Skip to content

Commit f9752f0

Browse files
authored
Merge pull request #279245 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents b254bbd + 359bd68 commit f9752f0

File tree

8 files changed

+21
-5
lines changed

8 files changed

+21
-5
lines changed

articles/ai-services/content-safety/studio-quickstart.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ In this quickstart, get started with the Azure AI Content Safety service using C
2323

2424
* An active Azure account. If you don't have one, you can [create one for free](https://azure.microsoft.com/free/cognitive-services/).
2525
* A [Content Safety](https://aka.ms/acs-create) Azure resource.
26+
* The `Cognitive Services User` role assigned to the Content Safety resource in the desired Azure subscription.
2627
* Sign in to [Content Safety Studio](https://contentsafety.cognitive.azure.com) with your Azure subscription and Content Safety resource.
2728

2829

articles/ai-services/openai/concepts/gpt-with-vision.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ For a typical use case, take an image with both visible objects and text and a 1
8181
| Item | Detail | Cost |
8282
|-----------------|-----------------|--------------|
8383
| Text prompt input | 100 text tokens | $0.001 |
84-
| Example image input (see [Image tokens](/ai-services/openai/overview#image-tokens-gpt-4-turbo-with-vision)) | 170 + 85 image tokens | $0.00255 |
84+
| Example image input (see [Image tokens](/azure/ai-services/openai/overview#image-tokens-gpt-4-turbo-with-vision)) | 170 + 85 image tokens | $0.00255 |
8585
| Enhanced add-on features for OCR | $1.50 / 1000 transactions | $0.0015 |
8686
| Enhanced add-on features for Object Grounding | $1.50 / 1000 transactions | $0.0015 |
8787
| Output Tokens | 100 tokens (assumed) | $0.003 |

articles/aks/configure-azure-cni-static-block-allocation.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ location="myRegion"
149149
az group create --name $resourceGroup --location $location
150150
151151
# Create our two subnet network
152-
az network vnet create -resource-group $resourceGroup --location $location --name $vnet --address-prefixes 10.0.0.0/8 -o none
152+
az network vnet create --resource-group $resourceGroup --location $location --name $vnet --address-prefixes 10.0.0.0/8 -o none
153153
az network vnet subnet create --resource-group $resourceGroup --vnet-name $vnet --name nodesubnet --address-prefixes 10.240.0.0/16 -o none
154154
az network vnet subnet create --resource-group $resourceGroup --vnet-name $vnet --name podsubnet --address-prefixes 10.40.0.0/13 -o none
155155
```
@@ -171,7 +171,6 @@ az aks create \
171171
--vnet-subnet-id /subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.Network/virtualNetworks/$vnet/subnets/nodesubnet \
172172
--pod-subnet-id /subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.Network/virtualNetworks/$vnet/subnets/podsubnet \
173173
--enable-addons monitoring \
174-
--kubernetes-version 1.28 \
175174
--generate-ssh-keys
176175
```
177176

31.5 KB
Loading

articles/aks/monitor-aks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ For more information on the difference between collection modes including how to
103103
> The ability to select the collection mode isn't available in the Azure portal in all regions yet. For those regions where it's not yet available, use CLI to create the diagnostic setting with a command such as the following:
104104
>
105105
> ```azurecli
106-
> az monitor diagnostic-settings create --name AKS-Diagnostics --resource /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myresourcegroup/providers/Microsoft.ContainerService/managedClusters/my-cluster --logs '[{""category"": ""kube-audit"",""enabled"": true}, {""category"": ""kube-audit-admin"", ""enabled"": true}, {""category"": ""kube-apiserver"", ""enabled"": true}, {""category"": ""kube-controller-manager"", ""enabled"": true}, {""category"": ""kube-scheduler"", ""enabled"": true}, {""category"": ""cluster-autoscaler"", ""enabled"": true}, {""category"": ""cloud-controller-manager"", ""enabled"": true}, {""category"": ""guard"", ""enabled"": true}, {""category"": ""csi-azuredisk-controller"", ""enabled"": true}, {""category"": ""csi-azurefile-controller"", ""enabled"": true}, {""category"": ""csi-snapshot-controller"", ""enabled"": true}]' --workspace /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourcegroups/myresourcegroup/providers/microsoft.operationalinsights/workspaces/myworkspace --export-to-resource-specific true
106+
> az monitor diagnostic-settings create --name AKS-Diagnostics --resource /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myresourcegroup/providers/Microsoft.ContainerService/managedClusters/my-cluster --logs '[{"category": "kube-audit","enabled": true}, {"category": "kube-audit-admin", "enabled": true}, {"category": "kube-apiserver", "enabled": true}, {"category": "kube-controller-manager", "enabled": true}, {"category": "kube-scheduler", "enabled": true}, {"category": "cluster-autoscaler", "enabled": true}, {"category": "cloud-controller-manager", "enabled": true}, {"category": "guard", "enabled": true}, {"category": "csi-azuredisk-controller", "enabled": true}, {"category": "csi-azurefile-controller", "enabled": true}, {"category": "csi-snapshot-controller", "enabled": true}]' --workspace /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourcegroups/myresourcegroup/providers/microsoft.operationalinsights/workspaces/myworkspace --export-to-resource-specific true
107107
> ```
108108
109109
#### Sample log queries

articles/aks/use-kms-etcd-encryption.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -336,7 +336,7 @@ kubectl get secrets --all-namespaces -o json | kubectl replace -f -
336336
> [!NOTE]
337337
> To change a different key vault with a different mode (whether public or private), you can run `az aks update` directly. To change the mode of an attached key vault, you must first turn off KMS, and then turn it on again by using the new key vault IDs.
338338
339-
The following sections describe how to migrate an attached public key vault to private mode.
339+
The following sections describe how to migrate an attached public key vault to private mode. These steps can also be used for migrating from private to public.
340340

341341
### Turn off KMS on the cluster
342342

@@ -354,6 +354,8 @@ Update the key vault from public to private:
354354
az keyvault update --name MyKeyVault --resource-group MyResourceGroup --public-network-access Disabled
355355
```
356356

357+
To migrate from private to public set `--public-network-access` to `Enabled` in the command above.
358+
357359
### Turn on KMS for the cluster by using the updated key vault
358360

359361
Turn on KMS by using the updated private key vault:

articles/aks/windows-aks-customer-stories.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,22 @@ Explore how various industries are using Windows Containers on Azure Kubernetes
1616
Learn directly from the customer stories listed here.
1717

1818
## Customer stories
19+
- [Finastra](#finastra)
1920
- [Relativity](#relativity)
2021
- [Duck Creek](#duck-creek)
2122
- [Forza (Xbox Game Studios)](#forza)
2223
- [Microsoft Experience + Devices](#microsoft-experience--devices)
2324

25+
26+
### Finastra
27+
28+
![Logo of Finastra.](./media/windows-aks-customer-stories/finastra.png)
29+
30+
LaserPro document management software is key to the Finastra vision of delivering the future of banking. Migrating from an on-premises management system to a cloud-based infrastructure using Windows containers on Azure Kubernetes Service has significantly increased agility through biweekly updates and reduced support costs for both customers and developers.
31+
32+
For more information visit [Finastra's Windows AKS customer story](https://customers.microsoft.com/en-us/story/1759082810297807726-finastra-azure-kubernetes-service-professional-services-en-united-kingdom).
33+
34+
2435
### Relativity
2536

2637
![Logo of Relativity.](./media/windows-aks-customer-stories/relativity.png)

articles/virtual-machines/shared-image-galleries.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,9 @@ Specialized VMs haven't been through a process to remove machine specific inform
108108
- VMs will have the **Computer name** of the VM the image was taken from. You should change the computer name to avoid collisions.
109109
- The `osProfile` is how some sensitive information is passed to the VM, using `secrets`. This may cause issues using KeyVault, WinRM and other functionality that uses `secrets` in the `osProfile`. In some cases, you can use managed service identities (MSI) to work around these limitations.
110110

111+
> [!NOTE]
112+
> Generalized and specialized VM images contain an operating system disk and all the attached disks, if there any.
113+
111114

112115
## Updating resources
113116

0 commit comments

Comments
 (0)