Skip to content

Commit 4ab28a7

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into asc-melvyn-containerwork
2 parents 04b3666 + 541cff0 commit 4ab28a7

17 files changed

+890
-284
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52278,6 +52278,12 @@
5227852278
"source_path": "articles/load-balancer/azure-media-player/components-limitations.md",
5227952279
"redirect_url": "/articles/load-balancer/concepts",
5228052280
"redirect_document_id": false
52281+
},
52282+
{
52283+
"source_path": "articles/virtual-machines/troubleshooting/linux-virtual-machine-cannot-start-fstab-errors.md",
52284+
"redirect_url": "/articles/virtual-machines/troubleshooting",
52285+
"redirect_document_id": false
5228152286
}
52287+
5228252288
]
5228352289
}

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1198,8 +1198,8 @@ The SCIM spec does not define a SCIM-specific scheme for authentication and auth
11981198
[!NOTE] It's not recommended to leave the token field blank in the Azure AD provisioning configuration custom app UI. The token generated is primarily available for testing purposes.
11991199

12001200
**OAuth authorization code grant flow:** The provisioning service supports the [authorization code grant](https://tools.ietf.org/html/rfc6749#page-24). After submitting your request for publishing your app in the gallery, our team will work with you to collect the following information:
1201-
* Authorization URL: A URL by the client to obtain authorization from the resource owner via user-agent redirection. The user is redirected to this URL to authorize access.
1202-
* Token exchange URL: A URL by the client to exchange an authorization grant for an access token, typically with client authentication.
1201+
* Authorization URL: A URL by the client to obtain authorization from the resource owner via user-agent redirection. The user is redirected to this URL to authorize access. Note that this URL is currently not configurable per tenant.
1202+
* Token exchange URL: A URL by the client to exchange an authorization grant for an access token, typically with client authentication. Note that this URL is currently not configurable per tenant.
12031203
* Client ID: The authorization server issues the registered client a client identifier, which is a unique string representing the registration information provided by the client. The client identifier is not a secret; it is exposed to the resource owner and **must not** be used alone for client authentication.
12041204
* Client secret: The client secret is a secret generated by the authorization server. It should be a unique value known only to the authorization server.
12051205

articles/application-gateway/configuration-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -96,18 +96,18 @@ For this scenario, use NSGs on the Application Gateway subnet. Put the following
9696

9797
You can create a UDR to send 0.0.0.0/0 traffic directly to the Internet.
9898

99-
**Scenario 3**: UDR for Azure Kubernetes Service kubenet
99+
**Scenario 3**: UDR for Azure Kubernetes Service with kubenet
100100

101-
If you're using kubenet with Azure Kubernetes Service (AKS) and Application Gateway Ingress Controller (AGIC), you need to set up a route table to allow traffic sent to the pods to be routed to the correct node. This won't be necessary if you use Azure CNI.
101+
If you're using kubenet with Azure Kubernetes Service (AKS) and Application Gateway Ingress Controller (AGIC), you'll need a route table to allow traffic sent to the pods from Application Gateway to be routed to the correct node. This won't be necessary if you use Azure CNI.
102102

103-
To set up the route table to allow kubenet to work, use the following steps:
103+
To use the route table to allow kubenet to work, follow the steps below:
104104

105-
1. Create a Route Table resource in Azure.
106-
2. Once it's created, go to the **Routes** page.
107-
3. Add a new route:
105+
1. Go to the resource group created by AKS (the name of the resource group should begin with "MC_")
106+
2. Find the route table created by AKS in that resource group. The route table should be populated with the following information:
108107
- Address prefix should be the IP range of the pods you want to reach in AKS.
109-
- Next hop type should be **Virtual Appliance**.
110-
- Next hop address should be the IP address of the node hosting the pods within the IP range defined in the address prefix field.
108+
- Next hop type should be Virtual Appliance.
109+
- Next hop address should be the IP address of the node hosting the pods.
110+
3. Associate this route table to the Application Gateway subnet.
111111

112112
**v2 unsupported scenarios**
113113

articles/application-gateway/ssl-overview.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,10 @@ Application Gateway supports TLS termination at the gateway, after which traffic
2424

2525
To configure TLS termination, a TLS/SSL certificate is required to be added to the listener to enable the application gateway to derive a symmetric key as per TLS/SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. The TLS/SSL certificate needs to be in Personal Information Exchange (PFX) format. This file format allows you to export the private key that is required by the application gateway to perform the encryption and decryption of traffic.
2626

27+
> [!IMPORTANT]
28+
> Please note that the certificate on the listener requires the entire certificate chain to be uploaded.
29+
30+
2731
> [!NOTE]
2832
>
2933
> Application gateway does not provide any capability to create a new certificate or send a certificate request to a certification authority.

articles/azure-monitor/platform/manage-cost-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ Usage
308308

309309
### Data volume by computer
310310

311-
The `Usage` data type does not include information at the completer level. To see the **size** of ingested data per computer, use the `_BilledSize` [property](log-standard-properties.md#_billedsize), which provides the size in bytes:
311+
The `Usage` data type does not include information at the computer level. To see the **size** of ingested data per computer, use the `_BilledSize` [property](log-standard-properties.md#_billedsize), which provides the size in bytes:
312312

313313
```kusto
314314
union withsource = tt *
@@ -599,4 +599,4 @@ There are some additional Log Analytics limits, some of which depend on the Log
599599
- To configure an effective event collection policy, review [Azure Security Center filtering policy](../../security-center/security-center-enable-data-collection.md).
600600
- Change [performance counter configuration](data-sources-performance-counters.md).
601601
- To modify your event collection settings, review [event log configuration](data-sources-windows-events.md).
602-
- To modify your syslog collection settings, review [syslog configuration](data-sources-syslog.md).
602+
- To modify your syslog collection settings, review [syslog configuration](data-sources-syslog.md).

articles/backup/backup-azure-troubleshoot-vm-backup-fails-snapshot-timeout.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ After you register and schedule a VM for the Azure Backup service, Backup starts
4040

4141
**Cause 4: [VM-Agent configuration options are not set (for Linux VMs)](#vm-agent-configuration-options-are-not-set-for-linux-vms)**
4242

43+
**Cause 5: [Application control solution is blocking IaaSBcdrExtension.exe](#application-control-solution-is-blocking-iaasbcdrextensionexe)**
44+
4345
## UserErrorVmProvisioningStateFailed - The VM is in failed provisioning state
4446

4547
**Error code**: UserErrorVmProvisioningStateFailed<br>
@@ -195,9 +197,17 @@ If you require verbose logging for waagent, follow these steps:
195197

196198
### VM-Agent configuration options are not set (for Linux VMs)
197199

198-
A configuration file (/etc/waagent.conf) controls the actions of waagent. Configuration File Options **Extensions.Enable** and **Provisioning.Agent** should be set to **y** for Backup to work.
200+
A configuration file (/etc/waagent.conf) controls the actions of waagent. Configuration File Options **Extensions.Enable** should be set to **y** and **Provisioning.Agent** should be set to **auto** for Backup to work.
199201
For full list of VM-Agent Configuration File Options, see <https://github.com/Azure/WALinuxAgent#configuration-file-options>
200202

203+
### Application control solution is blocking IaaSBcdrExtension.exe
204+
205+
If you are running [AppLocker](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker) (or another application control solution), and the rules are publisher or path based, they may block the **IaaSBcdrExtension.exe** executable from running.
206+
207+
#### Solution
208+
209+
Exclude the `/var/lib` path or the **IaaSBcdrExtension.exe** executable from AppLocker (or other application control software.)
210+
201211
### <a name="the-snapshot-status-cannot-be-retrieved-or-a-snapshot-cannot-be-taken"></a>The snapshot status can't be retrieved, or a snapshot can't be taken
202212

203213
The VM backup relies on issuing a snapshot command to the underlying storage account. Backup can fail either because it has no access to the storage account, or because the execution of the snapshot task is delayed.

articles/backup/backup-azure-vms-troubleshoot.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,14 @@ Restart VSS writers that are in a bad state. From an elevated command prompt, ru
9393
* ```net stop serviceName```
9494
* ```net start serviceName```
9595

96+
Another procedure that can help is to run the following command from an elevated command-prompt (as an administrator).
97+
98+
```CMD
99+
REG ADD "HKLM\SOFTWARE\Microsoft\BcdrAgentPersistentKeys" /v SnapshotWithoutThreads /t REG_SZ /d True /f
100+
```
101+
102+
Adding this registry key will cause the threads to be not created for blob-snapshots, and prevent the time-out.
103+
96104
## ExtensionConfigParsingFailure - Failure in parsing the config for the backup extension
97105

98106
Error code: ExtensionConfigParsingFailure<br/>

articles/load-balancer/concepts.md

Lines changed: 5 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -61,35 +61,15 @@ Availability Zones | Standard load balancer supports additional abilities in reg
6161

6262
## <a name = "limitations"></a>Limitations
6363

64-
- A load balancer rule can't span two virtual networks. Front-ends and their related backend instances must be located in the same virtual network.
65-
- Web Worker Roles without a virtual network and other Microsoft platform services can be accessible from instances behind only an internal standard load balancer. Don't rely on this accessibility, as the respective service itself or the underlying platform can change without notice. If outbound connectivity is required when using a standard internal load balancer, [outbound connectivity](load-balancer-outbound-connections.md) must be configured.
66-
- Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
67-
68-
Load balancer doesn't close, respond, or otherwise interact with the payload of a UDP or TCP flow. Load balancer doesn't function as a proxy.
69-
70-
A successful connection to a front end must take place. This connection must be with the same port used in a load balancing or inbound NAT rule. To see a response from the frontend, one virtual machine in the backend pool must respond.
71-
72-
Failure to receive a response from the front end indicates no virtual machines could respond. Interact with a load balancer front end will fail without a virtual machine to respond.
73-
74-
This principle also applies to outbound connections where port masquerade SNAT is only supported for TCP and UDP. Any other IP protocols, including ICMP, fail.
75-
76-
Assign a public IP address to the resource to resolve this issue. For more information, see [Understanding SNAT and PAT](load-balancer-outbound-connections.md#snat).
64+
- A load balancer rule can't span two virtual networks. Frontends and their backend instances must be located in the same virtual network.
7765

78-
- Internal load balancers don't translate outbound originated connections to the front end of an internal load balancer because both are in private IP address space. Public load balancers provide [outbound connections](load-balancer-outbound-connections.md) from private IP addresses inside the virtual network to public IP addresses. For internal load balancers, this approach avoids potential SNAT port exhaustion inside a unique internal IP address space, where translation isn't required.
66+
- Web Worker Roles without a virtual network and other Microsoft platform services can be accessible from instances behind only a Standard internal Load balancer. Don't rely on this accessibility, as the respective service itself or the underlying platform can change without notice. If outbound connectivity is required when using a standard internal load balancer, [outbound connectivity](load-balancer-outbound-connections.md) must be configured.
7967

80-
Outbound flow from a backend VM to a frontend of an internal load balancer will fail. The failure occurs when the flow is mapped backed to itself. The two legs of the flow don't match and the flow will fail.
81-
82-
When the flow maps back to itself, the outbound flow appears to originate from the VM to the front end.
83-
84-
The flow succeeds if it didn't map back to the same VM in the back-end that created the flow.
85-
86-
The inbound and outbound parts of the flow don't match inside the VM. The TCP stack won't recognize these halves of the same flow as being part of the same flow. The source and destination don't match. The VM can respond when the flow maps to another VM in the backend. The halves for the flow match, and the connection can continue.
87-
88-
The symptom for this scenario is intermittent connection timeouts. Common workarounds include insertion of a proxy layer behind the internal load balancer and using Direct Server Return (DSR) style rules. For more information, see [Multiple Front ends for Azure Load Balancer](load-balancer-multivip-overview.md).
68+
- Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
8969

90-
You can combine an internal load balancer with any third-party proxy. Use of internal [Application Gateway](../application-gateway/application-gateway-introduction.md) for proxy scenarios with HTTP/HTTPS is also available. While you could use a public load balancer to mitigate this issue, the resulting scenario is prone to [SNAT exhaustion](load-balancer-outbound-connections.md#snat). Avoid this second approach unless carefully managed.
70+
- Internal load balancers don't translate outbound originated connections to the frontend of an internal load balancer because both are in private IP address space. Outbound flow from a backend VM to a frontend of an internal load balancer will fail. The failure occurs when the flow is mapped backed to itself. The two legs of the flow don't match and the flow will fail.
9171

92-
- In general, forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules. HA ports load-balancing rules can be used to forward existing IP fragments. For more information, see [High availability ports overview](load-balancer-ha-ports-overview.md).
72+
- Forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules. HA ports load-balancing rules can be used to forward existing IP fragments. For more information, see [High availability ports overview](load-balancer-ha-ports-overview.md).
9373

9474
## Next steps
9575

articles/machine-learning/how-to-enable-virtual-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -554,7 +554,7 @@ For information on using Azure Machine Learning with Azure Firewall, see [Use Az
554554
555555
For more information, see the [update()](https://docs.microsoft.com/python/api/azureml-core/azureml.core.workspace.workspace?view=azure-ml-py#update-friendly-name-none--description-none--tags-none--image-build-compute-none--enable-data-actions-none-) method reference.
556556
557-
1. If you are using Private Link for your Azure Machine Learning workspace, and put the Azure Container Registry for your workspace in a virtual network, you must also apply the following Azure Resource Manager template. This template enables your workspace to communicate with ACR over the Private Link.
557+
1. You must apply the following Azure Resource Manager template. This template enables your workspace to communicate with ACR.
558558
559559
```json
560560
{

articles/remote-rendering/how-tos/conversion/conversion-rest-api.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,7 @@ The status of an ongoing conversion started with one of the REST calls above can
116116

117117
Returns a JSON document with a "status" field that can have the following values:
118118

119+
- "Created"
119120
- "Running"
120121
- "Success"
121122
- "Failure"

0 commit comments

Comments
 (0)