Skip to content

Commit 10353d0

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 5374c16 + 3ee6fe9 commit 10353d0

File tree

103 files changed

+1309
-2346
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

103 files changed

+1309
-2346
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -885,6 +885,7 @@
885885
"redirection_files": [
886886
".openpublishing.redirection.json",
887887
".openpublishing.redirection.active-directory.json",
888+
".openpublishing.redirection.azure-blob.json",
888889
".openpublishing.redirection.azure-sql.json",
889890
"articles/data-factory/.openpublishing.redirection.data-factory.json",
890891
".openpublishing.redirection.defender-for-cloud.json",
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/storage/blobs/storage-upload-process-images.md",
5+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/storage/blobs/storage-secure-access-application.md",
10+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
11+
"redirect_document_id": true
12+
},
13+
{
14+
"source_path_from_root": "/articles/storage/blobs/storage-monitor-troubleshoot-storage-application.md",
15+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
16+
"redirect_document_id": false
17+
}
18+
]
19+
}

articles/aks/TOC.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -374,14 +374,14 @@
374374
href: azure-netapp-files.md
375375
- name: Use Azure Ultra Disks
376376
href: use-ultra-disks.md
377-
- name: CSI Storage Drivers
378-
items:
379-
- name: Enable CSI Storage Drivers
380-
href: csi-storage-drivers.md
381-
- name: Azure Disk CSI drivers
382-
href: azure-disk-csi.md
383-
- name: Azure Files CSI drivers
384-
href: azure-files-csi.md
377+
- name: CSI Storage Drivers
378+
items:
379+
- name: Enable CSI Storage Drivers
380+
href: csi-storage-drivers.md
381+
- name: Azure Disk CSI drivers
382+
href: azure-disk-csi.md
383+
- name: Azure Files CSI drivers
384+
href: azure-files-csi.md
385385
- name: Monitoring and logging
386386
items:
387387
- name: Monitor AKS

articles/application-gateway/application-gateway-faq.yml

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -153,17 +153,20 @@ sections:
153153
- question: How do I achieve a DR scenario across datacenters by using Application Gateway?
154154
answer: Use Traffic Manager to distribute traffic across multiple application gateways in different datacenters.
155155

156+
- question: Does Application Gateway support connection draining?
157+
answer: |
158+
Yes. You can set up connection draining to change members within a backend pool without disruption. For more information, see [connection draining section of Application Gateway](features.md#connection-draining).
159+
156160
- question: Does Application Gateway support autoscaling?
157161
answer: |
158162
Yes, the Application Gateway v2 SKU supports autoscaling. For more information, see [Autoscaling and Zone-redundant Application Gateway](application-gateway-autoscaling-zone-redundant.md).
159163
160164
- question: Does manual or automatic scale up or scale down cause downtime?
161165
answer: No. Instances are distributed across upgrade domains and fault domains.
166+
167+
- question: Can I change from Standard to WAF sku without disruption?
168+
answer: Yes.
162169

163-
- question: Does Application Gateway support connection draining?
164-
answer: |
165-
Yes. You can set up connection draining to change members within a backend pool without disruption. For more information, see [connection draining section of Application Gateway](features.md#connection-draining).
166-
167170
- question: Can I change instance size from medium to large without disruption?
168171
answer: Yes.
169172

articles/automanage/virtual-machines-custom-profile.md

Lines changed: 61 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,15 @@ ms.author: jushiman
1414

1515
Azure Automanage for machine best practices has default best practice profiles that cannot be edited. However, if you need more flexibility, you can pick and choose the set of services and settings by creating a custom profile.
1616

17-
We support toggling services ON and OFF. We also currently support customizing settings on [Azure Backup](..\backup\backup-azure-arm-vms-prepare.md#create-a-custom-policy) and [Microsoft Antimalware](../security/fundamentals/antimalware.md#default-and-custom-antimalware-configuration). Also, for Windows machines only, you can modify the audit modes for the [Azure security baselines in Guest Configuration](../governance/policy/concepts/guest-configuration.md). Check out the [ARM template](#create-a-custom-profile-using-azure-resource-manager-templates) for modifying the **azureSecurityBaselineAssignmentType**.
17+
Automanage supports toggling services ON and OFF. It also currently supports customizing settings on [Azure Backup](..\backup\backup-azure-arm-vms-prepare.md#create-a-custom-policy) and [Microsoft Antimalware](../security/fundamentals/antimalware.md#default-and-custom-antimalware-configuration). You can also specify an existing log analytics workspace. Also, for Windows machines only, you can modify the audit modes for the [Azure security baselines in Guest Configuration](../governance/policy/concepts/guest-configuration.md).
1818

19+
Automanage allows you to tag the following resources in the custom profile:
20+
* Resource Group
21+
* Automation Account
22+
* Log Analytics Workspace
23+
* Recovery Vault
1924

25+
Check out the [ARM template](#create-a-custom-profile-using-azure-resource-manager-templates) for modifying these settings.
2026

2127
## Create a custom profile in the Azure portal
2228

@@ -47,6 +53,10 @@ Sign in to the [Azure portal](https://portal.azure.com/).
4753
## Create a custom profile using Azure Resource Manager Templates
4854

4955
The following ARM template will create an Automanage custom profile. Details on the ARM template and steps on how to deploy are located in the ARM template deployment [section](#arm-template-deployment).
56+
57+
> [!NOTE]
58+
> If you want to use a specific log analytics workspace, specify the ID of the workspace like this: "/subscriptions/**subscriptionId**/resourceGroups/**resourceGroupName**/providers/Microsoft.OperationalInsights/workspaces/**workspaceName**"
59+
5060
```json
5161
{
5262
"$schema": "http://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json",
@@ -65,7 +75,14 @@ The following ARM template will create an Automanage custom profile. Details on
6575
"ApplyAndMonitor",
6676
"Audit"
6777
]
68-
}
78+
},
79+
"logAnalyticsWorkspace": {
80+
"type": "String"
81+
},
82+
"LogAnalyticsBehavior": {
83+
"defaultValue": false,
84+
"type": "Bool"
85+
}
6986
},
7087
"resources": [
7188
{
@@ -102,8 +119,22 @@ The following ARM template will create an Automanage custom profile. Details on
102119
"BootDiagnostics/Enable": true,
103120
"ChangeTrackingAndInventory/Enable": true,
104121
"LogAnalytics/Enable": true,
122+
"LogAnalytics/Reprovision": "[parameters('LogAnalyticsBehavior')]",
123+
"LogAnalytics/Workspace": "[parameters('logAnalyticsWorkspace')]",
105124
"UpdateManagement/Enable": true,
106-
"VMInsights/Enable": true
125+
"VMInsights/Enable": true,
126+
"Tags/ResourceGroup": {
127+
"foo": "rg"
128+
},
129+
"Tags/AzureAutomation": {
130+
"foo": "automationAccount"
131+
},
132+
"Tags/LogAnalyticsWorkspace": {
133+
"foo": "workspace"
134+
},
135+
"Tags/RecoveryVault": {
136+
"foo": "recoveryVault"
137+
}
107138
}
108139
}
109140
}
@@ -124,6 +155,33 @@ The `azureSecurityBaselineAssignmentType` is the audit mode that you can choose
124155
* ApplyAndMonitor : This will apply the Azure security baseline through the Guest Configuration extention when you first assign this profile to each machine. After it is applied, the Guest Configuration service will monitor the sever baseline and report any drift from the desired state. However, it will not auto-remdiate.
125156
* Audit : This will install the Azure security baseline using the Guest Configuration extension. You will be able to see where your machine is out of compliance with the baseline, but noncompliance won't be automatically remediated.
126157

158+
You can also specify an existing log analytics workspace by adding this setting to the configuration section of properties below:
159+
* "LogAnalytics/Workspace": "/subscriptions/**subscriptionId**/resourceGroups/**resourceGroupName**/providers/Microsoft.OperationalInsights/workspaces/**workspaceName**"
160+
* "LogAnalytics/Reprovision": false
161+
Specify your existing workspace in the `LogAnalytics/Workspace` line. Set the `LogAnalytics/Reprovision` setting to true if you would like this log analytics workspace to be used in all cases. This means that any machine with this custom profile will use this workspace, even it is already connected to one. By default, the `LogAnalytics/Reprovision` is set to false. If your machine is already connected to a workspace, then that workspace will continue to be used. If it is not connected to a workspace, then the workspace specified in `LogAnalytics\Workspace` will be used.
162+
163+
Also, you can add tags to resources specified in the custom profile like below:
164+
165+
```json
166+
"Tags/ResourceGroup": {
167+
"foo": "rg"
168+
},
169+
"Tags/ResourceGroup/Behavior": "Preserve",
170+
"Tags/AzureAutomation": {
171+
"foo": "automationAccount"
172+
},
173+
"Tags/AzureAutomation/Behavior": "Replace",
174+
"Tags/LogAnalyticsWorkspace": {
175+
"foo": "workspace"
176+
},
177+
"Tags/LogAnalyticsWorkspace/Behavior": "Replace",
178+
"Tags/RecoveryVault": {
179+
"foo": "recoveryVault"
180+
},
181+
"Tags/RecoveryVault/Behavior": "Preserve"
182+
```
183+
The `Tags/Behavior` can either be set to Preserve or Replace. If the resource you are tagging already has the same tag key in the key/value pair, you can choose if you would like to replace that key with the specified value in the configuration profile by using the *Replace* behavior. By default, the behavior is set to *Preserve*, meaning that the tag key that is already associated with that resource will be kept and not overwritten by the key/value pair specified in the configuration profile.
184+
127185
Follow these steps to deploy the ARM template:
128186
1. Save this ARM template as `azuredeploy.json`
129187
1. Run this ARM template deployment with `az deployment group create --resource-group myResourceGroup --template-file azuredeploy.json`

articles/automation/automation-services.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Provides a serverless event-driven compute platform for automation that allows y
149149

150150
- You can use a variety of languages to write functions in a language of your choice such as C#, Java, JavaScript, PowerShell, or Python and focus on specific pieces of code. Functions runtime is an open source.
151151
- You can choose the hosting plan according to your function app scaling requirements, functionality, and resources required.
152-
- You can orchestrate complex workflows through [durable functions](/azure-functions/durable/durable-functions-overview?tabs=csharp).
152+
- You can orchestrate complex workflows through [durable functions](/azure/azure-functions/durable/durable-functions-overview?tabs=csharp).
153153
- You should avoid large, and long-running functions that can cause unexpected timeout issues. [Learn more](/azure/azure-functions/functions-best-practices?tabs=csharp#write-robust-functions).
154154
- When you write Powershell scripts within the Function Apps, you must tweak the scripts to define how the function behaves such as - how it's triggered, its input and output parameters. [Learn more](/azure/azure-functions/functions-reference-powershell?tabs=portal).
155155

@@ -191,7 +191,7 @@ Provides a serverless event-driven compute platform for automation that allows y
191191

192192
- You can use a variety of languages to write functions in a language of your choice such as C#, Java, JavaScript, PowerShell, or Python and focus on specific pieces of code. Functions runtime is an open source.
193193
- You can choose the hosting plan according to your function app scaling requirements, functionality, and resources required.
194-
- You can orchestrate complex workflows through [durable functions](/azure-functions/durable/durable-functions-overview?tabs=csharp).
194+
- You can orchestrate complex workflows through [durable functions](/azure/azure-functions/durable/durable-functions-overview?tabs=csharp).
195195
- You should avoid large, and long-running functions that can cause unexpected timeout issues. [Learn more](/azure/azure-functions/functions-best-practices?tabs=csharp#write-robust-functions).
196196
- When you write Powershell scripts within the Function Apps, you must tweak the scripts to define how the function behaves such as - how it's triggered, its input and output parameters. [Learn more](/azure/azure-functions/functions-reference-powershell?tabs=portal).
197197

articles/azure-monitor/alerts/action-groups-create-resource-manager-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ First template, describes how to create a Resource Manager template for an actio
2626

2727
```json
2828
{
29-
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
29+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3030
"contentVersion": "1.0.0.0",
3131
"parameters": {
3232
"actionGroupName": {
@@ -123,7 +123,7 @@ First template, describes how to create a Resource Manager template for an actio
123123

124124
```json
125125
{
126-
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
126+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
127127
"contentVersion": "1.0.0.0",
128128
"parameters": {
129129
"actionGroupName": {

articles/azure-monitor/app/asp-net-core.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,6 +129,8 @@ For Visual Studio for Mac, use the [manual guidance](#enable-application-insight
129129
If you want to store the connection string in ASP.NET Core user secrets or retrieve it from another configuration provider, you can use the overload with a `Microsoft.Extensions.Configuration.IConfiguration` parameter. For example, `services.AddApplicationInsightsTelemetry(Configuration);`.
130130
In Microsoft.ApplicationInsights.AspNetCore version [2.15.0](https://www.nuget.org/packages/Microsoft.ApplicationInsights.AspNetCore) and later, calling `services.AddApplicationInsightsTelemetry()` automatically reads the connection string from `Microsoft.Extensions.Configuration.IConfiguration` of the application. There's no need to explicitly provide the `IConfiguration`.
131131

132+
If `IConfiguration` has loaded configuration from multiple providers, then `services.AddApplicationInsightsTelemetry` prioritizes configuration from `appsettings.json`, irrespective of the order in which providers are added. Use the `services.AddApplicationInsightsTelemetry(IConfiguration)` method to read configuration from IConfiguration without this preferential treatment for `appsettings.json`.
133+
132134
## Run your application
133135

134136
Run your application and make requests to it. Telemetry should now flow to Application Insights. The Application Insights SDK automatically collects incoming web requests to your application, along with the following telemetry.
@@ -536,4 +538,4 @@ For the latest updates and bug fixes, see the [release notes](./release-notes.md
536538
* [Configure a snapshot collection](./snapshot-debugger.md) to see the state of source code and variables at the moment an exception is thrown.
537539
* [Use the API](./api-custom-events-metrics.md) to send your own events and metrics for a detailed view of your app's performance and usage.
538540
* Use [availability tests](./monitor-web-app-availability.md) to check your app constantly from around the world.
539-
* [Dependency Injection in ASP.NET Core](/aspnet/core/fundamentals/dependency-injection)
541+
* [Dependency Injection in ASP.NET Core](/aspnet/core/fundamentals/dependency-injection)

articles/azure-monitor/essentials/activity-log-schema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -290,7 +290,7 @@ This category contains the record of any resource health events that have occurr
290290
| eventDataId |Unique identifier of the alert event. |
291291
| category | Always "ResourceHealth" |
292292
| eventTimestamp |Timestamp when the event was generated by the Azure service processing the request corresponding the event. |
293-
| level |Level of the event. One of the following values: “Critical”, “Error”, “Warning”, “Informational”, and “Verbose” |
293+
| level |Level of the event. One of the following values: “Critical”, or “Informational” (other levels are not supported) |
294294
| operationId |A GUID shared among the events that correspond to a single operation. |
295295
| operationName |Name of the operation. |
296296
| resourceGroupName |Name of the resource group that contains the resource. |

0 commit comments

Comments
 (0)