Skip to content

Commit 0cecc25

Browse files
authored
Merge pull request #250503 from JasonWHowell/fixes1
Bulk fix build suggestions
2 parents 9736405 + 5b12f20 commit 0cecc25

File tree

10 files changed

+55
-54
lines changed

10 files changed

+55
-54
lines changed

articles/azure-monitor/autoscale/autoscale-multiprofile.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ When creating multiple profiles using templates, the CLI, and PowerShell, follow
5858

5959
## [ARM templates](#tab/templates)
6060

61-
See the autoscale section of the [ARM template resource definition](https://learn.microsoft.com/azure/templates/microsoft.insights/autoscalesettings) for a full template reference.
61+
See the autoscale section of the [ARM template resource definition](/azure/templates/microsoft.insights/autoscalesettings) for a full template reference.
6262

6363
There is no specification in the template for end time. A profile will remain active until the next profile's start time.
6464

@@ -68,7 +68,7 @@ There is no specification in the template for end time. A profile will remain ac
6868
The example below shows how to create two recurring profiles. One profile for weekends from 00:01 on Saturday morning and a second Weekday profile starting on Mondays at 04:00. That means that the weekend profile will start on Saturday morning at one minute passed midnight and end on Monday morning at 04:00. The Weekday profile will start at 4am on Monday and end just after midnight on Saturday morning.
6969

7070
Use the following command to deploy the template:
71-
` az deployment group create --name VMSS1-Autoscale-607 --resource-group rg-vmss1 --template-file VMSS1-autoscale.json`
71+
`az deployment group create --name VMSS1-Autoscale-607 --resource-group rg-vmss1 --template-file VMSS1-autoscale.json`
7272
where *VMSS1-autoscale.json* is the the file containing the JSON object below.
7373

7474
``` JSON
@@ -192,7 +192,7 @@ where *VMSS1-autoscale.json* is the the file containing the JSON object below.
192192

193193
The CLI can be used to create multiple profiles in your autoscale settings.
194194

195-
See the [Autoscale CLI reference](https://learn.microsoft.com/cli/azure/monitor/autoscale?view=azure-cli-latest) for the full set of autoscale CLI commands.
195+
See the [Autoscale CLI reference](/cli/azure/monitor/autoscale) for the full set of autoscale CLI commands.
196196

197197
The following steps show how to create a recurring autoscale profile using the CLI.
198198

@@ -267,7 +267,7 @@ az monitor autoscale rule create -g rg-vmss1--autoscale-name VMSS1-Autoscale-607
267267

268268
PowerShell can be used to create multiple profiles in your autoscale settings.
269269

270-
See the [PowerShell Az.Monitor Reference ](https://learn.microsoft.com/powershell/module/az.monitor/#monitor) for the full set of autoscale PowerShell commands.
270+
See the [PowerShell Az.Monitor Reference](/powershell/module/az.monitor/#monitor) for the full set of autoscale PowerShell commands.
271271

272272
The following steps show how to create an autoscale profile using PowerShell.
273273

@@ -415,10 +415,10 @@ $DefaultProfileThursdayProfile = New-AzAutoscaleProfile -DefaultCapacity "1" -Ma
415415

416416
## Next steps
417417

418-
* [Autoscale CLI reference](https://learn.microsoft.com/cli/azure/monitor/autoscale?view=azure-cli-latest)
419-
* [ARM template resource definition](https://learn.microsoft.com/azure/templates/microsoft.insights/autoscalesettings)
420-
* [PowerShell Az PowerShell module.Monitor Reference](https://learn.microsoft.com/powershell/module/az.monitor/#monitor)
421-
* [REST API reference. Autoscale Settings](https://learn.microsoft.com/rest/api/monitor/autoscale-settings).
422-
* [Tutorial: Automatically scale a Virtual Machine Scale Set with an Azure template](https://learn.microsoft.com/azure/virtual-machine-scale-sets/tutorial-autoscale-template)
423-
* [Tutorial: Automatically scale a Virtual Machine Scale Set with the Azure CLI](https://learn.microsoft.com/azure/virtual-machine-scale-sets/tutorial-autoscale-cli)
424-
* [Tutorial: Automatically scale a Virtual Machine Scale Set with an Azure template](https://learn.microsoft.com/azure/virtual-machine-scale-sets/tutorial-autoscale-powershell)
418+
* [Autoscale CLI reference](/cli/azure/monitor/autoscale)
419+
* [ARM template resource definition](/azure/templates/microsoft.insights/autoscalesettings)
420+
* [PowerShell Az PowerShell module.Monitor Reference](/powershell/module/az.monitor/#monitor)
421+
* [REST API reference. Autoscale Settings](/rest/api/monitor/autoscale-settings).
422+
* [Tutorial: Automatically scale a Virtual Machine Scale Set with an Azure template](/azure/virtual-machine-scale-sets/tutorial-autoscale-template)
423+
* [Tutorial: Automatically scale a Virtual Machine Scale Set with the Azure CLI](/azure/virtual-machine-scale-sets/tutorial-autoscale-cli)
424+
* [Tutorial: Automatically scale a Virtual Machine Scale Set with an Azure template](/azure/virtual-machine-scale-sets/tutorial-autoscale-powershell)

articles/azure-monitor/autoscale/autoscale-using-powershell.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ To create autoscale setting using PowerShell, follow the sequence below:
7474
### Create rules
7575

7676
Create scale in and scale out rules then associated them with a profile.
77-
Rules are created using the [`New-AzAutoscaleScaleRuleObject`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscalescaleruleobject).
77+
Rules are created using the [`New-AzAutoscaleScaleRuleObject`](/powershell/module/az.monitor/new-azautoscalescaleruleobject).
7878

7979
The following PowerShell script creates two rules.
8080

@@ -134,7 +134,7 @@ The table below describes the parameters used in the `New-AzAutoscaleScaleRuleOb
134134

135135
### Create a default autoscale profile and associate the rules
136136

137-
After defining the scale rules, create a profile. The profile specifies the default, upper, and lower instance count limits, and the times that the associated rules can be applied. Use the [`New-AzAutoscaleProfileObject`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscaleprofileobject) cmdlet to create a new autoscale profile. As this is a default profile, it doesn't have any schedule parameters. The default profile is active at times that no other profiles are active
137+
After defining the scale rules, create a profile. The profile specifies the default, upper, and lower instance count limits, and the times that the associated rules can be applied. Use the [`New-AzAutoscaleProfileObject`](/powershell/module/az.monitor/new-azautoscaleprofileobject) cmdlet to create a new autoscale profile. As this is a default profile, it doesn't have any schedule parameters. The default profile is active at times that no other profiles are active
138138

139139
```azurepowershell
140140
$defaultProfile=New-AzAutoscaleProfileObject `
@@ -163,7 +163,7 @@ The table below describes the parameters used in the `New-AzAutoscaleProfileObje
163163

164164
### Apply the autoscale settings
165165

166-
After fining the rules and profile, apply the autoscale settings using [`New-AzAutoscaleSetting`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscalesetting). To update existing autoscale setting use [`Update-AzAutoscaleSetting`](https://learn.microsoft.com/powershell/module/az.monitor/add-azautoscalesetting)
166+
After fining the rules and profile, apply the autoscale settings using [`New-AzAutoscaleSetting`](/powershell/module/az.monitor/new-azautoscalesetting). To update existing autoscale setting use [`Update-AzAutoscaleSetting`](/powershell/module/az.monitor/add-azautoscalesetting)
167167

168168
```azurepowershell
169169
New-AzAutoscaleSetting `
@@ -179,15 +179,15 @@ New-AzAutoscaleSetting `
179179
### Add notifications to your autoscale settings
180180

181181
Add notifications to your sale setting to trigger a webhook or send email notifications when a scale event occurs.
182-
For more information on webhook notifications, see [`New-AzAutoscaleWebhookNotificationObject`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscalewebhooknotificationobject)
182+
For more information on webhook notifications, see [`New-AzAutoscaleWebhookNotificationObject`](/powershell/module/az.monitor/new-azautoscalewebhooknotificationobject)
183183

184184
Set a webhook using the following cmdlet;
185185
```azurepowershell
186186
187187
$webhook1=New-AzAutoscaleWebhookNotificationObject -Property @{} -ServiceUri "http://contoso.com/webhook1"
188188
```
189189

190-
Configure the notification using the webhook and set up email notification using the [`New-AzAutoscaleNotificationObject`](https://learn.microsoft.com/powershell/module/az.monitor/new-azautoscalenotificationobject) cmdlet:
190+
Configure the notification using the webhook and set up email notification using the [`New-AzAutoscaleNotificationObject`](/powershell/module/az.monitor/new-azautoscalenotificationobject) cmdlet:
191191

192192
```azurepowershell
193193
@@ -302,7 +302,7 @@ For more information on scheduled profiles, see [Autoscale with multiple profile
302302

303303
## Other autoscale commands
304304

305-
For a complete list of PowerShell cmdlets for autoscale, see the [PowerShell Module Browser](https://learn.microsoft.com/powershell/module/?term=azautoscale)
305+
For a complete list of PowerShell cmdlets for autoscale, see the [PowerShell Module Browser](/powershell/module/?term=azautoscale)
306306

307307
## Clean up resources
308308

articles/azure-monitor/autoscale/autoscale-webhook-email.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ For example, the following command adds an email notification and a webhook noti
6363
> You can add mote than one email or webhook notification by using the `--add-action` parameter multiple times. While multiple webhook notifications are supported and can be seen in the JSON, the portal only shows the first webhook.
6464
6565

66-
For more information, see [az monitor autoscale](https://learn.microsoft.com/cli/azure/monitor/autoscale?view=azure-cli-latest).
66+
For more information, see [az monitor autoscale](/cli/azure/monitor/autoscale).
6767

6868

6969

@@ -105,7 +105,7 @@ New-AzAutoscaleSetting -Name autoscalesetting2 `
105105

106106
### Use Resource Manager templates to configure notifications.
107107

108-
When you use the Resource Manager templates or REST API, include the `notifications` element in your [autoscale settings](https://learn.microsoft.com/azure/templates/microsoft.insights/autoscalesettings?pivots=deployment-language-arm-template#resource-format-1), for example:
108+
When you use the Resource Manager templates or REST API, include the `notifications` element in your [autoscale settings](/azure/templates/microsoft.insights/autoscalesettings?pivots=deployment-language-arm-template#resource-format-1), for example:
109109

110110
```JSON
111111
"notifications": [

articles/azure-monitor/containers/container-insights-syslog.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ Container Insights offers the ability to collect Syslog events from Linux nodes
1818
- You need to have managed identity authentication enabled on your cluster. To enable, see [migrate your AKS cluster to managed identity authentication](container-insights-enable-existing-clusters.md?tabs=azure-cli#migrate-to-managed-identity-authentication). Note: Enabling Managed Identity will create a new Data Collection Rule (DCR) named `MSCI-<WorkspaceRegion>-<ClusterName>`
1919
- Minimum versions of Azure components
2020
- **Azure CLI**: Minimum version required for Azure CLI is [2.45.0 (link to release notes)](/cli/azure/release-notes-azure-cli#february-07-2023). See [How to update the Azure CLI](/cli/azure/update-azure-cli) for upgrade instructions.
21-
- **Azure CLI AKS-Preview Extension**: Minimum version required for AKS-Preview Azure CLI extension is [ 0.5.125 (link to release notes)](https://github.com/Azure/azure-cli-extensions/blob/main/src/aks-preview/HISTORY.rst#05125). See [How to update extensions](/cli/azure/azure-cli-extensions-overview#how-to-update-extensions) for upgrade guidance.
22-
- **Linux image version**: Minimum version for AKS node linux image is 2022.11.01. See [Upgrade Azure Kubernetes Service (AKS) node images](https://learn.microsoft.com/azure/aks/node-image-upgrade) for upgrade help.
21+
- **Azure CLI AKS-Preview Extension**: Minimum version required for AKS-Preview Azure CLI extension is [0.5.125 (link to release notes)](https://github.com/Azure/azure-cli-extensions/blob/main/src/aks-preview/HISTORY.rst#05125). See [How to update extensions](/cli/azure/azure-cli-extensions-overview#how-to-update-extensions) for upgrade guidance.
22+
- **Linux image version**: Minimum version for AKS node linux image is 2022.11.01. See [Upgrade Azure Kubernetes Service (AKS) node images](/azure/aks/node-image-upgrade) for upgrade help.
2323

2424
## How to enable Syslog
2525

@@ -158,8 +158,8 @@ Select the minimum log level for each facility that you want to collect.
158158
## Next steps
159159

160160
Once setup customers can start sending Syslog data to the tools of their choice
161-
- Send Syslog to Microsoft Sentinel: https://learn.microsoft.com/azure/sentinel/connect-syslog
162-
- Export data from Log Analytics: https://learn.microsoft.com/azure/azure-monitor/logs/logs-data-export?tabs=portal
161+
- [Send Syslog to Microsoft Sentinel](/azure/sentinel/connect-syslog)
162+
- [Export data from Log Analytics](/azure/azure-monitor/logs/logs-data-export?tabs=portal)
163163

164164
Read more
165165
- [Syslog record properties](/azure/azure-monitor/reference/tables/syslog)

articles/azure-monitor/essentials/diagnostics-settings-policies-deployifnotexists.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The following steps show how to apply the policy to send audit logs to for key v
4848
### [CLI](#tab/cli)
4949
To apply a policy using the CLI, use the following commands:
5050

51-
1. Create a policy assignment using [`az policy assignment create`](https://learn.microsoft.com/cli/azure/policy/assignment?view=azure-cli-latest#az-policy-assignment-create).
51+
1. Create a policy assignment using [`az policy assignment create`](/cli/azure/policy/assignment#az-policy-assignment-create).
5252
```azurecli
5353
az policy assignment create --name <policy assignment name> --policy "6b359d8f-f88d-4052-aa7c-32015963ecc1" --scope <scope> --params "{\"logAnalytics\": {\"value\": \"<log analytics workspace resource ID"}}" --mi-system-assigned --location <location>
5454
```
@@ -69,7 +69,7 @@ Find the role in the policy definition by searching for *roleDefinitionIds*
6969
"deployment": {
7070
"properties": {...
7171
```
72-
Assign the required role using [`az policy assignment identity assign`](https://learn.microsoft.com/cli/azure/policy/assignment/identity?view=azure-cli-latest):
72+
Assign the required role using [`az policy assignment identity assign`](/cli/azure/policy/assignment/identity):
7373
```azurecli
7474
az policy assignment identity assign --system-assigned --resource-group <resource group name> --role <role name or ID> --identity-scope </scope> --name <policy assignment name>
7575
```
@@ -78,13 +78,13 @@ Find the role in the policy definition by searching for *roleDefinitionIds*
7878
az policy assignment identity assign --system-assigned --resource-group rg-001 --role 92aaf0da-9dab-42b6-94a3-d43ce8d16293 --identity-scope /subscriptions/12345678-aaaa-bbbb-cccc-1234567890ab/resourceGroups/rg001 --name policy-assignment-1
7979
```
8080

81-
1. Trigger a scan to find existing resources using [`az policy state trigger-scan`](https://learn.microsoft.com/cli/azure/policy/state?view=azure-cli-latest#az-policy-state-trigger-scan).
81+
1. Trigger a scan to find existing resources using [`az policy state trigger-scan`](/cli/azure/policy/state#az-policy-state-trigger-scan).
8282

8383
```azurecli
8484
az policy state trigger-scan --resource-group rg-001
8585
```
8686

87-
1. Create a remediation task to apply the policy to existing resources using [`az policy remediation create`](https://learn.microsoft.com/cli/azure/policy/remediation?view=azure-cli-latest#az-policy-remediation-create).
87+
1. Create a remediation task to apply the policy to existing resources using [`az policy remediation create`](/cli/azure/policy/remediation#az-policy-remediation-create).
8888

8989
```azurecli
9090
az policy remediation create -g <resource group name> --policy-assignment <policy assignment name> --name <remediation name>
@@ -95,7 +95,7 @@ Find the role in the policy definition by searching for *roleDefinitionIds*
9595
az policy remediation create -g rg-001 -n remediation-001 --policy-assignment policy-assignment-1
9696
```
9797

98-
For more information on policy assignment using CLI, see [Azure CLI reference - az policy assignment](https://learn.microsoft.com/cli/azure/policy/assignment?view=azure-cli-latest#az-policy-assignment-create)
98+
For more information on policy assignment using CLI, see [Azure CLI reference - az policy assignment](/cli/azure/policy/assignment#az-policy-assignment-create)
9999

100100
### [PowerShell](#tab/Powershell)
101101

@@ -284,7 +284,7 @@ You can get your policy assignment details using the following command:
284284

285285
1. Select the subscription where you want to apply the policy initiative using the `az account set` command.
286286

287-
1. Assign the initiative using [`az policy assignment create`](https://learn.microsoft.com/cli/azure/policy/assignment?view=azure-cli-latest#az-policy-assignment-create).
287+
1. Assign the initiative using [`az policy assignment create`](/cli/azure/policy/assignment#az-policy-assignment-create).
288288

289289
```azurecli
290290
az policy assignment create --name <assignment name> --resource-group <resource group name> --policy-set-definition <initiative name> --params <parameters object> --mi-system-assigned --location <location>
@@ -306,7 +306,7 @@ You can get your policy assignment details using the following command:
306306
"deployment": {
307307
"properties": {...
308308
```
309-
Assign the required role using [`az policy assignment identity assign`](https://learn.microsoft.com/cli/azure/policy/assignment/identity?view=azure-cli-latest):
309+
Assign the required role using [`az policy assignment identity assign`](/cli/azure/policy/assignment/identity):
310310
```azurecli
311311
az policy assignment identity assign --system-assigned --resource-group <resource group name> --role <role name or ID> --identity-scope <scope> --name <policy assignment name>
312312
```
@@ -322,7 +322,7 @@ You can get your policy assignment details using the following command:
322322
```azurecli
323323
az policy set-definition show --name f5b29bc4-feca-4cc6-a58a-772dd5e290a5 |grep policyDefinitionReferenceId
324324
```
325-
Remediate the resources using [`az policy remediation create`](https://learn.microsoft.com/cli/azure/policy/remediation?view=azure-cli-latest#az-policy-remediation-create)
325+
Remediate the resources using [`az policy remediation create`](/cli/azure/policy/remediation#az-policy-remediation-create)
326326
327327
```azurecli
328328
az policy remediation create --resource-group <resource group name> --policy-assignment <assignment name> --name <remediation task name> --definition-reference-id "policy specific reference ID" --resource-discovery-mode ReEvaluateCompliance

0 commit comments

Comments
 (0)