Skip to content

Commit 43a4499

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-marketplace
2 parents 0c8fc40 + bbfb268 commit 43a4499

36 files changed

+523
-471
lines changed

articles/aks/manage-abort-operations.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,31 @@ This command provides you with a percentage that indicates how close the operati
2828
"status": "InProgress"
2929
```
3030

31+
There is also a cli command equivalent for the above that shows the status of the most recent operation in the cluster.
32+
```azurecli-interactive
33+
az aks operation show-latest --resource-group myResourceGroup --name myCluster
34+
```
35+
The following is an example output -
36+
```azurecli-interactive
37+
{
38+
"endTime": null,
39+
"error": null,
40+
"id": "/subscriptions/3368aba5-673c-452f-96b8-71326a289646/resourcegroups/testkaar/providers/Microsoft.ContainerService/managedClusters/contoso/operations/94e04d66-5b57-4c2b-bf3e-e026f1067dd1",
41+
"name": "94e04d66-5b57-4c2b-bf3e-e026f1067dd1",
42+
"operations": null,
43+
"percentComplete": 1.0,
44+
"resourceGroup": "testkaar",
45+
"resourceId": null,
46+
"startTime": "2024-06-12T18:16:21+00:00",
47+
"status": "InProgress"
48+
}
49+
```
50+
You can also run this command using the operation-id available from the above output. The `Id` parameter denotes the operation-id to use example:
51+
52+
```azurecli-interactive
53+
az aks operation show --resource-group myResourceGroup --name myCluster --operation-id "94e04d66-5b57-4c2b-bf3e-e026f1067dd1"
54+
```
55+
3156
While it's important to allow operations to gracefully terminate when they're no longer needed, there are circumstances where you need to release control of node pools and clusters with long running operations using an *abort* command.
3257

3358
AKS support for aborting long running operations is now generally available. This feature allows you to take back control and run another operation seamlessly. This design is supported using the [Azure REST API](/rest/api/azure/) or the [Azure CLI](/cli/azure/).

articles/aks/manage-azure-rbac.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,11 @@ author: palma21
1313

1414
# Use Azure role-based access control for Kubernetes Authorization
1515

16-
When you leverage [integrated authentication between Microsoft Entra ID and AKS](managed-azure-ad.md), you can use Microsoft Entra users, groups, or service principals as subjects in [Kubernetes role-based access control (Kubernetes RBAC)][kubernetes-rbac]. This feature frees you from having to separately manage user identities and credentials for Kubernetes. However, you still have to set up and manage Azure RBAC and Kubernetes RBAC separately.
17-
1816
This article covers how to use Azure RBAC for Kubernetes Authorization, which allows for the unified management and access control across Azure resources, AKS, and Kubernetes resources. For more information, see [Azure RBAC for Kubernetes Authorization][kubernetes-rbac].
1917

18+
> [!NOTE]
19+
> When you leverage [integrated authentication between Microsoft Entra ID and AKS](managed-azure-ad.md), you can use Microsoft Entra users, groups, or service principals as subjects in [Kubernetes role-based access control (Kubernetes RBAC)][kubernetes-rbac]. This feature frees you from having to separately manage user identities and credentials for Kubernetes. However, you still have to set up and manage Azure RBAC and Kubernetes RBAC separately.
20+
2021
## Before you begin
2122

2223
* You need the Azure CLI version 2.24.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].

articles/automation/automation-linux-hrw-install.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -229,15 +229,13 @@ sudo python /opt/microsoft/omsconfig/modules/nxOMSAutomationWorker/DSCResources/
229229

230230
## <a name="remove-linux-hybrid-runbook-worker"></a>Remove the Hybrid Runbook Worker
231231

232-
Run the following commands as root on the agent-based Linux Hybrid Worker:
232+
1. Run the following commands as root on the agent-based Linux Hybrid Worker:
233233

234-
1. ```bash
235-
sudo bash
234+
```bash
235+
sudo bash
236+
rm -r /home/nxautomation
236237
```
237238

238-
1. ```bash
239-
rm -r /home/nxautomation
240-
```
241239
1. Under **Process Automation**, select **Hybrid worker groups** and then your hybrid worker group to go to the **Hybrid Worker Group** page.
242240
1. Under **Hybrid worker group**, select **Hybrid Workers**.
243241
1. Select the checkbox next to the machine(s) you want to delete from the hybrid worker group.

articles/automation/migrate-existing-agent-based-hybrid-worker-to-extension-based-workers.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -914,15 +914,13 @@ New-AzConnectedMachineExtension -ResourceGroupName <VMResourceGroupName> -Locati
914914
915915
#### [Linux Hybrid Worker](#tab/lin-hrw)
916916

917-
Run the following commands on agent-based Linux Hybrid Worker:
917+
1. Run the following commands on agent-based Linux Hybrid Worker:
918918

919-
1. ```bash
920-
sudo bash
919+
```bash
920+
sudo bash
921+
rm -r /home/nxautomation
921922
```
922923

923-
1. ```bash
924-
rm -r /home/nxautomation
925-
```
926924
1. Under **Process Automation**, select **Hybrid worker groups** and then your hybrid worker group to go to the **Hybrid Worker Group** page.
927925
1. Under **Hybrid worker group**, select **Hybrid Workers**.
928926
1. Select the checkbox next to the machine(s) you want to delete from the hybrid worker group.
Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: Add an NSX-T network segment
3-
description: Steps to add an NSX-T network segment for Azure VMware Solution in NSX-T Manager.
2+
title: Add an NSX network segment
3+
description: Steps to add an NSX network segment for Azure VMware Solution in NSX Manager.
44
ms.topic: include
55
ms.service: azure-vmware
6-
ms.date: 01/03/2024
6+
ms.date: 6/12/2024
77
author: suzizuber
88
ms.author: v-szuber
99
ms.custom: engagement-fy23
1010
---
1111

1212
<!-- Used in configure-dhcp-azure-vmware-solution.md and tutorial-nsx-t-network-segment.md -->
1313

14-
1. In NSX-T Manager, select **Networking** > **Segments**, and then select **Add Segment**.
14+
1. In NSX Manager, select **Networking** > **Segments**, and then select **Add Segment**.
1515

16-
:::image type="content" source="../media/nsxt/nsxt-segments-overview.png" alt-text="Screenshot showing how to add a new segment in NSX-T Manager.":::
16+
:::image type="content" source="../media/nsxt/nsxt-segments-overview.png" alt-text="Screenshot showing how to add a new segment in NSX Manager.":::
1717

1818
1. Enter a name for the segment.
1919

2020
1. Select the Tier-1 Gateway (TNTxx-T1) as the **Connected Gateway** and leave the **Type** as Flexible.
2121

2222
1. Select the preconfigured overlay **Transport Zone** (TNTxx-OVERLAY-TZ) and then select **Set Subnets**.
2323

24-
:::image type="content" source="../media/nsxt/nsxt-create-segment-specs.png" alt-text="Screenshot showing the Segments details for adding a new NSX-T network segment.":::
24+
:::image type="content" source="../media/nsxt/nsxt-create-segment-specs.png" alt-text="Screenshot showing the Segments details for adding a new NSX network segment.":::
2525

2626
1. Enter the gateway IP address and then select **Add**.
2727

@@ -33,5 +33,3 @@ ms.custom: engagement-fy23
3333
1. Select **Apply** and then **Save**.
3434

3535
1. Select **No** to decline the option to continue configuring the segment.
36-
37-
Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Add an NSX-T Data Center network segment using Azure VMware Solution
3-
description: Steps to add an NSX-T Data Center network segment for Azure VMware Solution in the Azure portal.
2+
title: Add an NSX network segment using Azure VMware Solution
3+
description: Steps to add an NSX network segment for Azure VMware Solution in the Azure portal.
44
ms.topic: include
55
ms.service: azure-vmware
6-
ms.date: 1/03/2024
6+
ms.date: 6/12/2024
77
author: suzizuber
88
ms.author: v-szuber
99
ms.custom: engagement-fy23
@@ -13,13 +13,13 @@ ms.custom: engagement-fy23
1313

1414

1515
>[!NOTE]
16-
>If you plan to use DHCP, you'll need to [configure a DHCP server or DHCP relay](../configure-dhcp-azure-vmware-solution.md) before you can configure an NSX-T Data Center network segment.
16+
>If you plan to use DHCP, you'll need to [configure a DHCP server or DHCP relay](../configure-dhcp-azure-vmware-solution.md) before you can configure an NSX network segment.
1717
1818
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **Segments** > **Add**.
1919

2020
2. Provide the details for the new logical segment and select **OK**.
2121

22-
:::image type="content" source="../media/networking/add-new-nsxt-segment.png" alt-text="Screenshot showing how to add a new NSX-T Data Center segment in the Azure portal.":::
22+
:::image type="content" source="../media/networking/add-new-nsxt-segment.png" alt-text="Screenshot showing how to add a new NSX segment in the Azure portal.":::
2323

2424
- **Segment name** - Name of the segment that is visible in vCenter Server.
2525

@@ -30,8 +30,8 @@ ms.custom: engagement-fy23
3030
>[!NOTE]
3131
>The **Connected gateway** is selected by default and is read-only. It shows Tier-1 Gateway and type of segment information.
3232
>
33-
>- **T1** - Name of the Tier-1 Gateway in NSX-T Manager. A private cloud comes with an NSX-T Tier-0 Gateway in Active/Active mode and a default NSX-T Tier-1 Gateway in Active/Standby mode. Segments created through the Azure VMware Solution console only connect to the default Tier-1 Gateway, and the workloads of these segments get East-West and North-South connectivity. You can only create more Tier-1 Gateways through NSX-T Manager. Tier-1 Gateways created from the NSX-T Manager console are not visible in the Azure VMware Solution console.
33+
>- **T1** - Name of the Tier-1 Gateway in NSX Manager. A private cloud comes with an NSX Tier-0 Gateway in Active/Active mode and a default NSX Tier-1 Gateway in Active/Standby mode. Segments created through the Azure VMware Solution console only connect to the default Tier-1 Gateway, and the workloads of these segments get East-West and North-South connectivity. You can only create more Tier-1 Gateways through NSX Manager. Tier-1 Gateways created from the NSX Manager console are not visible in the Azure VMware Solution console.
3434
>
3535
>- **Type** - Overlay segment supported by Azure VMware Solution.
3636
37-
The segment is now visible in Azure VMware Solution, NSX-T Manager, and vCenter Server.
37+
The segment is now visible in Azure VMware Solution, NSX Manager, and vCenter Server.

articles/azure-vmware/tutorial-configure-networking.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn to create and configure the networking needed to deploy your
44
ms.topic: tutorial
55
ms.custom: engagement-fy23
66
ms.service: azure-vmware
7-
ms.date: 12/19/2023
7+
ms.date: 6/12/2024
88
---
99

1010
# Tutorial: Configure networking for your VMware private cloud in Azure
@@ -22,65 +22,65 @@ In this tutorial, you learn how to:
2222
> * Connect your ExpressRoute circuit to the gateway
2323
2424
>[!NOTE]
25-
>Before you create a new virtual network (vNet), evaluate if you already have an existing vNet in Azure and plan to use it to connect to Azure VMware Solution; or whether to create a new vNet entirely.
26-
>* To use an existing vNet in same Azure subscription as Azure VMware Solution, use the **[Azure vNet connect](#select-an-existing-vnet)** tab under **Connectivity**.
27-
>* To use an existing vNet in a different Azure subscription than Azure VMware Solution, use the guidance on **[Connect to the private cloud manually](#connect-to-the-private-cloud-manually)**.
28-
>* To create a new vNet in same Azure subscription as Azure VMware Solution, use the **[Azure vNet connect](#create-a-new-vnet)** tab or create one [manually](#create-a-vnet-manually).
25+
>Before you create a new virtual network (VNet), evaluate if you already have an existing VNet in Azure and plan to use it to connect to Azure VMware Solution; or whether to create a new VNet entirely.
26+
>* To use an existing VNet in same Azure subscription as Azure VMware Solution, use the **[Azure VNet connect](#select-an-existing-vnet)** tab under **Connectivity**.
27+
>* To use an existing VNet in a different Azure subscription than Azure VMware Solution, use the guidance on **[Connect to the private cloud manually](#connect-to-the-private-cloud-manually)**.
28+
>* To create a new VNet in same Azure subscription as Azure VMware Solution, use the **[Azure VNet connect](#create-a-new-vnet)** tab or create one [manually](#create-a-vnet-manually).
2929
30-
## Connect with the Azure vNet connect feature
30+
## Connect with the Azure VNet connect feature
3131

32-
You can use the **Azure vNet connect** feature to use an existing vNet or create a new vNet to connect to Azure VMware Solution. **Azure vNet connect** is a function to configure vNet connectivity, it doesn't record configuration state; browse the Azure portal to check what settings are already configured.
32+
You can use the **Azure VNet connect** feature to use an existing VNet or create a new VNet to connect to Azure VMware Solution. **Azure VNet connect** is a function to configure VNet connectivity, it doesn't record configuration state; browse the Azure portal to check what settings are already configured.
3333

3434
>[!NOTE]
35-
>Address space in the vNet cannot overlap with the Azure VMware Solution private cloud CIDR.
35+
>Address space in the VNet cannot overlap with the Azure VMware Solution private cloud CIDR.
3636
3737
### Prerequisites
3838

39-
Before you select an existing vNet, there are specific requirements that must be met.
39+
Before you select an existing VNet, there are specific requirements that must be met.
4040

41-
1. vNet must contain a gateway subnet.
41+
1. VNet must contain a gateway subnet.
4242
1. Be in the same region as Azure VMware Solution private cloud.
4343
1. Be in the same resource group as Azure VMware Solution private cloud.
44-
1. vNet must contain an address space that doesn't overlap with Azure VMware Solution.
44+
1. VNet must contain an address space that doesn't overlap with Azure VMware Solution.
4545
1. Validate solution design is within Azure VMware Solution limits (Microsoft technical documentation/azure/azure-resource-manager/management/azure-subscription-service-limits).
4646

47-
### Select an existing vNet
47+
### Select an existing VNet
4848

49-
When you select an existing vNet, the Azure Resource Manager (ARM) template that creates the vNet and other resources gets redeployed. The resources, in this case, are the public IP, gateway, gateway connection, and ExpressRoute authorization key. If everything is set up, the deployment doesn't change anything. However, if anything is missing, it gets created automatically. For example, if the GatewaySubnet is missing, then it gets added during the deployment.
49+
When you select an existing VNet, the Azure Resource Manager (ARM) template that creates the VNet and other resources gets redeployed. The resources, in this case, are the public IP, gateway, gateway connection, and ExpressRoute authorization key. If everything is set up, the deployment doesn't change anything. However, if anything is missing, it gets created automatically. For example, if the GatewaySubnet is missing, then it gets added during the deployment.
5050

5151
1. In your Azure VMware Solution private cloud, under **Manage**, select **Connectivity**.
5252

53-
2. Select the **Azure vNet connect** tab and then select the existing vNet.
53+
2. Select the **Azure VNet connect** tab and then select the existing VNet.
5454

55-
:::image type="content" source="media/networking/azure-vnet-connect-tab.png" alt-text="Screenshot showing the Azure vNet connect tab under Connectivity with an existing vNet selected.":::
55+
:::image type="content" source="media/networking/azure-vnet-connect-tab.png" alt-text="Screenshot showing the Azure VNet connect tab under Connectivity with an existing VNet selected.":::
5656

5757
3. Select **Save**.
5858

59-
At this point, the vNet validates if overlapping IP address spaces between Azure VMware Solution and vNet are detected. If detected, change the network address of either the private cloud or the vNet so they don't overlap.
59+
At this point, the VNet validates if overlapping IP address spaces between Azure VMware Solution and VNet are detected. If detected, change the network address of either the private cloud or the VNet so they don't overlap.
6060

6161

62-
### Create a new vNet
62+
### Create a new VNet
6363

64-
When you create a new vNet, the required components to connect to Azure VMware Solution are automatically created.
64+
When you create a new VNet, the required components to connect to Azure VMware Solution are automatically created.
6565

6666
1. In your Azure VMware Solution private cloud, under **Manage**, select **Connectivity**.
6767

68-
2. Select the **Azure vNet connect** tab and then select **Create new**.
68+
2. Select the **Azure VNet connect** tab and then select **Create new**.
6969

70-
:::image type="content" source="media/networking/azure-vnet-connect-tab-create-new.png" alt-text="Screenshot showing the Azure vNet connect tab under Connectivity.":::
70+
:::image type="content" source="media/networking/azure-vnet-connect-tab-create-new.png" alt-text="Screenshot showing the Azure VNet connect tab under Connectivity.":::
7171

72-
3. Provide or update the information for the new vNet and then select **OK**.
72+
3. Provide or update the information for the new VNet and then select **OK**.
7373

74-
At this point, the vNet validates if overlapping IP address spaces between Azure VMware Solution and vNet are detected. If detected, change the private cloud or vNet's network address so they don't overlap.
74+
At this point, the VNet validates if overlapping IP address spaces between Azure VMware Solution and VNet are detected. If detected, change the private cloud or VNet's network address so they don't overlap.
7575

7676
:::image type="content" source="media/networking/create-new-virtual-network.png" alt-text="Screenshot showing the Create virtual network window.":::
7777

78-
The vNet with the provided address range and GatewaySubnet is created in your subscription and resource group.
78+
The VNet with the provided address range and GatewaySubnet is created in your subscription and resource group.
7979

8080

8181
## Connect to the private cloud manually
8282

83-
### Create a vNet manually
83+
### Create a VNet manually
8484

8585
1. Sign in to the [Azure portal](https://portal.azure.com).
8686

@@ -154,13 +154,13 @@ Now that you deployed a virtual network gateway, add a connection between it and
154154
In this tutorial, you learned how to:
155155

156156
> [!div class="checklist"]
157-
> * Create a Virtual Network using the vNet Connect Feature
157+
> * Create a Virtual Network using the VNet Connect Feature
158158
> * Create a Virtual Network Manually
159159
> * Create a Virtual Network gateway
160160
> * Connect your ExpressRoute circuit to the gateway
161161
162162

163-
Continue to the next tutorial to learn how to create the NSX-T network segments used for VMs in vCenter Server.
163+
Continue to the next tutorial to learn how to create the NSX network segments used for VMs in vCenter Server.
164164

165165
> [!div class="nextstepaction"]
166-
> [Create an NSX-T network segment](./tutorial-nsx-t-network-segment.md)
166+
> [Create an NSX network segment](./tutorial-nsx-t-network-segment.md)

articles/backup/backup-dpm-automation.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -319,12 +319,12 @@ Set-DPMPolicySchedule -ProtectionGroup $MPG -Schedule $onlineSch[3] -TimesOfDay
319319
Set-DPMProtectionGroup -ProtectionGroup $MPG
320320
```
321321

322-
In the example above, ```$onlineSch``` is an array with four elements that contains the existing online protection schedule for the Protection Group in the GFS scheme:
322+
In the example above, `$onlineSch` is an array with four elements that contains the existing online protection schedule for the Protection Group in the GFS scheme:
323323

324-
1. ```$onlineSch[0]``` contains the daily schedule
325-
2. ```$onlineSch[1]``` contains the weekly schedule
326-
3. ```$onlineSch[2]``` contains the monthly schedule
327-
4. ```$onlineSch[3]``` contains the yearly schedule
324+
1. `$onlineSch[0]` contains the daily schedule
325+
2. `$onlineSch[1]` contains the weekly schedule
326+
3. `$onlineSch[2]` contains the monthly schedule
327+
4. `$onlineSch[3]` contains the yearly schedule
328328

329329
So if you need to modify the weekly schedule, you need to refer to the ```$onlineSch[1]```.
330330

articles/data-factory/tutorial-data-flow-delta-lake.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ You will generate two data flows in this tutorial. The first data flow is a simp
104104

105105
:::image type="content" source="media/data-flow/data-flow-tutorial-2.png" alt-text="Derived column":::
106106

107-
1. ```Update, insert, delete, and upsert``` policies are created in the alter Row transform. Add an alter row transformation after your derived column.
107+
1. `Update, insert, delete, and upsert` policies are created in the alter Row transform. Add an alter row transformation after your derived column.
108108
1. Your alter row policies should look like this.
109109

110110
:::image type="content" source="media/data-flow/data-flow-tutorial-3.png" alt-text="Alter row":::

0 commit comments

Comments
 (0)