Skip to content

Commit f9e9271

Browse files
committed
2 parents b48d24d + 46476b7 commit f9e9271

29 files changed

+196
-129
lines changed

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ To configure the Temporary Access Pass authentication method policy:
6363
|---|---|---|---|
6464
| Minimum lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Minimum number of minutes that the Temporary Access Pass is valid. |
6565
| Maximum lifetime | 8 hours | 10 – 43,200 Minutes (30 days) | Maximum number of minutes that the Temporary Access Pass is valid. |
66-
| Default lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Default values can be override by the individual passes, within the minimum and maximum lifetime configured by the policy. |
66+
| Default lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Default values can be overridden by the individual passes, within the minimum and maximum lifetime configured by the policy. |
6767
| One-time use | False | True / False | When the policy is set to false, passes in the tenant can be used either once or more than once during its validity (maximum lifetime). By enforcing one-time use in the Temporary Access Pass policy, all passes created in the tenant will be created as one-time use. |
6868
| Length | 8 | 8-48 characters | Defines the length of the passcode. |
6969

articles/active-directory/fundamentals/multi-tenant-user-management-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ These terms are used throughout this content:
5858

5959
* **Home tenant**: The Azure AD tenant containing users requiring access to the resources in the resource tenant.
6060

61-
* **User lifecycle management**: the process of provisioning, managing, and deprovisioning user access to resources.
61+
* **User lifecycle management**: The process of provisioning, managing, and deprovisioning user access to resources.
6262

6363
* **Unified GAL**: Each user in each tenant can see users from each organization in their Global Address List (GAL).
6464

articles/active-directory/governance/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@
250250
- name: Developer API reference Lifecycle Workflows- Azure Active Directory
251251
href: lifecycle-workflows-developer-reference.md
252252
- name: Set EmployeeLeaveDateTime for leaver workflows
253-
href: /graph/tutorial-lifecycle-workflows-set-employeeleavedatetime
253+
href: /graph/tutorial-lifecycle-workflows-set-employeeleavedatetime?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json
254254
- name: Preparing user accounts for Lifecycle workflows tutorials (Preview)
255255
href: tutorial-prepare-azure-ad-user-accounts.md
256256
- name: Configure a Logic App for Lifecycle Workflow use (Preview)

articles/active-directory/identity-protection/howto-identity-protection-configure-mfa-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ For more information on Azure AD multifactor authentication, see [What is Azure
3636
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **MFA registration policy**.
3737
1. Under **Assignments**
3838
1. **Users** - Choose **All users** or **Select individuals and groups** if limiting your rollout.
39-
1. Optionally you can choose to exclude users from the policy.
39+
1. Optionally you can choose to exclude users or groups from the policy.
4040
1. **Enforce Policy** - **On**
4141
1. **Save**
4242

articles/active-directory/managed-identities-azure-resources/managed-identities-status.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,8 @@ The following Azure services support managed identities for Azure resources:
6868
| Azure Service Fabric | [Using Managed identities for Azure with Service Fabric](../../service-fabric/concepts-managed-identity.md) |
6969
| Azure SignalR Service | [Managed identities for Azure SignalR Service](../../azure-signalr/howto-use-managed-identity.md) |
7070
| Azure Spring Apps | [Enable system-assigned managed identity for an application in Azure Spring Apps](../../spring-apps/how-to-enable-system-assigned-managed-identity.md) |
71-
| Azure SQL | [Azure SQL Transparent Data Encryption with customer-managed key](/azure/azure-sql/database/transparent-data-encryption-byok-overview) |
72-
| Azure SQL Managed Instance | [Azure SQL Transparent Data Encryption with customer-managed key](/azure/azure-sql/database/transparent-data-encryption-byok-overview) |
71+
| Azure SQL | [Managed identities in Azure AD for Azure SQL](/azure/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity) |
72+
| Azure SQL Managed Instance | [Managed identities in Azure AD for Azure SQL](/azure/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity) |
7373
| Azure Stack Edge | [Manage Azure Stack Edge secrets using Azure Key Vault](../../databox-online/azure-stack-edge-gpu-activation-key-vault.md#recover-managed-identity-access)
7474
| Azure Static Web Apps | [Securing authentication secrets in Azure Key Vault](../../static-web-apps/key-vault-secrets.md)
7575
| Azure Stream Analytics | [Authenticate Stream Analytics to Azure Data Lake Storage Gen1 using managed identities](../../stream-analytics/stream-analytics-managed-identities-adls.md) |

articles/azure-monitor/containers/container-insights-prometheus-metrics-addon.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ The output will be similar to the following:
136136

137137
- Register the `AKS-PrometheusAddonPreview` feature flag in the Azure Kubernetes clusters subscription with the following command in Azure CLI: `az feature register --namespace Microsoft.ContainerService --name AKS-PrometheusAddonPreview`.
138138
- The Azure Monitor workspace and Azure Managed Grafana workspace must already be created.
139-
- The template needs to be deployed in the same resource group as the cluster.
139+
- The template needs to be deployed in the Azure Managed Grafana workspaces resource group.
140140

141141
### Retrieve list of Grafana integrations
142142
If you're using an existing Azure Managed Grafana instance that already has been linked to an Azure Monitor workspace then you need the list of Grafana integrations. Open the **Overview** page for the Azure Managed Grafana instance and select the JSON view. Copy the value of the `azureMonitorWorkspaceIntegrations` field. If it doesn't exist, then the instance hasn't been linked with any Azure Monitor workspace.
@@ -157,7 +157,7 @@ If you're using an existing Azure Managed Grafana instance that already has been
157157
```
158158

159159
### Retrieve System Assigned identity for Grafana resource
160-
If you're using an existing Azure Managed Grafana instance that already has been linked to an Azure Monitor workspace then you need the list of Grafana integrations. Open the **Overview** page for the Azure Managed Grafana instance and select the JSON view. Copy the value of the `principalId` field for the `SystemAssigned` identity.
160+
The system assigned identity for the Azure Managed Grafana resource is also required. To get to it, open the **Overview** page for the Azure Managed Grafana instance and select the JSON view. Copy the value of the `principalId` field for the `SystemAssigned` identity.
161161

162162
```json
163163
"identity": {
@@ -166,8 +166,7 @@ If you're using an existing Azure Managed Grafana instance that already has been
166166
"type": "SystemAssigned"
167167
},
168168
```
169-
170-
Assign the `Monitoring Data Reader` role to the Grafana System Assigned Identity. This is the principalId on the Azure Monitor Workspace resource. This will let the Azure Managed Grafana resource read data from the Azure Monitor Workspace and is a requirement for viewing the metrics.
169+
Please assign the `Monitoring Data Reader` on the Azure Monitor Workspace for the Grafana System Identity i.e. take the principal ID that you got from the Azure Managed Grafana Resource, open the Access Control Blade for the Azure Monitor Workspace and assign the `Monitoring Data Reader` Built-In role to the principal ID (System Assigned MSI for the Azure Managed Grafana resource). This will let the Azure Managed Grafana resource read data from the Azure Monitor Workspace and is a requirement for viewing the metrics.
171170

172171
### Download and edit template and parameter file
173172

@@ -207,14 +206,15 @@ Assign the `Monitoring Data Reader` role to the Grafana System Assigned Identity
207206
},
208207
{
209208
"azureMonitorWorkspaceResourceId": "full_resource_id_2"
210-
}
209+
},
211210
{
212-
"azureMonitorWorkspaceResourceId": "[parameters('azureMonitorWorkspaceResourceId')]"
211+
"azureMonitorWorkspaceResourceId": "[parameters('azureMonitorWorkspaceResourceId')]"
213212
}
214213
]
215214
}
216215
}
217216
````
217+
For e.g. In the above code snippet `full_resource_id_1` and `full_resource_id_2` were already present on the Azure Managed Grafana resource and we're manually adding them to the ARM template. The final `azureMonitorWorkspaceResourceId` already exists in the template and is being used to link to the Azure Monitor Workspace resource ID provided in the parameters file. Please note, You do not have to replace `full_resource_id_1` and `full_resource_id_2` and any other resource id's if no integrations are found in the retrieval step.
218218

219219

220220
### Deploy template
@@ -268,7 +268,9 @@ ama-metrics-ksm-5fcf8dffcd 1 1 1 11h
268268

269269

270270
## Uninstall metrics addon
271-
Currently, Azure CLI is the only option to remove the metrics addon and stop sending Prometheus metrics to Azure Monitor managed service for Prometheus. The following command removes the agent from the cluster nodes and deletes the recording rules created for the data being collected from the cluster, it doesn't remove the DCE, DCR, or the data already collected and stored in your Azure Monitor workspace.
271+
272+
Currently, Azure CLI is the only option to remove the metrics addon and stop sending Prometheus metrics to Azure Monitor managed service for Prometheus.
273+
The aks-preview extension needs to be installed using the command `az extension add --name aks-preview`. For more information on how to install a CLI extension, see [Use and manage extensions with the Azure CLI](/azure/azure-cli-extensions-overview). The following command removes the agent from the cluster nodes and deletes the recording rules created for the data being collected from the cluster, it doesn't remove the DCE, DCR, or the data already collected and stored in your Azure Monitor workspace.
272274

273275
```azurecli
274276
az aks update --disable-azuremonitormetrics -n <cluster-name> -g <cluster-resource-group>

articles/azure-vmware/deploy-disaster-recovery-using-jetstream.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ Azure VMware Solution supports the installation of JetStream using either static
194194
| **Datastore** | Name of the datastore where you'll deploy the JetStream MSA. |
195195
| **VMName** | Name of JetStream MSA VM, for example, **jetstreamServer**. |
196196
| **Cluster** | Name of the Azure VMware Solution private cluster where the JetStream MSA is deployed, for example, **Cluster-1**. |
197-
| **Netmask** | Netmask of the MSA to be deployed, for example, **22** or **24**. |
197+
| **Netmask** | Netmask of the MSA to be deployed, for example, **255.255.255.0**. |
198198
| **MSIp** | IP address of the JetStream MSA VM. |
199199
| **Dns** | DNS IP that the JetStream MSA VM should use. |
200200
| **Gateway** | IP address of the network gateway for the JetStream MSA VM. |

articles/backup/blob-backup-support-matrix.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Operational backup of blobs uses blob point-in-time restore, blob versioning, so
2222

2323
**Other limitations:**
2424

25-
- If you've deleted a container during the retention period, that container won't be restored with the point-in-time restore operation. If you attempt to restore a range of blobs that includes blobs in a deleted container, the point-in-time restore operation will fail. For more information about protecting containers from deletion, see [Soft delete for containers (preview)](../storage/blobs/soft-delete-container-overview.md).
25+
- If you've deleted a container during the retention period, that container won't be restored with the point-in-time restore operation. If you attempt to restore a range of blobs that includes blobs in a deleted container, the point-in-time restore operation will fail. For more information about protecting containers from deletion, see [Soft delete for containers](../storage/blobs/soft-delete-container-overview.md).
2626
- If a blob has moved between the hot and cool tiers in the period between the present moment and the restore point, the blob is restored to its previous tier. Restoring block blobs in the archive tier isn't supported. For example, if a blob in the hot tier was moved to the archive tier two days ago, and a restore operation restores to a point three days ago, the blob isn't restored to the hot tier. To restore an archived blob, first move it out of the archive tier. For more information, see [Rehydrate blob data from the archive tier](../storage/blobs/archive-rehydrate-overview.md).
2727
- A block that has been uploaded via [Put Block](/rest/api/storageservices/put-block) or [Put Block from URL](/rest/api/storageservices/put-block-from-url), but not committed via [Put Block List](/rest/api/storageservices/put-block-list), isn't part of a blob and so isn't restored as part of a restore operation.
2828
- A blob with an active lease can't be restored. If a blob with an active lease is included in the range of blobs to restore, the restore operation will fail automatically. Break any active leases before starting the restore operation.
@@ -31,4 +31,4 @@ Operational backup of blobs uses blob point-in-time restore, blob versioning, so
3131

3232
## Next steps
3333

34-
[Overview of operational backup for Azure Blobs](blob-backup-overview.md)
34+
[Overview of operational backup for Azure Blobs](blob-backup-overview.md)

articles/chaos-studio/chaos-studio-permissions-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,8 @@ All user interactions with Chaos Studio happen through Azure Resource Manager. I
5555
Azure Chaos Studio doesn't support Private Link for agent-based scenarios.
5656

5757
## Service tags
58-
A service tag is a group of IP address prefixes that can be assigned to in-bound and out-bound NSG rules. It handles updates to the group of IP address prefixes without any intervention. This benefits you because you can use service tags to explicitly allow in-bound traffic from Chaos Studio, without needing to know the IP addresses of the platform. Currently service tags can be enabled via PowerShell.
59-
* Limitation of service tags is that they can only be used with resources that have a public IP address. If a resource only has a private IP address, then service tags will not be able to allow traffic to route to it.
58+
A [service tags](../virtual-network/service-tags-overview.md) is a group of IP address prefixes that can be assigned to in-bound and out-bound NSG rules. It automatically handles updates to the group of IP address prefixes without any intervention. This benefits you because you can use service tags to explicitly allow in-bound traffic from Chaos Studio without needing to know the IP addresses of the platform. Currently service tags can be enabled via PowerShell and support will soon be added to the Chaos Studio user interface.
59+
* Limitation of service tags is that they can only be used with applications that have a public IP address. If a resource only has a private IP address, then service tags will not be able to allow traffic to route to it.
6060

6161
## Data encryption
6262

articles/cognitive-services/personalizer/includes/quickstart-sdk-csharp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -534,7 +534,7 @@ Run the application with the dotnet `run` command from your application director
534534
dotnet run
535535
```
536536

537-
## Generate sample events for analysis
537+
## Generate sample events for analysis (Optional)
538538

539539
You can easily generate 5,000 events from this quickstart demo scenario, which is sufficient to get experience with using Apprentice mode, Online mode, running offline evaluations, and creating feature evaluations. Simply replace the `Main()` method of the above code in the `Run a Rank and Reward cycle` section with:
540540

0 commit comments

Comments
 (0)