Skip to content

Commit 86c914d

Browse files
authored
Merge pull request #239555 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 5/29
2 parents 8bcdd0b + 11e0718 commit 86c914d

File tree

171 files changed

+1175
-770
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

171 files changed

+1175
-770
lines changed

articles/active-directory/authentication/troubleshoot-sspr-writeback.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -197,6 +197,7 @@ A best practice when you troubleshoot problems with password writeback is to ins
197197
| 31016| WriteBackServiceStopped| This event indicates that the password writeback service has stopped. Any password management requests from the cloud won't be successful.|
198198
| 31017| AuthTokenSuccess| This event indicates that we successfully retrieved an authorization token for the Global Administrator specified during Azure AD Connect setup to start the offboarding or onboarding process.|
199199
| 31018| KeyPairCreationSuccess| This event indicates that we successfully created the password encryption key. This key is used to encrypt passwords from the cloud to be sent to your on-premises environment.|
200+
| 31019| ServiceBusHeartBeat| This event indicates that we successfully sent a request to your tenant's Service Bus instance.|
200201
| 31034| ServiceBusListenerError| This event indicates that there was an error connecting to your tenant's Service Bus listener. If the error message includes "The remote certificate is invalid", check to make sure that your Azure AD Connect server has all the required Root CAs as described in [Azure TLS certificate changes](../../security/fundamentals/tls-certificate-changes.md). |
201202
| 31044| PasswordResetService| This event indicates that password writeback is not working. The Service Bus listens for requests on two separate relays for redundancy. Each relay connection is managed by a unique Service Host. The writeback client returns an error if either Service Host is not running.|
202203
| 32000| UnknownError| This event indicates an unknown error occurred during a password management operation. Look at the exception text in the event for more details. If you're having problems, try disabling and then re-enabling password writeback. If this doesn't help, include a copy of your event log along with the tracking ID specified when you open a support request.|

articles/active-directory/fundamentals/active-directory-deployment-plans.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Use the following list to plan for authentication deployment.
5656
* **Azure AD self-service password reset (SSPR)** - Help users reset a password without administrator intervention:
5757
* See, [Passwordless authentication options for Azure AD](../authentication/concept-authentication-passwordless.md)
5858
* See, [Plan an Azure Active Directory self-service password reset deployment](../authentication/howto-sspr-deployment.md)
59-
* **Passordless authentication** - Implement passwordless authentication using the Microsoft Authenticator app or FIDO2 Security keys:
59+
* **Passwordless authentication** - Implement passwordless authentication using the Microsoft Authenticator app or FIDO2 Security keys:
6060
* See, [Enable passwordless sign-in with Microsoft Authenticator](../authentication/howto-authentication-passwordless-phone.md)
6161
* See, [Plan a passwordless authentication deployment in Azure Active Directory](../authentication/howto-authentication-passwordless-deployment.md)
6262

articles/aks/ingress-basic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -228,7 +228,7 @@ helm install ingress-nginx ingress-nginx/ingress-nginx \
228228
--set defaultBackend.image.registry=$ACR_URL \
229229
--set defaultBackend.image.image=$DEFAULTBACKEND_IMAGE \
230230
--set defaultBackend.image.tag=$DEFAULTBACKEND_TAG \
231-
--set defaultBackend.image.digest="" \
231+
--set defaultBackend.image.digest=""
232232
```
233233

234234
### [Azure PowerShell](#tab/azure-powershell)

articles/api-management/api-management-get-started-publish-versions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: danlep
1313

1414
There are times when it's impractical to have all callers to your API use exactly the same version. When callers want to upgrade to a later version, they want an approach that's easy to understand. As shown in this tutorial, it is possible to provide multiple *versions* in Azure API Management.
1515

16-
For background, see [Versions & revisions](https://azure.microsoft.com/blog/versions-revisions/).
16+
For background, see [Versions](api-management-versions.md) & [Revisions](api-management-revisions.md).
1717

1818
In this tutorial, you learn how to:
1919

articles/api-management/api-management-sample-cache-by-key.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ API Management service uses a shared per-tenant internal data cache so that, as
2121
> The internal cache is not available in the **Consumption** tier of Azure API Management. You can [use an external Azure Cache for Redis](api-management-howto-cache-external.md) instead. An external cache allows for greater cache control and flexibility for API Management instances in all tiers.
2222
2323
## Fragment caching
24-
There are certain cases where responses being returned contain some portion of data that is expensive to determine and yet remains fresh for a reasonable amount of time. As an example, consider a service built by an airline that provides information relating flight reservations, flight status, and so on. If the user is a member of the airlines points program, they would also have information relating to their current status and accumulated mileage. This user-related information might be stored in a different system, but it may be desirable to include it in responses returned about flight status and reservations. This can be done using a process called fragment caching. The primary representation can be returned from the origin server using some kind of token to indicate where the user-related information is to be inserted.
24+
There are certain cases where responses being returned contain some portion of data that is expensive to determine and yet remains fresh for a reasonable amount of time. As an example, consider a service built by an airline that provides information relating to flight reservations, flight status, and so on. If the user is a member of the airlines points program, they would also have information relating to their current status and accumulated mileage. This user-related information might be stored in a different system, but it may be desirable to include it in responses returned about flight status and reservations. This can be done using a process called fragment caching. The primary representation can be returned from the origin server using some kind of token to indicate where the user-related information is to be inserted.
2525

2626
Consider the following JSON response from a backend API.
2727

articles/automation/how-to/move-account.md

Lines changed: 6 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Move your Azure Automation account to another subscription
33
description: This article tells how to move your Automation account to another subscription.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 01/07/2021
6+
ms.date: 05/26/2023
77
ms.topic: conceptual
88
---
99

@@ -16,8 +16,7 @@ The Automation account is one of the resources that you can move. In this articl
1616
1. Disable your features.
1717
2. Unlink your workspace.
1818
3. Move the Automation account.
19-
4. Delete and re-create the Run As accounts.
20-
5. Re-enable your features.
19+
4. Re-enable your features.
2120

2221
## Remove features
2322

@@ -97,43 +96,25 @@ You can now move your Automation account and its runbooks.
9796

9897
2. Select the resources in your resource group that you want to move. Ensure that you include your Automation account, runbooks, and Log Analytics workspace resources.
9998

100-
## Re-create Run As accounts
101-
102-
[Run As accounts](../automation-security-overview.md#run-as-accounts) create a service principal in Azure Active Directory to authenticate with Azure resources. When you change subscriptions, the Automation account no longer uses the existing Run As account. To re-create the Run As accounts:
103-
104-
1. Go to your Automation account in the new subscription, and select **Run as accounts** under **Account Settings**. You'll see that the Run As accounts show as incomplete now.
105-
106-
![Screenshot of Run As accounts, showing incomplete](../media/move-account/run-as-accounts.png)
107-
108-
2. Delete the Run As accounts, one at a time, by selecting **Delete** on the **Properties** page.
109-
110-
> [!NOTE]
111-
> If you don't have permissions to create or view the Run As accounts, you see the following message: `You do not have permissions to create an Azure Run As account (service principal) and grant the Contributor role to the service principal.` For more information, see [Permissions required to configure Run As accounts](../automation-security-overview.md#permissions).
112-
113-
3. After you've deleted the Run As accounts, select **Create** under **Azure Run As account**.
114-
115-
4. On the Add Azure Run As account page, select **Create** to create the Run As account and service principal.
116-
117-
5. Repeat the steps above with the Azure Classic Run As account.
99+
> [!NOTE]
100+
> The movement of System assigned managed identity, and User-assigned managed identity takes place automatically with the Automation account.
118101
119102
## Enable features
120103

121-
After you re-create the Run As accounts, you must re-enable the features that you removed before the move:
104+
You must re-enable the features that you removed before the move:
122105

123106
1. To turn on Change Tracking and Inventory, select **Change Tracking and Inventory** in your Automation account. Choose the Log Analytics workspace that you moved over, and select **Enable**.
124107

125108
2. Repeat step 1 for Update Management.
126109

127110
![Screenshot of Re-enabling features in your moved Automation account](../media/move-account/reenable-solutions.png)
128111

129-
3. Machines that are enabled with your features are visible when you've connected the existing Log Analytics workspace. To turn on the Start/Stop VMs during off-hours feature, you must re-enable it. Under **Related Resources**, select **Start/Stop VMs** > **Learn more about and enable the solution** > **Create** to start the deployment.
112+
3. Machines that are enabled with your features are visible when you've connected the existing Log Analytics workspace.
130113

131114
4. On the Add Solution page, choose your Log Analytics workspace and Automation account.
132115

133116
![Screenshot of Add Solution menu](../media/move-account/add-solution-vm.png)
134117

135-
5. Configure the feature as described in [Start/Stop VMs during off-hours overview](../automation-solution-vm-management.md).
136-
137118
## Verify the move
138119

139120
When the move is complete, verify that the capabilities listed below are enabled.

articles/automation/migrate-run-as-accounts-managed-identity.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Migrate from a Run As account to Managed identities
33
description: This article describes how to migrate from a Run As account to managed identities in Azure Automation.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 03/14/2023
6+
ms.date: 05/29/2023
77
ms.topic: conceptual
88
ms.custom: devx-track-azurepowershell
99
---
@@ -40,6 +40,7 @@ Before you migrate from a Run As account or Classic Run As account to a managed
4040

4141
1. If you're using Classic Run As accounts, ensure that you have [migrated](../virtual-machines/classic-vm-deprecation.md) resources deployed through classic deployment model to Azure Resource Manager.
4242
1. Use [this script](https://github.com/azureautomation/runbooks/blob/master/Utility/AzRunAs/Check-AutomationRunAsAccountRoleAssignments.ps1) to find out which Automation accounts are using a Run As account. If your Azure Automation accounts contain a Run As account, it will have the built-in contributor role assigned to it by default. You can use the script to check the Azure Automation Run As accounts and determine if their role assignment is the default one or if it has been changed to a different role definition.
43+
1. Use [this script](https://github.com/azureautomation/runbooks/blob/master/Utility/AzRunAs/IdentifyRunAsRunbooks.ps1) to find out if all runbooks in your Automation account are using the Run As account.
4344

4445
## Migrate from an Automation Run As account to a managed identity
4546

articles/azure-arc/kubernetes/troubleshooting.md

Lines changed: 32 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -43,27 +43,42 @@ If the Helm Chart release is present with `STATUS: deployed`, check the status o
4343

4444
```console
4545
$ kubectl -n azure-arc get deployments,pods
46-
NAME READY UP-TO-DATE AVAILABLE AGE
47-
deployment.apps/clusteridentityoperator 1/1 1 1 16h
48-
deployment.apps/config-agent 1/1 1 1 16h
49-
deployment.apps/cluster-metadata-operator 1/1 1 1 16h
50-
deployment.apps/controller-manager 1/1 1 1 16h
51-
deployment.apps/flux-logs-agent 1/1 1 1 16h
52-
deployment.apps/metrics-agent 1/1 1 1 16h
53-
deployment.apps/resource-sync-agent 1/1 1 1 16h
54-
55-
NAME READY STATUS RESTART AGE
56-
pod/cluster-metadata-operator-7fb54d9986-g785b 2/2 Running 0 16h
57-
pod/clusteridentityoperator-6d6678ffd4-tx8hr 3/3 Running 0 16h
58-
pod/config-agent-544c4669f9-4th92 3/3 Running 0 16h
59-
pod/controller-manager-fddf5c766-ftd96 3/3 Running 0 16h
60-
pod/flux-logs-agent-7c489f57f4-mwqqv 2/2 Running 0 16h
61-
pod/metrics-agent-58b765c8db-n5l7k 2/2 Running 0 16h
62-
pod/resource-sync-agent-5cf85976c7-522p5 3/3 Running 0 16h
46+
NAME READY UP-TO-DATE AVAILABLE AGE
47+
deployment.apps/cluster-metadata-operator 1/1 1 1 3d19h
48+
deployment.apps/clusterconnect-agent 1/1 1 1 3d19h
49+
deployment.apps/clusteridentityoperator 1/1 1 1 3d19h
50+
deployment.apps/config-agent 1/1 1 1 3d19h
51+
deployment.apps/controller-manager 1/1 1 1 3d19h
52+
deployment.apps/extension-events-collector 1/1 1 1 3d19h
53+
deployment.apps/extension-manager 1/1 1 1 3d19h
54+
deployment.apps/flux-logs-agent 1/1 1 1 3d19h
55+
deployment.apps/kube-aad-proxy 1/1 1 1 3d19h
56+
deployment.apps/metrics-agent 1/1 1 1 3d19h
57+
deployment.apps/resource-sync-agent 1/1 1 1 3d19h
58+
59+
60+
61+
NAME READY STATUS RESTARTS AGE
62+
pod/cluster-metadata-operator-74747b975-9phtz 2/2 Running 0 3d19h
63+
pod/clusterconnect-agent-cf4c7849c-88fmf 3/3 Running 0 3d19h
64+
pod/clusteridentityoperator-79bdfd945f-pt2rv 2/2 Running 0 3d19h
65+
pod/config-agent-67bcb94b7c-d67t8 1/2 Running 0 3d19h
66+
pod/controller-manager-559dd48b64-v6rmk 2/2 Running 0 3d19h
67+
pod/extension-events-collector-85f4fbff69-55zmt 2/2 Running 0 3d19h
68+
pod/extension-manager-7c7668446b-69gps 3/3 Running 0 3d19h
69+
pod/flux-logs-agent-fc7c6c959-vgqvm 1/1 Running 0 3d19h
70+
pod/kube-aad-proxy-84d668c44b-j457m 2/2 Running 0 3d19h
71+
pod/metrics-agent-58fb8554df-5ll67 2/2 Running 0 3d19h
72+
pod/resource-sync-agent-dbf5db848-c9lg8 2/2 Running 0 3d19h
6373
```
6474

6575
All pods should show `STATUS` as `Running` with either `3/3` or `2/2` under the `READY` column. Fetch logs and describe the pods returning an `Error` or `CrashLoopBackOff`. If any pods are stuck in `Pending` state, there might be insufficient resources on cluster nodes. [Scaling up your cluster](https://kubernetes.io/docs/tasks/administer-cluster/) can get these pods to transition to `Running` state.
6676

77+
### Resource Provisioning Failed
78+
If you receive this error, it indicates that there was an error due to which the resource could not be provisioned successfully. Please check the status of the Azure Arc enabled Kubernetes service at the following dashboard: [Azure status](https://azure.status.microsoft/en-us/status). If the status is healthy and you continue to face issues while onboarding, please raise a support ticket. If the status is unhealthy, please wait until the status becomes healthy and try onboarding again after deleting the existing connected cluster Azure resource.
79+
80+
### Service Timeout
81+
If you receive this error, it indicates that the service timed out while provisioning the certificates. Please check the status of the Azure Arc enabled Kubernetes service at the following dashboard: [Azure status](https://azure.status.microsoft/en-us/status). If the status is healthy and you continue to face issues while onboarding, please raise a support ticket. If the status is unhealthy, please wait until the status becomes healthy and try onboarding again after deleting the existing connected cluster Azure resource.
6782

6883
### Overage claims error
6984

articles/azure-arc/servers/onboard-portal.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,23 +23,22 @@ The script to automate the download and installation, and to establish the conne
2323

2424
1. On the **Servers - Azure Arc** page, select **Add** at the upper left.
2525

26-
1. On the **Select a method** page, select the **Add a single server** tile, and then select **Generate script**.
26+
1. On the **Select a method** page, under the **Add a single server** tile, and then select **Generate script**.
2727

28-
1. On the **Generate script** page, select the subscription and resource group where you want the machine to be managed within Azure. Select an Azure location where the machine metadata will be stored. This location can be the same or different, as the resource group's location.
29-
30-
1. On the **Prerequisites** page, review the information and then select **Next: Resource details**.
28+
1. On the **Prerequisites** page, review the information and then select **Next** to Resource details page.
3129

3230
1. On the **Resource details** page, provide the following:
3331

3432
1. In the **Resource group** drop-down list, select the resource group the machine will be managed from.
3533
1. In the **Region** drop-down list, select the Azure region to store the servers metadata.
3634
1. In the **Operating system** drop-down list, select the operating system that the script is configured to run on.
37-
1. If the machine is communicating through a proxy server to connect to the internet, specify the proxy server IP address or the name and port number that the machine will use to communicate with the proxy server. Enter the value in the format `http://<proxyURL>:<proxyport>`.
38-
1. Select **Next: Tags**.
35+
1. In the **Connectivity method** section, If the machine is communicating through a proxy server to connect to the internet, select **Proxy server** option and specify the proxy server IP address or the name and port number that the machine will use to communicate with the proxy server. Enter the value in the format `http://<proxyURL>:<proxyport>`. Else if the machine is communicating through a private endpoint then select **Private endpoint** option and appropriate private link scope in the drop-down list. Else if the machine is communicating through a public endpoint then select **Public endpoint** option.
36+
1. In the **Automanage machine best practices** section, you may enable automanage if you want to onboard and configure best practice services like Machine configuration and Insights, based on your server needs.
37+
1. Select **Next** to Tags page.
3938

4039
1. On the **Tags** page, review the default **Physical location tags** suggested and enter a value, or specify one or more **Custom tags** to support your standards.
4140

42-
1. Select **Next: Download and run script**.
41+
1. Select **Next** to Download and run script page.
4342

4443
1. On the **Download and run script** page, review the summary information, and then select **Download**. If you still need to make changes, select **Previous**.
4544

articles/azure-monitor/essentials/prometheus-api-promql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ curl -X POST 'https://login.microsoftonline.com/<tennant ID>/oauth2/token' \
7777
-H 'Content-Type: application/x-www-form-urlencoded' \
7878
--data-urlencode 'grant_type=client_credentials' \
7979
--data-urlencode 'client_id=<your apps client ID>' \
80-
--data-urlencode 'client_secret=<your apps client secret' \
80+
--data-urlencode 'client_secret=<your apps client secret>' \
8181
--data-urlencode 'resource=https://prometheus.monitor.azure.com'
8282
```
8383

@@ -211,4 +211,4 @@ For more information on Prometheus metrics limits, see [Prometheus metrics](../.
211211
[Azure Monitor workspace overview](./azure-monitor-workspace-overview.md)
212212
[Manage an Azure Monitor workspace](./azure-monitor-workspace-manage.md)
213213
[Overview of Azure Monitor Managed Service for Prometheus](./prometheus-metrics-overview.md)
214-
[Query Prometheus metrics using Azure workbooks](./prometheus-workbooks.md)
214+
[Query Prometheus metrics using Azure workbooks](./prometheus-workbooks.md)

0 commit comments

Comments
 (0)