Skip to content

Commit 4081b9c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-improve-mqtt-bridge-cmds
2 parents 20c0c31 + 6e6589e commit 4081b9c

File tree

128 files changed

+2879
-1473
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

128 files changed

+2879
-1473
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10906,9 +10906,10 @@
1090610906
{
1090710907
"source_path_from_root": "/articles/reliability/disaster-recovery-guidance-overview.md",
1090810908
"redirect_url": "/azure/reliability/reliability-guidance-overview",
10909-
"redirect_document_id": false
10909+
"redirect_document_id": false
1091010910
},
1091110911
{
10912+
1091210913
"source_path_from_root": "/articles/orbital/overview-analytics.md",
1091310914
"redirect_url": "/azure/orbital/overview",
1091410915
"redirect_document_id": false
@@ -10938,6 +10939,31 @@
1093810939
"source_path_from_root": "/articles/networking/disaster-recovery-dns-traffic-manager.md",
1093910940
"redirect_url": "/azure/reliability/reliability-traffic-manager",
1094010941
"redirect_document_id": false
10942+
},
10943+
{
10944+
"source_path_from_root": "/articles/event-hubs/move-across-regions.md",
10945+
"redirect_url": "/azure/operational-excellence/relocation-event-hub",
10946+
"redirect_document_id": false
10947+
},
10948+
{
10949+
"source_path_from_root": "/articles/azure-monitor/logs/move-workspace-region.md",
10950+
"redirect_url": "/azure/operational-excellence/relocation-log-analytics",
10951+
"redirect_document_id": false
10952+
},
10953+
{
10954+
"source_path_from_root": "/articles/key-vault/general/move-region.md",
10955+
"redirect_url": "/azure/operational-excellence/relocation-key-vault",
10956+
"redirect_document_id": false
10957+
},
10958+
{
10959+
"source_path_from_root": "/articles/event-hubs/move-cluster-across-regions.md",
10960+
"redirect_url": "/azure/operational-excellence/relocation-event-hub-cluster",
10961+
"redirect_document_id": false
10962+
},
10963+
{
10964+
"source_path_from_root": "/articles/storage/common/storage-account-move.md",
10965+
"redirect_url": "/azure/operational-excellence/relocation-storage-account",
10966+
"redirect_document_id": false
1094110967
}
1094210968

1094310969
]

articles/advisor/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@
8383
- name: App Service
8484
href: ../app-service/app-service-best-practices.md
8585
- name: REST API
86-
href: /rest/api/advisor/
86+
href: /rest/api/advisor/operation-groups?view=rest-advisor-2023-01-01&preserve-view=true
8787
- name: Azure CLI
8888
href: /cli/azure/advisor
8989
- name: PowerShell

articles/aks/tutorial-kubernetes-deploy-cluster.md

Lines changed: 50 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,56 @@ AZD Environments in a codespace automatically download all dependencies found in
8282
8383
---
8484
85+
## Create an AKS cluster
86+
87+
AKS clusters can use [Kubernetes role-based access control (Kubernetes RBAC)][k8s-rbac], which allows you to define access to resources based on roles assigned to users. Permissions are combined when users are assigned multiple roles. Permissions can be scoped to either a single namespace or across the whole cluster. For more information, see [Control access to cluster resources using Kubernetes RBAC and Microsoft Entra ID in AKS][aks-k8s-rbac].
88+
89+
For information about AKS resource limits and region availability, see [Quotas, virtual machine size restrictions, and region availability in AKS][quotas-skus-regions].
90+
91+
> [!NOTE]
92+
> To ensure your cluster operates reliably, you should run at least two nodes.
93+
94+
### [Azure CLI](#tab/azure-cli)
95+
96+
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
97+
98+
* Create an AKS cluster using the [`az aks create`][az aks create] command. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
99+
100+
```azurecli-interactive
101+
az aks create \
102+
--resource-group myResourceGroup \
103+
--name myAKSCluster \
104+
--node-count 2 \
105+
--generate-ssh-keys \
106+
--attach-acr <acrName>
107+
```
108+
109+
> [!NOTE]
110+
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `--generate-ssh-keys` parameter.
111+
112+
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
113+
114+
### [Azure PowerShell](#tab/azure-powershell)
115+
116+
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
117+
118+
* Create an AKS cluster using the [`New-AzAksCluster`][new-azakscluster] cmdlet. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
119+
120+
```azurepowershell-interactive
121+
New-AzAksCluster -ResourceGroupName myResourceGroup -Name myAKSCluster -NodeCount 2 -GenerateSshKey -AcrNameToAttach <acrName>
122+
```
123+
124+
> [!NOTE]
125+
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `-GenerateSshKey` parameter.
126+
127+
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
128+
129+
### [Azure Developer CLI](#tab/azure-azd)
130+
131+
AZD packages the deployment of clusters with the application itself using `azd up`. This command is covered in the next tutorial.
132+
133+
---
134+
85135
## Connect to cluster using kubectl
86136
87137
### [Azure CLI](#tab/azure-cli)
@@ -158,56 +208,6 @@ Sign in to your Azure Account through AZD configures your credentials.
158208
159209
---
160210
161-
## Create an AKS cluster
162-
163-
AKS clusters can use [Kubernetes role-based access control (Kubernetes RBAC)][k8s-rbac], which allows you to define access to resources based on roles assigned to users. Permissions are combined when users are assigned multiple roles. Permissions can be scoped to either a single namespace or across the whole cluster. For more information, see [Control access to cluster resources using Kubernetes RBAC and Microsoft Entra ID in AKS][aks-k8s-rbac].
164-
165-
For information about AKS resource limits and region availability, see [Quotas, virtual machine size restrictions, and region availability in AKS][quotas-skus-regions].
166-
167-
> [!NOTE]
168-
> To ensure your cluster operates reliably, you should run at least two nodes.
169-
170-
### [Azure CLI](#tab/azure-cli)
171-
172-
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
173-
174-
* Create an AKS cluster using the [`az aks create`][az aks create] command. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
175-
176-
```azurecli-interactive
177-
az aks create \
178-
--resource-group myResourceGroup \
179-
--name myAKSCluster \
180-
--node-count 2 \
181-
--generate-ssh-keys \
182-
--attach-acr <acrName>
183-
```
184-
185-
> [!NOTE]
186-
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `--generate-ssh-keys` parameter.
187-
188-
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
189-
190-
### [Azure PowerShell](#tab/azure-powershell)
191-
192-
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
193-
194-
* Create an AKS cluster using the [`New-AzAksCluster`][new-azakscluster] cmdlet. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
195-
196-
```azurepowershell-interactive
197-
New-AzAksCluster -ResourceGroupName myResourceGroup -Name myAKSCluster -NodeCount 2 -GenerateSshKey -AcrNameToAttach <acrName>
198-
```
199-
200-
> [!NOTE]
201-
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `-GenerateSshKey` parameter.
202-
203-
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
204-
205-
### [Azure Developer CLI](#tab/azure-azd)
206-
207-
AZD packages the deployment of clusters with the application itself using `azd up`. This command is covered in the next tutorial.
208-
209-
---
210-
211211
## Next steps
212212
213213
In this tutorial, you deployed a Kubernetes cluster in AKS and configured `kubectl` to connect to the cluster. You learned how to:

articles/automation/TOC.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,8 +123,12 @@
123123
href: how-to/private-link-security.md
124124
- name: Manage role permissions and security
125125
href: automation-role-based-access-control.md
126-
- name: Move Automation account to another subscription
127-
href: how-to/move-account.md
126+
- name: Relocate Automation
127+
items:
128+
- name: Move Automation account to another subscription
129+
href: how-to/move-account.md
130+
- name: Move Automation account to another region
131+
href: ../operational-excellence/relocation-automation.md?toc=/azure/private-link/toc.json
128132
- name: Manage Automation account
129133
href: delete-account.md
130134
- name: Migrate from Orchestrator to Azure Automation (Beta)

articles/automation/how-to/move-account.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,4 +129,7 @@ When the move is complete, verify that the capabilities listed below are enabled
129129

130130
## Next steps
131131

132+
133+
To learn how to move Automation to a new region, see [Move Automation account to another region](../../operational-excellence/relocation-automation.md).
134+
132135
To learn about moving resources in Azure, see [Move resources in Azure](../../azure-resource-manager/management/move-support-resources.md).

articles/azure-monitor/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -946,7 +946,7 @@ items:
946946
- name: Move a workspace
947947
href: logs/move-workspace.md
948948
- name: Move a workspace across regions
949-
href: logs/move-workspace-region.md
949+
href: ../operational-excellence/relocation-log-analytics.md?toc=/azure/azure-monitor/toc.json
950950
- name: Delete and recover a workspace
951951
href: logs/delete-workspace.md
952952
- name: Manage access

articles/azure-portal/azure-portal-add-remove-sort-favorites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ In this example, we'll add **Cost Management + Billing** to the **Favorites** li
2121

2222
:::image type="content" source="media/azure-portal-add-remove-sort-favorites/azure-portal-favorites-new-all-services.png" alt-text="Screenshot showing All services in the Azure portal menu.":::
2323

24-
1. Enter the word "cost" in the **Filter services** field near the top of the **All services** page. Services that have "cost" in the title or that have "cost" as a keyword are shown.
24+
1. Enter the word "cost" in the **Filter services** field near the top of the **All services** pane. Services that have "cost" in the title or that have "cost" as a keyword are shown.
2525

2626
:::image type="content" source="media/azure-portal-add-remove-sort-favorites/azure-portal-favorites-find-service.png" alt-text="Screenshot showing a search in All services in the Azure portal.":::
2727

articles/azure-portal/azure-portal-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ As noted earlier, you can [set your startup page to Dashboard](set-preferences.m
4444

4545
## Getting around the portal
4646

47-
The portal menu and page header are global elements that are always present in the Azure portal. These persistent features are the "shell" for the user interface associated with each individual service or feature. The header provides access to global controls. The configuration page (sometimes referred to as a "blade") for a resource or service may also have a resource menu specific to that area.
47+
The portal menu and page header are global elements that are always present in the Azure portal. These persistent features are the "shell" for the user interface associated with each individual service or feature. The header provides access to global controls. The working pane for a resource or service may also have a resource menu specific to that area.
4848

4949
The figure below labels the basic elements of the Azure portal, each of which are described in the following table. In this example, the current focus is a virtual machine, but the same elements apply no matter what type of resource or service you're working with.
5050

0 commit comments

Comments
 (0)