Skip to content

Commit 2679ffa

Browse files
authored
Merge branch 'main' into Branch-PostEdit
2 parents d9719d8 + fefb9ff commit 2679ffa

File tree

33 files changed

+624
-139
lines changed

33 files changed

+624
-139
lines changed

.openpublishing.redirection.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13679,6 +13679,10 @@
1367913679
{
1368013680
"source_path": "support/dynamics/gp/suta-futa-taxable-wages-are-off.md",
1368113681
"redirect_url": "/troubleshoot/dynamics/gp/welcome-gp"
13682+
},
13683+
{
13684+
"source_path": "support/windows-server/active-directory/dcs-cannot-be-located-high-rate-outbound-sessions.md",
13685+
"redirect_url": "/troubleshoot/windows-server/user-profiles-and-logon/dcs-cannot-be-located-high-rate-outbound-sessions"
1368213686
}
1368313687
]
1368413688
}

support/azure/azure-kubernetes/create-upgrade-delete/429-too-many-requests-errors.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,6 @@ For an AKS cluster, you can use [AKS Diagnose and Solve Problems](/azure/aks/aks
8282
- Host: The host where HTTP status 429 responses were detected. Azure Resource Manager throttles come from `management.azure.com`; anything else is a lower-layer resource provider.
8383
- User agent: Requests with a specified user agent that were throttled.
8484
- Operation: Operations where HTTP status 429 responses were detected.
85-
- Client IP: The client IP address that sent the throttled requests.
8685

8786
Request throttling can be caused by a combination of any cluster in this subscription, not just the request rate for this cluster.
8887

Lines changed: 45 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Recommended and useful mountOptions settings on Azure Files
33
description: Learn about the useful and recommended mountOptions settings when you configure the storage class object on Azure Files.
4-
ms.date: 04/25/2025
4+
ms.date: 04/27/2025
55
ms.reviewer: chiragpa, nickoman, v-leedennis
66
ms.service: azure-kubernetes-service
77
#Customer intent: As an Azure Kubernetes user, I want to learn about mount option settings so that I can set up my Azure Files storage class object optimally on my Azure Kubernetes Service (AKS) cluster.
@@ -13,54 +13,56 @@ This article discusses recommended mount options when you configure the storage
1313

1414
## Recommended settings
1515

16-
The following `mountOptions` are recommended for SMB and NFS shares:
16+
The following `mountOptions` settings are recommended for Server Message Block (SMB) and Network File System (NFS) shares:
1717

18-
**SMB shares**
18+
- **SMB shares**
1919

20-
```yaml
21-
apiVersion: storage.k8s.io/v1
22-
kind: StorageClass
23-
metadata:
24-
name: azurefile-csi
25-
provisioner: file.csi.azure.com
26-
allowVolumeExpansion: true
27-
parameters:
28-
skuName: Premium_LRS # available values: Premium_LRS, Premium_ZRS, Standard_LRS, Standard_GRS, Standard_ZRS, Standard_RAGRS, Standard_RAGZRS
29-
reclaimPolicy: Delete
30-
volumeBindingMode: Immediate
31-
mountOptions:
32-
- dir_mode=0777 # modify this permission if you want to enhance the security
33-
- file_mode=0777 # modify this permission if you want to enhance the security
34-
- mfsymlinks # support symbolic links
35-
- cache=strict # https://linux.die.net/man/8/mount.cifs
36-
- nosharesock # reduces probability of reconnect race
37-
- actimeo=30 # reduces latency for metadata-heavy workload
38-
- nobrl # disable sending byte range lock requests to the server and for applications which have challenges with posix locks
39-
```
20+
```yaml
21+
apiVersion: storage.k8s.io/v1
22+
kind: StorageClass
23+
metadata:
24+
name: azurefile-csi
25+
provisioner: file.csi.azure.com
26+
allowVolumeExpansion: true
27+
parameters:
28+
skuName: Premium_LRS # available values: Premium_LRS, Premium_ZRS, Standard_LRS, Standard_GRS, Standard_ZRS, Standard_RAGRS, Standard_RAGZRS
29+
reclaimPolicy: Delete
30+
volumeBindingMode: Immediate
31+
mountOptions:
32+
- dir_mode=0777 # modify this permission if you want to enhance the security
33+
- file_mode=0777 # modify this permission if you want to enhance the security
34+
- mfsymlinks # support symbolic links
35+
- cache=strict # https://linux.die.net/man/8/mount.cifs
36+
- nosharesock # reduces probability of reconnect race
37+
- actimeo=30 # reduces latency for metadata-heavy workload
38+
- nobrl # disable sending byte range lock requests to the server and for applications which have challenges with posix locks
39+
```
4040
41-
**NFS shares**
41+
- **NFS shares**
4242
43-
```yaml
44-
apiVersion: storage.k8s.io/v1
45-
kind: StorageClass
46-
metadata:
47-
name: azurefile-csi-nfs
48-
provisioner: file.csi.azure.com
49-
parameters:
50-
protocol: nfs
51-
skuName: Premium_LRS # available values: Premium_LRS, Premium_ZRS
52-
reclaimPolicy: Delete
53-
volumeBindingMode: Immediate
54-
allowVolumeExpansion: true
55-
mountOptions:
56-
- nconnect=4 # improves performance by enabling multiple connections to share
57-
- noresvport # improves availability
58-
- actimeo=30 # reduces latency for metadata-heavy workloads
59-
```
43+
```yaml
44+
apiVersion: storage.k8s.io/v1
45+
kind: StorageClass
46+
metadata:
47+
name: azurefile-csi-nfs
48+
provisioner: file.csi.azure.com
49+
parameters:
50+
protocol: nfs
51+
skuName: Premium_LRS # available values: Premium_LRS, Premium_ZRS
52+
reclaimPolicy: Delete
53+
volumeBindingMode: Immediate
54+
allowVolumeExpansion: true
55+
mountOptions:
56+
- nconnect=4 # improves performance by enabling multiple connections to share
57+
- noresvport # improves availability
58+
- actimeo=30 # reduces latency for metadata-heavy workloads
59+
```
6060
6161
> [!NOTE]
62-
> The location to configure mount options (mountOptions) depends on whether you're provisioning dynamic or static persistent volumes. If you're [dynamically provisioning a volume](/azure/aks/azure-csi-files-storage-provision#dynamically-provision-a-volume) with a storage class, specify the mount options on the storage class object (kind: StorageClass). If you’re [statically provisioning a volume](/azure/aks/azure-csi-files-storage-provision#statically-provision-a-volume), specify the mount options on the PersistentVolume object (kind: PersistentVolume). If you’re [mounting the file share as an inline volume](/azure/aks/azure-csi-files-storage-provision#mount-file-share-as-an-inline-volume), specify the mount options on the Pod object (kind: Pod).
62+
> The location for configuring mount options (`mountOptions`) depends on whether you provision dynamic or static persistent volumes. If you [dynamically provision a volume](/azure/aks/azure-csi-files-storage-provision#dynamically-provision-a-volume) with a storage class, specify the mount options on the storage class object (`kind: StorageClass`). If you [statically provision a volume](/azure/aks/azure-csi-files-storage-provision#statically-provision-a-volume), specify the mount options on the `PersistentVolume` object (`kind: PersistentVolume`). If you [mount the file share as an inline volume](/azure/aks/azure-csi-files-storage-provision#mount-file-share-as-an-inline-volume), specify the mount options on the `Pod` object (`kind: Pod`).
6363

64-
For best practices when using Azure Files, see [Provision Azure Files storage](/azure/aks/azure-csi-files-storage-provision#best-practices).
64+
## More information
65+
66+
For Azure Files best practices, see [Provision Azure Files storage](/azure/aks/azure-csi-files-storage-provision#best-practices).
6567

6668
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/azure/azure-storage/files/file-sync/file-sync-troubleshoot-installation.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -175,6 +175,38 @@ When registering a server using *ServerRegistration.exe*, some resource groups a
175175

176176
This issue occurs due to a known issue that has been fixed in File Sync Agent v19.1. To resolve this issue, install the latest version of the agent.
177177

178+
179+
180+
**Server Registration displays the following message: "System.Net.Http, Version=4.2.0.0, Culture=neutral, PublicKeyToken=..."**
181+
182+
This error occurs when the required version of the .NET Framework is missing on the server. Azure File Sync's server registration requires **.NET Framework 4.7.2. or higher** to function properly.
183+
184+
To resolve the issue:
185+
1. Downland and install .NET Framework 4.7.2. or higher.
186+
2. Restart the server after installation.
187+
3. Retry the server registration using the Server Registration UI or PowerShell.
188+
189+
190+
191+
**Server registration fails with error: operation returned an invalid status code 'Unauthorized'**
192+
193+
During server registration, if you encounter the following error:
194+
`Operation returned an invalid status code 'Unauthorized'`
195+
196+
This issue occurs when authentication with Azure fails during the registration process. To resolve this issue:
197+
198+
Manually register the server using PowerShell:
199+
200+
```powershell
201+
Connect-AzAccount -Subscription "<your-subscription-guid>" -Tenant "<your-tenant-guid>"
202+
Register-AzStorageSyncServer -ResourceGroupName "<your-resource-group-name>" -StorageSyncServiceName "<your-storage-sync-service-name>"
203+
```
204+
205+
Replace the placeholder values with your subscription ID, tenant ID, resource group name, and Storage Sync Service name.
206+
207+
After completing the manual registration, verify that the server appears under Registered servers in the Azure portal.
208+
209+
178210
<a id="server-already-registered"></a>**Server Registration displays the following message: "This server is already registered"**
179211

180212
:::image type="content" source="media/file-sync-troubleshoot-installation/server-already-registered-error.png" alt-text="Screenshot that shows the Server Registration dialog box with the 'server is already registered' error message.":::

support/azure/virtual-machines/linux/serial-console-linux.md

Lines changed: 10 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -33,25 +33,18 @@ For Serial Console documentation for Windows, see [Serial Console for Windows](.
3333
> [!NOTE]
3434
> Serial Console is compatible with a managed boot diagnostics storage account.
3535
36-
## Prerequisites
36+
## Prerequisites to access the Azure Serial Console
3737

38-
- Your VM or virtual machine scale set instance must use the resource management deployment model. Classic deployments aren't supported.
38+
To access the Serial Console on your VM or virtual machine scale set instance, you will need the following:
3939

40-
- Your account that uses serial console must have the [Virtual Machine Contributor role](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) for the VM and the [boot diagnostics](../windows/boot-diagnostics.md) storage account
40+
- Boot diagnostics must be enabled for the VM.
41+
- A user account that uses password authentication must exist within the VM. You can create a password-based user with the [reset password](/azure/virtual-machines/extensions/vmaccess#reset-password) function of the VM access extension. Select **Reset password** from the **Help** section.
42+
- The Azure account accessing Serial Console must have [Virtual Machine Contributor role](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) for both the VM and the [boot diagnostics](../windows/boot-diagnostics.md) storage account.
43+
- Classic deployments aren't supported. Your VM or virtual machine scale set instance must use the Azure Resource Manager deployment model.
44+
- Serial Console is not supported when the storage account has **Allow storage account key access** disabled.
4145

42-
- Your VM or virtual machine scale set instance must have a password-based user. You can create one with the [reset password](/azure/virtual-machines/extensions/vmaccess#reset-password) function of the VM access extension. Select **Reset password** from the **Help** section.
43-
44-
- Your VM or virtual machine scale set instance must have [boot diagnostics](../windows/boot-diagnostics.md) enabled.
45-
46-
:::image type="content" source="media/serial-console-linux/diagnostics-settings.png" alt-text="Screenshot of the Diagnostics settings page in Azure portal. The Boot diagnostics option is enabled.":::
47-
48-
- For settings specific to Linux distributions, see [Serial console Linux distribution availability](#serial-console-linux-distribution-availability).
49-
50-
- Your VM or virtual machine scale set instance must be configured for serial output on `ttys0`. This is the default for Azure images, but you will want to double check this on custom images. Details [below](#custom-linux-images).
51-
52-
> [!NOTE]
53-
> The serial console requires a local user with a configured password. VMs or virtual machine scale sets configured only with an SSH public key won't be able to sign in to the serial console. To create a local user with a password, use the [VMAccess Extension](/azure/virtual-machines/extensions/vmaccess), which is available in the portal by selecting **Reset password** in the Azure portal, and create a local user with a password.
54-
> You can also reset the administrator password in your account by [using GRUB to boot into single user mode](./serial-console-grub-single-user-mode.md).
46+
> [!IMPORTANT]
47+
> Serial Console is now compatible with [managed boot diagnostics storage accounts](../windows/boot-diagnostics.md) and custom storage account firewalls.
5548
5649
## Serial Console Linux distribution availability
5750

@@ -143,7 +136,7 @@ After the IP addresses are successfully added to the storage account firewall, r
143136

144137
### Access security
145138

146-
Access to the serial console is limited to users who have an access role of [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) or higher to the virtual machine. If your Microsoft Entra tenant requires multi-factor authentication (MFA), then access to the serial console will also need MFA because the serial console's access is through the [Azure portal](https://portal.azure.com).
139+
Access to the serial console is limited to users who have an access role of [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) or higher to the virtual machine. If your Microsoft Entra tenant requires multifactor authentication (MFA), then access to the serial console will also need MFA because the serial console's access is through the [Azure portal](https://portal.azure.com).
147140

148141
### Channel security
149142

support/azure/virtual-machines/linux/troubleshoot-ssh-connection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Use Network Watcher's [Next hop](/azure/network-watcher/diagnose-vm-network-rout
8181

8282
## Use the Azure VM Serial Console
8383

84-
The [Azure VM Serial Console](./serial-console-linux.md) provides access to a text-based console for Linux virtual machines. You can use the console to troubleshoot your SSH connection in an interactive shell. Ensure you have met the [prerequisites](./serial-console-linux.md#prerequisites) for using Serial Console and try the commands below to further troubleshoot your SSH connectivity.
84+
The [Azure VM Serial Console](./serial-console-linux.md) provides access to a text-based console for Linux virtual machines. You can use the console to troubleshoot your SSH connection in an interactive shell. Ensure you have met the [prerequisites](./serial-console-linux.md#prerequisites-to-access-the-azure-serial-console) for using Serial Console and try the commands below to further troubleshoot your SSH connectivity.
8585

8686
### Check that SSH service is running
8787

support/azure/virtual-machines/windows/breadcrumb/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,4 +65,4 @@
6565
topicHref: /troubleshoot/azure/virtual-machines/windows/welcome-virtual-machines-windows
6666
- name: Virtual Machine running Windows
6767
tocHref: /troubleshoot/windows-server/installing-updates-features-roles/
68-
topicHref: /troubleshoot/azure/virtual-machines/windows/welcome-virtual-machines-windows
68+
topicHref: /troubleshoot/azure/virtual-machines/windows/welcome-virtual-machines-windows

support/azure/virtual-machines/windows/serial-console-windows.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,6 @@ For serial console documentation for Linux, see [Azure Serial Console for Linux]
3333
> [!NOTE]
3434
> Serial Console is compatible with a managed boot diagnostics storage account.
3535
36-
[Prerequisites to access the Azure Serial Console](serial-console-overview.md#prerequisites-to-access-the-azure-serial-console)
37-
3836
## Prerequisites
3937

4038
The prerequisites to access the Azure Serial Console can be found [here](serial-console-overview.md#prerequisites-to-access-the-azure-serial-console).
@@ -191,7 +189,7 @@ After the IP addresses are successfully added to the storage account firewall, r
191189

192190
### Access security
193191

194-
Access to the serial console is limited to users who have an access role of [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) or higher to the virtual machine. If your Microsoft Entra tenant requires multi-factor authentication (MFA), then access to the serial console will also need MFA because the serial console's access is through the [Azure portal](https://portal.azure.com).
192+
Access to the serial console is limited to users who have an access role of [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) or higher to the virtual machine. If your Microsoft Entra tenant requires multifactor authentication (MFA), then access to the serial console will also need MFA because the serial console's access is through the [Azure portal](https://portal.azure.com).
195193

196194
### Channel security
197195

@@ -209,7 +207,7 @@ The Azure portal or [Azure CLI](/cli/azure/serial-console) act as remote termina
209207

210208
### Audit logs
211209

212-
All access to the serial console is currently logged in the [boot diagnostics](./boot-diagnostics.md) logs of the virtual machine. Access to these logs are owned and controlled by the Azure virtual machine administrator.
210+
All access to the serial console is currently logged in the [boot diagnostics](./boot-diagnostics.md) logs of the virtual machine. Access to these logs is owned and controlled by the Azure virtual machine administrator.
213211

214212
> [!CAUTION]
215213
> No access passwords for the console are logged. However, if commands run within the console contain or output passwords, secrets, user names, or any other form of personally identifiable information (PII), those will be written to the VM boot diagnostics logs. They will be written along with all other visible text, as part of the implementation of the serial console's scroll back function. These logs are circular and only individuals with read permissions to the diagnostics storage account have access to them. However, we recommend following the best practice of using the Remote Desktop for anything that may involve secrets and/or PII.
@@ -237,7 +235,7 @@ The serial console has screen reader support built in. Navigating around with a
237235

238236
Scenario | Actions in the serial console
239237
:------------------|:-----------------------------------------
240-
Incorrect firewall rules | Access serial console and fix Windows firewall rules.
238+
Incorrect firewall rules | Access Serial Console and fix Windows Firewall rules.
241239
Filesystem corruption/check | Access the serial console and recover the filesystem.
242240
RDP configuration issues | Access the serial console and change the settings. For more information, see the [RDP documentation](/windows-server/remote/remote-desktop-services/clients/remote-desktop-allow-access).
243241
Network lock down system | Access the serial console from the Azure portal to manage the system. Some network commands are listed in [Windows commands: CMD and PowerShell](serial-console-cmd-ps-commands.md).
@@ -255,7 +253,7 @@ SAC does not take up the entire Serial Console area in the browser | This is a k
255253
Unable to type at SAC prompt if kernel debugging is enabled. | RDP to VM and run `bcdedit /debug {current} off` from an elevated command prompt. If you can't RDP, you can instead attach the OS disk to another Azure VM and modify it while attached as a data disk by running `bcdedit /store <drive letter of data disk>:\boot\bcd /debug <identifier> off`, then swapping the disk back.
256254
Pasting into PowerShell in SAC results in a third character if the original content had a repeating character. | For a workaround, run `Remove-Module PSReadLine` to unload the PSReadLine module from the current session. This action will not delete or uninstall the module.
257255
Some keyboard inputs produce strange SAC output (for example, **[A**, **[3~**). | [VT100](/windows/console/console-virtual-terminal-sequences) escape sequences aren't supported by the SAC prompt.
258-
Pasting long strings doesn't work. | The serial console limits the length of strings pasted into the terminal to 2048 characters to prevent overloading the serial port bandwidth.
256+
Pasting long strings doesn't work. | The serial console limits the length of strings pasted into the terminal to 2,048 characters to prevent overloading the serial port bandwidth.
259257

260258
## Frequently asked questions
261259

0 commit comments

Comments
 (0)