Skip to content

Commit 815f226

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI195353-qualys-notice
2 parents fa15b32 + 7d708cc commit 815f226

12 files changed

+132
-86
lines changed

articles/azure-app-configuration/cli-samples.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ author: maud-lv
55
ms.author: malev
66
ms.service: azure-app-configuration
77
ms.topic: sample
8-
ms.date: 08/09/2022
8+
ms.date: 1/9/2024
99
ms.custom: devx-track-azurecli, devdivchpfy22
1010
---
1111

1212
# Azure CLI samples
1313

14-
The following table includes links to bash scripts for Azure App Configuration by using the [az appconfig](/cli/azure/appconfig) commands in the Azure CLI:
14+
The following table includes links to Azure CLI scripts for Azure App Configuration using the [az appconfig](/cli/azure/appconfig) commands in the Azure CLI:
1515

1616
| Script | Description |
1717
|-|-|

articles/azure-monitor/alerts/alerts-log-alert-query-samples.md

Lines changed: 20 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,24 @@ ms.reviewer: nolavime
1010

1111
# Sample log alert queries that include ADX and ARG
1212

13-
A log alert rule monitors a resource by using a Log Analytics query to evaluate resource logs at a set frequency. You can include data from Azure Data Explorer and Azure Resource Graph in your log alert rule queries.
13+
A log alert rule monitors a resource by using a Log Analytics query to evaluate logs at a set frequency. You can include data from Azure Data Explorer and Azure Resource Graph in your log alert rule queries.
1414

1515
This article provides examples of log alert rule queries that use Azure Data Explorer and Azure Resource Graph. For more information about creating a log alert rule, see [Create a log alert rule](./alerts-create-log-alert-rule.md).
1616

17-
## Query that checks virtual machine health
17+
## Queries that check virtual machine health
1818

19-
This query finds virtual machines that are marked as critical and that had a heartbeat more than 24 hours ago, but that haven't had a heartbeat in the last 2 minutes.
19+
This query finds virtual machines marked as critical that haven't had a heartbeat in the last 2 minutes.
20+
21+
```kusto
22+
arg("").Resources
23+
| where type == "microsoft.compute/virtualmachines"
24+
| summarize LastCall = max(case(isnull(TimeGenerated), make_datetime(1970, 1, 1), TimeGenerated)) by name, id
25+
| extend SystemDown = case(LastCall < ago(2m), 1, 0)
26+
| where SystemDown == 1
27+
```
28+
29+
30+
This query finds virtual machines marked as critical that had a heartbeat more than 24 hours ago, but that haven't had a heartbeat in the last 2 minutes.
2031

2132
```kusto
2233
{
@@ -38,15 +49,15 @@ This query finds virtual machines that are marked as critical and that had a hea
3849
## Query that filters virtual machines that need to be monitored
3950

4051
```kusto
41-
{
52+
{
4253
let RuleGroupTags = dynamic(['Linux']);
43-
Perf | where ObjectName == 'Processor' and CounterName == '% Idle Time' and (InstanceName == '_Total' or InstanceName == 'total')
54+
Perf | where ObjectName == 'Processor' and CounterName == '% Idle Time' and (InstanceName in ('_Total,'total'))
4455
| extend CpuUtilisation = (100 - CounterValue)   
4556
| join kind=inner hint.remote=left (arg("").Resources
46-
| where type =~ 'Microsoft.Compute/virtualMachines'
57+
| where type =~ 'Microsoft.Compute/virtualMachines'
4758
| project _ResourceId=tolower(id), tags) on _ResourceId
4859
| project-away _ResourceId1
49-
| where (isnull(tags.monitored) or tolower(tostring(tags.monitored)) != 'false') and (tostring(tags.monitorRuleGroup) in (RuleGroupTags) or isnull(tags.monitorRuleGroup) or tostring(tags.monitorRuleGroup) == '')
60+
| where (tostring(tags.monitorRuleGroup) in (RuleGroupTags))
5061
}
5162
```
5263

@@ -68,10 +79,10 @@ This query finds virtual machines that are marked as critical and that had a hea
6879
```kusto
6980
{
7081
arg("").resourcechanges
71-
| extend changeTime = todatetime(properties.changeAttributes.timestamp), targetResourceId = tostring(properties.targetResourceId),
82+
| extend changeTime = todatetime(properties.changeAttributes.timestamp),
7283
changeType = tostring(properties.changeType),targetResourceType = tostring(properties.targetResourceType),
7384
changedBy = tostring(properties.changeAttributes.changedBy)
74-
| where changeType == "Create"
85+
| where changeType == "Create" and changeTime <ago(1h)
7586
| project changeTime,targetResourceId,changedBy
7687
}
7788
```

articles/defender-for-cloud/TOC.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -599,9 +599,6 @@
599599
- name: How does Defender for Containers work?
600600
displayName: containers
601601
href: defender-for-containers-architecture.md
602-
- name: Vulnerability assessment for Azure powered by Qualys
603-
displayName: ACR, registry, images, qualys
604-
href: defender-for-containers-vulnerability-assessment-azure.md
605602
- name: Vulnerability assessments powered by Microsoft Defender Vulnerability Management
606603
items:
607604
- name: Vulnerability assessments for Azure
@@ -622,12 +619,15 @@
622619
href: transition-to-defender-vulnerability-management.md
623620
- name: Common questions
624621
href: common-questions-microsoft-defender-vulnerability-management.md
625-
- name: Vulnerability assessment for AWS powered by Trivy (deprecated)
626-
displayName: AWS, ECR, registry, images, qualys
627-
href: defender-for-containers-vulnerability-assessment-elastic.md
628622
- name: Kubernetes data plane hardening
629623
displayName: k8s, containers, aks
630624
href: kubernetes-workload-protections.md
625+
- name: Vulnerability assessment for Azure powered by Qualys (Deprecated)
626+
displayName: ACR, registry, images, qualys
627+
href: defender-for-containers-vulnerability-assessment-azure.md
628+
- name: Vulnerability assessment for AWS powered by Trivy (deprecated)
629+
displayName: AWS, ECR, registry, images, qualys
630+
href: defender-for-containers-vulnerability-assessment-elastic.md
631631
- name: Defender for Kubernetes (deprecated)
632632
displayName: clusters, k8s, aks
633633
href: defender-for-kubernetes-introduction.md

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,24 @@
11
---
2-
title: Vulnerability assessment for Azure powered by Qualys
2+
title: Vulnerability assessment for Azure powered by Qualys (Deprecated)
33
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
44
author: dcurwin
55
ms.author: dacurwin
6-
ms.date: 12/19/2023
6+
ms.date: 12/25/2023
77
ms.topic: how-to
88
ms.custom: ignite-2022, build-2023
99
---
1010

11-
# Vulnerability assessment for Azure powered by Qualys
11+
# Vulnerability assessment for Azure powered by Qualys (Deprecated)
12+
13+
> [!IMPORTANT]
14+
>
15+
> The Defender for Cloud Containers Vulnerability Assessment powered by Qualys is now on a retirement path completing on **March 1st, 2024**. If you are currently using container vulnerability assessment powered by Qualys, start planning your transition to [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md).
16+
>
17+
> - For more information about our decision to unify our vulnerability assessment offering with Microsoft Defender Vulnerability Management, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
18+
>
19+
> - For more information about migrating to our new container vulnerability assessment offering powered by Microsoft Defender Vulnerability Management, see [Transition from Qualys to Microsoft Defender Vulnerability Management](transition-to-defender-vulnerability-management.md).
20+
>
21+
> - For common questions about the transition to Microsoft Defender Vulnerability Management, see [Common questions about the Microsoft Defender Vulnerability Management solution](common-questions-microsoft-defender-vulnerability-management.md).
1222
1323
Vulnerability assessment for Azure, powered by Qualys, is an out-of-box solution that empowers security teams to easily discover and remediate vulnerabilities in Linux container images, with zero configuration for onboarding, and without deployment of any agents.
1424

articles/defender-for-cloud/transition-to-defender-vulnerability-management.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,16 @@ ms.date: 01/08/2024
99

1010
Microsoft Defender for Cloud is unifying all vulnerability assessment solutions to utilize the Microsoft Defender Vulnerability Management vulnerability scanner.
1111

12-
Microsoft Defender Vulnerability Management integrates across many cloud native use cases, such as containers ship and runtime scenarios.
12+
Microsoft Defender Vulnerability Management integrates across many cloud native use cases, such as containers ship and runtime scenarios. As part of this change, we're retiring our built-in vulnerability assessments offering powered by Qualys.
13+
14+
> [!IMPORTANT]
15+
> The Defender for Cloud Containers Vulnerability Assessment powered by Qualys is now on a retirement path completing on **March 1st, 2024**.
16+
>
17+
> Customers that onboarded at least one subscription to Defender for Containers prior to **November 15th, 2023** can continue to use Container Vulnerability Assessment powered by Qualys until **March 1st, 2024**.
18+
>
19+
> For more information about the change, see [Defender for Cloud unifies Vulnerability Assessment solution powered by Microsoft Defender Vulnerability Management](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
20+
21+
If you're currently using the built vulnerability assessment solution powered by Qualys, start planning for the upcoming retirement by following the steps on this page.
1322

1423
## Step 1: Verify that scanning is enabled
1524

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ If you're looking for the latest release notes, you can find them in the [What's
2626
| Planned change | Announcement date | Estimated date for change |
2727
|--|--|--|
2828
| [Defender for Servers built-in vulnerability assessment (Qualys) retirement path](#defender-for-servers-built-in-vulnerability-assessment-qualys-retirement-path) | January 9, 2024 | May 2024 |
29+
| [Retirement of the Defender for Cloud Containers Vulnerability Assessment powered by Qualys](#retirement-of-the-defender-for-cloud-containers-vulnerability-assessment-powered-by-qualys) | January 9, 2023 | March 2024 |
2930
| [New version of Defender Agent for Defender for Containers](#new-version-of-defender-agent-for-defender-for-containers) | January 4, 2024 | February 2024 |
3031
| [Upcoming change for the Defender for Cloud’s multicloud network requirements](#upcoming-change-for-the-defender-for-clouds-multicloud-network-requirements) | January 3, 2024 | May 2024 |
3132
| [Deprecation and severity changes to security alerts](#deprecation-and-severity-changes-to-security-alerts) | December 27, 2023 | January 2024 |
@@ -51,6 +52,20 @@ For more information about our decision to unify our vulnerability assessment of
5152

5253
You can also check out the [common questions about the transition to Microsoft Defender Vulnerability Management solution](faq-scanner-detection.yml).
5354

55+
## Retirement of the Defender for Cloud Containers Vulnerability Assessment powered by Qualys
56+
57+
**Announcement date: January 9, 2023**
58+
59+
**Estimated date for change: March 2024**
60+
61+
The Defender for Cloud Containers Vulnerability Assessment powered by Qualys is now on a retirement path completing on **March 1st, 2024**. If you are currently using container vulnerability assessment powered by Qualys, start planning your transition to [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md).
62+
63+
For more information about our decision to unify our vulnerability assessment offering with Microsoft Defender Vulnerability Management, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
64+
65+
For more information about transitioning to our new container vulnerability assessment offering powered by Microsoft Defender Vulnerability Management, see [Transition from Qualys to Microsoft Defender Vulnerability Management](transition-to-defender-vulnerability-management.md).
66+
67+
For common questions about the transition to Microsoft Defender Vulnerability Management, see [Common questions about the Microsoft Defender Vulnerability Management solution](common-questions-microsoft-defender-vulnerability-management.md).
68+
5469
## New version of Defender Agent for Defender for Containers
5570

5671
**Announcement date: January 4, 2024**

articles/dns/dns-private-resolver-get-started-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Next, add a virtual network to the resource group that you created, and configur
6565
5. Select the **default** subnet.
6666
6. Enter the following values on the **Edit subnet** page:
6767
- Name: snet-inbound
68-
- IPv4 address range: 10.0.0.0.16
68+
- IPv4 address range: 10.0.0.0/16
6969
- Starting address: 10.0.0.0
7070
- Size: /28 (16 IP addresses)
7171
- Select **Save**

articles/hdinsight/hadoop/hdinsight-use-mapreduce.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to run Apache MapReduce jobs on Apache Hadoop in HDInsigh
44
ms.service: hdinsight
55
ms.topic: how-to
66
ms.custom: hdinsightactive
7-
ms.date: 12/21/2022
7+
ms.date: 01/04/2024
88
---
99

1010
# Use MapReduce in Apache Hadoop on HDInsight
@@ -13,7 +13,7 @@ Learn how to run MapReduce jobs on HDInsight clusters.
1313

1414
## Example data
1515

16-
HDInsight provides various example data sets, which are stored in the `/example/data` and `/HdiSamples` directory. These directories are in the default storage for your cluster. In this document, we use the `/example/data/gutenberg/davinci.txt` file. This file contains the notebooks of Leonardo da Vinci.
16+
HDInsight provides various example data sets, which are stored in the `/example/data` and `/HdiSamples` directory. These directories are in the default storage for your cluster. In this document, we use the `/example/data/gutenberg/davinci.txt` file. This file contains the notebooks of `Leonardo da Vinci`.
1717

1818
## Example MapReduce
1919

@@ -101,8 +101,8 @@ HDInsight can run HiveQL jobs by using various methods. Use the following table
101101

102102
| **Use this**... | **...to do this** | ...from this **client operating system** |
103103
|:--- |:--- |:--- |:--- |
104-
| [SSH](apache-hadoop-use-mapreduce-ssh.md) |Use the Hadoop command through **SSH** |Linux, Unix, Mac OS X, or Windows |
105-
| [Curl](apache-hadoop-use-mapreduce-curl.md) |Submit the job remotely by using **REST** |Linux, Unix, Mac OS X, or Windows |
104+
| [SSH](apache-hadoop-use-mapreduce-ssh.md) |Use the Hadoop command through **SSH** |Linux, Unix, `MacOS X`, or Windows |
105+
| [Curl](apache-hadoop-use-mapreduce-curl.md) |Submit the job remotely by using **REST** |Linux, Unix, `MacOS X`, or Windows |
106106
| [Windows PowerShell](apache-hadoop-use-mapreduce-powershell.md) |Submit the job remotely by using **Windows PowerShell** |Windows |
107107

108108
## Next steps

articles/hdinsight/hdinsight-apps-install-custom-applications.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to install HDInsight applications for Apache Hadoop clust
44
ms.service: hdinsight
55
ms.topic: how-to
66
ms.custom: hdinsightactive
7-
ms.date: 12/21/2022
7+
ms.date: 01/04/2024
88
---
99

1010
# Install custom Apache Hadoop applications on Azure HDInsight
@@ -77,9 +77,9 @@ For **Hue**, you can use the following steps:
7777

7878
### Azure CLI
7979

80-
Replace `CLUSTERNAME`, and `RESOURCEGROUP` with the relevant values and then enter the commands below:
80+
Replace `CLUSTERNAME`, and `RESOURCEGROUP` with the relevant values and then enter the following commands:
8181

82-
* To lists all of the applications for the HDInsight cluster.
82+
* To list all of the applications for the HDInsight cluster.
8383

8484
```azurecli
8585
az hdinsight application list --cluster-name CLUSTERNAME --resource-group RESOURCEGROUP
@@ -125,7 +125,7 @@ If an application installation failed, you can see the error messages and debug
125125
126126
### Azure CLI
127127
128-
Replace `NAME`, `CLUSTERNAME`, and `RESOURCEGROUP` with the relevant values and then enter the command below:
128+
Replace `NAME`, `CLUSTERNAME`, and `RESOURCEGROUP` with the relevant values and then enter the following command:
129129
130130
```azurecli
131131
az hdinsight application delete --name NAME --cluster-name CLUSTERNAME --resource-group RESOURCEGROUP

articles/hdinsight/hdinsight-log-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Determine the types, sizes, and retention policies for HDInsight ac
44
ms.service: hdinsight
55
ms.topic: how-to
66
ms.custom: hdinsightactive
7-
ms.date: 12/07/2022
7+
ms.date: 01/04/2024
88
---
99

1010
# Manage logs for an HDInsight cluster
@@ -59,7 +59,7 @@ It's important to understand the workload types running on your HDInsight cluste
5959

6060
* Consider how you can collect logs from the cluster, or from more than one cluster, and collate them for purposes such as auditing, monitoring, planning, and alerting. You might use a custom solution to access and download the log files regularly, and combine and analyze them to provide a dashboard display. You can also add other capabilities for alerting for security or failure detection. You can build these utilities using PowerShell, the HDInsight SDKs, or code that accesses the Azure classic deployment model.
6161

62-
* Consider whether a monitoring solution or service would be a useful benefit. The Microsoft System Center provides an [HDInsight management pack](https://systemcenter.wiki/?Get_ManagementPackBundle=Microsoft.HDInsight.mpb&FileMD5=10C7D975C6096FFAA22C84626D211259). You can also use third-party tools such as Apache Chukwa and Ganglia to collect and centralize logs. Many companies offer services to monitor Hadoop-based big data solutions, for example: Centerity, Compuware APM, Sematext SPM, and Zettaset Orchestrator.
62+
* Consider whether a monitoring solution or service would be a useful benefit. The Microsoft System Center provides an [HDInsight management pack](https://systemcenter.wiki/?Get_ManagementPackBundle=Microsoft.HDInsight.mpb&FileMD5=10C7D975C6096FFAA22C84626D211259). You can also use third-party tools such as Apache Chukwa and Ganglia to collect and centralize logs. Many companies offer services to monitor Hadoop-based big data solutions, for example: `Centerity`, Compuware APM, Sematext SPM, and Zettaset Orchestrator.
6363

6464
## Step 2: Manage cluster service versions and view logs
6565

@@ -119,7 +119,7 @@ YARN aggregates logs across all containers on a worker node and stores those log
119119
/app-logs/<user>/logs/<applicationId>
120120
```
121121

122-
The aggregated logs aren't directly readable, as they're written in a TFile binary format indexed by container. Use the YARN ResourceManager logs or CLI tools to view these logs as plain text for applications or containers of interest.
122+
The aggregated logs aren't directly readable, as they're written in a `TFile` binary format indexed by container. Use the YARN `ResourceManager` logs or CLI tools to view these logs as plain text for applications or containers of interest.
123123

124124
#### YARN CLI tools
125125

0 commit comments

Comments
 (0)