You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-maps/how-to-create-data-registries.md
+6-48Lines changed: 6 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,16 @@
1
1
---
2
-
title: Create Data Registry (preview)
2
+
title: Create Data Registry
3
3
titleSuffix: Azure Maps
4
4
description: Learn how to create Data Registry.
5
5
author: faterceros
6
6
ms.author: aterceros
7
-
ms.date: 2/14/2023
7
+
ms.date: 6/14/2023
8
8
ms.topic: how-to
9
9
ms.service: azure-maps
10
10
services: azure-maps
11
11
---
12
12
13
-
# How to create data registry (preview)
13
+
# How to create data registry
14
14
15
15
The [data registry] service enables you to register data content in an Azure Storage Account with your Azure Maps account. An example of data might include a collection of Geofences used in the Azure Maps Geofencing service. Another example is ZIP files containing drawing packages (DWG) or GeoJSON files that Azure Maps Creator uses to create or update indoor maps.
16
16
@@ -221,7 +221,7 @@ To create a data registry:
221
221
1. Once you have the body of your HTTP request ready, execute the following **HTTP PUT request**:
@@ -241,15 +241,15 @@ The value of the **Operation-Location** key is the status URL that you'll use to
241
241
To (optionally) check the status of the data registry creation process, enter the status URL you copied in the [Create a data registry](#create-a-data-registry) section, and add your subscription key as a query string parameter. The request should look similar to the following URL:
| contentMD5 | MD5 hash created from the contents of the file being registered. For more information, see [Data validation](#data-validation)|
315
-
| downloadURL | The download URL of the underlying data. Used to [Get content from a data registry](#get-content-from-a-data-registry). |
316
312
| sizeInBytes | The size of the content in bytes. |
317
313
318
-
## Get content from a data registry
319
-
320
-
Once you've uploaded one or more files to an Azure storage account, created and Azure Maps datastore to link to those files, then registered them using the [register] API, you can access the data contained in the files.
321
-
322
-
Use the `udid` to get the content of a file registered in an Azure Maps account:
The contents of the file appear in the body of the response. For example, a text based GeoJSON file appears similar to the following example:
329
-
330
-
```json
331
-
{
332
-
"type": "FeatureCollection",
333
-
"features": [
334
-
{
335
-
"type": "Feature",
336
-
"geometry": {
337
-
"type": "Point",
338
-
"coordinates": [
339
-
-122.126986,
340
-
47.639754
341
-
]
342
-
},
343
-
"properties": {
344
-
"geometryId": "001",
345
-
"radius": 500
346
-
}
347
-
}
348
-
]
349
-
}
350
-
```
351
-
352
-
The file type is returned in the `content-type` key of the response header.
353
-
354
-
Both text and binary files can be saved to a local hard drive or used directly in other processes like importing into the Azure Maps Creator conversion process.
355
-
356
314
## Replace a data registry
357
315
358
316
If you need to replace a previously registered file with another file, rerun the register request, passing in the same [AzureBlob](#the-azureblob) used to create the original registration, except for the [blobUrl](#the-bloburl-property). The `BlobUrl` needs to be modified to point to the new file.
Copy file name to clipboardExpand all lines: articles/cosmos-db/continuous-backup-restore-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ Currently, you can restore an Azure Cosmos DB account (API for NoSQL or MongoDB,
39
39
By default, Azure Cosmos DB stores continuous mode backup data in locally redundant storage blobs. For the regions that have zone redundancy configured, the backup is stored in zone-redundant storage blobs. In continuous backup mode, you can't update the backup storage redundancy.
40
40
41
41
## Different ways to restore
42
-
Continuous backup mode supports two ways to restore deleted containers, databases. Existing restore mechanism restores into a [new account](restore-account-continuous-backup.md) as documented here. Restore into existing account is described [here](restore-account-continuous-backup.md). The choice between two depends on the scenarios and impact. Most of the deleted containers, databases can prefer in-account (existing) account restore to prevent data transfer which is required in case you restored to a new account. For scenarios where you have modified the data accidently restore into new account is the right thing to do.
42
+
Continuous backup mode supports two ways to restore deleted containers, databases. Existing restore mechanism restores into a [new account](restore-account-continuous-backup.md) as documented here. Restore into existing account is described [here](restore-account-continuous-backup.md). The choice between two depends on the scenarios and impact. Most of the deleted containers, databases can prefer in-account (existing) account restore to prevent data transfer which is required in case you restored to a new account. For scenarios where you have modified the data accidentally restore into new account is the right thing to do.
Copy file name to clipboardExpand all lines: articles/synapse-analytics/security/synapse-workspace-ip-firewall.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ This article will explain IP firewall rules and teach you how to configure them
16
16
17
17
## IP firewall rules
18
18
19
-
IP firewall rules grant or deny access to your Azure Synapse workspace based on the originating IP address of each request. You can configure IP firewall rules for your workspace. IP firewall rules configured at the workspace level apply to all public endpoints of the workspace (dedicated SQL pools, serverless SQL pool, and development).
19
+
IP firewall rules grant or deny access to your Azure Synapse workspace based on the originating IP address of each request. You can configure IP firewall rules for your workspace. IP firewall rules configured at the workspace level apply to all public endpoints of the workspace (dedicated SQL pools, serverless SQL pool, and development). The maximum number of IP firewall rules is limited to 128. If you have the **Allow Azure Services and resources to access this server** setting enabled, this counts as a single firewall rule for the workspace.
0 commit comments