You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/autoscale/autoscale-multiprofile.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ When creating multiple profiles using templates, the CLI, and PowerShell, follow
58
58
59
59
## [ARM templates](#tab/templates)
60
60
61
-
See the autoscale section of the [ARM template resource definition](https://learn.microsoft.com/azure/templates/microsoft.insights/autoscalesettings) for a full template reference.
61
+
See the autoscale section of the [ARM template resource definition](/azure/templates/microsoft.insights/autoscalesettings) for a full template reference.
62
62
63
63
There is no specification in the template for end time. A profile will remain active until the next profile's start time.
64
64
@@ -68,7 +68,7 @@ There is no specification in the template for end time. A profile will remain ac
68
68
The example below shows how to create two recurring profiles. One profile for weekends from 00:01 on Saturday morning and a second Weekday profile starting on Mondays at 04:00. That means that the weekend profile will start on Saturday morning at one minute passed midnight and end on Monday morning at 04:00. The Weekday profile will start at 4am on Monday and end just after midnight on Saturday morning.
69
69
70
70
Use the following command to deploy the template:
71
-
`az deployment group create --name VMSS1-Autoscale-607 --resource-group rg-vmss1 --template-file VMSS1-autoscale.json`
71
+
`az deployment group create --name VMSS1-Autoscale-607 --resource-group rg-vmss1 --template-file VMSS1-autoscale.json`
72
72
where *VMSS1-autoscale.json* is the the file containing the JSON object below.
73
73
74
74
```JSON
@@ -192,7 +192,7 @@ where *VMSS1-autoscale.json* is the the file containing the JSON object below.
192
192
193
193
The CLI can be used to create multiple profiles in your autoscale settings.
194
194
195
-
See the [Autoscale CLI reference](https://learn.microsoft.com/cli/azure/monitor/autoscale?view=azure-cli-latest) for the full set of autoscale CLI commands.
195
+
See the [Autoscale CLI reference](/cli/azure/monitor/autoscale) for the full set of autoscale CLI commands.
196
196
197
197
The following steps show how to create a recurring autoscale profile using the CLI.
PowerShell can be used to create multiple profiles in your autoscale settings.
269
269
270
-
See the [PowerShell Az.Monitor Reference](https://learn.microsoft.com/powershell/module/az.monitor/#monitor) for the full set of autoscale PowerShell commands.
270
+
See the [PowerShell Az.Monitor Reference](/powershell/module/az.monitor/#monitor) for the full set of autoscale PowerShell commands.
271
271
272
272
The following steps show how to create an autoscale profile using PowerShell.
*[PowerShell Az PowerShell module.Monitor Reference](https://learn.microsoft.com/powershell/module/az.monitor/#monitor)
421
-
*[REST API reference. Autoscale Settings](https://learn.microsoft.com/rest/api/monitor/autoscale-settings).
422
-
*[Tutorial: Automatically scale a Virtual Machine Scale Set with an Azure template](https://learn.microsoft.com/azure/virtual-machine-scale-sets/tutorial-autoscale-template)
423
-
*[Tutorial: Automatically scale a Virtual Machine Scale Set with the Azure CLI](https://learn.microsoft.com/azure/virtual-machine-scale-sets/tutorial-autoscale-cli)
424
-
*[Tutorial: Automatically scale a Virtual Machine Scale Set with an Azure template](https://learn.microsoft.com/azure/virtual-machine-scale-sets/tutorial-autoscale-powershell)
Copy file name to clipboardExpand all lines: articles/azure-monitor/autoscale/autoscale-using-powershell.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ To create autoscale setting using PowerShell, follow the sequence below:
74
74
### Create rules
75
75
76
76
Create scale in and scale out rules then associated them with a profile.
77
-
Rules are created using the [`New-AzAutoscaleScaleRuleObject`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscalescaleruleobject).
77
+
Rules are created using the [`New-AzAutoscaleScaleRuleObject`](/powershell/module/az.monitor/new-azautoscalescaleruleobject).
78
78
79
79
The following PowerShell script creates two rules.
80
80
@@ -134,7 +134,7 @@ The table below describes the parameters used in the `New-AzAutoscaleScaleRuleOb
134
134
135
135
### Create a default autoscale profile and associate the rules
136
136
137
-
After defining the scale rules, create a profile. The profile specifies the default, upper, and lower instance count limits, and the times that the associated rules can be applied. Use the [`New-AzAutoscaleProfileObject`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscaleprofileobject) cmdlet to create a new autoscale profile. As this is a default profile, it doesn't have any schedule parameters. The default profile is active at times that no other profiles are active
137
+
After defining the scale rules, create a profile. The profile specifies the default, upper, and lower instance count limits, and the times that the associated rules can be applied. Use the [`New-AzAutoscaleProfileObject`](/powershell/module/az.monitor/new-azautoscaleprofileobject) cmdlet to create a new autoscale profile. As this is a default profile, it doesn't have any schedule parameters. The default profile is active at times that no other profiles are active
138
138
139
139
```azurepowershell
140
140
$defaultProfile=New-AzAutoscaleProfileObject `
@@ -163,7 +163,7 @@ The table below describes the parameters used in the `New-AzAutoscaleProfileObje
163
163
164
164
### Apply the autoscale settings
165
165
166
-
After fining the rules and profile, apply the autoscale settings using [`New-AzAutoscaleSetting`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscalesetting). To update existing autoscale setting use [`Update-AzAutoscaleSetting`](https://learn.microsoft.com/powershell/module/az.monitor/add-azautoscalesetting)
166
+
After fining the rules and profile, apply the autoscale settings using [`New-AzAutoscaleSetting`](/powershell/module/az.monitor/new-azautoscalesetting). To update existing autoscale setting use [`Update-AzAutoscaleSetting`](/powershell/module/az.monitor/add-azautoscalesetting)
167
167
168
168
```azurepowershell
169
169
New-AzAutoscaleSetting `
@@ -179,15 +179,15 @@ New-AzAutoscaleSetting `
179
179
### Add notifications to your autoscale settings
180
180
181
181
Add notifications to your sale setting to trigger a webhook or send email notifications when a scale event occurs.
182
-
For more information on webhook notifications, see [`New-AzAutoscaleWebhookNotificationObject`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscalewebhooknotificationobject)
182
+
For more information on webhook notifications, see [`New-AzAutoscaleWebhookNotificationObject`](/powershell/module/az.monitor/new-azautoscalewebhooknotificationobject)
Configure the notification using the webhook and set up email notification using the [`New-AzAutoscaleNotificationObject`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscalenotificationobject) cmdlet:
190
+
Configure the notification using the webhook and set up email notification using the [`New-AzAutoscaleNotificationObject`](/powershell/module/az.monitor/new-azautoscalenotificationobject) cmdlet:
191
191
192
192
```azurepowershell
193
193
@@ -302,7 +302,7 @@ For more information on scheduled profiles, see [Autoscale with multiple profile
302
302
303
303
## Other autoscale commands
304
304
305
-
For a complete list of PowerShell cmdlets for autoscale, see the [PowerShell Module Browser](https://learn.microsoft.com/powershell/module/?term=azautoscale)
305
+
For a complete list of PowerShell cmdlets for autoscale, see the [PowerShell Module Browser](/powershell/module/?term=azautoscale)
Copy file name to clipboardExpand all lines: articles/azure-monitor/autoscale/autoscale-webhook-email.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ For example, the following command adds an email notification and a webhook noti
63
63
> You can add mote than one email or webhook notification by using the `--add-action` parameter multiple times. While multiple webhook notifications are supported and can be seen in the JSON, the portal only shows the first webhook.
64
64
65
65
66
-
For more information, see [az monitor autoscale](https://learn.microsoft.com/cli/azure/monitor/autoscale?view=azure-cli-latest).
66
+
For more information, see [az monitor autoscale](/cli/azure/monitor/autoscale).
### Use Resource Manager templates to configure notifications.
107
107
108
-
When you use the Resource Manager templates or REST API, include the `notifications` element in your [autoscale settings](https://learn.microsoft.com/azure/templates/microsoft.insights/autoscalesettings?pivots=deployment-language-arm-template#resource-format-1), for example:
108
+
When you use the Resource Manager templates or REST API, include the `notifications` element in your [autoscale settings](/azure/templates/microsoft.insights/autoscalesettings?pivots=deployment-language-arm-template#resource-format-1), for example:
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-syslog.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,8 @@ Container Insights offers the ability to collect Syslog events from Linux nodes
18
18
- You need to have managed identity authentication enabled on your cluster. To enable, see [migrate your AKS cluster to managed identity authentication](container-insights-enable-existing-clusters.md?tabs=azure-cli#migrate-to-managed-identity-authentication). Note: Enabling Managed Identity will create a new Data Collection Rule (DCR) named `MSCI-<WorkspaceRegion>-<ClusterName>`
19
19
- Minimum versions of Azure components
20
20
-**Azure CLI**: Minimum version required for Azure CLI is [2.45.0 (link to release notes)](/cli/azure/release-notes-azure-cli#february-07-2023). See [How to update the Azure CLI](/cli/azure/update-azure-cli) for upgrade instructions.
21
-
-**Azure CLI AKS-Preview Extension**: Minimum version required for AKS-Preview Azure CLI extension is [0.5.125 (link to release notes)](https://github.com/Azure/azure-cli-extensions/blob/main/src/aks-preview/HISTORY.rst#05125). See [How to update extensions](/cli/azure/azure-cli-extensions-overview#how-to-update-extensions) for upgrade guidance.
22
-
-**Linux image version**: Minimum version for AKS node linux image is 2022.11.01. See [Upgrade Azure Kubernetes Service (AKS) node images](https://learn.microsoft.com/azure/aks/node-image-upgrade) for upgrade help.
21
+
-**Azure CLI AKS-Preview Extension**: Minimum version required for AKS-Preview Azure CLI extension is [0.5.125 (link to release notes)](https://github.com/Azure/azure-cli-extensions/blob/main/src/aks-preview/HISTORY.rst#05125). See [How to update extensions](/cli/azure/azure-cli-extensions-overview#how-to-update-extensions) for upgrade guidance.
22
+
-**Linux image version**: Minimum version for AKS node linux image is 2022.11.01. See [Upgrade Azure Kubernetes Service (AKS) node images](/azure/aks/node-image-upgrade) for upgrade help.
23
23
24
24
## How to enable Syslog
25
25
@@ -158,8 +158,8 @@ Select the minimum log level for each facility that you want to collect.
158
158
## Next steps
159
159
160
160
Once setup customers can start sending Syslog data to the tools of their choice
161
-
- Send Syslog to Microsoft Sentinel: https://learn.microsoft.com/azure/sentinel/connect-syslog
162
-
- Export data from Log Analytics: https://learn.microsoft.com/azure/azure-monitor/logs/logs-data-export?tabs=portal
161
+
-[Send Syslog to Microsoft Sentinel](/azure/sentinel/connect-syslog)
162
+
-[Export data from Log Analytics](/azure/azure-monitor/logs/logs-data-export?tabs=portal)
163
163
164
164
Read more
165
165
-[Syslog record properties](/azure/azure-monitor/reference/tables/syslog)
Copy file name to clipboardExpand all lines: articles/azure-monitor/essentials/diagnostics-settings-policies-deployifnotexists.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ The following steps show how to apply the policy to send audit logs to for key v
48
48
### [CLI](#tab/cli)
49
49
To apply a policy using the CLI, use the following commands:
50
50
51
-
1. Create a policy assignment using [`az policy assignment create`](https://learn.microsoft.com/cli/azure/policy/assignment?view=azure-cli-latest#az-policy-assignment-create).
51
+
1. Create a policy assignment using [`az policy assignment create`](/cli/azure/policy/assignment#az-policy-assignment-create).
@@ -69,7 +69,7 @@ Find the role in the policy definition by searching for *roleDefinitionIds*
69
69
"deployment": {
70
70
"properties": {...
71
71
```
72
-
Assign the required role using [`az policy assignment identity assign`](https://learn.microsoft.com/cli/azure/policy/assignment/identity?view=azure-cli-latest):
72
+
Assign the required role using [`az policy assignment identity assign`](/cli/azure/policy/assignment/identity):
73
73
```azurecli
74
74
az policy assignment identity assign --system-assigned --resource-group <resource group name> --role <role name or ID> --identity-scope </scope> --name <policy assignment name>
75
75
```
@@ -78,13 +78,13 @@ Find the role in the policy definition by searching for *roleDefinitionIds*
1. Trigger a scan to find existing resources using [`az policy state trigger-scan`](https://learn.microsoft.com/cli/azure/policy/state?view=azure-cli-latest#az-policy-state-trigger-scan).
81
+
1. Trigger a scan to find existing resources using [`az policy state trigger-scan`](/cli/azure/policy/state#az-policy-state-trigger-scan).
82
82
83
83
```azurecli
84
84
az policy state trigger-scan --resource-group rg-001
85
85
```
86
86
87
-
1. Create a remediation task to apply the policy to existing resources using [`az policy remediation create`](https://learn.microsoft.com/cli/azure/policy/remediation?view=azure-cli-latest#az-policy-remediation-create).
87
+
1. Create a remediation task to apply the policy to existing resources using [`az policy remediation create`](/cli/azure/policy/remediation#az-policy-remediation-create).
88
88
89
89
```azurecli
90
90
az policy remediation create -g <resource group name> --policy-assignment <policy assignment name> --name <remediation name>
@@ -95,7 +95,7 @@ Find the role in the policy definition by searching for *roleDefinitionIds*
95
95
az policy remediation create -g rg-001 -n remediation-001 --policy-assignment policy-assignment-1
96
96
```
97
97
98
-
For more information on policy assignment using CLI, see [Azure CLI reference - az policy assignment](https://learn.microsoft.com/cli/azure/policy/assignment?view=azure-cli-latest#az-policy-assignment-create)
98
+
For more information on policy assignment using CLI, see [Azure CLI reference - az policy assignment](/cli/azure/policy/assignment#az-policy-assignment-create)
99
99
100
100
### [PowerShell](#tab/Powershell)
101
101
@@ -284,7 +284,7 @@ You can get your policy assignment details using the following command:
284
284
285
285
1. Select the subscription where you want to apply the policy initiative using the `az account set` command.
286
286
287
-
1. Assign the initiative using [`az policy assignment create`](https://learn.microsoft.com/cli/azure/policy/assignment?view=azure-cli-latest#az-policy-assignment-create).
287
+
1. Assign the initiative using [`az policy assignment create`](/cli/azure/policy/assignment#az-policy-assignment-create).
288
288
289
289
```azurecli
290
290
az policy assignment create --name <assignment name> --resource-group <resource group name> --policy-set-definition <initiative name> --params <parameters object> --mi-system-assigned --location <location>
@@ -306,7 +306,7 @@ You can get your policy assignment details using the following command:
306
306
"deployment": {
307
307
"properties": {...
308
308
```
309
-
Assign the required role using [`az policy assignment identity assign`](https://learn.microsoft.com/cli/azure/policy/assignment/identity?view=azure-cli-latest):
309
+
Assign the required role using [`az policy assignment identity assign`](/cli/azure/policy/assignment/identity):
310
310
```azurecli
311
311
az policy assignment identity assign --system-assigned --resource-group <resource group name> --role <role name or ID> --identity-scope <scope> --name <policy assignment name>
312
312
```
@@ -322,7 +322,7 @@ You can get your policy assignment details using the following command:
322
322
```azurecli
323
323
az policy set-definition show --name f5b29bc4-feca-4cc6-a58a-772dd5e290a5 |grep policyDefinitionReferenceId
324
324
```
325
-
Remediate the resources using [`az policy remediation create`](https://learn.microsoft.com/cli/azure/policy/remediation?view=azure-cli-latest#az-policy-remediation-create)
325
+
Remediate the resources using [`az policy remediation create`](/cli/azure/policy/remediation#az-policy-remediation-create)
326
326
327
327
```azurecli
328
328
az policy remediation create --resource-group <resource group name> --policy-assignment <assignment name> --name <remediation task name> --definition-reference-id "policy specific reference ID" --resource-discovery-mode ReEvaluateCompliance
0 commit comments