Skip to content

Commit 32a5d5a

Browse files
Merge pull request #268578 from MicrosoftDocs/main
publish main to live 4 PM Sunday 3/10
2 parents 97ff0d7 + e80d6e1 commit 32a5d5a

36 files changed

+1071
-886
lines changed

articles/advisor/advisor-high-availability-recommendations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Azure Advisor helps you ensure and improve the continuity of your business-criti
1212

1313
## Check the version of your Check Point network virtual appliance image
1414

15-
Advisor can identify whether your virtual machine is running a version of the Check Point image that has been known to lose network connectivity during platform servicing operations. The Advisor recommendation will help you upgrade to a newer version of the image that addresses this problem. This check will ensure business continuity through better network connectivity.
15+
Advisor can identify whether your virtual machine is running a version of the Check Point image that has been known to lose network connectivity during platform servicing operations. The Advisor recommendation helps you upgrade to a newer version of the image that addresses this problem. This check ensures business continuity through better network connectivity.
1616

1717
## Ensure application gateway fault tolerance
1818

@@ -56,7 +56,7 @@ Azure Advisor checks for any VPN gateways that use a Basic SKU and recommends th
5656
- Higher stability and availability.
5757

5858
## Ensure reliable outbound connectivity with VNet NAT
59-
Using default outbound connecitivty provided by a Standard Load Balancer or other Azure resources is not recommended for production workloads as this causes connection failures (also called SNAT port exhaustion). The recommended approach is using a VNet NAT which will prevent any failures of connectivity in this regard. NAT can scale seamlessly to ensure your application is never out ports. [Learn more about VNet NAT](../virtual-network/nat-gateway/nat-overview.md).
59+
Using default outbound connectivity provided by a Standard Load Balancer or other Azure resources is not recommended for production workloads as this causes connection failures (also called SNAT port exhaustion). The recommended approach is using a VNet NAT which will prevent any failures of connectivity in this regard. NAT can scale seamlessly to ensure your application is never out ports. [Learn more about VNet NAT](../virtual-network/nat-gateway/nat-overview.md).
6060

6161
## Ensure virtual machine fault tolerance (temporarily disabled)
6262

@@ -76,7 +76,7 @@ Virtual machines in an availability set with disks that share either storage acc
7676
## Repair invalid log alert rules
7777

7878
Azure Advisor detects log alert rules that have invalid queries specified in their condition section.
79-
Azure Monitor log alert rules run queries at specified frequency and fire alerts based on the results. Queries can become invalid over time because of changes in the referenced resources, tables, or commands. Advisor recommends corrections for alert queries to prevent the rules from being automatically disabled and to ensure monitoring coverage. For more information, see [Troubleshooting alert rules](../azure-monitor/alerts/alerts-troubleshoot-log.md#query-used-in-a-log-alert-isnt-valid)
79+
Azure Monitor log alert rules run queries at specified frequency and fire alerts based on the results. Queries can become invalid over time because of changes in the referenced resources, tables, or commands. Advisor recommends corrections for alert queries to prevent the rules from being automatically disabled and to ensure monitoring coverage. For more information, see [Troubleshooting alert rules](../azure-monitor/alerts/alerts-troubleshoot-log.md)
8080

8181
## Configure Consistent indexing mode on your Azure Cosmos DB collection
8282

@@ -110,10 +110,10 @@ Starting July 1, 2020, you won't be able to create new Spark clusters by using S
110110
Virtual machines that don't have replication enabled to another region aren't resilient to regional outages. Replicating virtual machines reduces any adverse business impact during Azure region outages. Advisor detects VMs on which replication isn't enabled and recommends enabling it. When you enable replication, if there's an outage, you can quickly bring up your virtual machines in a remote Azure region. [Learn more about virtual machine replication.](../site-recovery/azure-to-azure-quickstart.md)
111111

112112
## Upgrade to the latest version of the Azure Connected Machine agent
113-
The [Azure Connected Machine agent](../azure-arc/servers/manage-agent.md) is updated regularly with bug fixes, stability enhancements, and new functionality. We have identified resources which are not working on the latest version of machine agent and this Advisor recommendation will suggest you to upgrade your agent to the latest version for the best Azure Arc experience.
113+
The [Azure Connected Machine agent](../azure-arc/servers/manage-agent.md) is updated regularly with bug fixes, stability enhancements, and new functionality. We have identified resources which are not working on the latest version of machine agent and this Advisor recommendation suggests that you to upgrade your agent to the latest version for the best Azure Arc experience.
114114

115115
## Do not override hostname to ensure website integrity
116-
Advisor recommend to try avoid overriding the hostname when configuring Application Gateway. Having a different domain on the frontend of Application Gateway than the one which is used to access the backend can potentially lead to cookies or redirect URLs being broken. Note that this might not be the case in all situations and that certain categories of backends (like REST API's) in general are less sensitive to this. Please make sure the backend is able to deal with this or update the Application Gateway configuration so the hostname does not need to be overwritten towards the backend. When used with App Service, attach a custom domain name to the Web App and avoid use of the `*.azurewebsites.net` host name towards the backend. [Learn more about custom domain](../application-gateway/troubleshoot-app-service-redirection-app-service-url.md).
116+
Advisor recommends that you try avoid overriding the hostname when configuring Application Gateway. Having a different domain on the frontend of Application Gateway than the one which is used to access the backend can potentially lead to cookies or redirect URLs being broken. Note that this might not be the case in all situations and that certain categories of backends (like REST APIs) in general are less sensitive to this. Please make sure the backend is able to deal with this or update the Application Gateway configuration so the hostname does not need to be overwritten towards the backend. When used with App Service, attach a custom domain name to the Web App and avoid use of the `*.azurewebsites.net` host name towards the backend. [Learn more about custom domain](../application-gateway/troubleshoot-app-service-redirection-app-service-url.md).
117117

118118
## Next steps
119119

articles/azure-monitor/agents/azure-monitor-agent-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -421,7 +421,7 @@ These initiatives above comprise individual policies that:
421421
- `User-Assigned Managed Identity Name`: If you use your own identity (selected `true`), specify the name of the identity that's assigned to the machines.
422422
- `User-Assigned Managed Identity Resource Group`: If you use your own identity (selected `true`), specify the resource group where the identity exists.
423423
- `Additional Virtual Machine Images`: Pass additional VM image names that you want to apply the policy to, if not already included.
424-
- `Built-In-Identity-RG Location`: If you use built-in user-assigned managed identity, specify the location where the identity and the resource group should be created. This parameter is only used when 'Bring Your Own User-Assigned Managed Identity' parameter is false.
424+
- `Built-In-Identity-RG Location`: If you use built-in user-assigned managed identity, specify the location where the identity and the resource group should be created. This parameter is only used when `Bring Your Own User-Assigned Managed Identity` parameter is set to `false`.
425425
- Create and deploy the association to link the machine to specified data collection rule.
426426
- `Data Collection Rule Resource Id`: The Azure Resource Manager resourceId of the rule you want to associate via this policy to all machines the policy is applied to.
427427

articles/azure-monitor/agents/azure-monitor-agent-mma-removal-tool.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ To install the package:
5959

6060
``` PowerShell
6161
CD "<LocalExtractedFolderPath>\AzTSMMARemovalUtilityDeploymentFiles"
62-
. ".\MMARemovalUtilitySetupConsolidated.ps1"
62+
. ".\MMARemovalUtilityConsolidatedSetup.ps1"
6363
```
6464

6565
1. Sign in to the Azure account by using the following PowerShell command:

articles/azure-monitor/agents/data-collection-syslog.md

Lines changed: 19 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -20,24 +20,29 @@ When the Azure Monitor agent for Linux is installed, it configures the local Sys
2020
:::image type="content" source="media/azure-monitor-agent/linux-agent-syslog-communication.png" lightbox="media/azure-monitor-agent/linux-agent-syslog-communication.png" alt-text="Diagram that shows Syslog daemon and Azure Monitor Agent communication.":::
2121

2222
The following facilities are supported with the Syslog collector:
23-
* alert
24-
* audit
25-
* auth
26-
* authpriv
27-
* clock (formerly mark)
28-
* cron
23+
* None
24+
* Kern
25+
* user
26+
* mail
2927
* daemon
30-
* ftp
31-
* kern
32-
* local0-local7
28+
* auth
29+
* syslog
3330
* lpr
34-
* mail
3531
* news
36-
* nopri
37-
* ntp
38-
* syslog
39-
* user
4032
* uucp
33+
* ftp
34+
* ntp
35+
* audit
36+
* alert
37+
* mark
38+
* local0
39+
* local1
40+
* local2
41+
* local3
42+
* local4
43+
* local5
44+
* local6
45+
* local7
4146

4247
For some device types that don't allow local installation of Azure Monitor Agent, the agent can be installed instead on a dedicated Linux-based log forwarder. The originating device must be configured to send Syslog events to the Syslog daemon on this forwarder instead of the local daemon. For more information, see the [Sentinel tutorial](../../sentinel/forward-syslog-monitor-agent.md).
4348

0 commit comments

Comments
 (0)