You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With Azure Active Directory B2C (Azure AD B2C) [HTML templates](customize-ui-with-html.md), you can craft your users' identity experiences. Your HTML templates can contain only certain HTML tags and attributes. Basic HTML tags, such as <b>, <i>, <u>, <h1>, and <hr> are allowed. More advanced tags such as <script>, and <iframe> are removed for security reasons.
23
+
With Azure Active Directory B2C (Azure AD B2C) [HTML templates](customize-ui-with-html.md), you can craft your users' identity experiences. Your HTML templates can contain only certain HTML tags and attributes. Basic HTML tags, such as <b>, <i>, <u>, <h1>, and <hr> are allowed. More advanced tags such as <script>, and <iframe> are removed for security reasons but the `<script>` tag should be added in the `<head>` tag.
24
+
25
+
The `<script>` tag should be added in the `<head>` tag in two ways:
26
+
27
+
1. Adding the `defer` attribute, which specifies that the script is downloaded in parallel to parsing the page, then the script is executed after the page has finished parsing:
28
+
29
+
```javascript
30
+
<script src="my-script.js" defer></script>
31
+
```
32
+
33
+
34
+
2. Adding `async` attribute that specifies that the script is downloaded in parallel to parsing the page, then the script is executed as soon as it is available (before parsing completes):
35
+
36
+
```javascript
37
+
<script src="my-script.js" async></script>
38
+
```
24
39
25
40
To enable JavaScript and advance HTML tags and attributes:
Copy file name to clipboardExpand all lines: articles/ai-services/speech-service/how-to-custom-speech-test-and-train.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,6 +99,9 @@ Audio files can have silence at the beginning and end of the recording. If possi
99
99
100
100
Custom Speech projects require audio files with these properties:
101
101
102
+
> [!IMPORTANT]
103
+
> These are requirements for Audio + human-labeled transcript training and testing. They differ from the ones for Audio only training and testing. If you want to use Audio only training and testing, [see this section](#audio-data-for-training-or-testing).
@@ -242,6 +245,9 @@ Audio data is optimal for testing the accuracy of Microsoft's baseline speech to
242
245
243
246
Custom Speech projects require audio files with these properties:
244
247
248
+
> [!IMPORTANT]
249
+
> These are requirements for Audio only training and testing. They differ from the ones for Audio + human-labeled transcript training and testing. If you want to use Audio + human-labeled transcript training and testing, [see this section](#audio--human-labeled-transcript-data-for-training-or-testing).
Copy file name to clipboardExpand all lines: articles/aks/use-oidc-issuer.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Create an OpenID Connect provider for your Azure Kubernetes Service (AKS)
3
3
description: Learn how to configure the OpenID Connect (OIDC) provider for a cluster in Azure Kubernetes Service (AKS)
4
4
ms.topic: article
5
5
ms.custom: devx-track-azurecli
6
-
ms.date: 10/26/2023
6
+
ms.date: 10/27/2023
7
7
---
8
8
9
9
# Create an OpenID Connect provider on Azure Kubernetes Service (AKS)
@@ -60,7 +60,7 @@ az aks oidc-issuer rotate-signing-keys -n myAKSCluster -g myResourceGroup
60
60
```
61
61
62
62
> [!IMPORTANT]
63
-
> Once you rotate the key, the old key (key1) expires after 24 hours. This means that both the old key (key1) and the new key (key2) are valid within the 24-hour period. If you want to invalidate the old key (key1) immediately, you need to rotate the OIDC key twice. Then key2 and key3 are valid, and key1 is invalid.
63
+
> Once you rotate the key, the old key (key1) expires after 24 hours. This means that both the old key (key1) and the new key (key2) are valid within the 24-hour period. If you want to invalidate the old key (key1) immediately, you need to rotate the OIDC key twice and restart the pods using projected service account tokens. Then key2 and key3 are valid, and key1 is invalid.
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-component-versioning.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,8 @@ This table lists the versions of HDInsight that are available in the Azure porta
16
16
17
17
| HDInsight version | VM OS | Release date| Support type | Support expiration date | Retirement date | High availability |
18
18
| --- | --- | --- | --- | --- | --- | ---|
19
-
|[HDInsight 5.1](./hdinsight-5x-component-versioning.md)|Ubuntu 18.0.4 LTS |Feb 27, 2023 |[Standard](hdinsight-component-versioning.md#support-options-for-hdinsight-versions)| Not announced |Not announced| Yes |
19
+
|[HDInsight 5.1](./hdinsight-5x-component-versioning.md)|Ubuntu 18.0.4 LTS |November 1, 2023 |[Standard](hdinsight-component-versioning.md#support-options-for-hdinsight-versions)| Not announced |Not announced| Yes |
20
+
|[HDInsight 5.0](./hdinsight-5x-component-versioning.md)|Ubuntu 18.0.4 LTS |March 11, 2022 |[Standard](hdinsight-component-versioning.md#support-options-for-hdinsight-versions)| Not announced |Not announced| Yes |
20
21
|[HDInsight 4.0](hdinsight-40-component-versioning.md)|Ubuntu 18.0.4 LTS |September 24, 2018 |[Standard](hdinsight-component-versioning.md#support-options-for-hdinsight-versions)| Not announced | Not announced |Yes |
21
22
22
23
**Support expiration** means that Microsoft no longer provides support for the specific HDInsight version. You might not be able to create clusters from the Azure portal.
@@ -31,7 +32,7 @@ Azure HDInsight supports the following Apache Spark versions.
31
32
| -- | -- |--|--|--|--|--|
32
33
| 4.0 | 2.4 | July 8, 2019 | End of life announced (EOLA)| February 10, 2023| August 10, 2023 | February 10, 2024 |
33
34
| 5.0 | 3.1 | March 11, 2022 | General availability |-|-|-|
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-release-notes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ For workload specific versions, see
39
39
40
40
## What's new
41
41
42
-
* HDInsight announces the General availability of HDInsight 5.1 starting October 26, 2023. This release brings in a full stack refresh to the [open source components](./hdinsight-5x-component-versioning.md#open-source-components-available-with-hdinsight-5x) and the integrations from Microsoft.
42
+
* HDInsight announces the General availability of HDInsight 5.1 starting November 1, 2023. This release brings in a full stack refresh to the [open source components](./hdinsight-5x-component-versioning.md#open-source-components-available-with-hdinsight-5x) and the integrations from Microsoft.
43
43
* Latest Open Source Versions – [HDInsight 5.1](./hdinsight-5x-component-versioning.md) comes with the latest stable [open-source version](./hdinsight-5x-component-versioning.md#open-source-components-available-with-hdinsight-5x) available. Customers can benefit from all latest open source features, Microsoft performance improvements, and Bug fixes.
44
44
* Secure – The latest versions come with the most recent security fixes, both open-source security fixes and security improvements by Microsoft.
45
45
* Lower TCO – With performance enhancements customers can lower the operating cost, along with [enhanced autoscale](https://techcommunity.microsoft.com/t5/analytics-on-azure-blog/enhanced-autoscale-capabilities-in-hdinsight-clusters/ba-p/3811271).
- Support Automated consumer offsets sync across cluster in MM 2.0, making it easier to migrate or failover consumers across clusters. (KIP-545)
25
-
- Hint to the partition leader to recover the partition: A new feature that allows the controller to communicate to a newly elected topic partition leader whether it needs to recover its state (KIP-704)
26
-
- Supports TLS 1.2 by default for secure communication
27
-
- Zookeeper Dependency Removal: Producers and consumers no longer need the zookeeper parameter. Use the `--bootstrap-server` option instead of `--zookeeper` with CLI commands. (KIP-500)
28
-
- Configurable backlog size for creating Acceptor: A new configuration that allows setting the size of the SYN backlog for TCP’s acceptor sockets on the brokers (KIP-764)
29
-
- Top-level error code field to DescribeLogDirsResponse: A new error code that makes DescribeLogDirs API consistent with other APIs and allows returning other errors besides CLUSTER_AUTHORIZATION_FAILED (KIP-784)
20
+
- Support Automated consumer offsets sync across cluster in MM 2.0, making it easier to migrate or failover consumers across clusters [KIP-545](https://cwiki.apache.org/confluence/display/KAFKA/KIP-545%3A+support+automated+consumer+offset+sync+across+clusters+in+MM+2.0).
21
+
- Hint to the partition leader to recover the partition: A new feature that allows the controller to communicate to a newly elected topic partition leader whether it needs to recover its state [KIP-704](https://cwiki.apache.org/confluence/display/KAFKA/KIP-704%3A+Send+a+hint+to+the+partition+leader+to+recover+the+partition).
22
+
- Supports TLS 1.2 by default for secure communication.
23
+
- Zookeeper Dependency Removal: Producers and consumers no longer need the zookeeper parameter. Use the `--bootstrap-server` option instead of `--zookeeper` with CLI commands [KIP-500](https://cwiki.apache.org/confluence/display/KAFKA/KIP-500%3A+Replace+ZooKeeper+with+a+Self-Managed+Metadata+Quorum).
24
+
- Configurable backlog size for creating Acceptor: A new configuration that allows setting the size of the SYN backlog for TCP’s acceptor sockets on the brokers [KIP-764](https://cwiki.apache.org/confluence/display/KAFKA/KIP-764%3A+Configurable+backlog+size+for+creating+Acceptor).
25
+
- Top-level error code field to DescribeLogDirsResponse: A new error code that makes DescribeLogDirs API consistent with other APIs and allows returning other errors besides CLUSTER_AUTHORIZATION_FAILED [KIP-784](https://cwiki.apache.org/confluence/display/KAFKA/KIP-784%3A+Add+top-level+error+code+field+to+DescribeLogDirsResponse).
30
26
31
27
32
28
For a complete list of updates, see [Apache Kafka 3.2.0 release notes](https://archive.apache.org/dist/kafka/3.2.0/RELEASE_NOTES.html).
33
29
34
-
35
30
## Kafka client compatibility
36
31
37
-
New Kafka brokers support older clients. [KIP-35 - Retrieving protocol version](https://cwiki.apache.org/confluence/display/KAFKA/KIP-35+-+Retrieving+protocol+version) introduced a mechanism for dynamically determining the functionality of a Kafka broker and [KIP-97: Improved Kafka Client RPC Compatibility Policy](https://cwiki.apache.org/confluence/display/KAFKA/KIP-97%3A+Improved+Kafka+Client+RPC+Compatibility+Policy) introduced a new compatibility policy and guarantees for the Java client. Previously, a Kafka client had to interact with a broker of the same version or a newer version. Now, newer versions of the Java clients and other clients that support KIP-35 such as `librdkafka` can fall back to older request types or throw appropriate errors if functionality isn't available.
32
+
New Kafka brokers support older clients. [KIP-35 - Retrieving protocol version](https://cwiki.apache.org/confluence/display/KAFKA/KIP-35+-+Retrieving+protocol+version) introduced a mechanism for dynamically determining the functionality of a Kafka broker and [KIP-97: Improved Kafka Client RPC Compatibility Policy](https://cwiki.apache.org/confluence/display/KAFKA/KIP-97%3A+Improved+Kafka+Client+RPC+Compatibility+Policy) introduced a new compatibility policy and guarantees for the Java client. Previously, a Kafka client had to interact with a broker of the same version or a newer version. Now, newer versions of the Java clients and other clients that support [KIP-35](https://cwiki.apache.org/confluence/display/KAFKA/KIP-35+-+Retrieving+protocol+version) such as `librdkafka` can fall back to older request types or throw appropriate errors if functionality isn't available.
0 commit comments