Skip to content

Commit 3254c2c

Browse files
committed
ts_hbase7
2 parents 1f5bd28 + 48384e4 commit 3254c2c

26 files changed

+667
-347
lines changed

articles/active-directory/saas-apps/amazon-web-service-tutorial.md

Lines changed: 149 additions & 149 deletions
Large diffs are not rendered by default.

articles/active-directory/users-groups-roles/roles-assign-powershell.md

Lines changed: 25 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -52,16 +52,17 @@ Now you can start using the cmdlets in the module. For a full description of the
5252
1. Create a new role using the following PowerShell script.
5353

5454
``` PowerShell
55+
## Assign a role to a user or service principal with resource scope
5556
# Get the user and role definition you want to link
56-
$user = Get-AzureADMSUser -Filter "userPrincipalName eq '[email protected]'"
57+
$user = Get-AzureADUser -Filter "userPrincipalName eq '[email protected]'"
5758
$roleDefinition = Get-AzureADMSRoleDefinition -Filter "displayName eq 'Application Support Administrator'"
5859
5960
# Get app registration and construct resource scope for assignment.
60-
"displayName eq 'f/128 Filter Photos'"
61-
$resourceScopes = '/' + $appRegistration.objectId
61+
$appRegistration = Get-AzureADApplication -Filter "displayName eq 'f/128 Filter Photos'"
62+
$resourceScope = '/' + $appRegistration.objectId
6263
6364
# Create a scoped role assignment
64-
$roleAssignment = New-AzureADMSRoleAssignment -ResourceScopes $resourceScopes -RoleDefinitionId $roleDefinition.objectId -PrincipalId $user.objectId
65+
$roleAssignment = New-AzureADMSRoleAssignment -ResourceScope $resourceScope -RoleDefinitionId $roleDefinition.Id -PrincipalId $user.objectId
6566
```
6667

6768
To assign the role to a service principal instead of a user, use the [Get-AzureADMSServicePrincipal cmdlet](https://docs.microsoft.com/powershell/module/azuread/get-azureadserviceprincipal?view=azureadps-2.0).
@@ -74,24 +75,20 @@ Role definition objects contain the definition of the built-in or custom role, a
7475

7576
``` PowerShell
7677
# Basic information
77-
78-
$description = "Application Registration Credential Administrator"
79-
$displayName = "Custom Demo Admin"
80-
$resourceScopes = @('/')
81-
$templateId = "355aed8a-864b-4e2b-b225-ea95482e7570"
78+
$description = "Can manage credentials of application registrations"
79+
$displayName = "Application Registration Credential Administrator"
80+
$templateId = (New-Guid).Guid
8281
8382
# Set of actions to grant
8483
$allowedResourceAction =
8584
@(
86-
"microsoft.directory/applications/default/read",
85+
"microsoft.directory/applications/standard/read",
8786
"microsoft.directory/applications/credentials/update"
8887
)
89-
$resourceActions = @{'allowedResourceActions'= $allowedResourceAction}
90-
$rolePermission = @{'resourceActions' = $resourceActions}
91-
$rolePermissions = $rolePermission
88+
$rolePermissions = @{'allowedResourceActions'= $allowedResourceAction}
9289
9390
# Create new custom admin role
94-
$customAdmin = New-AzureADMSRoleDefinitions -RolePermissions $rolePermissions -ResourceScopes $resourceScopes -DisplayName $displayName -Description $description -TemplateId $templateId -IsEnabled $true
91+
$customAdmin = New-AzureADMSRoleDefinition -RolePermissions $rolePermissions -DisplayName $displayName -Description $description -TemplateId $templateId -IsEnabled $true
9592
```
9693

9794
### Read Operations on RoleDefinition
@@ -101,10 +98,10 @@ $customAdmin = New-AzureADMSRoleDefinitions -RolePermissions $rolePermissions -R
10198
Get-AzureADMSRoleDefinitions
10299
103100
# Get single role definition by objectId
104-
$customAdmin = Get-AzureADMSRoleDefinitions -ObjectId '86593cfc-114b-4a15-9954-97c3494ef49b'
101+
Get-AzureADMSRoleDefinition -Id 86593cfc-114b-4a15-9954-97c3494ef49b
105102
106103
# Get single role definition by templateId
107-
$customAdmin = Get-AzureADMSRoleDefinitions -Filter "templateId eq '355aed8a-864b-4e2b-b225-ea95482e757not
104+
Get-AzureADMSRoleDefinition -Filter "templateId eq 'c4e39bd9-1100-46d3-8c65-fb160da0071f'"
108105
```
109106

110107
### Update Operations on RoleDefinition
@@ -113,14 +110,14 @@ $customAdmin = Get-AzureADMSRoleDefinitions -Filter "templateId eq '355aed8a-864
113110
# Update role definition
114111
# This works for any writable property on role definition. You can replace display name with other
115112
# valid properties.
116-
Set-AzureADMSRoleDefinitions -ObjectId $customAdmin.ObjectId -DisplayName "Updated DisplayName"
113+
Set-AzureADMSRoleDefinition -Id c4e39bd9-1100-46d3-8c65-fb160da0071f -DisplayName "Updated DisplayName"
117114
```
118115

119116
### Delete operations on RoleDefinition
120117

121118
``` PowerShell
122119
# Delete role definition
123-
Remove-AzureADMSRoleDefinitions -ObjectId $customAdmin.ObjectId
120+
Remove-AzureADMSRoleDefinitions -Id c4e39bd9-1100-46d3-8c65-fb160da0071f
124121
```
125122

126123
## Operations on RoleAssignment
@@ -130,32 +127,33 @@ Role assignments contain information linking a given security principal (a user
130127
### Create Operations on RoleAssignment
131128

132129
``` PowerShell
133-
# Scopes to scope granted permissions to
134-
$resourceScopes = @('/')
130+
# Get the user and role definition you want to link
131+
$user = Get-AzureADUser -Filter "userPrincipalName eq '[email protected]'"
132+
$roleDefinition = Get-AzureADMSRoleDefinition -Filter "displayName eq 'Application Support Administrator'"
135133
136-
# IDs of principal and role definition you want to link
137-
$principalId = "27c8ca78-ab1c-40ae-bd1b-eaeebd6f68ac"
138-
$roleDefinitionId = $customKeyCredAdmin.ObjectId
134+
# Get app registration and construct resource scope for assignment.
135+
$appRegistration = Get-AzureADApplication -Filter "displayName eq 'f/128 Filter Photos'"
136+
$resourceScope = '/' + $appRegistration.objectId
139137
140138
# Create a scoped role assignment
141-
$roleAssignment = New-AzureADMSRoleAssignments -ResourceScopes $resourceScopes -RoleDefinitionId -PrincipalId $principalId
139+
$roleAssignment = New-AzureADMSRoleAssignment -ResourceScope $resourceScope -RoleDefinitionId $roleDefinition.Id -PrincipalId $user.objectId
142140
```
143141

144142
### Read Operations on RoleAssignment
145143

146144
``` PowerShell
147145
# Get role assignments for a given principal
148-
Get-AzureADMSRoleAssignments -Filter "principalId eq '27c8ca78-ab1c-40ae-bd1b-eaeebd6f68ac'"
146+
Get-AzureADMSRoleAssignment -Filter "principalId eq '27c8ca78-ab1c-40ae-bd1b-eaeebd6f68ac'"
149147
150148
# Get role assignments for a given role definition
151-
Get-AzureADMSRoleAssignments -Filter "principalId eq '355aed8a-864b-4e2b-b225-ea95482e7570'"
149+
Get-AzureADMSRoleAssignment -Filter "roleDefinitionId eq '355aed8a-864b-4e2b-b225-ea95482e7570'"
152150
```
153151

154152
### Delete Operations on RoleAssignment
155153

156154
``` PowerShell
157155
# Delete role assignment
158-
Remove-AzureADMSRoleAssignments -ObjectId $roleAssignment.ObjectId
156+
Remove-AzureADMSRoleAssignment -Id 'qiho4WOb9UKKgng_LbPV7tvKaKRCD61PkJeKMh7Y458-1'
159157
```
160158

161159
## Next steps

articles/active-directory/users-groups-roles/roles-create-custom.md

Lines changed: 27 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -88,20 +88,18 @@ Create a new role using the following PowerShell script:
8888

8989
``` PowerShell
9090
# Basic role information
91-
$description = "Application Support Administrator"
92-
$displayName = "Can manage basic aspects of application registrations."
91+
$displayName = "Application Support Administrator
92+
$description = "Can manage basic aspects of application registrations."
9393
$templateId = (New-Guid).Guid
94-
94+
9595
# Set of permissions to grant
9696
$allowedResourceAction =
9797
@(
9898
"microsoft.directory/applications/basic/update",
9999
"microsoft.directory/applications/credentials/update"
100100
)
101-
$resourceActions = @{'allowedResourceActions'= $allowedResourceAction}
102-
$rolePermission = @{'resourceActions' = $resourceActions}
103-
$rolePermissions = $rolePermission
104-
101+
$rolePermissions = @{'allowedResourceActions'= $allowedResourceAction}
102+
105103
# Create new custom admin role
106104
$customAdmin = New-AzureADMSRoleDefinition -RolePermissions $rolePermissions -DisplayName $displayName -Description $description -TemplateId $templateId -IsEnabled $true
107105
```
@@ -113,14 +111,14 @@ Assign the role using the below PowerShell script:
113111
``` PowerShell
114112
# Get the user and role definition you want to link
115113
$user = Get-AzureADUser -Filter "userPrincipalName eq '[email protected]'"
116-
$roleDefinition = Get-AzureADRoleDefinition -Filter "displayName eq ' Application Registration Creator'"
114+
$roleDefinition = Get-AzureADMSRoleDefinition -Filter "displayName eq 'Application Support Administrator'"
117115
118116
# Get app registration and construct resource scope for assignment.
119117
$appRegistration = Get-AzureADApplication -Filter "displayName eq 'f/128 Filter Photos'"
120-
$resourceScopes = '/' + $appRegistration.objectId
118+
$resourceScope = '/' + $appRegistration.objectId
121119
122120
# Create a scoped role assignment
123-
$roleAssignment = New-AzureADRoleAssignment -ResourceScopes $resourceScopes -RoleDefinitionId $roleDefinition.objectId -PrincipalId $user.objectId
121+
$roleAssignment = New-AzureADMSRoleAssignment -ResourceScope $resourceScope -RoleDefinitionId $roleDefinition.Id -PrincipalId $user.objectId
124122
```
125123

126124
## Create a custom role using Microsoft Graph API
@@ -138,16 +136,20 @@ $roleAssignment = New-AzureADRoleAssignment -ResourceScopes $resourceScopes -Rol
138136
Body
139137
140138
``` HTTP
141-
{
142-
"description":"Can manage basic aspects of application registrations.",
143-
"displayName":"Application Support Administrator",
144-
"isEnabled":true,
145-
"rolePermissions":
146-
[
147-
"microsoft.directory/applications/basic/update",
148-
"microsoft.directory/applications/credentials/update"
149-
]
150-
}
139+
{
140+
"description": "Can manage basic aspects of application registrations.",
141+
"displayName": "Application Support Administrator",
142+
"isEnabled": true,
143+
"templateId": "<GUID>",
144+
"rolePermissions": [
145+
{
146+
"allowedResourceActions": [
147+
"microsoft.directory/applications/basic/update",
148+
"microsoft.directory/applications/credentials/update"
149+
]
150+
}
151+
]
152+
}
151153
```
152154
153155
1. Create the role assignment.
@@ -163,11 +165,11 @@ $roleAssignment = New-AzureADRoleAssignment -ResourceScopes $resourceScopes -Rol
163165
Body
164166
165167
``` HTTP
166-
{
167-
"principalId":"<GUID OF USER>",
168-
"roleDefinitionId":"<GUID OF ROLE DEFINITION>",
169-
"resourceScope":["/<GUID OF APPLICATION REGISTRATION>"]
170-
}
168+
{
169+
"principalId":"<GUID OF USER>",
170+
"roleDefinitionId":"<GUID OF ROLE DEFINITION>",
171+
"resourceScope":"/<GUID OF APPLICATION REGISTRATION>"
172+
}
171173
```
172174
173175
## Next steps

articles/azure-netapp-files/azure-netapp-files-metrics.md

Lines changed: 20 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 08/06/2019
16+
ms.date: 08/07/2019
1717
ms.author: b-juche
1818
---
1919
# Metrics for Azure NetApp Files
@@ -24,28 +24,40 @@ Azure NetApp Files provides metrics on allocated storage, actual storage usage,
2424

2525
<!--
2626
- *Volume pool allocated size*
27-
This is the size (GiB) of the provisioned capacity pool.
27+
The size (GiB) of the provisioned capacity pool
2828
-->
2929
- *Volume pool allocated used*
30-
This is the total of volume quota (GiB) in a given capacity pool (that is, the total of the volumes' provisioned sizes in the capacity pool). This is the size you selected during volume creation.
30+
The total of volume quota (GiB) in a given capacity pool (that is, the total of the volumes' provisioned sizes in the capacity pool)
31+
This is the size you selected during volume creation.
3132
- *Volume pool total logical size*
32-
This is the total of logical space (GiB) used across volumes in a capacity pool.
33+
The total of logical space (GiB) used across volumes in a capacity pool
3334
<!--
3435
- *Volume pool total snapshot size*
35-
This is the total of incremental logical space used by the snapshots.
36+
The total of incremental logical space used by the snapshots
3637
-->
3738

3839
## <a name="volumes"></a>Usage metrics for volumes
3940

4041
<!--
4142
- *Volume allocated size*
42-
This is the volume size (quota) provisioned in GiB.
43+
The volume size (quota) provisioned in GiB
4344
-->
4445
- *Volume logical size*
45-
This is the total logical space used in a volume (GiB).
46+
The total logical space used in a volume (GiB)
4647
This size includes logical space used by active file systems and snapshots.
4748
- *Volume snapshot size*
48-
This is the incremental logical space used by snapshots in a volume.
49+
The incremental logical space used by snapshots in a volume
50+
51+
## Performance metrics for volumes
52+
53+
- *AverageReadLatency*
54+
The average time for reads from the volume in milliseconds
55+
- *AverageWriteLatency*
56+
The average time for writes from the volume in milliseconds
57+
- *ReadIops*
58+
The number of reads to the volume per second
59+
- *WriteIops*
60+
The number of writes to the volume per second
4961

5062
## Next steps
5163

articles/azure-netapp-files/azure-netapp-files-solution-architectures.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,16 @@ ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 06/24/2019
16+
ms.date: 08/07/2019
1717
ms.author: b-juche
1818
---
1919
# Solution architectures using Azure NetApp Files
2020
This article provides references to best practices that can help you understand the solution architectures for using Azure NetApp Files.
2121

22+
## Solutions for Azure Kubernetes Service (AKS)
23+
24+
[Azure NetApp Files integration with AKS](https://github.com/andyzhangx/demo/tree/master/linux/nfs)
25+
2226
## Solutions for Oracle database
2327

2428
* [Oracle on Azure deployment best practice guide using Azure NetApp Files](https://www.netapp.com/us/media/tr-4780.pdf)

articles/hdinsight/hadoop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,8 @@
6363
href: ./hdinsight-hdfs-troubleshoot-safe-mode.md
6464
- name: Apache Ambari heartbeat issues
6565
href: ./apache-ambari-troubleshoot-heartbeat-issues.md
66+
- name: Apache Ambari UI 502 error
67+
href: ./apache-ambari-troubleshoot-fivezerotwo-error.md
6668
- name: Apache Ambari shows down hosts and services
6769
href: ./apache-ambari-troubleshoot-down-hosts-services.md
6870
- name: How to
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
title: Apache Ambari UI 502 error in Azure HDInsight
3+
description: Apache Ambari UI 502 error in Azure HDInsight
4+
ms.service: hdinsight
5+
ms.topic: troubleshooting
6+
author: hrasheed-msft
7+
ms.author: hrasheed
8+
ms.date: 08/05/2019
9+
---
10+
11+
# Scenario: Apache Ambari UI 502 error in Azure HDInsight
12+
13+
This article describes troubleshooting steps and possible resolutions for issues when interacting with Azure HDInsight clusters.
14+
15+
## Issue
16+
17+
When you try to access the Apache Ambari UI for your HDInsight cluster, you get a message similar to: "502 - Web server received an invalid response while acting as a gateway or proxy server."
18+
19+
## Cause
20+
21+
In general, the HTTP 502 status code means that Ambari server is not running correctly on the active headnode. There are a few possible root causes.
22+
23+
## Resolution
24+
25+
In most of the cases, to mitigate the problem, you can restart the active headnode. Or choose a larger VM size for your headnode.
26+
27+
### Ambari server failed to start
28+
29+
You can check ambari-server logs to find out why Ambari server failed to start. One common reason is the database consistency check error. You can find this out in this log file: `/var/log/ambari-server/ambari-server-check-database.log`.
30+
31+
If you made any modifications to the cluster node, please undo them. Always use Ambari UI to modify any Hadoop/Spark related configurations.
32+
33+
### Ambari server taking 100% CPU utilization
34+
35+
In rare situations, we’ve seen ambari-server process has close to 100% CPU utilization constantly. As a mitigation, you can ssh to the active headnode, and kill the Ambari server process and start it again.
36+
37+
```bash
38+
ps -ef | grep AmbariServer
39+
top -p <ambari-server-pid>
40+
kill -9 <ambari-server-pid>
41+
service ambari-server start
42+
```
43+
44+
### Ambari server killed by oom-killer
45+
46+
In some scenarios, your headnode runs out of memory, and the Linux oom-killer starts to pick processes to kill. You can verify this situation by searching the AmbariServer process ID, which should not be found. Then look at your `/var/log/syslog`, and look for something like this:
47+
48+
```
49+
Jul 27 15:29:30 hn0-xxxxxx kernel: [874192.703153] java invoked oom-killer: gfp_mask=0x23201ca, order=0, oom_score_adj=0
50+
```
51+
52+
Then identify which processes are taking memories and try to further root cause.
53+
54+
### Other issues with Ambari server
55+
56+
Rarely the Ambari server cannot handle the incoming request, you can find more info by looking at the ambari-server logs for any error. One such case is an error like this:
57+
58+
```
59+
Error Processing URI: /api/v1/clusters/xxxxxx/host_components - (java.lang.OutOfMemoryError) Java heap space
60+
```
61+
62+
## Next steps
63+
64+
If you didn't see your problem or are unable to solve your issue, visit one of the following channels for more support:
65+
66+
* Get answers from Azure experts through [Azure Community Support](https://azure.microsoft.com/support/community/).
67+
68+
* Connect with [@AzureSupport](https://twitter.com/azuresupport) - the official Microsoft Azure account for improving customer experience by connecting the Azure community to the right resources: answers, support, and experts.
69+
70+
* If you need more help, you can submit a support request from the [Azure portal](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade/). Select **Support** from the menu bar or open the **Help + support** hub. For more detailed information, please review [How to create an Azure support request](https://docs.microsoft.com/azure/azure-supportability/how-to-create-azure-support-request). Access to Subscription Management and billing support is included with your Microsoft Azure subscription, and Technical Support is provided through one of the [Azure Support Plans](https://azure.microsoft.com/support/plans/).

articles/hdinsight/hbase/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,8 @@
164164
href: ../hdinsight-troubleshoot-guide.md?toc=/azure/hdinsight/hbase/toc.json&bc=/azure/hdinsight/hbase/breadcrumb/toc.json
165165
- name: Issues with region servers
166166
href: ./hbase-troubleshoot-unassigned-regions.md
167+
- name: Apache Phoenix connectivity issues
168+
href: ./hbase-troubleshoot-phoenix-connectivity.md
167169
- name: Apache HBase REST not responding
168170
href: ./hbase-troubleshoot-rest-not-spending.md
169171
- name: Pegged CPU on region server

0 commit comments

Comments
 (0)