You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/migrate-from-classic-vnet.md
+16-15Lines changed: 16 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ In the *migration* stage, the underlying virtual disks for the domain controller
37
37
38
38
When you move an Azure AD DS managed domain using this migration process, you avoid the need to rejoin machines to the managed domain or delete the Azure AD DS instance and create one from scratch. VMs continue to be joined to the Azure AD DS managed domain at the end of the migration process.
39
39
40
-
AFter migration, Azure AD DS provides many features that are only available for domains using in Resource Manager virtual networks, such as:
40
+
After migration, Azure AD DS provides many features that are only available for domains using Resource Manager virtual networks, such as:
41
41
42
42
* Fine-grained password policy support.
43
43
* AD account lockout protection.
@@ -52,7 +52,8 @@ Azure AD DS managed domains that use a Resource Manager virtual network help you
52
52
53
53
Some common scenarios for migrating an Azure AD DS managed domain include the following examples.
54
54
55
-
[!NOTE] Do not convert the Classic virtual network until you have confirmed a successful migration. Converting the virtual network removes the option to roll back or restore the Azure AD DS managed domain if there any problems during the migration and verification stages.
55
+
> [!NOTE]
56
+
> Do not convert the Classic virtual network until you have confirmed a successful migration. Converting the virtual network removes the option to roll back or restore the Azure AD DS managed domain if there are any problems during the migration and verification stages.
56
57
57
58
### Migrate Azure AD DS to an existing Resource Manager virtual network (recommended)
58
59
@@ -130,7 +131,7 @@ If you suspect that some accounts may be locked out after migration, the final m
130
131
131
132
### Roll back and restore
132
133
133
-
If the migration isn't successful, there's process to roll back or restore an Azure AD DS managed domain. Rollback is a self-service option to immediately return the state of the managed domain to before the migration attempt. Azure support engineers can also restore a managed domain from backup as a last resort. For more information, see [how to roll back or restore from a failed migration](#roll-back-and-restore).
134
+
If the migration isn't successful, there's process to roll back or restore an Azure AD DS managed domain. Rollback is a self-service option to immediately return the state of the managed domain to before the migration attempt. Azure support engineers can also restore a managed domain from backup as a last resort. For more information, see [how to roll back or restore from a failed migration](#roll-back-and-restore-from-migration).
134
135
135
136
### Restrictions on available virtual networks
136
137
@@ -150,9 +151,9 @@ The migration to the Resource Manager deployment model and virtual network is sp
150
151
| Step | Performed through | Estimated time | Downtime | Roll back/Restore? |
|[Step 1 - Update and locate the new virtual network](#update-and-verify-virtual-network-settings)| Azure portal | 15 minutes | No downtime required | N/A |
153
-
|[Step 2 - Prepare the Azure AD DS managed domain for migration](#prepare-the-managed-domain-for-migration)| PowerShell | 15 – 30 minutes on average | Downtime of Azure AD DS starts after this command is completed. | Roll back and restore available |
154
-
|[Step 3 - Move the Azure AD DS managed domain to an existing virtual network](#migrate-the-managed-domain)| PowerShell | 1 – 3 hours on average | One domain controller is available once this command is completed, downtime ends. |Restore only|
155
-
|[Step 4 - Test and wait for the replica domain controller](#test-and-verify-connectivity-after-the-migration)| PowerShell and Azure portal | 1 hour or more, depending on the number of tests | Both domain controllers are available and should function normally. |Restore only|
154
+
|[Step 2 - Prepare the Azure AD DS managed domain for migration](#prepare-the-managed-domain-for-migration)| PowerShell | 15 – 30 minutes on average | Downtime of Azure AD DS starts after this command is completed. | Roll back and restore available.|
155
+
|[Step 3 - Move the Azure AD DS managed domain to an existing virtual network](#migrate-the-managed-domain)| PowerShell | 1 – 3 hours on average | One domain controller is available once this command is completed, downtime ends. |On failure, both rollback (self service) and restore are available.|
156
+
|[Step 4 - Test and wait for the replica domain controller](#test-and-verify-connectivity-after-the-migration)| PowerShell and Azure portal | 1 hour or more, depending on the number of tests | Both domain controllers are available and should function normally. |N/A. Once the first VM is successfully migrated, there's no option for rollback or restore.|
156
157
|[Step 5 - Optional configuration steps](#optional-post-migration-configuration-steps)| Azure portal and VMs | N/A | No downtime required | N/A |
157
158
158
159
> [!IMPORTANT]
@@ -168,7 +169,7 @@ Before you begin the migration, complete the following initial checks and update
168
169
169
170
1. Create, or choose an existing, Resource Manager virtual network.
170
171
171
-
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables and network security groups.
172
+
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables (although it's not recommended to use route tables) and network security groups.
172
173
173
174
To view the ports required, see [Network security groups and required ports][network-ports]. To minimize network communication problems, it's recommended to wait and apply a network security group or route table to the Resource Manager virtual network after the migration successfully completed.
174
175
@@ -178,15 +179,15 @@ Before you begin the migration, complete the following initial checks and update
178
179
1. Optionally, if you plan to move other resources to the Resource Manager deployment model and virtual network, confirm that those resources can be migrated. For more information, see [Platform-supported migration of IaaS resources from Classic to Resource Manager][migrate-iaas].
179
180
180
181
> [!NOTE]
181
-
> Don't convert the Classic virtual network to a Resource Manager virtual network. If you, there's no option to roll back or restore the Azure AD DS managed domain.
182
+
> Don't convert the Classic virtual network to a Resource Manager virtual network. If you do, there's no option to roll back or restore the Azure AD DS managed domain.
182
183
183
184
## Prepare the managed domain for migration
184
185
185
186
Azure PowerShell is used to prepare the Azure AD DS managed domain for migration. These steps include taking a backup, pausing synchronization, and deleting the cloud service that hosts Azure AD DS. When this step completes, Azure AD DS is taken offline for a period of time. If the preparation step fails, you can [roll back to the previous state](#roll-back).
186
187
187
188
To prepare the Azure AD DS managed domain for migration, complete the following steps:
188
189
189
-
1. Install the `Migrate-Aaads`module from the [PowerShell Gallery][powershell-script]. This PowerShell migration script is a digitally signed by the Azure AD engineering team.
190
+
1. Install the `Migrate-Aaads`script from the [PowerShell Gallery][powershell-script]. This PowerShell migration script is a digitally signed by the Azure AD engineering team.
190
191
191
192
```powershell
192
193
Install-Script -Name Migrate-Aadds
@@ -243,7 +244,7 @@ The migration process continues to run, even if you close out the PowerShell scr
243
244
244
245
When the migration successfully completes, you can view your first domain controller's IP address in the Azure portal or through Azure PowerShell. A time estimate on the second domain controller being available is also shown.
245
246
246
-
As this stage, you can optionally move other existing resources from the Classic deployment model and virtual network. Or, you can keep the resources on the Classic deployment model and peer the virtual networks to each other after the Azure AD DS migration is complete.
247
+
At this stage, you can optionally move other existing resources from the Classic deployment model and virtual network. Or, you can keep the resources on the Classic deployment model and peer the virtual networks to each other after the Azure AD DS migration is complete.
247
248
248
249
## Test and verify connectivity after the migration
249
250
@@ -263,7 +264,7 @@ Now test the virtual network connection and name resolution. On a VM that is con
263
264
1. Verify name resolution of the managed domain, such as `nslookup contoso.com`
264
265
* Specify the DNS name for your own Azure AD DS managed domain to verify that the DNS settings are correct and resolves.
265
266
266
-
The second domain controller should be available 1-2 hours after the migration cmdlet from finishes. To check if the second domain controller is available, look at the **Properties** page for the Azure AD DS managed domain in the Azure portal. If two IP addresses shown, the second domain controller is ready.
267
+
The second domain controller should be available 1-2 hours after the migration cmdlet finishes. To check if the second domain controller is available, look at the **Properties** page for the Azure AD DS managed domain in the Azure portal. If two IP addresses shown, the second domain controller is ready.
267
268
268
269
## Optional post-migration configuration steps
269
270
@@ -291,16 +292,16 @@ If needed, you can update the fine-grained password policy to be less restrictiv
291
292
292
293
#### Creating a network security group
293
294
294
-
Azure AD DS creates a network security group that opens up the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain. This network security group should be automatically created. If not, or you need to open additional ports, review the following steps:
295
+
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain, and isn't automatically created. To create the network security group and open the required ports, review the following steps:
295
296
296
-
1. In the Azure portal, select your Azure AD DS resource. On the overview page, a button is displayed to create a network security group if there's none associated with Azure AD Domain Services
297
+
1. In the Azure portal, select your Azure AD DS resource. On the overview page, a button is displayed to create a network security group if there's none associated with Azure AD Domain Services.
297
298
1. If you use secure LDAP, add a rule to the network security group to allow incoming traffic for *TCP* port *636*. For more information, see [Configure secure LDAP][secure-ldap].
298
299
299
-
## Roll back and restore
300
+
## Roll back and restore from migration
300
301
301
302
### Roll back
302
303
303
-
If PowerShell cmdlet to prepare for migration in step 2 fails, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.
304
+
If there's an error when you run the PowerShell cmdlet to prepare for migration in step 2 or for the migration itself in step 3, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.
304
305
305
306
Run the `Migrate-Aadds` cmdlet using the *-Abort* parameter. Provide the *-ManagedDomainFqdn* for your own Azure AD DS managed domain prepared in a previous section, such as *contoso.com*:
Copy file name to clipboardExpand all lines: articles/aks/spark-job.md
+20-6Lines changed: 20 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: jeconnoc
7
7
8
8
ms.service: container-service
9
9
ms.topic: article
10
-
ms.date: 03/15/2018
10
+
ms.date: 10/18/2019
11
11
ms.author: alehall
12
12
ms.custom: mvc
13
13
---
@@ -39,10 +39,16 @@ Create a resource group for the cluster.
39
39
az group create --name mySparkCluster --location eastus
40
40
```
41
41
42
-
Create the AKS cluster with nodes that are of size `Standard_D3_v2`.
42
+
Create a Service Principal for the cluster. After it is created, you will need the Service Principal appId and password for the next command.
43
43
44
44
```azurecli
45
-
az aks create --resource-group mySparkCluster --name mySparkCluster --node-vm-size Standard_D3_v2
45
+
az ad sp create-for-rbac --name SparkSP
46
+
```
47
+
48
+
Create the AKS cluster with nodes that are of size `Standard_D3_v2`, and values of appId and password passed as service-principal and client-secret parameters.
49
+
50
+
```azurecli
51
+
az aks create --resource-group mySparkCluster --name mySparkCluster --node-vm-size Standard_D3_v2 --generate-ssh-keys --service-principal <APPID> --client-secret <PASSWORD>
46
52
```
47
53
48
54
Connect to the AKS cluster.
@@ -60,7 +66,7 @@ Before running Spark jobs on an AKS cluster, you need to build the Spark source
60
66
Clone the Spark project repository to your development system.
Copy file name to clipboardExpand all lines: articles/app-service/overview-diagnostics.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.service: app-service
12
12
ms.workload: na
13
13
ms.tgt_pltfrm: na
14
14
ms.topic: article
15
-
ms.date: 11/10/2017
15
+
ms.date: 10/18/2019
16
16
ms.author: jennile
17
17
ms.custom: seodec18
18
18
@@ -88,17 +88,17 @@ Diagnostics Tools include more advanced diagnostic tools that help you investiga
88
88
89
89
### Proactive CPU monitoring
90
90
91
-
Proactive CPU monitoring provides you an easy, proactive way to take an action when your app or child process for your app is consuming high CPU resources. You can set your own CPU threshold rules to temporarily mitigate a high CPU issue until the real cause for the unexpected issue is found.
91
+
Proactive CPU monitoring provides you an easy, proactive way to take an action when your app or child process for your app is consuming high CPU resources. You can set your own CPU threshold rules to temporarily mitigate a high CPU issue until the real cause for the unexpected issue is found. For more information, see [Mitigate your CPU problems before they happen](https://azure.github.io/AppService/2019/10/07/Mitigate-your-CPU-problems-before-they-even-happen.html).Proactive CPU monitoring provides you an easy, proactive way to take an action when your app or child process for your app is consuming high CPU resources. You can set your own CPU threshold rules to temporarily mitigate a high CPU issue until the real cause for the unexpected issue is found.
92
92
93
93

94
94
95
95
### Auto-healing and proactive auto-healing
96
96
97
-
Auto-healing is a mitigation action you can take when your app is having unexpected behavior. You can set your own rules based on request count, slow request, memory limit, and HTTP status code to trigger mitigation actions. Use the tool to temporarily mitigate an unexpected behavior until you find the root cause.
97
+
Auto-healing is a mitigation action you can take when your app is having unexpected behavior. You can set your own rules based on request count, slow request, memory limit, and HTTP status code to trigger mitigation actions. Use the tool to temporarily mitigate an unexpected behavior until you find the root cause. For more information, see [Announcing the new auto healing experience in app service diagnostics](https://azure.github.io/AppService/2018/09/10/Announcing-the-New-Auto-Healing-Experience-in-App-Service-Diagnostics.html).
Like proactive CPU monitoring, proactive auto-healing is a turn-key solution to mitigating unexpected behavior of your app. Proactive auto-healing restarts your app when App Service determines that your app is in an unrecoverable state. For more information, see [Announcing the new auto healing experience in app service diagnostics](https://azure.github.io/AppService/2018/09/10/Announcing-the-New-Auto-Healing-Experience-in-App-Service-Diagnostics.html).
101
+
Like proactive CPU monitoring, proactive auto-healing is a turn-key solution to mitigating unexpected behavior of your app. Proactive auto-healing restarts your app when App Service determines that your app is in an unrecoverable state. For more information, see [Introducing Proactive Auto Heal](https://azure.github.io/AppService/2017/08/17/Introducing-Proactive-Auto-Heal.html).
102
102
103
103
## Navigator and change analysis (only for Windows app)
0 commit comments