, `<account>.queue.core.windows.net`, and
35+
* If you aren't using [Simplified Compute Node Communication](simplified-compute-node-communication.md), you need to resolve your Azure Storage endpoints by using any custom DNS servers that serve your virtual network. Specifically, URLs of the form `<account>.table.core.windows.net`, `<account>.queue.core.windows.net`, and
3836
`<account>.blob.core.windows.net` should be resolvable.
3937

4038
* Multiple pools can be created in the same virtual network or in the same subnet (as long as it has sufficient address space). A single pool can't exist across multiple virtual networks or subnets.
@@ -49,10 +47,7 @@ pools are [deprecated](https://azure.microsoft.com/updates/azure-batch-cloudserv
4947
> [Simplified](simplified-compute-node-communication.md) node communication mode
5048
> is where the compute nodes initiate communication to the Batch Service.
5149
52-
* Any virtual network or peered virtual network that will be used for Batch pools should not have overlapping IP address ranges with software defined networking
53-
or routing on compute nodes. A common source for conflicts is from the use of a [container runtime](batch-docker-container-workloads.md), such as docker. Docker
54-
will create a default network bridge with a defined subnet range of `172.17.0.0/16`. Any services running within a virtual network in that default IP address
55-
space will conflict with services on the compute node, such as remote access via SSH.
50+
* Any virtual network or peered virtual network that will be used for Batch pools should not have overlapping IP address ranges with software defined networking or routing on compute nodes. A common source for conflicts is from the use of a [container runtime](batch-docker-container-workloads.md), such as docker. Docker will create a default network bridge with a defined subnet range of `172.17.0.0/16`. Any services running within a virtual network in that default IP address space will conflict with services on the compute node, such as remote access via SSH.
5651

5752
## Pools in Virtual Machine Configuration
5853

@@ -74,15 +69,11 @@ Requirements:
7469
7570
### Network security groups for Virtual Machine Configuration pools: Batch default
7671

77-
Batch creates a network security group (NSG) at the network interface level of each Virtual Machine Scale
78-
Set deployment within a Batch pool. For pools that don't have public IP addresses under `simplified` compute
79-
node communication, NSGs aren't created.
72+
Batch creates a network security group (NSG) at the network interface level of each Virtual Machine Scale Set deployment within a Batch pool. For pools that don't have public IP addresses under `simplified` compute node communication, NSGs aren't created.
8073

81-
In order to provide the necessary communication between compute nodes and the Batch service, these NSGs are
82-
configured such that:
74+
In order to provide the necessary communication between compute nodes and the Batch service, these NSGs are configured such that:
8375

84-
* Inbound TCP traffic on ports 29876 and 29877 from Batch service IP addresses that correspond to the
85-
BatchNodeManagement.*region* service tag. This rule is only created in `classic` pool communication mode.
76+
* Inbound TCP traffic on ports 29876 and 29877 from Batch service IP addresses that correspond to the BatchNodeManagement.*region* service tag. This rule is only created in `classic` pool communication mode.
8677
* Inbound TCP traffic on port 22 (Linux nodes) or port 3389 (Windows nodes) to permit remote access for SSH or RDP on default ports, respectively. For certain types of multi-instance tasks on Linux, such as MPI, you may need to allow SSH traffic for IPs in the subnet containing Batch compute nodes. Certain MPI runtimes may require launching over SSH, which is typically routed on private IP address space. This traffic might be blocked per subnet-level NSG rules.
8778
* Outbound any traffic on port 443 to Batch service IP addresses that correspond to the BatchNodeManagement.*region* service tag.
8879
* Outbound traffic on any port to the virtual network. This rule might be amended per subnet-level NSG rules.
@@ -93,8 +84,7 @@ BatchNodeManagement.*region* service tag. This rule is only created in `classic`
9384
9485
### Network security groups for Virtual Machine Configuration pools: Specifying subnet-level rules
9586

96-
If you have an NSG associated with the subnet for Batch compute nodes, you must configure this
97-
NSG with at least the inbound and outbound security rules that are shown in the following tables.
87+
If you have an NSG associated with the subnet for Batch compute nodes, you must configure this NSG with at least the inbound and outbound security rules that are shown in the following tables.
9888

9989
> [!WARNING]
10090
> Batch service IP addresses can change over time. Therefore, you should use the
@@ -108,12 +98,7 @@ NSG with at least the inbound and outbound security rules that are shown in the
10898
| BatchNodeManagement.*region* [service tag](../../articles/virtual-network/network-security-groups-overview.md#service-tags) | 29876-29877 | TCP | Classic | Yes |
10999
| Source IP addresses for remotely accessing compute nodes | 3389 (Windows), 22 (Linux) | TCP | Classic or Simplified | No |
110100

111-
Configure inbound traffic on port 3389 (Windows) or 22 (Linux) only if you need to permit remote access
112-
to the compute nodes from outside sources on default RDP or SSH ports, respectively. You might need to allow
113-
SSH traffic on Linux if you require support for multi-instance tasks with certain Message Passing Interface
114-
(MPI) runtimes in the subnet containing the Batch compute nodes as traffic may be blocked per subnet-level NSG
115-
rules. MPI traffic is typically over private IP address space, but can vary between MPI runtimes and runtime
116-
configuration. Allowing traffic on these ports isn't strictly required for the pool compute nodes to be usable.
101+
Configure inbound traffic on port 3389 (Windows) or 22 (Linux) only if you need to permit remote access to the compute nodes from outside sources on default RDP or SSH ports, respectively. You might need to allow SSH traffic on Linux if you require support for multi-instance tasks with certain Message Passing Interface (MPI) runtimes in the subnet containing the Batch compute nodes as traffic may be blocked per subnet-level NSG rules. MPI traffic is typically over private IP address space, but can vary between MPI runtimes and runtime configuration. Allowing traffic on these ports isn't strictly required for the pool compute nodes to be usable.
117102
You can also disable default remote access on these ports through configuring [pool endpoints](pool-endpoint-configuration.md).
118103

119104
#### Outbound security rules
@@ -123,14 +108,7 @@ You can also disable default remote access on these ports through configuring [p
123108
| BatchNodeManagement.*region* [service tag](../../articles/virtual-network/network-security-groups-overview.md#service-tags) | 443 | * | Simplified | Yes |
124109
| Storage.*region* [service tag](../../articles/virtual-network/network-security-groups-overview.md#service-tags) | 443 | TCP | Classic | Yes |
125110

126-
Outbound to BatchNodeManagement.*region* service tag is required in `classic` pool communication mode
127-
if you're using Job Manager tasks or if your tasks must communicate back to the Batch service. For outbound to
128-
BatchNodeManagement.*region* in `simplified` pool communication mode, the Batch service currently only
129-
uses TCP protocol, but UDP might be required for future compatibility. For
130-
[pools without public IP addresses](simplified-node-communication-pool-no-public-ip.md)
131-
using `simplified` communication mode and with a node management private endpoint, an NSG isn't needed.
132-
For more information about outbound security rules for the BatchNodeManagement.*region* service tag, see
133-
[Use simplified compute node communication](simplified-compute-node-communication.md).
111+
Outbound to BatchNodeManagement.*region* service tag is required in `classic` pool communication mode if you're using Job Manager tasks or if your tasks must communicate back to the Batch service. For outbound to BatchNodeManagement.*region* in `simplified` pool communication mode, the Batch service currently only uses TCP protocol, but UDP might be required for future compatibility. For [pools without public IP addresses](simplified-node-communication-pool-no-public-ip.md) using `simplified` communication mode and with a node management private endpoint, an NSG isn't needed. For more information about outbound security rules for the BatchNodeManagement.*region* service tag, see [Use simplified compute node communication](simplified-compute-node-communication.md).
134112

135113
## Pools in the Cloud Services Configuration
136114

@@ -158,7 +136,7 @@ Configure inbound traffic on port 3389 for Windows if you need to permit RDP acc
158136

159137
| Source IP addresses | Source ports | Destination | Destination ports | Protocol | Action |
160138
| --- | --- | --- | --- | --- | --- |
161-
Any <br /><br />Although this rule effectively requires *allow all*, the Batch service applies an ACL rule at the level of each node that filters out all non-Batch service IP addresses. | * | Any | 10100, 20100, 30100 | TCP | Allow |
139+
| Any <br /><br />Although this rule effectively requires *allow all*, the Batch service applies an ACL rule at the level of each node that filters out all non-Batch service IP addresses. | * | Any | 10100, 20100, 30100 | TCP | Allow |
162140
| Optional, to allow RDP access to compute nodes. | * | Any | 3389 | TCP | Allow |
163141

164142
**Outbound security rules**

articles/communication-services/resources/troubleshooting/voice-video-calling/audio-issues/overview.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,7 @@ To establish a voice call with good quality, several factors must be considered.
2323

2424
All of these factors are important from an end-to-end perspective.
2525

26-
Device and network issues are considered external problems from the perspective of the ACS Calling SDK.
27-
Your application should integrate the [User Facing Diagnostics API](../../../../concepts/voice-video-calling/user-facing-diagnostics.md)
28-
to monitor device and network issues and display warning messages accordingly.
29-
In this way, users are aware of the issue and can troubleshoot on their own.
26+
Device and network issues are considered external problems from the perspective of the ACS Calling SDK. Your application should integrate the [User Facing Diagnostics API](../../../../concepts/voice-video-calling/user-facing-diagnostics.md) to monitor device and network issues and display warning messages accordingly. In this way, users are aware of the issue and can troubleshoot on their own.
3027

3128
## Common issues in audio calls
3229
Here we list several common audio issues, along with potential causes for each issue:

articles/container-registry/resource-graph-samples.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,8 @@ ms.custom: subject-resourcegraph-sample
1010
---
1111
# Azure Resource Graph sample queries for Azure Container Registry
1212

13-
This page is a collection of [Azure Resource Graph](../governance/resource-graph/overview.md) sample
14-
queries for Azure Container Registry. For a complete list of Azure Resource Graph samples, see
15-
[Resource Graph samples by Category](../governance/resource-graph/samples/samples-by-category.md)
16-
and [Resource Graph samples by Table](../governance/resource-graph/samples/samples-by-table.md).
13+
This page is a collection of [Azure Resource Graph](../governance/resource-graph/overview.md) sample queries for Azure Container Registry. For a complete list of Azure Resource Graph samples, see
14+
[Resource Graph samples by Category](../governance/resource-graph/samples/samples-by-category.md) and [Resource Graph samples by Table](../governance/resource-graph/samples/samples-by-table.md).
1715

1816
## Sample queries
1917

articles/cosmos-db/mongodb/how-to-configure-multi-region-write.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@ MongoDB connection strings supports the “appName” parameter, which is a mean
3636
The appName parameter can be in one of the following formats​:
3737

3838
```powershell
39-
appName=<user-workload-name>
40-
appName=<user-workload-name>@<preferred-write-region>
39+
appName=<user-workload-name>
40+
appName=<user-workload-name>@<preferred-write-region>
4141
appName=<user-workload-name>@<cosmosdb-account-name>@<preferred-write-region>
4242
```
4343

articles/cosmos-db/nosql/kafka-connector-sink.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -260,9 +260,8 @@ If you have non-JSON data on your source topic in Kafka and attempt to read it u
260260

261261
```console
262262
org.apache.kafka.connect.errors.DataException: Converting byte[] to Kafka Connect data failed due to serialization error:
263-
264-
org.apache.kafka.common.errors.SerializationException: java.io.CharConversionException: Invalid UTF-32 character 0x1cfa7e2 (above 0x0010ffff) at char #1, byte #7)
265-
263+
...
264+
org.apache.kafka.common.errors.SerializationException: java.io.CharConversionException: Invalid UTF-32 character 0x1cfa7e2 (above 0x0010ffff) at char #1, byte #7
266265
```
267266

268267
This error is likely caused by data in the source topic being serialized in either Avro or another format such as CSV string.
@@ -313,10 +312,9 @@ This scenario is applicable when you try to use the Avro converter to read data
313312
```console
314313
org.apache.kafka.connect.errors.DataException: my-topic-name
315314
at io.confluent.connect.avro.AvroConverter.toConnectData(AvroConverter.java:97)
316-
315+
...
317316
org.apache.kafka.common.errors.SerializationException: Error deserializing Avro message for id -1
318317
org.apache.kafka.common.errors.SerializationException: Unknown magic byte!
319-
320318
```
321319

322320
**Solution**: Check the source topic’s serialization format. Then, either switch Kafka Connect’s sink connector to use the right converter or switch the upstream format to Avro.

0 commit comments

Comments
 (0)