You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/how-to-prerequisites.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -195,7 +195,7 @@ The following are known limitations:
195
195
196
196
### Scoping filter
197
197
When using OU scoping filter
198
-
- You can only sync up to 59 separate OUs for a given configuration.
198
+
- You can only sync up to 59 separate OUs or Security Groups for a given configuration.
199
199
- Nested OUs are supported (that is, you **can** sync an OU that has 130 nested OUs, but you **cannot** sync 60 separate OUs in the same configuration).
Copy file name to clipboardExpand all lines: articles/azure-vmware/concepts-storage.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,10 +47,14 @@ In a three-host cluster, FTT-1 accommodates a single host's failure. Microsoft g
47
47
48
48
vSAN datastores use data-at-rest encryption by default using keys stored in Azure Key Vault. The encryption solution is KMS-based and supports vCenter Server operations for key management. When a host is removed from a cluster, all data on SSDs is invalidated immediately.
49
49
50
+
## Datastore capacity expansion options
51
+
52
+
The vSAN datastore capacity can be expanded by connecting Azure storage resources such as [Azure NetApp Files volumes as datastores](/azure/azure-vmware/attach-azure-netapp-files-to-azure-vmware-solution-hosts). Virtual machines can be migrated between vSAN and Azure NetApp Files datastores using storage vMotion. Azure NetApp Files datastores can be replicated to other regions using storage based [Cross-region replication](/azure/azure-netapp-files/cross-region-replication-introduction) for testing, development and failover purposes.
53
+
Azure NetApp Files is available in [Ultra, Premium and Standard performance tiers](/azure/azure-netapp-files/azure-netapp-files-service-levels) to allow for adjusting performance and cost to the requirements of the workloads.
54
+
50
55
## Azure storage integration
51
56
52
57
You can use Azure storage services in workloads running in your private cloud. The Azure storage services include Storage Accounts, Table Storage, and Blob Storage. The connection of workloads to Azure storage services doesn't traverse the internet. This connectivity provides more security and enables you to use SLA-based Azure storage services in your private cloud workloads.
53
-
You can expand the datastore capacity by connecting Azure disk pools or [Azure NetApp Files datastores](attach-azure-netapp-files-to-azure-vmware-solution-hosts.md). Azure NetApp Files is available in Ultra, [Premium and Standard performance tiers](/azure/azure-netapp-files/azure-netapp-files-service-levels) to allow adjusting the performance and cost to the requirements of the workloads.
Copy file name to clipboardExpand all lines: articles/event-grid/manage-event-delivery.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,7 @@ To set a dead letter location, you need a storage account for holding events tha
23
23
> [!NOTE]
24
24
> - Create a storage account and a blob container in the storage before running commands in this article.
25
25
> - The Event Grid service creates blobs in this container. The names of blobs will have the name of the Event Grid subscription with all the letters in upper case. For example, if the name of the subscription is My-Blob-Subscription, names of the dead letter blobs will have MY-BLOB-SUBSCRIPTION (myblobcontainer/MY-BLOB-SUBSCRIPTION/2019/8/8/5/111111111-1111-1111-1111-111111111111.json). This behavior is to protect against differences in case handling between Azure services.
26
+
> - In the above example .../2019/8/8/5/... represents the non-zero padded date and hour (UTC): .../YYYY/MM/DD/HH/...
26
27
> - The dead letter blobs created will contain one or more events in an array. An important behavior to consider when processing dead letters.
Copy file name to clipboardExpand all lines: articles/virtual-machines/windows/external-ntpsource-configuration.md
+18-2Lines changed: 18 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Time synchronization in Active Directory should be managed by only allowing the
25
25
26
26
To check current time source in your **PDC**, from an elevated command prompt run *w32tm /query /source* and note the output for later comparison.
27
27
28
-
1. From *Start* run *gpedit.msc*
28
+
1. From *Start* run *gpedit.msc*.
29
29
2. Navigate to the *Global Configuration Settings* policy under *Computer Configuration* -> *Administrative Templates* -> *System* -> *Windows Time Service*.
30
30
3. Set it to *Enabled* and configure the *AnnounceFlags* parameter to **5**.
31
31
4. Navigate to *Computer Settings* -> *Administrative Templates* -> *System* -> *Windows Time Service* -> *Time Providers*.
@@ -55,13 +55,29 @@ To mark the VMIC provider as *Disabled* from *Start* type *regedit.exe* -> In th
55
55
56
56
From an elevated command prompt rerun *w32tm /query /source* and compare the output to the one you noted at the beginning of the configuration. Now it will be set to the NTP Server you chose.
57
57
58
+
>[!TIP]
59
+
>Follow the steps below if you want to speed-up the process of changing the NTP source on your PDC. You can create a scheduled task to run at **System Start-up** with the **Delay** task for up to (random delay) set to **2 minutes**.
60
+
61
+
## Scheduled task to set NTP source on your PDC
62
+
63
+
1. From *Start* run *Task Scheduler*.
64
+
2. Browse to *Task Scheduler* Library -> *Microsoft* -> *Windows* -> *Time Synchronization* -> Right-click in the right hand side pane and select *Create New Task*.
65
+
3. In the *General* tab, click the *Change User or Group...* button and set it to run as *LOCAL SERVICE*. Then check the box to *Run with highest privileges*.
66
+
4. Under *Configure for:* select your operating system version.
67
+
5. Switch to the *Triggers* tab, click the *New...* button, and set the schedule as per your requirements. Before clicking *OK*, make sure the box next to *Enabled* is checked.
68
+
6. Go to the *Actions* tab. Click the *New...* button and enter the following details:
69
+
- On *Action:* set *Start a program*.
70
+
- On *Program/script:* set the path to *%windir%\system32\w32tm.exe*.
71
+
- On *Add arguments:* type */resync*, and click *OK* to save changes.
72
+
7. Under the *Conditions* tab ensure that *Start the task only if the computer is in idle for* and *Start the task only if the computer is on AC power* is *not selected*. Click *OK*.
73
+
58
74
## GPO for Clients
59
75
60
76
Configure the following Group Policy Object to enable your clients to synchronize time with any Domain Controller in your Domain:
61
77
62
78
To check current time source in your client, from an elevated command prompt run *w32tm /query /source* and note the output for later comparison.
63
79
64
-
1. From a Domain Controller go to *Start* run *gpmc.msc*
80
+
1. From a Domain Controller go to *Start* run *gpmc.msc*.
65
81
2. Browse to the Forest and Domain where you want to create the GPO.
66
82
3. Create a new GPO, for example *Clients Time Sync*, in the container *Group Policy Objects*.
0 commit comments