Skip to content

Commit 84ad7d0

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 1d19189 + 9a4296c commit 84ad7d0

File tree

38 files changed

+472
-370
lines changed

38 files changed

+472
-370
lines changed

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ In the *migration* stage, the underlying virtual disks for the domain controller
3737

3838
When you move an Azure AD DS managed domain using this migration process, you avoid the need to rejoin machines to the managed domain or delete the Azure AD DS instance and create one from scratch. VMs continue to be joined to the Azure AD DS managed domain at the end of the migration process.
3939

40-
AFter migration, Azure AD DS provides many features that are only available for domains using in Resource Manager virtual networks, such as:
40+
After migration, Azure AD DS provides many features that are only available for domains using Resource Manager virtual networks, such as:
4141

4242
* Fine-grained password policy support.
4343
* AD account lockout protection.
@@ -52,7 +52,8 @@ Azure AD DS managed domains that use a Resource Manager virtual network help you
5252

5353
Some common scenarios for migrating an Azure AD DS managed domain include the following examples.
5454

55-
[!NOTE] Do not convert the Classic virtual network until you have confirmed a successful migration. Converting the virtual network removes the option to roll back or restore the Azure AD DS managed domain if there any problems during the migration and verification stages.
55+
> [!NOTE]
56+
> Do not convert the Classic virtual network until you have confirmed a successful migration. Converting the virtual network removes the option to roll back or restore the Azure AD DS managed domain if there are any problems during the migration and verification stages.
5657
5758
### Migrate Azure AD DS to an existing Resource Manager virtual network (recommended)
5859

@@ -130,7 +131,7 @@ If you suspect that some accounts may be locked out after migration, the final m
130131

131132
### Roll back and restore
132133

133-
If the migration isn't successful, there's process to roll back or restore an Azure AD DS managed domain. Rollback is a self-service option to immediately return the state of the managed domain to before the migration attempt. Azure support engineers can also restore a managed domain from backup as a last resort. For more information, see [how to roll back or restore from a failed migration](#roll-back-and-restore).
134+
If the migration isn't successful, there's process to roll back or restore an Azure AD DS managed domain. Rollback is a self-service option to immediately return the state of the managed domain to before the migration attempt. Azure support engineers can also restore a managed domain from backup as a last resort. For more information, see [how to roll back or restore from a failed migration](#roll-back-and-restore-from-migration).
134135

135136
### Restrictions on available virtual networks
136137

@@ -150,9 +151,9 @@ The migration to the Resource Manager deployment model and virtual network is sp
150151
| Step | Performed through | Estimated time | Downtime | Roll back/Restore? |
151152
|---------|--------------------|-----------------|-----------|-------------------|
152153
| [Step 1 - Update and locate the new virtual network](#update-and-verify-virtual-network-settings) | Azure portal | 15 minutes | No downtime required | N/A |
153-
| [Step 2 - Prepare the Azure AD DS managed domain for migration](#prepare-the-managed-domain-for-migration) | PowerShell | 15 – 30 minutes on average | Downtime of Azure AD DS starts after this command is completed. | Roll back and restore available |
154-
| [Step 3 - Move the Azure AD DS managed domain to an existing virtual network](#migrate-the-managed-domain) | PowerShell | 1 – 3 hours on average | One domain controller is available once this command is completed, downtime ends. | Restore only |
155-
| [Step 4 - Test and wait for the replica domain controller](#test-and-verify-connectivity-after-the-migration)| PowerShell and Azure portal | 1 hour or more, depending on the number of tests | Both domain controllers are available and should function normally. | Restore only |
154+
| [Step 2 - Prepare the Azure AD DS managed domain for migration](#prepare-the-managed-domain-for-migration) | PowerShell | 15 – 30 minutes on average | Downtime of Azure AD DS starts after this command is completed. | Roll back and restore available. |
155+
| [Step 3 - Move the Azure AD DS managed domain to an existing virtual network](#migrate-the-managed-domain) | PowerShell | 1 – 3 hours on average | One domain controller is available once this command is completed, downtime ends. | On failure, both rollback (self service) and restore are available. |
156+
| [Step 4 - Test and wait for the replica domain controller](#test-and-verify-connectivity-after-the-migration)| PowerShell and Azure portal | 1 hour or more, depending on the number of tests | Both domain controllers are available and should function normally. | N/A. Once the first VM is successfully migrated, there's no option for rollback or restore. |
156157
| [Step 5 - Optional configuration steps](#optional-post-migration-configuration-steps) | Azure portal and VMs | N/A | No downtime required | N/A |
157158

158159
> [!IMPORTANT]
@@ -168,7 +169,7 @@ Before you begin the migration, complete the following initial checks and update
168169

169170
1. Create, or choose an existing, Resource Manager virtual network.
170171

171-
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables and network security groups.
172+
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables (although it's not recommended to use route tables) and network security groups.
172173

173174
To view the ports required, see [Network security groups and required ports][network-ports]. To minimize network communication problems, it's recommended to wait and apply a network security group or route table to the Resource Manager virtual network after the migration successfully completed.
174175

@@ -178,15 +179,15 @@ Before you begin the migration, complete the following initial checks and update
178179
1. Optionally, if you plan to move other resources to the Resource Manager deployment model and virtual network, confirm that those resources can be migrated. For more information, see [Platform-supported migration of IaaS resources from Classic to Resource Manager][migrate-iaas].
179180

180181
> [!NOTE]
181-
> Don't convert the Classic virtual network to a Resource Manager virtual network. If you, there's no option to roll back or restore the Azure AD DS managed domain.
182+
> Don't convert the Classic virtual network to a Resource Manager virtual network. If you do, there's no option to roll back or restore the Azure AD DS managed domain.
182183
183184
## Prepare the managed domain for migration
184185

185186
Azure PowerShell is used to prepare the Azure AD DS managed domain for migration. These steps include taking a backup, pausing synchronization, and deleting the cloud service that hosts Azure AD DS. When this step completes, Azure AD DS is taken offline for a period of time. If the preparation step fails, you can [roll back to the previous state](#roll-back).
186187

187188
To prepare the Azure AD DS managed domain for migration, complete the following steps:
188189

189-
1. Install the `Migrate-Aaads` module from the [PowerShell Gallery][powershell-script]. This PowerShell migration script is a digitally signed by the Azure AD engineering team.
190+
1. Install the `Migrate-Aaads` script from the [PowerShell Gallery][powershell-script]. This PowerShell migration script is a digitally signed by the Azure AD engineering team.
190191

191192
```powershell
192193
Install-Script -Name Migrate-Aadds
@@ -243,7 +244,7 @@ The migration process continues to run, even if you close out the PowerShell scr
243244

244245
When the migration successfully completes, you can view your first domain controller's IP address in the Azure portal or through Azure PowerShell. A time estimate on the second domain controller being available is also shown.
245246

246-
As this stage, you can optionally move other existing resources from the Classic deployment model and virtual network. Or, you can keep the resources on the Classic deployment model and peer the virtual networks to each other after the Azure AD DS migration is complete.
247+
At this stage, you can optionally move other existing resources from the Classic deployment model and virtual network. Or, you can keep the resources on the Classic deployment model and peer the virtual networks to each other after the Azure AD DS migration is complete.
247248

248249
## Test and verify connectivity after the migration
249250

@@ -263,7 +264,7 @@ Now test the virtual network connection and name resolution. On a VM that is con
263264
1. Verify name resolution of the managed domain, such as `nslookup contoso.com`
264265
* Specify the DNS name for your own Azure AD DS managed domain to verify that the DNS settings are correct and resolves.
265266

266-
The second domain controller should be available 1-2 hours after the migration cmdlet from finishes. To check if the second domain controller is available, look at the **Properties** page for the Azure AD DS managed domain in the Azure portal. If two IP addresses shown, the second domain controller is ready.
267+
The second domain controller should be available 1-2 hours after the migration cmdlet finishes. To check if the second domain controller is available, look at the **Properties** page for the Azure AD DS managed domain in the Azure portal. If two IP addresses shown, the second domain controller is ready.
267268

268269
## Optional post-migration configuration steps
269270

@@ -291,16 +292,16 @@ If needed, you can update the fine-grained password policy to be less restrictiv
291292

292293
#### Creating a network security group
293294

294-
Azure AD DS creates a network security group that opens up the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain. This network security group should be automatically created. If not, or you need to open additional ports, review the following steps:
295+
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain, and isn't automatically created. To create the network security group and open the required ports, review the following steps:
295296

296-
1. In the Azure portal, select your Azure AD DS resource. On the overview page, a button is displayed to create a network security group if there's none associated with Azure AD Domain Services
297+
1. In the Azure portal, select your Azure AD DS resource. On the overview page, a button is displayed to create a network security group if there's none associated with Azure AD Domain Services.
297298
1. If you use secure LDAP, add a rule to the network security group to allow incoming traffic for *TCP* port *636*. For more information, see [Configure secure LDAP][secure-ldap].
298299

299-
## Roll back and restore
300+
## Roll back and restore from migration
300301

301302
### Roll back
302303

303-
If PowerShell cmdlet to prepare for migration in step 2 fails, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.
304+
If there's an error when you run the PowerShell cmdlet to prepare for migration in step 2 or for the migration itself in step 3, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.
304305

305306
Run the `Migrate-Aadds` cmdlet using the *-Abort* parameter. Provide the *-ManagedDomainFqdn* for your own Azure AD DS managed domain prepared in a previous section, such as *contoso.com*:
306307

articles/aks/spark-job.md

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: jeconnoc
77

88
ms.service: container-service
99
ms.topic: article
10-
ms.date: 03/15/2018
10+
ms.date: 10/18/2019
1111
ms.author: alehall
1212
ms.custom: mvc
1313
---
@@ -39,10 +39,16 @@ Create a resource group for the cluster.
3939
az group create --name mySparkCluster --location eastus
4040
```
4141

42-
Create the AKS cluster with nodes that are of size `Standard_D3_v2`.
42+
Create a Service Principal for the cluster. After it is created, you will need the Service Principal appId and password for the next command.
4343

4444
```azurecli
45-
az aks create --resource-group mySparkCluster --name mySparkCluster --node-vm-size Standard_D3_v2
45+
az ad sp create-for-rbac --name SparkSP
46+
```
47+
48+
Create the AKS cluster with nodes that are of size `Standard_D3_v2`, and values of appId and password passed as service-principal and client-secret parameters.
49+
50+
```azurecli
51+
az aks create --resource-group mySparkCluster --name mySparkCluster --node-vm-size Standard_D3_v2 --generate-ssh-keys --service-principal <APPID> --client-secret <PASSWORD>
4652
```
4753

4854
Connect to the AKS cluster.
@@ -60,7 +66,7 @@ Before running Spark jobs on an AKS cluster, you need to build the Spark source
6066
Clone the Spark project repository to your development system.
6167

6268
```bash
63-
git clone -b branch-2.3 https://github.com/apache/spark
69+
git clone -b branch-2.4 https://github.com/apache/spark
6470
```
6571

6672
Change into the directory of the cloned repository and save the path of the Spark source to a variable.
@@ -132,7 +138,7 @@ Run the following commands to add an SBT plugin, which allows packaging the proj
132138

133139
```bash
134140
touch project/assembly.sbt
135-
echo 'addSbtPlugin("com.eed3si9n" % "sbt-assembly" % "0.14.6")' >> project/assembly.sbt
141+
echo 'addSbtPlugin("com.eed3si9n" % "sbt-assembly" % "0.14.10")' >> project/assembly.sbt
136142
```
137143

138144
Run these commands to copy the sample code into the newly created project and add all necessary dependencies.
@@ -147,7 +153,7 @@ cat <<EOT >> build.sbt
147153
libraryDependencies += "org.apache.spark" %% "spark-sql" % "2.3.0" % "provided"
148154
EOT
149155

150-
sed -ie 's/scalaVersion.*/scalaVersion := "2.11.11",/' build.sbt
156+
sed -ie 's/scalaVersion.*/scalaVersion := "2.11.11"/' build.sbt
151157
sed -ie 's/name.*/name := "SparkPi",/' build.sbt
152158
```
153159

@@ -210,6 +216,13 @@ Navigate back to the root of Spark repository.
210216
cd $sparkdir
211217
```
212218

219+
Create a service account that has sufficient permissions for running a job.
220+
221+
```bash
222+
kubectl create serviceaccount spark
223+
kubectl create clusterrolebinding spark-role --clusterrole=edit --serviceaccount=default:spark --namespace=default
224+
```
225+
213226
Submit the job using `spark-submit`.
214227

215228
```bash
@@ -219,6 +232,7 @@ Submit the job using `spark-submit`.
219232
--name spark-pi \
220233
--class org.apache.spark.examples.SparkPi \
221234
--conf spark.executor.instances=3 \
235+
--conf spark.kubernetes.authenticate.driver.serviceAccountName=spark \
222236
--conf spark.kubernetes.container.image=$REGISTRY_NAME/spark:$REGISTRY_TAG \
223237
$jarUrl
224238
```
-19.4 KB
Loading

articles/app-service/overview-diagnostics.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: app-service
1212
ms.workload: na
1313
ms.tgt_pltfrm: na
1414
ms.topic: article
15-
ms.date: 11/10/2017
15+
ms.date: 10/18/2019
1616
ms.author: jennile
1717
ms.custom: seodec18
1818

@@ -88,17 +88,17 @@ Diagnostics Tools include more advanced diagnostic tools that help you investiga
8888

8989
### Proactive CPU monitoring
9090

91-
Proactive CPU monitoring provides you an easy, proactive way to take an action when your app or child process for your app is consuming high CPU resources. You can set your own CPU threshold rules to temporarily mitigate a high CPU issue until the real cause for the unexpected issue is found.
91+
Proactive CPU monitoring provides you an easy, proactive way to take an action when your app or child process for your app is consuming high CPU resources. You can set your own CPU threshold rules to temporarily mitigate a high CPU issue until the real cause for the unexpected issue is found. For more information, see [Mitigate your CPU problems before they happen](https://azure.github.io/AppService/2019/10/07/Mitigate-your-CPU-problems-before-they-even-happen.html).Proactive CPU monitoring provides you an easy, proactive way to take an action when your app or child process for your app is consuming high CPU resources. You can set your own CPU threshold rules to temporarily mitigate a high CPU issue until the real cause for the unexpected issue is found.
9292

9393
![Proactive CPU monitoring](./media/app-service-diagnostics/proactive-cpu-monitoring-9.png)
9494

9595
### Auto-healing and proactive auto-healing
9696

97-
Auto-healing is a mitigation action you can take when your app is having unexpected behavior. You can set your own rules based on request count, slow request, memory limit, and HTTP status code to trigger mitigation actions. Use the tool to temporarily mitigate an unexpected behavior until you find the root cause.
97+
Auto-healing is a mitigation action you can take when your app is having unexpected behavior. You can set your own rules based on request count, slow request, memory limit, and HTTP status code to trigger mitigation actions. Use the tool to temporarily mitigate an unexpected behavior until you find the root cause. For more information, see [Announcing the new auto healing experience in app service diagnostics](https://azure.github.io/AppService/2018/09/10/Announcing-the-New-Auto-Healing-Experience-in-App-Service-Diagnostics.html).
9898

9999
![Auto-healing](./media/app-service-diagnostics/auto-healing-10.png)
100100

101-
Like proactive CPU monitoring, proactive auto-healing is a turn-key solution to mitigating unexpected behavior of your app. Proactive auto-healing restarts your app when App Service determines that your app is in an unrecoverable state. For more information, see [Announcing the new auto healing experience in app service diagnostics](https://azure.github.io/AppService/2018/09/10/Announcing-the-New-Auto-Healing-Experience-in-App-Service-Diagnostics.html).
101+
Like proactive CPU monitoring, proactive auto-healing is a turn-key solution to mitigating unexpected behavior of your app. Proactive auto-healing restarts your app when App Service determines that your app is in an unrecoverable state. For more information, see [Introducing Proactive Auto Heal](https://azure.github.io/AppService/2017/08/17/Introducing-Proactive-Auto-Heal.html).
102102

103103
## Navigator and change analysis (only for Windows app)
104104

articles/azure-cache-for-redis/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@
3939
href: cache-best-practices.md
4040
- name: Azure Architecture Best Practices for Caching
4141
href: https://docs.microsoft.com/azure/architecture/best-practices/caching?toc=%2Fazure%2Fredis-cache%2Ftoc.json
42+
- name: Failover and patching explained
43+
href: cache-failover.md
4244
- name: How-to guides
4345
items:
4446
- name: Plan

0 commit comments

Comments
 (0)