Skip to content

Commit 6421a3f

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ratelimitingprovider
2 parents 6302e3a + c48188c commit 6421a3f

29 files changed

+801
-751
lines changed

articles/app-service/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,6 @@
2525
href: quickstart-python.md
2626
- name: Deploy WordPress
2727
href: quickstart-wordpress.md
28-
- name: Deploy Go (experimental)
29-
href: quickstart-golang.md
3028
- name: Deploy a custom container
3129
href: quickstart-custom-container.md
3230
- name: Use ARM template

articles/azure-arc/servers/troubleshoot-agent-onboard.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -104,16 +104,13 @@ The following table lists some of the known errors and suggestions on how to tro
104104
|--------|------|---------------|---------|
105105
|Failed to acquire authorization token device flow |`Error occurred while sending request for Device Authorization Code: Post https://login.windows.net/fb84ce97-b875-4d12-b031-ef5e7edf9c8e/oauth2/devicecode?api-version=1.0: dial tcp 40.126.9.7:443: connect: network is unreachable.` |Can't reach `login.windows.net` endpoint | Run [azcmagent check](azcmagent-check.md) to see if a firewall is blocking access to Microsoft Entra ID. |
106106
|Failed to acquire authorization token device flow |`Error occurred while sending request for Device Authorization Code: Post https://login.windows.net/fb84ce97-b875-4d12-b031-ef5e7edf9c8e/oauth2/devicecode?api-version=1.0: dial tcp 40.126.9.7:443: connect: network is Forbidden`. |Proxy or firewall is blocking access to `login.windows.net` endpoint. | Run [azcmagent check](azcmagent-check.md) to see if a firewall is blocking access to Microsoft Entra ID.|
107-
|Failed to acquire authorization token device flow |`Error occurred while sending request for Device Authorization Code: Post https://login.windows.net/fb84ce97-b875-4d12-b031-ef5e7edf9c8e/oauth2/devicecode?api-version=1.0: dial tcp lookup login.windows.net: no such host`. | Group Policy Object *Computer Configuration\ Administrative Templates\ System\ User Profiles\ Delete user profiles older than a specified number of days on system restart* is enabled. | Verify the GPO is enabled and targeting the affected machine. See footnote <sup>[1](#footnote1)</sup> for further details. |
108107
|Failed to acquire authorization token from SPN |`Failed to execute the refresh request. Error = 'Post https://login.windows.net/fb84ce97-b875-4d12-b031-ef5e7edf9c8e/oauth2/token?api-version=1.0: Forbidden'` |Proxy or firewall is blocking access to `login.windows.net` endpoint. |Run [azcmagent check](azcmagent-check.md) to see if a firewall is blocking access to Microsoft Entra ID. |
109108
|Failed to acquire authorization token from SPN |`Invalid client secret is provided` |Wrong or invalid service principal secret. |Verify the service principal secret. |
110109
| Failed to acquire authorization token from SPN |`Application with identifier 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx' wasn't found in the directory 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant` |Incorrect service principal and/or Tenant ID. |Verify the service principal and/or the tenant ID.|
111110
|Get ARM Resource Response |`The client '[email protected]' with object id 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx' does not have authorization to perform action 'Microsoft.HybridCompute/machines/read' over scope '/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourcegroups/myResourceGroup/providers/Microsoft.HybridCompute/machines/MSJC01' or the scope is invalid. If access was recently granted, please refresh your credentials."}}" Status Code=403` |Wrong credentials and/or permissions |Verify you or the service principal is a member of the **Azure Connected Machine Onboarding** role. |
112111
|Failed to AzcmagentConnect ARM resource |`The subscription isn't registered to use namespace 'Microsoft.HybridCompute'` |Azure resource providers aren't registered. |Register the [resource providers](prerequisites.md#azure-resource-providers). |
113112
|Failed to AzcmagentConnect ARM resource |`Get https://management.azure.com/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourcegroups/myResourceGroup/providers/Microsoft.HybridCompute/machines/MSJC01?api-version=2019-03-18-preview: Forbidden` |Proxy server or firewall is blocking access to `management.azure.com` endpoint. | Run [azcmagent check](azcmagent-check.md) to see if a firewall is blocking access to Azure Resource Manager. |
114113

115-
<a name="footnote1"></a><sup>1</sup>If this GPO is enabled and applies to machines with the Connected Machine agent, it deletes the user profile associated with the built-in account specified for the *himds* service. As a result, it also deletes the authentication certificate used to communicate with the service that is cached in the local certificate store for 30 days. Before the 30-day limit, an attempt is made to renew the certificate. To resolve this issue, follow the steps to [disconnect the agent](azcmagent-disconnect.md) and then re-register it with the service running `azcmagent connect`.
116-
117114
## Next steps
118115

119116
If you don't see your problem here or you can't resolve your issue, try one of the following channels for more support:

articles/azure-netapp-files/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -447,6 +447,8 @@
447447
href: azacsnap-cmd-ref-runbefore-runafter.md
448448
- name: Resources
449449
items:
450+
- name: Azure NetApp Files tools
451+
href: tools-reference.md
450452
- name: Pricing
451453
href: https://azure.microsoft.com/pricing/details/netapp/
452454
- name: Regional availability

articles/azure-netapp-files/azure-government.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ All [Azure NetApp Files features](whats-new.md) available on Azure public cloud
3434
| Azure NetApp Files backup | Public preview | No |
3535
| Azure NetApp Files large volumes | Public preview | No |
3636
| Edit network features for existing volumes | Public preview | No |
37-
| Standard storage with cool access in Azure NetApp Files | Public preview | No |
37+
| Standard storage with cool access in Azure NetApp Files | Public preview | Public preview [(in select regions)](cool-access-introduction.md#supported-regions) |
3838

3939
## Portal access
4040

articles/azure-netapp-files/cool-access-introduction.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@ Standard storage with cool access is supported for the following regions:
5757
* Switzerland North
5858
* Switzerland West
5959
* UAE North
60+
* US Gov Arizona
6061
* West US
6162

6263
## Effects of cool access on data
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: Azure NetApp Files tools
3+
description: Learn about the tools available to you to maximize your experience and savings with Azure NetApp Files.
4+
services: azure-netapp-files
5+
documentationcenter: ''
6+
author: b-ahibbard
7+
manager: ''
8+
editor: ''
9+
10+
ms.assetid:
11+
ms.service: azure-netapp-files
12+
ms.workload: storage
13+
ms.tgt_pltfrm: na
14+
ms.topic: conceptual
15+
ms.date: 01/12/2023
16+
ms.author: anfdocs
17+
---
18+
19+
# Azure NetApp Files tools
20+
21+
Azure NetApp Files offers [multiple tools](https://azure.github.io/azure-netapp-files/) to estimate costs, understand features and availability, and monitor your Azure NetApp Files deployment.
22+
23+
* [**Azure NetApp Files Performance Calculator**](https://aka.ms/anfcalc)
24+
25+
The Azure NetApp Files Performance Calculator enables you to easily calculate the performance and estimated cost of a volume based on the size and service level or performance requirements. It also helps you estimate backup and replication costs.
26+
27+
* [**Azure NetApp Files datastore for Azure VMware Solution TCO Estimator**](https://aka.ms/anfavscalc)
28+
29+
This tool assists you with sizing an Azure VMware Solution. In the Estimator, provide the details of your current VMware environment to learn how much you can save by using Azure NetApp Files datastores.
30+
31+
* [**SAP on Azure NetApp Files Sizing Estimator**](https://aka.ms/anfsapcalc)
32+
33+
This comprehensive tool estimates the infrastructure costs of an SAP HANA on Azure NetApp Files landscape. The estimate includes primary storage, backup, and replication costs.
34+
35+
* [**Azure NetApp Files Standard storage with cool access cost savings estimator**](https://aka.ms/anfcoolaccesscalc)
36+
37+
Standard storage with cool access enables you to transparently move infrequently accessed data to less expensive storage. This cost savings estimator helps you understand how much money you can save by enabling Standard storage with cool access.
38+
39+
* [**Azure NetApp Files Region and Feature Map**](https://aka.ms/anfmap)
40+
41+
Use this interactive map to understand which regions support Azure NetApp Files and its numerous features.
42+
43+
* [**Azure NetApp Files on YouTube**](https://www.youtube.com/@azurenetappfiles)
44+
45+
Learn about the latest features in Azure NetApp Files and watch detailed how-to videos on the Azure NetApp Files YouTube channel.
46+
47+
* [**ANFCapacityManager**](https://github.com/ANFTechTeam/ANFCapacityManager)
48+
49+
ANFCapacityManager is an Azure logic application that automatically creates metric alert rules in Azure Monitor to notify you when volumes are approaching their capacity. Optionally, it can increase the volumes' sizes automatically to keep your applications online.
50+
51+
* [**ANFHealthCheck**](https://github.com/seanluce/ANFHealthCheck)
52+
53+
ANFHeathCheck is a PowerShell runbook that generates artful HTML reports of your entire Azure NetApp Files landscape. Optionally, it can automatically reduce over-sized volumes and capacity pools to reduce your TCO.
Lines changed: 22 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Authentication concepts in Microsoft Azure Data Manager for Energy
3-
description: This article describes the various concepts regarding the authentication in Azure Data Manager for Energy.
3+
description: This article describes various concepts of authentication in Azure Data Manager for Energy.
44
author: shikhagarg1
55
ms.author: shikhagarg
66
ms.service: energy-data-services
@@ -9,21 +9,26 @@ ms.date: 02/10/2023
99
ms.custom: template-concept
1010
---
1111

12-
# Authentication concepts in Azure Data Manager for Energy
13-
Authentication confirms the identity of the users. The access flows can be user triggered, system triggered, or system API communication. In this article, you learn about service principals and authorization token.
12+
# Authentication concepts in Azure Data Manager for Energy
13+
14+
Authentication confirms the identity of users. The access flows can be user triggered, system triggered, or system API communication. In this article, you learn about service principals and authorization tokens.
1415

1516
## Service principals
16-
In the Azure Data Manager for Energy instance,
17-
1. No Service Principals are created.
18-
2. The app-id is used for API access. The same app-id is used to provision ADME instance.
19-
3. The app-id doesn't have access to infrastructure resources.
20-
4. The app-id also gets added as OWNER to all OSDU groups by default.
21-
5. For service-to-service (S2S) communication, ADME uses MSI (Microsoft Service Identity).
22-
23-
In the OSDU instance,
24-
1. Terraform scripts create two Service Principals:
25-
1. The first Service Principal is used for API access. It can also manage infrastructure resources.
26-
2. The second Service Principal is used for service-to-service (S2S) communications.
27-
28-
## Generate authorization token
29-
You can generate the authorization token using the steps outlined in [Generate auth token](how-to-generate-auth-token.md).
17+
18+
In an Azure Data Manager for Energy instance:
19+
20+
- No service principals are created.
21+
- The app ID is used for API access. The same app ID is used to provision an Azure Data Manager for Energy instance.
22+
- The app ID doesn't have access to infrastructure resources.
23+
- The app ID also gets added as OWNER to all OSDU groups by default.
24+
- For service-to-service communication, Azure Data Manager for Energy uses Managed Service Identity.
25+
26+
In an OSDU instance:
27+
28+
- Terraform scripts create two service principals:
29+
- The first service principal is used for API access. It can also manage infrastructure resources.
30+
- The second service principal is used for service-to-service communications.
31+
32+
## Generate an authorization token
33+
34+
To generate the authorization token, follow the steps in [Generate auth token](how-to-generate-auth-token.md).

0 commit comments

Comments
 (0)