Skip to content

Commit 7a50d12

Browse files
authored
Merge pull request #252136 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents f8a4f24 + 7da84ea commit 7a50d12

File tree

8 files changed

+72
-28
lines changed

8 files changed

+72
-28
lines changed

articles/azure-arc/servers/prepare-extended-security-updates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,12 +43,12 @@ To prepare for this new offer, you need to plan and prepare to onboard your mach
4343
We recommend you deploy your machines to Azure Arc in preparation for when the related Azure services deliver supported functionality to manage ESU. Once these machines are onboarded to Azure Arc-enabled servers, you'll have visibility into their ESU coverage and enroll through the Azure portal or using Azure Policy one month before Windows Server 2012 end of support. Billing for this service starts from October 2023, after Windows Server 2012 end of support.
4444

4545
> [!NOTE]
46-
> In order to purchase ESUs, you must have Software Assurance through Volume Licensing Programs such as an Enterprise Agreement (EA), Enterprise Agreement Subscription (EAS), Enrollment for Education Solutions (EES), or Server and Cloud Enrollment (SCE).
46+
> In order to purchase ESUs, you must have Software Assurance through Volume Licensing Programs such as an Enterprise Agreement (EA), Enterprise Agreement Subscription (EAS), Enrollment for Education Solutions (EES), or Server and Cloud Enrollment (SCE). Alternatively, if your Windows Server 2012/2012 R2 machines are licensed through SPLA or with a Server Subscription, Software Assurance is not required to purchase ESUs.
4747
>
4848
## Next steps
4949

5050
* Find out more about [planning for Windows Server and SQL Server end of support](https://www.microsoft.com/en-us/windows-server/extended-security-updates) and [getting Extended Security Updates](/windows-server/get-started/extended-security-updates-deploy).
5151

5252
* Learn about best practices and design patterns through the [Azure Arc landing zone accelerator for hybrid and multicloud](/azure/cloud-adoption-framework/scenarios/hybrid/arc-enabled-servers/eslz-identity-and-access-management).
5353
* Learn more about [Arc-enabled servers](overview.md) and how they work with Azure through the Azure Connected Machine agent.
54-
* Explore options for [onboarding your machines](plan-at-scale-deployment.md) to Azure Arc-enabled servers.
54+
* Explore options for [onboarding your machines](plan-at-scale-deployment.md) to Azure Arc-enabled servers.

articles/azure-monitor/agents/azure-monitor-agent-windows-client.md

Lines changed: 28 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -391,30 +391,46 @@ $requestURL = "https://management.azure.com$RespondId/providers/microsoft.insigh
391391
392392
393393
```
394+
## Verify successful setup
395+
Check the ‘Heartbeat’ table (and other tables you configured in the rules) in the Log Analytics workspace that you specified as a destination in the data collection rule(s).
396+
The `SourceComputerId`, `Computer`, `ComputerIP` columns should all reflect the client device information respectively, and the `Category` column should say 'Azure Monitor Agent'. See example below:
397+
398+
[![Diagram shows agent heartbeat logs on Azure portal.](media/azure-monitor-agent-windows-client/azure-monitor-agent-heartbeat-logs.png)](media/azure-monitor-agent-windows-client/azure-monitor-agent-heartbeat-logs.png)
394399

395400
### Using PowerShell for offboarding
396401
```PowerShell
397402
#This will remove the monitor object
398-
$TenantID = "xxxxxxxxx-xxxx-xxx" #Your Tenant ID
399-
$SubscriptionID = "xxxxxx-xxxx-xxxxx" #Your Subscription ID
400-
$ResourceGroup = "rg-yourResourseGroup" #Your resroucegroup
403+
$TenantID = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" #Your Tenant ID
401404
402405
Connect-AzAccount -Tenant $TenantID
403406
404-
#Select the subscription
405-
Select-AzSubscription -SubscriptionId $SubscriptionID
407+
#Create Auth Token
408+
$auth = Get-AzAccessToken
406409
407-
#Delete monitored object
410+
$AuthenticationHeader = @{
411+
"Content-Type" = "application/json"
412+
"Authorization" = "Bearer " + $auth.Token
413+
}
414+
415+
#Get Monitored Object
408416
$requestURL = "https://management.azure.com/providers/Microsoft.Insights/monitoredObjects/$TenantID`?api-version=2021-09-01-preview"
409-
#Invoke-RestMethod -Uri $requestURL -Headers $AuthenticationHeader -Method Delete
417+
$MonitoredObject = Invoke-RestMethod -Uri $requestURL -Headers $AuthenticationHeader -Method Get
410418
411-
```
419+
#Get Monitored Object Data Collection Rule Associations
420+
$requestURL = "https://management.azure.com$($MonitoredObject.id)/providers/microsoft.insights/datacollectionruleassociations?api-version=2021-09-01-preview"
421+
$MonitoredObjectAssociations = Invoke-RestMethod -Uri $requestURL -Headers $AuthenticationHeader -Method Get
412422
413-
## Verify successful setup
414-
Check the ‘Heartbeat’ table (and other tables you configured in the rules) in the Log Analytics workspace that you specified as a destination in the data collection rule(s).
415-
The `SourceComputerId`, `Computer`, `ComputerIP` columns should all reflect the client device information respectively, and the `Category` column should say 'Azure Monitor Agent'. See example below:
423+
#Disassociate from all Data Collection Rule
424+
foreach ($Association in $MonitoredObjectAssociations.value){
425+
$requestURL = "https://management.azure.com$($Association.id)?api-version=2022-06-01"
426+
Invoke-RestMethod -Uri $requestURL -Headers $AuthenticationHeader -Method Delete
427+
}
416428
417-
[![Diagram shows agent heartbeat logs on Azure portal.](media/azure-monitor-agent-windows-client/azure-monitor-agent-heartbeat-logs.png)](media/azure-monitor-agent-windows-client/azure-monitor-agent-heartbeat-logs.png)
429+
#Delete monitored object
430+
$requestURL = "https://management.azure.com/providers/Microsoft.Insights/monitoredObjects/$TenantID`?api-version=2021-09-01-preview"
431+
Invoke-AzRestMethod -Uri $requestURL -Method Delete
432+
433+
```
418434

419435

420436
## Manage the agent

articles/cloud-services/cloud-services-dotnet-install-dotnet.md

Lines changed: 35 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -88,18 +88,18 @@ You can use startup tasks to perform operations before a role starts. Installing
8888

8989
```cmd
9090
REM Set the value of netfx to install appropriate .NET Framework.
91-
REM ***** To install .NET 4.5.2 set the variable netfx to "NDP452" *****
92-
REM ***** To install .NET 4.6 set the variable netfx to "NDP46" *****
91+
REM ***** To install .NET 4.5.2 set the variable netfx to "NDP452" ***** https://go.microsoft.com/fwlink/?LinkId=397707
92+
REM ***** To install .NET 4.6 set the variable netfx to "NDP46" ***** https://go.microsoft.com/fwlink/?LinkId=528222
9393
REM ***** To install .NET 4.6.1 set the variable netfx to "NDP461" ***** https://go.microsoft.com/fwlink/?LinkId=671729
94-
REM ***** To install .NET 4.6.2 set the variable netfx to "NDP462" ***** https://dotnet.microsoft.com/download/dotnet-framework/net462
95-
REM ***** To install .NET 4.7 set the variable netfx to "NDP47" *****
94+
REM ***** To install .NET 4.6.2 set the variable netfx to "NDP462" ***** https://go.microsoft.com/fwlink/?linkid=780596
95+
REM ***** To install .NET 4.7 set the variable netfx to "NDP47" ***** https://go.microsoft.com/fwlink/?LinkId=825298
9696
REM ***** To install .NET 4.7.1 set the variable netfx to "NDP471" ***** https://go.microsoft.com/fwlink/?LinkId=852095
9797
REM ***** To install .NET 4.7.2 set the variable netfx to "NDP472" ***** https://go.microsoft.com/fwlink/?LinkId=863262
9898
REM ***** To install .NET 4.8 set the variable netfx to "NDP48" ***** https://dotnet.microsoft.com/download/thank-you/net48
9999
REM ***** To install .NET 4.8.1 set the variable netfx to "NDP481" ***** https://go.microsoft.com/fwlink/?linkid=2215256
100-
set netfx="NDP48"
100+
set netfx="NDP481"
101101

102-
REM ***** Set script start timestamp *****
102+
REM ***** Set script start timestamp ****
103103
set timehour=%time:~0,2%
104104
set timestamp=%date:~-4,4%%date:~-10,2%%date:~-7,2%-%timehour: =0%%time:~3,2%
105105
set "log=install.cmd started %timestamp%."
@@ -123,46 +123,55 @@ You can use startup tasks to perform operations before a role starts. Installing
123123

124124
set "netfxinstallfile=NDP452-KB2901954-Web.exe"
125125
set netfxregkey="0x5cbf5"
126+
set netfxUrl="https://go.microsoft.com/fwlink/?LinkId=397707"
126127
goto logtimestamp
127128

128129
:NDP46
129130
set "netfxinstallfile=NDP46-KB3045560-Web.exe"
130131
set netfxregkey="0x6004f"
132+
set netfxUrl="https://go.microsoft.com/fwlink/?LinkId=528222"
131133
goto logtimestamp
132134

133135
:NDP461
134136
set "netfxinstallfile=NDP461-KB3102438-Web.exe"
135137
set netfxregkey="0x6040e"
138+
set netfxUrl="https://go.microsoft.com/fwlink/?LinkId=671729"
136139
goto logtimestamp
137140

138141
:NDP462
139142
set "netfxinstallfile=NDP462-KB3151802-Web.exe"
140143
set netfxregkey="0x60632"
144+
set netfxUrl="https://go.microsoft.com/fwlink/?linkid=780596"
141145
goto logtimestamp
142146

143147
:NDP47
144148
set "netfxinstallfile=NDP47-KB3186500-Web.exe"
145149
set netfxregkey="0x707FE"
150+
set netfxUrl="https://go.microsoft.com/fwlink/?LinkId=825298"
146151
goto logtimestamp
147152

148153
:NDP471
149154
set "netfxinstallfile=NDP471-KB4033344-Web.exe"
150155
set netfxregkey="0x709fc"
156+
set netfxUrl="https://go.microsoft.com/fwlink/?LinkId=852095"
151157
goto logtimestamp
152158

153159
:NDP472
154160
set "netfxinstallfile=NDP472-KB4054531-Web.exe"
155161
set netfxregkey="0x70BF0"
162+
set netfxUrl="https://go.microsoft.com/fwlink/?LinkId=863262"
156163
goto logtimestamp
157164

158165
:NDP48
159166
set "netfxinstallfile=NDP48-Web.exe"
160167
set netfxregkey="0x80EA8"
168+
set netfxUrl="https://dotnet.microsoft.com/download/thank-you/net48"
161169
goto logtimestamp
162170

163171
:NDP481
164172
set "netfxinstallfile=NDP481-Web.exe"
165173
set netfxregkey="0x82348"
174+
set netfxUrl="https://go.microsoft.com/fwlink/?linkid=2215256"
166175
goto logtimestamp
167176

168177
:logtimestamp
@@ -182,7 +191,26 @@ You can use startup tasks to perform operations before a role starts. Installing
182191
FOR /F "usebackq skip=2 tokens=1,2*" %%A in (`reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full" /v Release 2^>nul`) do @set /A foundkey=%%C
183192
echo Minimum required key: %netfxregkeydecimal% -- found key: %foundkey% >> %startuptasklog%
184193
if %foundkey% GEQ %netfxregkeydecimal% goto installed
185-
194+
195+
REM ***** Downloading .NET Framework Setup *****
196+
set retryCount=0
197+
set maxRetry=3
198+
set delayInSeconds=60
199+
echo Downloading .NET Framework %netfx% setup with commandline: powershell -Command "Invoke-WebRequest %netfxUrl% -OutFile %~dp0%netfxinstallfile%" >> %startuptasklog%
200+
goto loop
201+
202+
:loop
203+
if %retryCount% NEQ 0 echo %date% %time% : Waiting %delayInSeconds% seconds to retry >> %startuptasklog%
204+
if %retryCount% NEQ 0 (powershell -Command "Start-Sleep -Seconds %delayInSeconds%")
205+
set /a retryCount=%retryCount%+1
206+
echo %date% %time% : Try downloading... [%retryCount% of %maxRetry%] >> %startuptasklog%
207+
powershell -Command "Invoke-WebRequest %netfxUrl% -OutFile %~dp0%netfxinstallfile%"
208+
if %ERRORLEVEL% NEQ 0 if %retryCount% NEQ %maxRetry% goto loop
209+
if %ERRORLEVEL% NEQ 0 if %retryCount%== %maxRetry% echo Taking existing file to install since error occurred while downloading .NET framework %netfx% setup from %netfxUrl%. >> %startuptasklog%
210+
if %ERRORLEVEL%== 0 echo %date% %time% : Successfully downloaded .NET framework %netfx% setup file. >> %startuptasklog%
211+
goto install
212+
213+
install:
186214
REM ***** Installing .NET *****
187215
echo Installing .NET with commandline: start /wait %~dp0%netfxinstallfile% /q /serialdownload /log %netfxinstallerlog% /chainingpackage "CloudService Startup Task" >> %startuptasklog%
188216
start /wait %~dp0%netfxinstallfile% /q /serialdownload /log %netfxinstallerlog% /chainingpackage "CloudService Startup Task" >> %startuptasklog% 2>>&1

articles/container-registry/container-registry-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 10/11/2022
1010

1111
# Connect privately to an Azure container registry using Azure Private Link
1212

13-
Limit access to a registry by assigning virtual network private IP addresses to the registry endpoints and using [Azure Private Link](../private-link/private-link-overview.md). Network traffic between the clients on the virtual network and the registry's private endpoints traverses the virtual network and a private link on the Microsoft backbone network, eliminating exposure from the public internet. Private Link also enables private registry access from on-premises through [Azure ExpressRoute](../expressroute/expressroute-introduction.MD) private peering or a [VPN gateway](../vpn-gateway/vpn-gateway-about-vpngateways.md).
13+
Limit access to a registry by assigning virtual network private IP addresses to the registry endpoints and using [Azure Private Link](../private-link/private-link-overview.md). Network traffic between the clients on the virtual network and the registry's private endpoints traverses the virtual network and a private link on the Microsoft backbone network, eliminating exposure from the public internet. Private Link also enables private registry access from on-premises through [Azure ExpressRoute](../expressroute/expressroute-introduction.md), private peering, or a [VPN gateway](../vpn-gateway/vpn-gateway-about-vpngateways.md).
1414

1515
You can [configure DNS settings](../private-link/private-endpoint-overview.md#dns-configuration) for the registry's private endpoints, so that the settings resolve to the registry's allocated private IP address. With DNS configuration, clients and services in the network can continue to access the registry at the registry's fully qualified domain name, such as *myregistry.azurecr.io*.
1616

articles/databox-online/azure-stack-edge-gpu-configure-tls-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Use the following steps to configure TLS 1.2 on your client.
2727
2. To set TLS 1.2 for the current PowerShell session, type:
2828

2929
```azurepowershell
30-
[System.Net.ServicePointManager]::SecurityProtocol = 'TLS12'
30+
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
3131
```
3232
3333
## Configure TLS 1.2 on client

articles/machine-learning/how-to-debug-pipeline-reuse-issues.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@ Azure Machine Learning pipeline has holistic logic to calculate whether a compon
3636

3737
Reuse criteria:
3838

39-
- Compenet defintion `is_determinstic` = true
40-
- Popeline runtime setting `FocceReRun` = false
39+
- Component definition `is_determinstic` = true
40+
- Pipeline runtime setting `ForceReRun` = false
4141
- Component code, environment definition, inputs and parameters, output settings, and run settings are all the same.
4242

4343
If a component meets the reuse criteria, the pipeline service skips execution for the component, copies original component's status, displays original component's output/logs/metrics for the reused component. In the pipeline UI, the reused component shows a little recycle icon to indicate this component has been reused.
@@ -100,4 +100,4 @@ You can compare the input data, parameters, output settings, run settings of the
100100

101101
### Step 6: Contact Microsoft for support
102102

103-
If you follow all above steps, and you still can't find the root cause of unexpected rerun, you can [file a support case ticket](https://ms.portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/~/overview) to Microsoft to get help.
103+
If you follow all above steps, and you still can't find the root cause of unexpected rerun, you can [file a support case ticket](https://ms.portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/~/overview) to Microsoft to get help.

articles/open-datasets/dataset-genomics-data-lake.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The Genomics Data Lake is hosted in the West US 2 and West Central US Azure regi
2828
| [OpenCravat](dataset-open-cravat.md) | OpenCravat: Open Custom Ranked Analysis of Variants Toolkit |
2929
| [ENCODE](dataset-encode.md) | ENCODE: Encyclopedia of DNA Elements |
3030
| [GATK Resource Bundle](dataset-gatk-resource-bundle.md) | GATK Resource bundle |
31-
| [TCGA Open Data](dataset-encode.md) | TCGA Open Data |
31+
| [TCGA Open Data](dataset-the-cancer-genome-atlas.md) | TCGA Open Data |
3232
| [Pan UK-Biobank](dataset-panancestry-uk-bio-bank.md) | Pan UK-Biobank |
3333

3434
## Next steps

articles/service-connector/quickstart-portal-spring-cloud-connection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You'll use Service Connector to create a new service connection in Azure Spring
5656
| **Subscription** | *my-subscription* | The subscription that contains your target service (the service you want to connect to). The default value is the subscription that contains the app deployed to Azure Spring Apps. |
5757
| **Connection name** | *storageblob_17d38* | The connection name that identifies the connection between your app and target service. Use the connection name provided by Service Connector or enter your own connection name. |
5858
| **Storage account** | *my-storage-account* | The target storage account you want to connect to. If you choose a different service type, select the corresponding target service instance. |
59-
| **Client type** | *SpringBoot* | The application stack that works with the target service you selected. Choose between SpringBoot and Java. |
59+
| **Client type** | *SpringBoot* | The application stack that works with the target service you selected. Besides SpringBoot and Java, other stacks are also supported. |
6060

6161
:::image type="content" source="./media/azure-spring-apps-quickstart/basics.png" alt-text="Screenshot of the Azure portal, filling out the Basics tab.":::
6262

0 commit comments

Comments
 (0)