Skip to content

Commit fb5cddd

Browse files
committed
DocuTune: Initial cleanup of (a, an, the) terms
1 parent a311c92 commit fb5cddd

33 files changed

+50
-52
lines changed

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -57,11 +57,11 @@ The following information is provided to better explain the anchor attributes an
5757

5858
The anchor attribute is a unique attribute of an object type that does not change and represents that object in the ECMA Connector Host in-memory cache.
5959

60-
The distinguished name (DN) is a name that uniquely identifies an object by indicating its current location in the directory hierarchy. Or in the case of SQL, in the partition. The name is formed by concatenating the anchor attribute a the root of the directory partition.
60+
The distinguished name (DN) is a name that uniquely identifies an object by indicating its current location in the directory hierarchy. Or in the case of SQL, in the partition. The name is formed by concatenating the anchor attribute at the root of the directory partition.
6161

6262
When we think of traditional DNs in a traditional format, for say, Active Directory or LDAP, we think of something similar to:
6363

64-
CN=Lola Jacobson,CN=Users,DC=contoso,DC=com
64+
`CN=Lola Jacobson,CN=Users,DC=contoso,DC=com`
6565

6666
However, for a data source such as SQL, which is flat, not hierarchical, the DN needs to be either already present in one of the table or created from the information we provide to the ECMA Connector Host.
6767

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ In this example, users and or groups are created in an HR database connected to
9494

9595
In this example, user creation occurs in Azure AD and the Azure AD provisioning service manages automatic user provisioning to the target (SaaS) applications.
9696

97-
![Diagram that shows the user/group creation process from an on-premises H R application through the Azure A D Provisioning Service to the target S a a S applications.](./media/plan-auto-user-provisioning/cloudprovisioning.png)
97+
![Diagram that shows the user/group creation process from an on-premises H R application through the Azure A D Provisioning Service to the target S A A S applications.](./media/plan-auto-user-provisioning/cloudprovisioning.png)
9898

9999
**Description of workflow:**
100100

articles/active-directory/develop/msal-net-migration-public-client.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
221221
// AcquireTokenByIntegratedWindowsAuth form that takes in the username
222222
223223
// Error Code: integrated_windows_auth_not_supported_managed_user
224-
// Explanation: This method relies on an a protocol exposed by Active Directory (AD). If a user was created in Azure
224+
// Explanation: This method relies on a protocol exposed by Active Directory (AD). If a user was created in Azure
225225
// Active Directory without AD backing ("managed" user), this method will fail. Users created in AD and backed by
226226
// AAD ("federated" users) can benefit from this non-interactive method of authentication.
227227
// Mitigation: Use interactive authentication

articles/active-directory/develop/scenario-desktop-acquire-token-integrated-windows-authentication.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ static async Task GetATokenForGraph()
124124
// AcquireTokenByIntegratedWindowsAuth form that takes in the username
125125
126126
// Error Code: integrated_windows_auth_not_supported_managed_user
127-
// Explanation: This method relies on an a protocol exposed by Active Directory (AD). If a user was created in Azure
127+
// Explanation: This method relies on a protocol exposed by Active Directory (AD). If a user was created in Azure
128128
// Active Directory without AD backing ("managed" user), this method will fail. Users created in AD and backed by
129129
// AAD ("federated" users) can benefit from this non-interactive method of authentication.
130130
// Mitigation: Use interactive authentication

articles/app-service/troubleshoot-dotnet-visual-studio.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ You typically deploy a web project with the `customErrors` flag in the Web.confi
7373

7474
**The website cannot display the page**
7575

76-
:::image type="content" source="./media/web-sites-dotnet-troubleshoot-visual-studio/genericerror2.png" alt-text="Screenshot showing a The website cannot display the page error in a web browser.":::
76+
:::image type="content" source="./media/web-sites-dotnet-troubleshoot-visual-studio/genericerror2.png" alt-text="Screenshot showing a message that reads **The website cannot display the page error in a web browser**.":::
7777

78-
Frequently the easiest way to find the cause of the error is to enable detailed error messages, which the first of the preceding screenshots explains how to do. That requires a change in the deployed Web.config file. You could edit the *Web.config* file in the project and redeploy the project, or create a [Web.config transform](https://www.asp.net/mvc/tutorials/deployment/visual-studio-web-deployment/web-config-transformations) and deploy a debug build, but there's a quicker way: in **Solution Explorer**, you can directly view and edit files in the remote app by using the *remote view* feature.
78+
Frequently the easiest way to find the cause of the error is to enable detailed error messages, which the first of the preceding screenshots explains how to do. That requires a change in the deployed Web.config file. You could edit the *Web.config* file in the project and redeploy the project, or create a [`Web.config` transform](https://www.asp.net/mvc/tutorials/deployment/visual-studio-web-deployment/web-config-transformations) and deploy a debug build, but there's a quicker way: in **Solution Explorer**, you can directly view and edit files in the remote app by using the *remote view* feature.
7979

8080
1. In **Server Explorer**, expand **Azure**, expand **App Service**, expand the resource group that your app is located in, and then expand the node for your app.
8181

articles/azure-app-configuration/enable-dynamic-configuration-java-spring-push-refresh.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ In this tutorial, you learn how to:
3434

3535
> [!div class="checklist"]
3636
> * Set up a subscription to send configuration change events from App Configuration to a Web Hook
37-
> * Deploy an a Spring Boot application to App Service
37+
> * Deploy a Spring Boot application to App Service
3838
> * Set up your Java Spring app to update its configuration in response to changes in App Configuration.
3939
> * Consume the latest configuration in your application.
4040

articles/azure-monitor/logs/create-pipeline-datacollector-api.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ This article will not cover how to create data or [upload it to an Azure Blob St
3232

3333
1. A process will detect that new data has been uploaded. Our example uses an [Azure Logic App](../../logic-apps/logic-apps-overview.md), which has available a trigger to detect new data being uploaded to a blob.
3434

35-
2. A processor reads this new data and converts it to JSON, the format required by Azure Monitor In this example, we use an [Azure Function](../../azure-functions/functions-overview.md) as a lightweight, cost-efficient way of executing our processing code. The function is kicked off by the same Logic App that we used to detect a the new data.
35+
2. A processor reads this new data and converts it to JSON, the format required by Azure Monitor In this example, we use an [Azure Function](../../azure-functions/functions-overview.md) as a lightweight, cost-efficient way of executing our processing code. The function is kicked off by the same Logic App that we used to detect the new data.
3636

3737
3. Finally, once the JSON object is available, it is sent to Azure Monitor. The same Logic App sends the data to Azure Monitor using the built in Log Analytics Data Collector activity.
3838

articles/azure-monitor/visualize/workbooks-bring-your-own-storage.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ There are times when you may have a query or some business logic that you want t
2323
3. Select the **Save** button to save the workbook.
2424
4. There's an option to `Save content to an Azure Storage Account`, select the checkbox to save to an Azure Storage Account.
2525

26-
![Screenshot showing a the saved dialog](./media/workbooks-bring-your-own-storage/saved-dialog-default.png)
26+
![Screenshot showing the **Save** dialog.](./media/workbooks-bring-your-own-storage/saved-dialog-default.png)
2727

2828
5. Select the desire Storage account and Container. The Storage account list is from the Subscription selected above.
2929

30-
![Screenshot showing a save dialog with storage option](./media/workbooks-bring-your-own-storage/save-dialog-with-storage.png)
30+
![Screenshot showing the **Save** dialog with storage option.](./media/workbooks-bring-your-own-storage/save-dialog-with-storage.png)
3131

3232
6. Then select **Change** to select a managed identity previously created.
3333

articles/azure-sql-edge/configure.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Add values in **Container Create Options**.
5959
> [!NOTE]
6060
> In the disconnected deployment mode, environment variables can be specified using the `-e` or `--env` or the `--env-file` option of the `docker run` command.
6161
62-
## Configure by using an mssql.conf file
62+
## Configure by using an `mssql.conf` file
6363

6464
Azure SQL Edge doesn't include the [mssql-conf configuration utility](/sql/linux/sql-server-linux-configure-mssql-conf/) like SQL Server on Linux does. You need to manually configure the mssql.conf file and place it in the persistent storage drive that is mapped to the /var/opt/mssql/ folder in the SQL Edge module. When you're deploying SQL Edge from Azure Marketplace, this mapping is specified as the **Mounts** option in the **Container Create Options**.
6565

@@ -94,7 +94,7 @@ The following mssql.conf options aren't applicable to SQL Edge:
9494
|**ML Services EULAs** | Accept R and Python EULAs for Azure Machine Learning packages. Applies to SQL Server 2019 only.|
9595
|**outboundnetworkaccess** |Enable outbound network access for [Machine Learning Services](/sql/linux/sql-server-linux-setup-machine-learning/) R, Python, and Java extensions.|
9696

97-
The following sample mssql.conf file works for SQL Edge. For more information on the format for an mssql.conf file, see [mssql.conf format](/sql/linux/sql-server-linux-configure-mssql-conf#mssql-conf-format).
97+
The following sample mssql.conf file works for SQL Edge. For more information on the format for an `mssql.conf` file, see [mssql.conf format](/sql/linux/sql-server-linux-configure-mssql-conf#mssql-conf-format).
9898

9999
```ini
100100
[EULA]

articles/backup/offline-backup-azure-data-box.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ Or you can:
104104
Install-Module -Name AzureRM -RequiredVersion 3.7.0
105105
```
106106
107-
Azure PowerShell could have also been installed by using an msi file. To remove it, uninstall it by using the **Uninstall programs** option in Control Panel.
107+
Azure PowerShell could have also been installed by using an MSI file. To remove it, uninstall it by using the **Uninstall programs** option in Control Panel.
108108
109109
### Order and receive the Data Box device
110110

articles/cognitive-services/text-analytics/tutorials/extract-excel-information.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Within the newly created **Apply to each 3** action, click **Add an action**, an
144144

145145
In the Condition window, click on the first text box. In the Dynamic content window, search for **Category** and select it.
146146

147-
:::image type="content" source="../media/tutorials/excel/choose-entities-value.png" alt-text="Add a the category to the control condition" lightbox="../media/tutorials/excel/choose-entities-value.png":::
147+
:::image type="content" source="../media/tutorials/excel/choose-entities-value.png" alt-text="Add the category to the control condition" lightbox="../media/tutorials/excel/choose-entities-value.png":::
148148

149149

150150
Make sure the second box is set to **is equal to**. Then select the third box, and search for `var_person` in the Dynamic content window.

articles/data-factory/connector-db2.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Typical properties inside the connection string:
102102
| certificateCommonName | When you use Secure Sockets Layer (SSL) or Transport Layer Security (TLS) encryption, you must enter a value for Certificate common name. | No |
103103

104104
> [!TIP]
105-
> If you receive an error message that states `The package corresponding to an SQL statement execution request was not found. SQLSTATE=51002 SQLCODE=-805`, the reason is a needed package is not created for the user. By default, the service will try to create a the package under collection named as the user you used to connect to the DB2. Specify the package collection property to indicate under where you want the service to create the needed packages when querying the database.
105+
> If you receive an error message that states `The package corresponding to an SQL statement execution request was not found. SQLSTATE=51002 SQLCODE=-805`, the reason is a needed package is not created for the user. By default, the service will try to create the package under the collection named as the user you used to connect to the DB2. Specify the package collection property to indicate under where you want the service to create the needed packages when querying the database.
106106
107107
**Example:**
108108

articles/data-factory/delete-activity.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -360,10 +360,10 @@ You can create a pipeline to clean up the old or expired files by leveraging fil
360360

361361
### Move files by chaining the Copy activity and the Delete activity
362362

363-
You can move a file by using a copy activity to copy a file and then a delete activity to delete a file in a pipeline. When you want to move multiple files, you can use the GetMetadata activity + Filter activity + Foreach activity + Copy activity + Delete activity as in the following sample:
363+
You can move a file by using a Copy activity to copy a file and then a Delete activity to delete a file in a pipeline. When you want to move multiple files, you can use the GetMetadata activity + Filter activity + Foreach activity + Copy activity + Delete activity as in the following sample.
364364

365365
> [!NOTE]
366-
> If you want to move the entire folder by defining a dataset containing a folder path only, and then using a copy activity and a the Delete activity to reference to the same dataset representing a folder, you need to be very careful. It is because you have to make sure that there will NOT be new files arriving into the folder between copying operation and deleting operation. If there are new files arriving at the folder at the moment when your copy activity just completed the copy job but the Delete activity has not been stared, it is possible that the Delete activity will delete this new arriving file which has NOT been copied to the destination yet by deleting the entire folder.
366+
> If you want to move the entire folder by defining a dataset containing a folder path only, and then using a Copy activity and a Delete activity to reference to the same dataset representing a folder, you need to be very careful. You must ensure that there **will not** be any new files arriving into the folder between the copy operation and the delete operation. If new files arrive in the folder at the moment when your copy activity just completed the copy job but the Delete activity has not been started, then the Delete activity might delete the newly arriving file which has NOT been copied to the destination yet by deleting the entire folder.
367367
368368
#### Sample pipeline
369369

articles/databox-online/azure-stack-edge-extend-compute-access-modules.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Take the following steps to add a webserver app module on your Azure Stack Edge
5757
3. In the **IoT Edge custom modules** blade:
5858

5959
1. Specify a **Name** for your webserver app module that you want to deploy.
60-
2. Provide an **Image URI** for your module image. A module matching the provided name and tags is retrieved. In this case, `mcr.microsoft.com/oss/nginx/nginx:1.15.5-alpine` will pull an nginx image (tagged as 1.15.5-alpine) from the public `mcr.microsoft.com` registry.
60+
2. Provide an **Image URI** for your module image. A module matching the provided name and tags is retrieved. In this case, `mcr.microsoft.com/oss/nginx/nginx:1.15.5-alpine` will pull an nginx image (tagged as `1.15.5-alpine`) from the public `mcr.microsoft.com` registry.
6161
3. In the **Container Create Options**, paste the following sample code:
6262

6363
```

articles/dedicated-hsm/troubleshoot.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The Azure Dedicated HSM service has two distinct facets. Firstly, the registrati
2727
2828
## HSM Registration
2929

30-
Dedicated HSM is not freely available for use as it is delivering hardware resources in the cloud and hence is a precious resource that needs protecting. We therefore use a allowlisiting process via email using [email protected].
30+
Dedicated HSM is not freely available for use as it is delivering hardware resources in the cloud and hence is a precious resource that needs protecting. We therefore use a allowlisting process via email using `[email protected]`.
3131

3232
### Getting access to Dedicated HSM
3333

articles/expressroute/expressroute-routing.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ You can use either private IP addresses or public IP addresses to configure the
4545
* You must set up both BGP sessions for our [availability SLA](https://azure.microsoft.com/support/legal/sla/) to be valid.
4646

4747
#### Example for private peering
48-
If you choose to use a.b.c.d/29 to set up the peering, it is split into two /30 subnets. In the following example, notice how the a.b.c.d/29 subnet is used:
48+
If you choose to use a.b.c.d/29 to set up the peering, it is split into two /30 subnets. In the following example, notice how the `a.b.c.d/29` subnet is used:
4949

5050
* a.b.c.d/29 is split to a.b.c.d/30 and a.b.c.d+4/30 and passed down to Microsoft through the provisioning APIs.
5151
* You use a.b.c.d+1 as the VRF IP for the Primary PE and Microsoft will consume a.b.c.d+2 as the VRF IP for the primary MSEE.

articles/governance/policy/samples/guest-configuration-baseline-linux.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ For more information, see [Azure Policy guest configuration](../concepts/guest-c
117117
|The logrotate (syslog rotater) service should be enabled.<br /><sub>(68)</sub> |Description: Logfiles could grow unbounded and consume all disk space |Install the logrotate package and confirm the logrotate cron entry is active (chmod 755 /etc/cron.daily/logrotate; chown root:root /etc/cron.daily/logrotate) |
118118
|The rlogin service should be disabled.<br /><sub>(69)</sub> |Description: An attacker could gain access, bypassing strict authentication requirements |Remove the inetd service. |
119119
|Disable inetd unless required. (inetd)<br /><sub>(70.1)</sub> |Description: An attacker could exploit a vulnerability in an inetd service to gain access |Uninstall the inetd service (apt-get remove inetd) |
120-
|Disable xinetd unless required. (xinetd)<br /><sub>(70.2)</sub> |Description: An attacker could exploit a vulnerability in a xinetd service to gain access |Uninstall the inetd service (apt-get remove xinetd) |
120+
|Disable xinetd unless required. (xinetd)<br /><sub>(70.2)</sub> |Description: An attacker could exploit a vulnerability in an xinetd service to gain access |Uninstall the inetd service (apt-get remove xinetd) |
121121
|Install inetd only if appropriate and required by your distro. Secure according to current hardening standards. (if required)<br /><sub>(71.1)</sub> |Description: An attacker could exploit a vulnerability in an inetd service to gain access |Uninstall the inetd service (apt-get remove inetd) |
122122
|Install xinetd only if appropriate and required by your distro. Secure according to current hardening standards. (if required)<br /><sub>(71.2)</sub> |Description: An attacker could exploit a vulnerability in an xinetd service to gain access |Uninstall the inetd service (apt-get remove xinetd) |
123123
|The telnet service should be disabled.<br /><sub>(72)</sub> |Description: An attacker could eavesdrop or hijack unencrypted telnet sessions |Remove or comment out the telnet entry in the file '/etc/inetd.conf' |

articles/hpc-cache/add-namespace-paths.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Fill in these values for each namespace path:
9696

9797
* **Export subdirectory** - If you want this path to mount a specific subdirectory of the export, enter it here. If not, leave this field blank.
9898

99-
![screenshot of the portal namespace page with the edit page open at the right. The edit form shows settings for an nfs storage target namespace path](media/namespace-edit-nfs.png)
99+
![Screenshot of the portal namespace page with the edit page open at the right. The edit form shows settings for an N F S storage target namespace path.](media/namespace-edit-nfs.png)
100100

101101
### [Azure CLI](#tab/azure-cli)
102102

articles/key-vault/general/event-grid-logicapps.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To create an Azure Event Grid subscription, follow these steps:
4040

4141
![Logic App Designer - connection](../media/eventgrid-logicappdesigner1.png)
4242

43-
1. On the **When a a resource event occurs** screen, do the following:
43+
1. On the **When a resource event occurs** screen, do the following:
4444
- Leave **Subscription** and **Resource Name** as default.
4545
- Select **Microsoft.KeyVault.vaults** for the **Resource Type**.
4646
- Select **Microsoft.KeyVault.SecretNewVersionCreated** for **Event Type Item - 1**.

0 commit comments

Comments
 (0)