Skip to content

Commit 800ebf8

Browse files
authored
Merge pull request #209574 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 9de94eb + a54ba83 commit 800ebf8

11 files changed

+55
-15
lines changed

articles/active-directory/enterprise-users/groups-dynamic-rule-member-of.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818

1919
# Group membership in a dynamic group (preview) in Azure Active Directory
2020

21-
This feature preview in Azure Active Directory (Azure AD), part of Microsoft Entra, enables admins to create dynamic groups that populate by adding members of other groups using the memberOf attribute. Apps that couldn't read group-based membership previously in Azure AD can now read the entire membership of these new memberOf groups. Not only can these groups be used for apps, they can also be used for licensing assignments. The following diagram illustrates how you could create Dynamic-Group-A with members of Security-Group-X and Security-Group-Y. Members of the groups inside of Security-Group-X and Security-Group-Y don't become members of Dynamic-Group-A.
21+
This feature preview in Azure Active Directory (Azure AD), part of Microsoft Entra, enables admins to create dynamic groups and administrative units that populate by adding members of other groups using the memberOf attribute. Apps that couldn't read group-based membership previously in Azure AD can now read the entire membership of these new memberOf groups. Not only can these groups be used for apps, they can also be used for licensing assignments. The following diagram illustrates how you could create Dynamic-Group-A with members of Security-Group-X and Security-Group-Y. Members of the groups inside of Security-Group-X and Security-Group-Y don't become members of Dynamic-Group-A.
2222

2323
:::image type="content" source="./media/groups-dynamic-rule-member-of/member-of-diagram.png" alt-text="Diagram showing how the memberOf attribute works.":::
2424

@@ -37,6 +37,7 @@ Only administrators in the Global Administrator, Intune Administrator, or User A
3737
- MemberOf can't be used with other rules. For example, a rule that states dynamic group A should contain members of group B and also should contain only users located in Redmond will fail.
3838
- Dynamic group rule builder and validate feature can't be used for memberOf at this time.
3939
- MemberOf can't be used with other operators. For example, you can't create a rule that states “Members Of group A can't be in Dynamic group B.”
40+
- The objects specified in the rule can't be administrative units.
4041

4142
## Getting started
4243

articles/active-directory/identity-protection/troubleshooting-identity-protection-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ sections:
7878
7979
**Confirm safe** (on a sign-in) – Informs Azure AD Identity Protection that the sign-in was performed by the identity owner and doesn't indicate a compromise.
8080
81-
- Upon receiving this feedback, we move the sign-in (not the user) risk state to **Confirmed safe** and the risk level to **-**.
81+
- Upon receiving this feedback, we move the sign-in (not the user) risk state to **Confirmed safe** and the risk level to **None**.
8282
8383
- In addition, we provide the information to our machine learning systems for future improvements in risk assessment.
8484

articles/iot-edge/version-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This table provides recent version history for IoT Edge package releases, and hi
3939

4040
| Release notes and assets | Type | Date | Highlights |
4141
| ------------------------ | ---- | ---- | ---------- |
42-
| [1.4](https://github.com/Azure/azure-iotedge/releases/tag/1.4.0) | Stable | August 2022 | Automatic image clean-up of unused Docker images <br> Ability to pass a [custom JSON payload to DPS on provisioning](../iot-dps/how-to-send-additional-data.md#iot-edge-support) <br> Ability to require all modules in a deployment be downloaded before restart <br> Use of the TCG TPM2 Software Stack which enables TPM hierarchy authorization values, specifying the TPM index at which to persist the DPS authentication key, and accommodating more [TPM configurations](http://github.com/Azure/iotedge/blob/897aed8c5573e8cad4b602e5a1298bdc64cd28b4/edgelet/contrib/config/linux/template.toml#L262-L288)
42+
| [1.4](https://github.com/Azure/azure-iotedge/releases/tag/1.4.0) | Long-term support (LTS) | August 2022 | Automatic image clean-up of unused Docker images <br> Ability to pass a [custom JSON payload to DPS on provisioning](../iot-dps/how-to-send-additional-data.md#iot-edge-support) <br> Ability to require all modules in a deployment be downloaded before restart <br> Use of the TCG TPM2 Software Stack which enables TPM hierarchy authorization values, specifying the TPM index at which to persist the DPS authentication key, and accommodating more [TPM configurations](http://github.com/Azure/iotedge/blob/897aed8c5573e8cad4b602e5a1298bdc64cd28b4/edgelet/contrib/config/linux/template.toml#L262-L288)
4343
| [1.3](https://github.com/Azure/azure-iotedge/releases/tag/1.3.0) | Stable | June 2022 | Support for Red Hat Enterprise Linux 8 on AMD and Intel 64-bit architectures.<br>Edge Hub now enforces that inbound/outbound communication uses minimum TLS version 1.2 by default<br>Updated runtime modules (edgeAgent, edgeHub) based on .NET 6
4444
| [1.2](https://github.com/Azure/azure-iotedge/releases/tag/1.2.0) | Stable | April 2021 | [IoT Edge devices behind gateways](how-to-connect-downstream-iot-edge-device.md?view=iotedge-2020-11&preserve-view=true)<br>[IoT Edge MQTT broker (preview)](how-to-publish-subscribe.md?view=iotedge-2020-11&preserve-view=true)<br>New IoT Edge packages introduced, with new installation and configuration steps. For more information, see [Update from 1.0 or 1.1 to latest release](how-to-update-iot-edge.md#special-case-update-from-10-or-11-to-latest-release).<br>Includes [Microsoft Defender for IoT micro-agent for Edge](../defender-for-iot/device-builders/overview.md).<br> Integration with Device Update. For more information, see [Update IoT Edge](how-to-update-iot-edge.md).
4545
| [1.1](https://github.com/Azure/azure-iotedge/releases/tag/1.1.0) | Long-term support (LTS) | February 2021 | [Long-term support plan and supported systems updates](support.md) |

articles/synapse-analytics/database-designer/concepts-lake-database.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ The new database designer gives you the possibility to create a data model for y
2626

2727
Lake databases use a data lake on the Azure Storage account to store the data of the database. The data can be stored in Parquet, Delta or CSV format and different settings can be used to optimize the storage. Every lake database uses a linked service to define the location of the root data folder. For every entity, separate folders are created by default within this database folder on the data lake. By default all tables within a lake database use the same format but the formats and location of the data can be changed per entity if that is requested.
2828

29+
> [!NOTE]
30+
> Publishing a lake database does not create any of the underlying structures or schemas needed to query the data in Spark or SQL. After publishing, load data into your lake database using [pipelines](../data-integration/data-integration-data-lake.md) to begin querying it.
31+
2932

3033
## Database compute
3134

articles/virtual-machines/workloads/sap/hana-vm-operations-netapp.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ When considering Azure NetApp Files for the SAP Netweaver and SAP HANA, be aware
3636
- Azure NetApp Files offers [export policy](../../../azure-netapp-files/azure-netapp-files-configure-export-policy.md): you can control the allowed clients, the access type (Read&Write, Read Only, etc.).
3737
- Azure NetApp Files feature isn't zone aware yet. Currently Azure NetApp Files feature isn't deployed in all Availability zones in an Azure region. Be aware of the potential latency implications in some Azure regions. Though to achieve proximity, the functionality of [Application Volume Groups](../../../azure-netapp-files/application-volume-group-introduction.md) is in public preview. See also later in this article
3838
- The User ID for <b>sid</b>adm and the Group ID for `sapsys` on the virtual machines must match the configuration in Azure NetApp Files.
39+
- Implement Linux OS parameters mentioned in SAP note [3024346](https://launchpad.support.sap.com/#/notes/3024346)
3940

4041
> [!IMPORTANT]
4142
> For SAP HANA workloads, low latency is critical. Work with your Microsoft representative to ensure that the virtual machines and the Azure NetApp Files volumes are deployed in close proximity.
@@ -115,6 +116,41 @@ Therefore you could consider to deploy similar throughput for the ANF volumes as
115116
116117
Documentation on how to deploy an SAP HANA scale-out configuration with standby node using NFS v4.1 volumes that are hosted in ANF is published in [SAP HANA scale-out with standby node on Azure VMs with Azure NetApp Files on SUSE Linux Enterprise Server](./sap-hana-scale-out-standby-netapp-files-suse.md).
117118

119+
## Linux Kernel Settings
120+
To successfully deploy SAP HANA on ANF Linux kernel settings need to be implemented according to SAP note [3024346](https://launchpad.support.sap.com/#/notes/3024346).
121+
122+
For systems using High Availability (HA) using pacemaker and Azure Load Balancer following settings need to be implemeneted in file /etc/sysctl.d/91-NetApp-HANA.conf
123+
124+
```
125+
net.core.rmem_max = 16777216
126+
net.core.wmem_max = 16777216
127+
net.ipv4.tcp_rmem = 4096 131072 16777216
128+
net.ipv4.tcp_wmem = 4096 16384 16777216
129+
net.core.netdev_max_backlog = 300000
130+
net.ipv4.tcp_slow_start_after_idle=0
131+
net.ipv4.tcp_no_metrics_save = 1
132+
net.ipv4.tcp_moderate_rcvbuf = 1
133+
net.ipv4.tcp_window_scaling = 1
134+
net.ipv4.tcp_timestamps = 0
135+
net.ipv4.tcp_sack = 1
136+
```
137+
138+
Systems running with no pacemaker and Azure Load Balancer should implemented these settings in /etc/sysctl.d/91-NetApp-HANA.conf
139+
140+
```
141+
net.core.rmem_max = 16777216
142+
net.core.wmem_max = 16777216
143+
net.ipv4.tcp_rmem = 4096 131072 16777216
144+
net.ipv4.tcp_wmem = 4096 16384 16777216
145+
net.core.netdev_max_backlog = 300000
146+
net.ipv4.tcp_slow_start_after_idle=0
147+
net.ipv4.tcp_no_metrics_save = 1
148+
net.ipv4.tcp_moderate_rcvbuf = 1
149+
net.ipv4.tcp_window_scaling = 1
150+
net.ipv4.tcp_timestamps = 1
151+
net.ipv4.tcp_sack = 1
152+
```
153+
118154
## Deployment through Azure NetApp Files application volume group for SAP HANA (AVG)
119155
To deploy ANF volumes with proximity to your VM, a new functionality called Azure NetApp Files application volume group for SAP HANA (AVG) got developed. **The functionality is currently in public preview**. There's a series of articles that document the functionality. Best is to start with the article [Understand Azure NetApp Files application volume group for SAP HANA](../../../azure-netapp-files/application-volume-group-introduction.md). As you read the articles, it becomes clear that the usage of AVGs involves the usage of Azure proximity placement groups as well. Proximity placement groups are used by the new functionality to tie into with the volumes that are getting created. To ensure that over the lifetime of the HANA system, the VM’s aren't going to be moved away from the ANF volumes, we recommend using a combination of Avset/ PPG for each of the zones you deploy into.
120156
The order of deployment would look like:

articles/virtual-machines/workloads/sap/sap-hana-high-availability-netapp-files-red-hat.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -388,10 +388,10 @@ For more information about the required ports for SAP HANA, read the chapter [Co
388388
10.32.0.5 hanadb2
389389
```
390390
391-
3. **[A]** Prepare the OS for running SAP HANA on Azure NetApp with NFS, as described in SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/netapp-hana.conf* for the NetApp configuration settings.
391+
3. **[A]** Prepare the OS for running SAP HANA on Azure NetApp with NFS, as described in SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/91-NetApp-HANA.conf* for the NetApp configuration settings.
392392
393393
<pre><code>
394-
vi /etc/sysctl.d/netapp-hana.conf
394+
vi /etc/sysctl.d/91-NetApp-HANA.conf
395395
# Add the following entries in the configuration file
396396
net.core.rmem_max = 16777216
397397
net.core.wmem_max = 16777216

articles/virtual-machines/workloads/sap/sap-hana-high-availability-netapp-files-suse.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -367,10 +367,10 @@ For more information about the required ports for SAP HANA, read the chapter [Co
367367
10.3.0.5 hanadb2
368368
```
369369

370-
2.**[A]** Prepare the OS for running SAP HANA on Azure NetApp with NFS, as described in SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/netapp-hana.conf* for the NetApp configuration settings.
370+
2.**[A]** Prepare the OS for running SAP HANA on Azure NetApp with NFS, as described in SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/91-NetApp-HANA.conf* for the NetApp configuration settings.
371371

372372
```
373-
vi /etc/sysctl.d/netapp-hana.conf
373+
vi /etc/sysctl.d/91-NetApp-HANA.conf
374374
# Add the following entries in the configuration file
375375
net.core.rmem_max = 16777216
376376
net.core.wmem_max = 16777216

articles/virtual-machines/workloads/sap/sap-hana-high-availability-scale-out-hsr-rhel.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -267,10 +267,10 @@ Configure and prepare your operating system by doing the following:
267267
10.23.1.207 hana-s2-db3-hsr
268268
```
269269
270-
1. **[A]** Prepare the operating system for running SAP HANA. For more information, see SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/netapp-hana.conf* for the Azure NetApp Files configuration settings.
270+
1. **[A]** Prepare the operating system for running SAP HANA. For more information, see SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/91-NetApp-HANA.conf* for the Azure NetApp Files configuration settings.
271271
272272
<pre><code>
273-
vi /etc/sysctl.d/netapp-hana.conf
273+
vi /etc/sysctl.d/91-NetApp-HANA.conf
274274
# Add the following entries in the configuration file
275275
net.core.rmem_max = 16777216
276276
net.core.wmem_max = 16777216

articles/virtual-machines/workloads/sap/sap-hana-high-availability-scale-out-hsr-suse.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -265,10 +265,10 @@ Configure and prepare your OS by doing the following steps:
265265
10.23.1.201 hana-s2-db3-hsr
266266
```
267267
268-
3. **[A]** Prepare the OS for running SAP HANA on NetApp Systems with NFS, as described in SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/netapp-hana.conf* for the NetApp configuration settings.
268+
3. **[A]** Prepare the OS for running SAP HANA on NetApp Systems with NFS, as described in SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/91-NetApp-HANA.conf* for the NetApp configuration settings.
269269
270270
<pre><code>
271-
vi /etc/sysctl.d/netapp-hana.conf
271+
vi /etc/sysctl.d/91-NetApp-HANA.conf
272272
# Add the following entries in the configuration file
273273
net.core.rmem_max = 16777216
274274
net.core.wmem_max = 16777216

articles/virtual-machines/workloads/sap/sap-hana-scale-out-standby-netapp-files-rhel.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -326,10 +326,10 @@ Configure and prepare your OS by doing the following steps:
326326
yum install nfs-utils
327327
</code></pre>
328328

329-
3. **[A]** Prepare the OS for running SAP HANA on Azure NetApp with NFS, as described in SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/netapp-hana.conf* for the NetApp configuration settings.
329+
3. **[A]** Prepare the OS for running SAP HANA on Azure NetApp with NFS, as described in SAP note [3024346 - Linux Kernel Settings for NetApp NFS](https://launchpad.support.sap.com/#/notes/3024346). Create configuration file */etc/sysctl.d/91-NetApp-HANA.conf* for the NetApp configuration settings.
330330

331331
<pre><code>
332-
vi /etc/sysctl.d/netapp-hana.conf
332+
vi /etc/sysctl.d/91-NetApp-HANA.conf
333333
# Add the following entries in the configuration file
334334
net.core.rmem_max = 16777216
335335
net.core.wmem_max = 16777216

0 commit comments

Comments
 (0)