Skip to content

Commit 4a7f338

Browse files
committed
fixing validation error
1 parent 237ebde commit 4a7f338

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/azure-monitor/agents/agent-linux-troubleshoot.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ Below the output plug-in, uncomment the following section by removing the `#` in
189189
### Probable causes
190190

191191
* The proxy specified during onboarding was incorrect.
192-
* The Azure Monitor and Azure Automation Service Endpoints aren't included in the approved list in your datacenter.
192+
* The Azure Monitor and Azure Automation service endpoints aren't included in the approved list in your datacenter.
193193

194194
### Resolution
195195

@@ -233,7 +233,7 @@ Performance-related bugs don't happen all the time, and they're difficult to rep
233233

234234
1. Callstack will be dumped in the omiagent_trace file. If you notice many curl and NSS function calls, follow these resolution steps.
235235

236-
### Resolution (step by step)
236+
### Resolution
237237

238238
1. Upgrade the nss-pem package to [v1.0.3-5.el7_6.1](https://centos.pkgs.org/7/centos-x86_64/nss-pem-1.0.3-7.el7.x86_64.rpm.html): <br/>
239239
`sudo yum upgrade nss-pem`
@@ -455,7 +455,7 @@ sudo sh ./onboard_agent.sh --purge
455455
456456
You can continue to reonboard after you use the `--purge` option.
457457
458-
## Log Analytics agent extension in the Azure portal is marked with a failed state: Provisioning failed
458+
## Issue: Log Analytics agent extension in the Azure portal is marked with a failed state: Provisioning failed
459459
460460
### Probable causes
461461
@@ -490,7 +490,7 @@ The Log Analytics agent packages on the host are outdated.
490490
491491
### Probable causes
492492
493-
There's a known issue where, if the VM's language isn't English, a check will fail when verifying which version of Python is being used. This issue leads to the agent always assuming Python2 is being used and failing if there's no Python2.
493+
For this known issue, if the VM's language isn't English, a check will fail when verifying which version of Python is being used. This issue leads to the agent always assuming Python2 is being used and failing if there's no Python2.
494494
495495
### Resolution
496496

articles/azure-monitor/agents/azure-monitor-agent-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The following prerequisites must be met prior to installing the Azure Monitor ag
4040
| Any role that includes the action *Microsoft.Resources/deployments/** | <ul><li>Subscription and/or</li><li>Resource group and/or </li></ul> | To deploy Azure Resource Manager templates |
4141
- **Non-Azure**: To install the agent on physical servers and virtual machines hosted *outside* of Azure (that is, on-premises) or in other clouds, you must [install the Azure Arc Connected Machine agent](../../azure-arc/servers/agent-overview.md) first, at no added cost.
4242
- **Authentication**: [Managed identity](../../active-directory/managed-identities-azure-resources/overview.md) must be enabled on Azure virtual machines. Both user-assigned and system-assigned managed identities are supported.
43-
- **User-assigned**: This managed identity is recommended for large-scale deployments, configurable via [built-in Azure policies](#using-azure-policy). You can create a user-assigned managed identity once and share it across multiple VMs, which means it's more scalable than a system-assigned managed identity. If you use a user-assigned managed identity, you must pass the managed identity details to the Azure Monitor agent via extension settings:
43+
- **User-assigned**: This managed identity is recommended for large-scale deployments, configurable via [built-in Azure policies](#use-azure-policy). You can create a user-assigned managed identity once and share it across multiple VMs, which means it's more scalable than a system-assigned managed identity. If you use a user-assigned managed identity, you must pass the managed identity details to the Azure Monitor agent via extension settings:
4444

4545
```json
4646
{

0 commit comments

Comments
 (0)