Skip to content

Commit 2c44f52

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afdclassicretirement
2 parents 1b12e93 + 28944d0 commit 2c44f52

17 files changed

+187
-191
lines changed

articles/advisor/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@
4444
items:
4545
- name: Use Azure Well Architected Framework Assessments
4646
href: advisor-assessments.md
47+
- name: Use Azure Advisor resiliency reviews
48+
href: advisor-resiliency-reviews.md
4749
- name: Optimize virtual machine spend by resizing or shutting down underutilized instances
4850
href: advisor-cost-recommendations.md
4951
- name: Optimize your Azure costs using the cost optimization workbook

articles/app-service/configure-ssl-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ If you use Azure Key Vault to manage your certificates, you can import a PKCS12
134134
By default, the App Service resource provider doesn't have access to your key vault. To use a key vault for a certificate deployment, you must [authorize read access for the resource provider to the key vault](../key-vault/general/assign-access-policy-cli.md).
135135

136136
> [!NOTE]
137-
> Currently, a Key Vault certificate supports only the Key Vault access policy, not RBAC model.
137+
> Currently, the Azure portal does not allow you to configure an App Service certificate in Key Vault to use the RBAC model. You can, however, use Azure CLI, Azure PowerShell, or an ARM template deployment to perform this configuration. For more information, see [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](../key-vault/general/rbac-guide.md?tabs=azure-cli).
138138
139139
| Resource provider | Service principal AppId | Key vault secret permissions | Key vault certificate permissions |
140140
|--|--|--|--|

articles/azure-monitor/app/opentelemetry-add-modify.md

Lines changed: 37 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1725,17 +1725,9 @@ Adding one or more span attributes populates the `customDimensions` field in the
17251725
```typescript
17261726
// Import the necessary packages.
17271727
const { useAzureMonitor } = require("@azure/monitor-opentelemetry");
1728-
const { trace, ProxyTracerProvider } = require("@opentelemetry/api");
17291728
const { ReadableSpan, Span, SpanProcessor } = require("@opentelemetry/sdk-trace-base");
1730-
const { NodeTracerProvider } = require("@opentelemetry/sdk-trace-node");
17311729
const { SemanticAttributes } = require("@opentelemetry/semantic-conventions");
17321730

1733-
// Enable Azure Monitor integration.
1734-
useAzureMonitor();
1735-
1736-
// Get the NodeTracerProvider instance.
1737-
const tracerProvider = ((trace.getTracerProvider() as ProxyTracerProvider).getDelegate() as NodeTracerProvider);
1738-
17391731
// Create a new SpanEnrichingProcessor class.
17401732
class SpanEnrichingProcessor implements SpanProcessor {
17411733
forceFlush(): Promise<void> {
@@ -1755,8 +1747,13 @@ class SpanEnrichingProcessor implements SpanProcessor {
17551747
}
17561748
}
17571749

1758-
// Add the SpanEnrichingProcessor instance to the NodeTracerProvider instance.
1759-
tracerProvider.addSpanProcessor(new SpanEnrichingProcessor());
1750+
// Enable Azure Monitor integration.
1751+
const options: AzureMonitorOpenTelemetryOptions = {
1752+
// Add the SpanEnrichingProcessor
1753+
spanProcessors: [new SpanEnrichingProcessor()]
1754+
}
1755+
useAzureMonitor(options);
1756+
17601757
```
17611758

17621759
##### [Python](#tab/python)
@@ -1960,29 +1957,27 @@ Logback, Log4j, and java.util.logging are [autoinstrumented](#logs). Attaching c
19601957
#### [Node.js](#tab/nodejs)
19611958

19621959
```typescript
1963-
// Import the useAzureMonitor function and the logs module from the @azure/monitor-opentelemetry and @opentelemetry/api-logs packages, respectively.
19641960
const { useAzureMonitor } = require("@azure/monitor-opentelemetry");
1965-
const { logs } = require("@opentelemetry/api-logs");
1966-
import { Logger } from "@opentelemetry/sdk-logs";
1961+
const bunyan = require('bunyan');
19671962

1968-
// Enable Azure Monitor integration.
1969-
useAzureMonitor();
1963+
// Instrumentations configuration
1964+
const options: AzureMonitorOpenTelemetryOptions = {
1965+
instrumentationOptions: {
1966+
// Instrumentations generating logs
1967+
bunyan: { enabled: true },
1968+
}
1969+
};
19701970

1971-
// Get the logger for the "testLogger" logger name.
1972-
const logger = (logs.getLogger("testLogger") as Logger);
1971+
// Enable Azure Monitor integration
1972+
useAzureMonitor(options);
19731973

1974-
// Create a new log record.
1975-
const logRecord = {
1976-
body: "testEvent",
1977-
attributes: {
1974+
var log = bunyan.createLogger({ name: 'testApp' });
1975+
log.info({
19781976
"testAttribute1": "testValue1",
19791977
"testAttribute2": "testValue2",
19801978
"testAttribute3": "testValue3"
1981-
}
1982-
};
1979+
}, 'testEvent');
19831980

1984-
// Emit the log record.
1985-
logger.emit(logRecord);
19861981
```
19871982

19881983
#### [Python](#tab/python)
@@ -2147,18 +2142,28 @@ See [sampling overrides](java-standalone-config.md#sampling-overrides-preview) a
21472142
Use the add [custom property example](#add-a-custom-property-to-a-span), but replace the following lines of code:
21482143

21492144
```typescript
2150-
// Import the SpanKind and TraceFlags classes from the @opentelemetry/api package.
2145+
// Import the necessary packages.
21512146
const { SpanKind, TraceFlags } = require("@opentelemetry/api");
2147+
const { ReadableSpan, Span, SpanProcessor } = require("@opentelemetry/sdk-trace-base");
21522148

21532149
// Create a new SpanEnrichingProcessor class.
2154-
class SpanEnrichingProcessor {
2150+
class SpanEnrichingProcessor implements SpanProcessor {
2151+
forceFlush(): Promise<void> {
2152+
return Promise.resolve();
2153+
}
21552154

2156-
onEnd(span) {
2157-
// If the span is an internal span, set the trace flags to NONE.
2158-
if(span.kind == SpanKind.INTERNAL){
2159-
span.spanContext().traceFlags = TraceFlags.NONE;
2155+
shutdown(): Promise<void> {
2156+
return Promise.resolve();
2157+
}
2158+
2159+
onStart(_span: Span): void {}
2160+
2161+
onEnd(span) {
2162+
// If the span is an internal span, set the trace flags to NONE.
2163+
if(span.kind == SpanKind.INTERNAL){
2164+
span.spanContext().traceFlags = TraceFlags.NONE;
2165+
}
21602166
}
2161-
}
21622167
}
21632168
```
21642169

articles/azure-monitor/app/opentelemetry-configuration.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -783,22 +783,18 @@ For more information about Java, see the [Java supplemental documentation](java-
783783
```typescript
784784
// Import the useAzureMonitor function, the AzureMonitorOpenTelemetryOptions class, the trace module, the ProxyTracerProvider class, the BatchSpanProcessor class, the NodeTracerProvider class, and the OTLPTraceExporter class from the @azure/monitor-opentelemetry, @opentelemetry/api, @opentelemetry/sdk-trace-base, @opentelemetry/sdk-trace-node, and @opentelemetry/exporter-trace-otlp-http packages, respectively.
785785
const { useAzureMonitor, AzureMonitorOpenTelemetryOptions } = require("@azure/monitor-opentelemetry");
786-
const { trace, ProxyTracerProvider } = require("@opentelemetry/api");
787786
const { BatchSpanProcessor } = require('@opentelemetry/sdk-trace-base');
788-
const { NodeTracerProvider } = require('@opentelemetry/sdk-trace-node');
789787
const { OTLPTraceExporter } = require('@opentelemetry/exporter-trace-otlp-http');
790788

791-
// Enable Azure Monitor integration.
792-
useAzureMonitor();
793-
794789
// Create a new OTLPTraceExporter object.
795790
const otlpExporter = new OTLPTraceExporter();
796791

797-
// Get the NodeTracerProvider instance.
798-
const tracerProvider = ((trace.getTracerProvider() as ProxyTracerProvider).getDelegate() as NodeTracerProvider);
799-
800-
// Add a BatchSpanProcessor to the NodeTracerProvider instance.
801-
tracerProvider.addSpanProcessor(new BatchSpanProcessor(otlpExporter));
792+
// Enable Azure Monitor integration.
793+
const options: AzureMonitorOpenTelemetryOptions = {
794+
// Add the SpanEnrichingProcessor
795+
spanProcessors: [new BatchSpanProcessor(otlpExporter)]
796+
}
797+
useAzureMonitor(options);
802798
```
803799

804800
#### [Python](#tab/python)
140 KB
Loading

articles/azure-vmware/vrealize-operations-for-azure-vmware-solution.md

Lines changed: 25 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,68 +1,64 @@
11
---
2-
title: Configure vRealize Operations for Azure VMware Solution
3-
description: Learn how to set up vRealize Operations for your Azure VMware Solution private cloud.
2+
title: Configure VMware Aria Operations for Azure VMware Solution
3+
description: Learn how to set up VMware Aria Operations for your Azure VMware Solution private cloud.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 12/20/2023
6+
ms.date: 3/18/2024
77
ms.custom: engagement-fy23
88
---
99

10-
# Configure vRealize Operations for Azure VMware Solution
10+
# Configure Aria Operations for Azure VMware Solution
1111

12-
vRealize Operations is an operations management platform that allows VMware infrastructure administrators to monitor system resources. These system resources could be application-level or infrastructure level (both physical and virtual) objects. Most VMware administrators use vRealize Operations to monitor and manage the VMware private cloud components – vCenter Server, ESXi, NSX-T Data Center, vSAN, and VMware HCX. Each provisioned Azure VMware Solution private cloud includes a dedicated vCenter Server, NSX-T Data Center, vSAN, and HCX deployment.
12+
Aria Operations is an operations management platform that allows VMware infrastructure administrators to monitor system resources. These system resources could be application-level or infrastructure level (both physical and virtual) objects. Most VMware administrators use Aria Operations to monitor and manage their VMware private cloud components – vCenter Server, ESXi, NSX, vSAN, and VMware HCX. Each provisioned Azure VMware Solution private cloud includes a dedicated vCenter Server, NSX Manager, vSAN, and HCX deployment.
1313

14-
Thoroughly review [Before you begin](#before-you-begin) and [Prerequisites](#prerequisites) first. Then, we walk you through the two typical deployment topologies:
15-
16-
> [!div class="checklist"]
17-
> * [On-premises vRealize Operations managing Azure VMware Solution deployment](#on-premises-vrealize-operations-managing-azure-vmware-solution-deployment)
18-
> * [vRealize Operations Cloud managing Azure VMware Solution deployment](#vrealize-operations-cloud-managing-azure-vmware-solution-deployment)
14+
Thoroughly review [Before you begin](#before-you-begin) and [Prerequisites](#prerequisites) first.
1915

2016
## Before you begin
21-
* Review the [vRealize Operations Manager product documentation](https://docs.vmware.com/en/vRealize-Operations-Manager/8.1/com.vmware.vcom.vapp.doc/GUID-7FFC61A0-7562-465C-A0DC-46D092533984.html) to learn more about deploying vRealize Operations.
17+
* Review the [Aria Operations product documentation](https://docs.vmware.com/en/VMware-Aria-Operations/index.html) to learn more about deploying Aria Operations.
2218
* Review the basic Azure VMware Solution Software-Defined Datacenter (SDDC) [tutorial series](tutorial-network-checklist.md).
23-
* Optionally, review the [vRealize Operations Remote Controller](https://docs.vmware.com/en/vRealize-Operations-Manager/8.1/com.vmware.vcom.vapp.doc/GUID-263F9219-E801-4383-8A59-E84F3D01ED6B.html) product documentation for the on-premises vRealize Operations managing Azure VMware Solution deployment option.
19+
* Optionally, review the [Aria Operations Remote Collector Nodes](https://docs.vmware.com/en/VMware-Aria-Operations/8.14/Getting-Started-Operations/GUID-263F9219-E801-4383-8A59-E84F3D01ED6B.html) product documentation for the on-premises Aria Operations managing Azure VMware Solution deployment option.
2420

2521
## Prerequisites
26-
* [vRealize Operations Manager](https://docs.vmware.com/en/vRealize-Operations-Manager/8.1/com.vmware.vcom.vapp.doc/GUID-7FFC61A0-7562-465C-A0DC-46D092533984.html) installed.
27-
* A VPN or an Azure ExpressRoute configured between on-premises and Azure VMware Solution SDDC.
22+
* [Aria Operations](https://docs.vmware.com/en/VMware-Aria-Operations/8.14/Getting-Started-Operations/GUID-69F7FAD8-3152-4376-9171-2208D6C9FA3A.html) is installed.
2823
* An Azure VMware Solution private cloud is deployed in Azure.
24+
* A VPN or an Azure ExpressRoute configured between on-premises and Azure VMware Solution private cloud.
2925

30-
## On-premises vRealize Operations managing Azure VMware Solution deployment
31-
Most customers have an existing on-premises deployment of vRealize Operations to manage one or more on-premises vCenter Server domains. When they provision an Azure VMware Solution private cloud, they connect their on-premises environment with their private cloud using an Azure ExpressRoute or a Layer 3 VPN solution.
26+
## On-premises Aria Operations managing Azure VMware Solution deployment
27+
Most customers have an existing on-premises deployment of Aria Operations to manage one or more on-premises vCenter Server SSO domains. When they provision an Azure VMware Solution private cloud, they connect their on-premises environment with their private cloud using an Azure ExpressRoute or a Layer 3 VPN solution.
3228

33-
:::image type="content" source="media/vrealize-operations-manager/vrealize-operations-deployment-option-1.png" alt-text="Diagram showing the on-premises vRealize Operations managing Azure VMware Solution deployment." border="false":::
29+
:::image type="content" source="media/vrealize-operations-manager/aria-operations-deployment-option-1.png" alt-text="Diagram showing the on-premises Aria Operations managing the Azure VMware Solution deployment." border="false" lightbox="media/vrealize-operations-manager/aria-operations-deployment-option-1.png":::
3430

35-
To extend the vRealize Operations capabilities to the Azure VMware Solution private cloud, you create an adapter [instance for the private cloud resources](https://docs.vmware.com/en/vRealize-Operations-Manager/8.1/com.vmware.vcom.config.doc/GUID-640AD750-301E-4D36-8293-1BFEB67E2600.html). It collects data from the Azure VMware Solution private cloud and brings it into on-premises vRealize Operations. The on-premises vRealize Operations Manager instance can directly connect to the vCenter Server and NSX-T Manager on Azure VMware Solution. Optionally, you can deploy a vRealize Operations Remote Collector on the Azure VMware Solution private cloud. The collector compresses and encrypts the data collected from the private cloud before it's sent over the ExpressRoute or VPN network to the vRealize Operations Manager running on-premises.
31+
To extend the Aria Operations capabilities to the Azure VMware Solution private cloud, you create an adapter [instance for the private cloud resources](https://docs.vmware.com/en/VMware-Aria-Operations/8.16/Configuring-Operations/GUID-6CDFEDDC-A72C-4AB4-B8E8-84542CC6CE27.html). It collects data from the Azure VMware Solution private cloud and brings it into the on-premises Aria Operations. The on-premises Aria Operations instance can directly connect to the vCenter Server and NSX Manager of the Azure VMware Solution. Optionally, you can deploy an Aria Operations Remote Collector in the Azure VMware Solution private cloud. The collector compresses and encrypts the data collected from the private cloud before it's sent over the ExpressRoute or VPN network to the Aria Operations running on-premises.
3632

3733
> [!TIP]
38-
> Refer to the [VMware documentation](https://docs.vmware.com/en/vRealize-Operations-Manager/8.1/com.vmware.vcom.vapp.doc/GUID-7FFC61A0-7562-465C-A0DC-46D092533984.html) for step-by-step guide for installing vRealize Operations Manager.
34+
> Refer to the [VMware documentation](https://docs.vmware.com/en/VMware-Aria-Operations/8.14/Getting-Started-Operations/GUID-69F7FAD8-3152-4376-9171-2208D6C9FA3A.html) for step-by-step guide for installing Aria Operations.
3935
40-
## vRealize Operations Cloud managing Azure VMware Solution deployment
41-
VMware vRealize Operations Cloud supports the Azure VMware Solution, including the vCenter Server, vSAN and NSX-T Data Center adapters.
36+
## Aria Operations Cloud managing Azure VMware Solution deployment
37+
VMware Aria Operations Cloud supports the Azure VMware Solution, including the vCenter Server, vSAN and NSX adapters.
4238

4339
> [!IMPORTANT]
44-
> Refer to the [VMware documentation](https://docs.vmware.com/en/vRealize-Operations/Cloud/com.vmware.vcom.config.doc/GUID-6CDFEDDC-A72C-4AB4-B8E8-84542CC6CE27.html) for step-by-step guide for connecting vRealize Operations Cloud to Azure VMware Solution.
40+
> Refer to the [VMware documentation](https://docs.vmware.com/en/VMware-Aria-Operations/index.html) for the step-by-step guide for connecting Aria Operations Cloud to Azure VMware Solution.
4541
4642
## Known limitations
4743

48-
- The **[email protected]** user in Azure VMware Solution has [limited privileges](concepts-identity.md). Virtual machines (VMs) on Azure VMware Solution doesn't support in-guest memory collection using VMware tools. Active and consumed memory utilization continues to work in this case.
44+
- The **[email protected]** user in Azure VMware Solution has [limited privileges](concepts-identity.md). Virtual machines (VMs) on Azure VMware Solution doesn't support in-guest memory collection using VMware tools. Active and consumed memory utilization continues to work in this case.
4945
- Workload optimization for host-based business intent doesn't work because Azure VMware Solutions manage cluster configurations, including DRS settings.
50-
- Workload optimization for the cross-cluster placement within the SDDC using the cluster-based business intent is fully supported with vRealize Operations Manager 8.0 and onwards. However, workload optimization isn't aware of resource pools and places the VMs at the cluster level. A user can manually correct it in the Azure VMware Solution vCenter Server interface.
51-
- You can't sign in to vRealize Operations Manager using your Azure VMware Solution vCenter Server credentials.
52-
- Azure VMware Solution doesn't support the vRealize Operations Manager plugin.
46+
- Workload optimization for the cross-cluster placement within the private cloud using the cluster-based business intent is fully supported with Aria Operations. However, workload optimization isn't aware of resource pools and places the VMs at the cluster level. A user can manually correct it in the Azure VMware Solution vCenter Server interface.
47+
- You can't sign into Aria Operations using your Azure VMware Solution vCenter Server credentials.
48+
- Azure VMware Solution doesn't support the Aria Operations plugin.
5349

54-
When you connect the Azure VMware Solution vCenter Server to vRealize Operations Manager using a vCenter Server Cloud Account, you see a warning:
50+
When you connect the Azure VMware Solution vCenter Server to Aria Operations using a vCenter Server CloudAdmin Account, you see a warning:
5551

5652
:::image type="content" source="./media/vrealize-operations-manager/warning-adapter-instance-creation-succeeded.png" alt-text="Screenshot shows a Warning message that states the adapter instance was created successfully.":::
5753

5854
The warning occurs because the **[email protected]** user in Azure VMware Solution doesn't have sufficient privileges to do all vCenter Server actions required for registration. However, the privileges are sufficient for the adapter instance to do data collection, as seen in the following example:
5955

6056
:::image type="content" source="./media/vrealize-operations-manager/adapter-instance-to-perform-data-collection.png" alt-text="Screenshot shows the adapter instance to collect data.":::
6157

62-
For more information, see [Privileges Required for Configuring a vCenter Server Adapter Instance](https://docs.vmware.com/en/vRealize-Operations-Manager/8.1/com.vmware.vcom.core.doc/GUID-3BFFC92A-9902-4CF2-945E-EA453733B426.html).
58+
For more information, see [Privileges Required for Configuring a vCenter Server Adapter Instance](https://docs.vmware.com/en/VMware-Aria-Operations/8.16/Configuring-Operations/GUID-3BFFC92A-9902-4CF2-945E-EA453733B426.html).
6359

6460
> [!NOTE]
65-
> VMware vRealize Automation(vRA) integration with the NSX-T Data Center component of the Azure VMware Solution requires the “auditor” role to be added to the user with the NSX-T Manager cloudadmin role.
61+
> VMware Aria Operations integration with the NSX Manager component of the Azure VMware Solution requires the “auditor” role to be added to the user with the NSX Manager cloudadmin role.
6662
6763
<!-- LINKS - external -->
6864

articles/ddos-protection/manage-ddos-ip-protection-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: AbdullahBell
55
ms.author: abell
66
ms.service: ddos-protection
77
ms.topic: quickstart
8-
ms.date: 06/22/2023
8+
ms.date: 03/01/2024
99
ms.custom: template-quickstart
1010
---
1111

-3.38 KB
Loading
-2.29 KB
Loading

0 commit comments

Comments
 (0)