Skip to content

Commit 18efadf

Browse files
committed
resolve merge conflict
2 parents 04c431f + 7f7be0f commit 18efadf

File tree

49 files changed

+442
-168
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+442
-168
lines changed

articles/automation/troubleshoot/extension-based-hybrid-runbook-worker.md

Lines changed: 1 addition & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Troubleshoot extension-based Hybrid Runbook Worker issues in Azure Automation
33
description: This article tells how to troubleshoot and resolve issues that arise with Azure Automation extension-based Hybrid Runbook Workers.
44
services: automation
5-
ms.date: 01/03/2024
5+
ms.date: 08/26/2024
66
ms.topic: troubleshooting
77
ms.custom:
88
---
@@ -73,34 +73,6 @@ To help troubleshoot issues with extension-based Hybrid Runbook Workers:
7373
/home/hweautomation
7474
```
7575
76-
77-
### Unable to update Az modules while using the Hybrid Worker
78-
79-
#### Issue
80-
81-
The Hybrid Runbook Worker jobs failed as it was unable to import Az modules.
82-
83-
#### Resolution
84-
85-
As a workaround, you can follow these steps:
86-
87-
1. Navigate to the folder:
88-
> [!TIP]
89-
> Replace `*` in the below path with the specific version that is installed if you know it.
90-
```
91-
C:\Program Files\Microsoft Monitoring Agent\Agent\AzureAutomation\*\HybridAgent
92-
```
93-
94-
1. Edit the file with the name `Orchestrator.Sandbox.exe.config`
95-
96-
1. Add the following lines inside the `<assemblyBinding>` tag:
97-
```xml
98-
<dependentAssembly>
99-
<assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />
100-
<bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />
101-
</dependentAssembly>
102-
```
103-
10476
### Scenario: Runbooks go into a suspended state on a Hybrid Runbook Worker when using a custom account on a server with User Account Control (UAC) enabled
10577
10678
#### Issue
@@ -411,38 +383,6 @@ This error occurs when you attempt to use a Run As account in a runbook that run
411383
If your Hybrid Runbook Worker is an Azure VM, you can use [runbook authentication with managed identities](../automation-hrw-run-runbooks.md#runbook-auth-managed-identities) instead. This scenario simplifies authentication by allowing you to authenticate to Azure resources using the managed identity of the Azure VM instead of the Run As account. When the Hybrid Runbook Worker is an on-premises machine, you need to install the Run As account certificate on the machine. To learn how to install the certificate, see the steps to run the PowerShell runbook **Export-RunAsCertificateToHybridWorker** in [Run runbooks on a Hybrid Runbook Worker](../automation-hrw-run-runbooks.md).
412384

413385

414-
### Scenario: Set-AzStorageBlobContent fails on a Hybrid Runbook Worker
415-
416-
#### Issue
417-
418-
Runbook fails when it tries to execute `Set-AzStorageBlobContent`, and you receive the following error message:
419-
420-
`Set-AzStorageBlobContent : Failed to open file xxxxxxxxxxxxxxxx: Illegal characters in path`
421-
422-
#### Cause
423-
424-
This error is caused by the long file name behavior of calls to `[System.IO.Path]::GetFullPath()`, which adds UNC paths.
425-
426-
#### Resolution
427-
428-
As a workaround, you can create a configuration file named `OrchestratorSandbox.exe.config` with the following content:
429-
430-
```azurecli
431-
<configuration>
432-
<runtime>
433-
<AppContextSwitchOverrides value="Switch.System.IO.UseLegacyPathHandling=false" />
434-
</runtime>
435-
</configuration>
436-
```
437-
438-
Place this file in the same folder as the executable file `OrchestratorSandbox.exe`. For example:
439-
> [!TIP]
440-
> Replace `*` in the below path with the specific version that is installed if you know it.
441-
```
442-
%ProgramFiles%\Microsoft Monitoring Agent\Agent\AzureAutomation\*\HybridAgent
443-
```
444-
445-
446386
### Scenario: Microsoft Azure VMs automatically dropped from a hybrid worker group
447387

448388
#### Issue

articles/azure-app-configuration/concept-feature-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 02/20/2024
1313

1414
Traditionally, shipping a new application feature requires a complete redeployment of the application itself. Testing a feature often requires multiple deployments of the application. Each deployment might change the feature or expose the feature to different customers for testing.
1515

16-
Feature management is a modern software-development practice that decouples feature release from code deployment and enables quick changes to feature availability on demand. It uses a technique called *feature flags* (also known as *feature toggles* and *feature switches*) to dynamically administer a feature's lifecycle.
16+
Feature management is a software-development practice that decouples feature release from code deployment and enables quick changes to feature availability on demand. It uses a technique called *feature flags* (also known as *feature toggles* and *feature switches*) to dynamically administer a feature's lifecycle.
1717

1818
Feature management helps developers address the following problems:
1919

articles/azure-monitor/agents/azure-monitor-agent-migration-data-collection-rule-generator.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,8 @@ To run script, copy the following command and replace the parameters with your v
7373

7474
For information on deploying the DCRs, see [Data collection rules in Azure Monitor](/azure/azure-monitor/essentials/data-collection-rule-overview) and [Create and edit data collection rules (DCRs) in Azure Monitor](/azure/azure-monitor/essentials/data-collection-rule-create-edit)
7575

76+
> [!Warning]
77+
> You shouldn’t use an existing custom log table used by MMA agents. Your MMA agents won't be able to write to the table once the first AMA agent writes to the table. You should create a new table for AMA to use to prevent MMA data loss.
7678
7779
## Next steps
7880

articles/azure-monitor/logs/manage-table-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The user can now read workspace details and run a query, but can't read data fro
9090
1. From the **Log Analytics workspaces** menu, select **Tables**.
9191
1. Select the ellipsis ( **...** ) to the right of your table and select **Access control (IAM)**.
9292

93-
:::image type="content" source="media/manage-access/table-level-access-control.png" alt-text="Screenshot that shows the Log Analytics workspace table management screen with the table-level access control button highlighted." lightbox="media/manage-access/manage-access-create-custom-role-json.png":::
93+
:::image type="content" source="media/manage-access/table-level-access-control.png" alt-text="Screenshot that shows the Log Analytics workspace table management screen with the table-level access control button highlighted." lightbox="media/manage-access/table-level-access-control.png":::
9494

9595
1. On the **Access control (IAM)** screen, select **Add** > **Add role assignment**.
9696
1. Select the **Reader** role and select **Next**.

articles/azure-monitor/vm/monitor-virtual-machine.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ The following table lists the different steps for configuration of VM monitoring
4444
| Step | Description |
4545
|:---|:---|
4646
| [Deploy Azure Monitor agent](monitor-virtual-machine-agent.md) | Deploy the Azure Monitor agent to your Azure and hybrid virtual machines to collect data from the guest operating system and workloads. |
47-
| [Configure data collection](monitor-virtual-machine-data-collection.md)) | Create data collection rules to instruct the Azure Monitor agent to collect telemetry from the guest operating system. |
48-
| [Analyze collect data](monitor-virtual-machine-analyze.md) | Analyze monitoring data collected by Azure Monitor from virtual machines and their guest operating systems and applications to identify trends and critical information. |
47+
| [Configure data collection](monitor-virtual-machine-data-collection.md) | Create data collection rules to instruct the Azure Monitor agent to collect telemetry from the guest operating system. |
48+
| [Analyze collected data](monitor-virtual-machine-analyze.md) | Analyze monitoring data collected by Azure Monitor from virtual machines and their guest operating systems and applications to identify trends and critical information. |
4949
| [Create alert rules](monitor-virtual-machine-alerts.md) | Create alerts to proactively identify critical issues in your monitoring data. |
5050
| [Migrate management pack logic](monitor-virtual-machine-management-packs.md) | General guidance for translation the logic from your System Center Operations Manager management packs to Azure Monitor. |
5151

@@ -90,4 +90,4 @@ See [Design a Log Analytics workspace architecture](../logs/workspace-design.md)
9090

9191
## Next steps
9292

93-
[Deploy the Azure Monitor agent to your virtual machines](monitor-virtual-machine-agent.md)
93+
[Deploy the Azure Monitor agent to your virtual machines](monitor-virtual-machine-agent.md)

articles/azure-netapp-files/manage-cool-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The storage with cool access feature provides options for the “coolness period
2828
* You can't use [large volume](large-volumes-requirements-considerations.md) with cool access.
2929
* See [Resource limits for Azure NetApp Files](azure-netapp-files-resource-limits.md#resource-limits) for maximum number of volumes supported for cool access per subscription per region.
3030
* Considerations for using cool access with [cross-region replication](cross-region-replication-requirements-considerations.md) and [cross-zone replication](cross-zone-replication-introduction.md):
31-
* The cool access setting on the destination is updated automatically to match the source volume whenever the setting is changed on the source volume or during authorizing or performing a reverse resync of the replication. Changes to the cool access setting on the destination volume don't affect the setting on the source volume.
31+
* The cool access setting on the destination volume is updated automatically to match the source volume whenever the setting is changed on the source volume or during authorizing or performing a reverse resync of the replication only if the destination volume is in a cool access-enabled capacity pool. Changes to the cool access setting on the destination volume don't affect the setting on the source volume.
3232
* In cross-region or cross-zone replication configuration, you can enable cool access exclusively for destination volumes to enhance data protection and create cost savings without affecting latency in source volumes.
3333
* Considerations for using cool access with [snapshot restore](snapshots-restore-new-volume.md):
3434
* When restoring a snapshot of a cool access enabled volume to a new volume, the new volume inherits the cool access configuration from the parent volume. Once the new volume is created, the cool access settings can be modified.

articles/azure-signalr/concept-connection-string.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article gives an overview of connection strings in Azure Signa
44
author: chenkennt
55
ms.service: azure-signalr-service
66
ms.topic: conceptual
7-
ms.date: 03/29/2023
7+
ms.date: 08/09/2024
88
ms.author: kenchen
99
---
1010

articles/azure-web-pubsub/howto-disable-local-auth.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,12 @@ ms.topic: conceptual
1111

1212
# Turn off local (access key) authentication
1313

14-
Azure Web PubSub resources can authenticate requests in two ways: via a Microsoft Entra ID or via an access key. Microsoft Entra ID provides superior security and ease of use over an access key. If you use Microsoft Entra ID, you don't need to store the tokens in your code and risk potential security vulnerabilities. We recommend that you use Microsoft Entra ID for your Web PubSub resources when possible.
14+
Azure Web PubSub resources can authenticate requests in two ways:
15+
16+
- Microsoft Entra ID (recommended)
17+
- Access key
18+
19+
Microsoft Entra ID provides superior security and ease of use over an access key. If you use Microsoft Entra ID, you don't need to store the tokens in your code and risk potential security vulnerabilities. We recommend that you use Microsoft Entra ID for your Web PubSub resources when possible.
1520

1621
> [!IMPORTANT]
1722
> Disabling local authentication might have the following results:
@@ -40,9 +45,9 @@ To turn off local authentication by using the Azure portal:
4045

4146
1. Select **Save**.
4247

43-
![Screenshot that shows turning off local authentication.](./media/howto-disable-local-auth/disable-local-auth.png)
48+
:::image type="content" source="media/howto-disable-local-auth/disable-local-auth.png" alt-text="Screenshot that shows turning off local authentication.":::
4449

45-
### Use an Azure Resource Manager template
50+
### Azure Resource Manager template
4651

4752
You can turn off local authentication by setting the `disableLocalAuth` property to `true` as shown in the following Azure Resource Manager template:
4853

@@ -96,9 +101,9 @@ You can turn off local authentication by setting the `disableLocalAuth` property
96101

97102
### Azure Policy
98103

99-
You can assign the policy [Azure Web PubSub Service should have local authentication methods disabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fb66ab71c-582d-4330-adfd-ac162e78691e) in Azure Policy to an Azure subscription or to a resource group to turn off local authentication for all Web PubSub resources in the subscription or resource group.
104+
You can assign the policy [Azure Web PubSub Service should have local authentication methods disabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fb66ab71c-582d-4330-adfd-ac162e78691e) in Azure Policy to an Azure subscription or to a resource group. Assigning this policy turns off local authentication for all Web PubSub resources in the subscription or resource group.
100105

101-
![Screenshot that shows turning off local authentication policy.](./media/howto-disable-local-auth/disable-local-auth-policy.png)
106+
:::image type="content" source="media/howto-disable-local-auth/disable-local-auth-policy.png" alt-text="Screenshot that shows turning off local authentication policy.":::
102107

103108
## Related content
104109

articles/cost-management-billing/manage/change-azure-account-profile.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
author: bandersmsft
77
ms.author: banders
88
ms.reviewer: judupont
9-
ms.date: 08/19/2024
9+
ms.date: 08/27/2024
1010
ms.service: cost-management-billing
1111
ms.subservice: billing
1212
ms.topic: how-to
@@ -91,7 +91,7 @@ procedureSection:
9191
- title: |
9292
Add a PO number
9393
summary: |
94-
By default, invoices for the billing profile don't have an associated PO number. After you add a PO number for a billing profile, the system regenerates the invoices within 24 hours. Afterward, the PO number appears on invoices for the billing profile.
94+
By default, invoices for the billing profile don't have an associated PO number. After you add a PO number for a billing profile, the system uses the updated PO number in the next invoice. Afterward, the PO number appears in invoices for the billing profile.
9595
9696
To add a PO number for a billing profile, use the following steps.
9797
steps:

articles/ddos-protection/ddos-protection-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure DDoS Protection monitors actual traffic utilization and constantly compare
2121
During mitigation, traffic sent to the protected resource is redirected by the DDoS protection service and several checks are performed, such as:
2222

2323
- Ensure packets conform to internet specifications and aren't malformed.
24-
- Interact with the client to determine if the traffic is potentially a spoofed packet (e.g: SYN Auth or SYN Cookie or by dropping a packet for the source to retransmit it).
24+
- Interact with the client to determine if the traffic is potentially a spoofed packet (for example: SYN Auth or SYN Cookie or by dropping a packet for the source to retransmit it).
2525
- Rate-limit packets, if no other enforcement method can be performed.
2626

2727
Azure DDoS Protection drops attack traffic and forwards the remaining traffic to its intended destination. Within a few minutes of attack detection, you're notified using Azure Monitor metrics. By configuring logging on DDoS Protection telemetry, you can write the logs to available options for future analysis. Metric data in Azure Monitor for DDoS Protection is retained for 30 days.

0 commit comments

Comments
 (0)