Skip to content

Commit 88c3db3

Browse files
authored
Merge pull request #213391 from MicrosoftDocs/main
10/03 AM Publish
2 parents aa7561f + 2c7d096 commit 88c3db3

File tree

98 files changed

+874
-1285
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+874
-1285
lines changed

articles/active-directory/devices/concept-azure-ad-register.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: conceptual
9-
ms.date: 02/15/2022
9+
ms.date: 09/30/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -26,10 +26,11 @@ The goal of Azure AD registered - also known as Workplace joined - devices is to
2626
| | Bring your own device |
2727
| | Mobile devices |
2828
| **Device ownership** | User or Organization |
29-
| **Operating Systems** | Windows 10 or newer, iOS, Android, and macOS |
29+
| **Operating Systems** | Windows 10 or newer, iOS, Android, macOS, Ubuntu 20.04/22.04 |
3030
| **Provisioning** | Windows 10 or newer – Settings |
3131
| | iOS/Android – Company Portal or Microsoft Authenticator app |
3232
| | macOS – Company Portal |
33+
| | Linux - Intune Agent |
3334
| **Device sign in options** | End-user local credentials |
3435
| | Password |
3536
| | Windows Hello |
246 KB
Loading

articles/active-directory/devices/plan-device-deployment.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 02/15/2022
9+
ms.date: 09/30/2022
1010

1111
ms.author: gasinh
1212
author: gargi-sinha
@@ -55,7 +55,7 @@ Consider your organizational needs while you determine the strategy for this dep
5555

5656
### Engage the right stakeholders
5757

58-
When technology projects fail, they typically do because of mismatched expectations on impact, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders](../fundamentals/active-directory-deployment-plans.md) and that stakeholder roles in the project are well understood.
58+
When technology projects fail, they typically do because of mismatched expectations on impact, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders,](../fundamentals/active-directory-deployment-plans.md) and that stakeholder roles in the project are well understood.
5959

6060
For this plan, add the following stakeholders to your list:
6161

@@ -103,6 +103,7 @@ iOS and Android devices may only be Azure AD registered. The following table pre
103103
| **Client operating systems** | | | |
104104
| Windows 11 or Windows 10 devices | ![Checkmark for these values.](./media/plan-device-deployment/check.png) | ![Checkmark for these values.](./media/plan-device-deployment/check.png) | ![Checkmark for these values.](./media/plan-device-deployment/check.png) |
105105
| Windows down-level devices (Windows 8.1 or Windows 7) | | | ![Checkmark for these values.](./media/plan-device-deployment/check.png) |
106+
| Linux Desktop - Ubuntu 20.04/22.04 | ![Checkmark for these values.](./media/plan-device-deployment/check.png) | | |
106107
|**Sign in options** | | | |
107108
| End-user local credentials | ![Checkmark for these values.](./media/plan-device-deployment/check.png) | | |
108109
| Password | ![Checkmark for these values.](./media/plan-device-deployment/check.png) | ![Checkmark for these values.](./media/plan-device-deployment/check.png) | ![Checkmark for these values.](./media/plan-device-deployment/check.png) |
@@ -135,6 +136,7 @@ BYOD and corporate owned mobile device are registered by users installing the Co
135136
* [Android](/mem/intune/user-help/enroll-device-android-company-portal)
136137
* [Windows 10 or newer](/mem/intune/user-help/enroll-windows-10-device)
137138
* [macOS](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)
139+
* [Linux Desktop - Ubuntu 20.04/22.04](/mem/intune/user-help/enroll-device-linux)
138140

139141
If registering your devices is the best option for your organization, see the following resources:
140142

articles/active-directory/enterprise-users/groups-dynamic-membership.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -396,7 +396,7 @@ The following device attributes can be used.
396396
deviceOSVersion | any string value | device.deviceOSVersion -eq "9.1"<br>device.deviceOSVersion -startsWith "10.0.1"
397397
deviceOwnership | Personal, Company, Unknown | device.deviceOwnership -eq "Company"
398398
devicePhysicalIds | any string value used by Autopilot, such as all Autopilot devices, OrderID, or PurchaseOrderID | device.devicePhysicalIDs -any _ -contains "[ZTDId]"<br>(device.devicePhysicalIds -any _ -eq "[OrderID]:179887111881"<br>(device.devicePhysicalIds -any _ -eq "[PurchaseOrderId]:76222342342"
399-
deviceTrustType | AzureAD, ServerAD, Workplace | device.deviceOwnership -eq "AzureAD"
399+
deviceTrustType | AzureAD, ServerAD, Workplace | device.deviceTrustType -eq "AzureAD"
400400
enrollmentProfileName | Apple Device Enrollment Profile name, Android Enterprise Corporate-owned dedicated device Enrollment Profile name, or Windows Autopilot profile name | device.enrollmentProfileName -eq "DEP iPhones"
401401
extensionAttribute1 | any string value | device.extensionAttribute1 -eq "some string value"
402402
extensionAttribute2 | any string value | device.extensionAttribute2 -eq "some string value"

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ There are two versions of group writeback. The original version is in general av
3131
- You can configure the common name in an Active Directory group's distinguished name to include the group's display name when it's written back.
3232
- You can use the Azure AD admin portal, Graph Explorer, and PowerShell to configure which Azure AD groups are written back.
3333

34-
The new version is available only in [Azure AD Connect version 2.0.89.0 or later](https://www.microsoft.com/download/details.aspx?id=47594). It must be enabled in addition to the original version.
34+
The new version is enabled on the tenant and not per Azure AD Connect client instance. Make sure that all Azure AD Connect client instances are updated to a minimal build of [Azure AD Connect version 2.0 or later](https://www.microsoft.com/download/details.aspx?id=47594) if group writeback is currently enabled on the client instance.
3535

3636
This article walks you through activities that you should complete before you enable group writeback for your tenant. These activities include discovering your current configuration, verifying the prerequisites, and choosing the deployment approach.
3737

articles/aks/cluster-autoscaler.md

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use the cluster autoscaler in Azure Kubernetes Service (AKS)
33
description: Learn how to use the cluster autoscaler to automatically scale your cluster to meet application demands in an Azure Kubernetes Service (AKS) cluster.
44
services: container-service
55
ms.topic: article
6-
ms.date: 07/18/2019
6+
ms.date: 10/03/2022
77

88
---
99

@@ -225,7 +225,7 @@ To configure logs to be pushed from the cluster autoscaler into Log Analytics, f
225225
1. Select the "Logs" section on your cluster via the Azure portal.
226226
1. Input the following example query into Log Analytics:
227227

228-
```
228+
```kusto
229229
AzureDiagnostics
230230
| where Category == "cluster-autoscaler"
231231
```
@@ -236,7 +236,7 @@ You should see logs similar to the following example as long as there are logs t
236236

237237
The cluster autoscaler will also write out health status to a `configmap` named `cluster-autoscaler-status`. To retrieve these logs, execute the following `kubectl` command. A health status will be reported for each node pool configured with the cluster autoscaler.
238238

239-
```
239+
```bash
240240
kubectl get configmap -n kube-system cluster-autoscaler-status -o yaml
241241
```
242242

@@ -281,31 +281,23 @@ Kubernetes supports [horizontal pod autoscaling][kubernetes-hpa] to adjust the n
281281

282282
This article showed you how to automatically scale the number of AKS nodes. You can also use the horizontal pod autoscaler to automatically adjust the number of pods that run your application. For steps on using the horizontal pod autoscaler, see [Scale applications in AKS][aks-scale-apps].
283283

284+
To further help improve cluster resource utilization and free up CPU and memory for other pods, see [Vertical Pod Autoscaler][vertical-pod-autoscaler].
285+
284286
<!-- LINKS - internal -->
285-
[aks-faq]: faq.md
286287
[aks-faq-node-resource-group]: faq.md#can-i-modify-tags-and-other-properties-of-the-aks-resources-in-the-node-resource-group
287288
[aks-multiple-node-pools]: use-multiple-node-pools.md
288289
[aks-scale-apps]: tutorial-kubernetes-scale.md
289-
[aks-support-policies]: support-policies.md
290-
[aks-upgrade]: upgrade-cluster.md
291290
[aks-view-master-logs]: monitor-aks.md#configure-monitoring
292-
[autoscaler-profile-properties]: #using-the-autoscaler-profile
293291
[azure-cli-install]: /cli/azure/install-azure-cli
294-
[az-aks-show]: /cli/azure/aks#az-aks-show
295-
[az-extension-add]: /cli/azure/extension#az-extension-add
296-
[az-extension-update]: /cli/azure/extension#az-extension-update
297292
[az-aks-create]: /cli/azure/aks#az-aks-create
298293
[az-aks-update]: /cli/azure/aks#az-aks-update
299294
[az-aks-scale]: /cli/azure/aks#az-aks-scale
300-
[az-feature-register]: /cli/azure/feature#az-feature-register
301-
[az-feature-list]: /cli/azure/feature#az-feature-list
302-
[az-provider-register]: /cli/azure/provider#az-provider-register
295+
[vertical-pod-autoscaler]: vertical-pod-autoscaler.md
303296

304297
<!-- LINKS - external -->
305298
[az-aks-update-preview]: https://github.com/Azure/azure-cli-extensions/tree/master/src/aks-preview
306299
[az-aks-nodepool-update]: https://github.com/Azure/azure-cli-extensions/tree/master/src/aks-preview#enable-cluster-auto-scaler-for-a-node-pool
307300
[autoscaler-scaledown]: https://github.com/kubernetes/autoscaler/blob/master/cluster-autoscaler/FAQ.md#what-types-of-pods-can-prevent-ca-from-removing-a-node
308-
[autoscaler-parameters]: https://github.com/kubernetes/autoscaler/blob/master/cluster-autoscaler/FAQ.md#what-are-the-parameters-to-ca
309301
[kubernetes-faq]: https://github.com/kubernetes/autoscaler/blob/master/cluster-autoscaler/FAQ.md#ca-doesnt-work-but-it-used-to-work-yesterday-why
310302
[kubernetes-hpa]: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
311303
[kubernetes-hpa-walkthrough]: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale-walkthrough/

articles/aks/index.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: landing-page
1111
author: laurenhughes
1212
ms.author: lahugh
13-
ms.date: 07/21/2020
13+
ms.date: 10/03/2022
1414

1515
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
1616

@@ -26,6 +26,10 @@ landingContent:
2626
url: intro-kubernetes.md
2727
- linkListType: whats-new
2828
links:
29+
- text: Vertical Pod Autoscaler (preview)
30+
url: vertical-pod-autoscaler.md
31+
- text: Workload identity (preview)
32+
url: workload-identity-overview.md
2933
- text: Use CVM (Preview)
3034
url: use-cvm.md
3135
- text: AKS GitHub Actions
@@ -40,10 +44,6 @@ landingContent:
4044
url: cluster-configuration.md#default-os-disk-sizing
4145
- text: Calico for Windows Server containers (GA)
4246
url: use-network-policies.md#create-an-aks-cluster-for-calico-network-policies
43-
- text: API Server VNet integration (preview)
44-
url: api-server-vnet-integration.md
45-
- text: GitHub Actions for AKS
46-
url: integrations.md#github-actions
4747
- linkListType: concept
4848
links:
4949
- text: Kubernetes core concepts for AKS

articles/api-management/self-hosted-gateway-settings-reference.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,9 @@ This article provides a reference for required and optional settings that are us
2323
|----|------|----------|-------------------|
2424
| config.service.endpoint | Configuration endpoint in Azure API Management for the self-hosted gateway. Find this value in the Azure portal under **Gateways** > **Deployment**. | Yes | N/A |
2525
| config.service.auth | Access token (authentication key) of the self-hosted gateway. Find this value in the Azure portal under **Gateways** > **Deployment**. | Yes | N/A |
26+
| neighborhood.host | DNS name used to resolve all instances of a self-hosted gateway deployment for cross-instance synchronization. In Kubernetes, this can be achieved by using a headless Service. | No | N/A |
27+
| neighborhood.heartbeat.port | UDP port used for instances of a self-hosted gateway deployment to send heartbeats to other instances. | No | 4291 |
28+
| policy.rate-limit.sync.port | UDP port used for self-hosted gateway instances to synchronize rate limiting across multiple instances. | No | 4290 |
2629

2730

2831
## Metrics

articles/azure-functions/functions-how-to-use-azure-function-app-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ The Functions editor built into the Azure portal lets you update your function c
265265
Files in the root of the app, such as function.proj or extensions.csproj need to be created and edited by using the [Advanced Tools (Kudu)](#kudu).
266266

267267
1. Select your function app, then under **Development tools** select **Advanced tools** > **Go**.
268-
1. If promoted, sign-in to the SCM site with your Azure credentials.
268+
1. If prompted, sign-in to the SCM site with your Azure credentials.
269269
1. From the **Debug console** menu, choose **CMD**.
270270
1. Navigate to `.\site\wwwroot`, select the plus (**+**) button at the top, and select **New file**.
271271
1. Name the file, such as `extensions.csproj` and press Enter.

articles/azure-monitor/agents/azure-monitor-agent-migration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Migrate from legacy agents to Azure Monitor Agent
33
description: This article provides guidance for migrating from the existing legacy agents to the new Azure Monitor Agent (AMA) and data collection rules (DCR).
44
ms.topic: conceptual
5-
author: guywild
5+
author: guywi-ms
66
ms.author: guywild
77
ms.reviewer: shseth
88
ms.date: 9/14/2022
@@ -11,7 +11,7 @@ ms.custom: devx-track-azurepowershell, devx-track-azurecli
1111
---
1212

1313
# Migrate to Azure Monitor Agent from Log Analytics agent
14-
[Azure Monitor Agent (AMA)](./agents-overview.md) replaces the Log Analytics agent (also known as MMA and OMS) for both Windows and Linux machines, in Azure and on premises. It introduces a simplified, flexible method of configuring collection configuration called [Data Collection Rules (DCRs)](../essentials/data-collection-rule-overview.md). This article outlines the benefits of migrating to Azure Monitor Agent (AMA) and provides guidance on how to implement a successful migration.
14+
[Azure Monitor Agent (AMA)](./agents-overview.md) replaces the Log Analytics agent (also known as MMA and OMS) for both Windows and Linux machines, in both Azure and non-Azure (on-premises and 3rd party clouds) environments. It introduces a simplified, flexible method of configuring collection configuration called [Data Collection Rules (DCRs)](../essentials/data-collection-rule-overview.md). This article outlines the benefits of migrating to Azure Monitor Agent (AMA) and provides guidance on how to implement a successful migration.
1515

1616
> [!IMPORTANT]
1717
> The Log Analytics agent will be [retired on **31 August, 2024**](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). If you are currently using the Log Analytics agent with Azure Monitor or other supported features and services, you should start planning your migration to Azure Monitor Agent using the information in this article.
@@ -49,7 +49,7 @@ Your migration plan to the Azure Monitor Agent should take into account:
4949
- Running two telemetry agents on the same machine consumes double the resources, including, but not limited to CPU, memory, storage space, and network bandwidth.
5050

5151
## Prerequisites
52-
Review the [prerequisites](./azure-monitor-agent-manage.md#prerequisites) for use Azure Monitor Agent. For on-premises servers or other cloud managed servers, [installing the Azure Arc agent](/azure/azure-arc/servers/agent-overview) is an important prerequisite that then helps to install the agent extension and other required extensions. Using Arc for this purpose comes at no added cost, and it's not mandatory to use Arc for server management overall (i.e. you can continue using your existing on premises management solutions). Once Arc agent is installed, you can follow the same guidance below across Azure and on-premise for migration.
52+
Review the [prerequisites](./azure-monitor-agent-manage.md#prerequisites) for use Azure Monitor Agent. For non-Azure servers, [installing the Azure Arc agent](/azure/azure-arc/servers/agent-overview) is an important prerequisite that then helps to install the agent extension and other required extensions. Using Arc for this purpose comes at no added cost, and it's not mandatory to use Arc for server management overall (i.e. you can continue using your existing non-Azure management solutions). Once Arc agent is installed, you can follow the same guidance below across Azure and non-Azure for migration.
5353

5454
## Migration testing
5555
To ensure safe deployment during migration, begin testing with few resources running Azure Monitor Agent in your nonproduction environment. After you validate the data collected on these test resources, roll out to production by following the same steps.
@@ -58,7 +58,7 @@ See [create new data collection rules](./data-collection-rule-azure-monitor-agen
5858
After you **validate** that data is flowing as expected with Azure Monitor Agent, check the `Category` column in the [Heartbeat](/azure/azure-monitor/reference/tables/heartbeat) table for the value *Azure Monitor Agent* for AMA collected data. Ensure it matches data flowing through the existing Log Analytics agent.
5959

6060
## At-scale migration using Azure Policy
61-
We recommend using [Azure Policy](../../governance/policy/overview.md) to migrate a large number of agents. Start by analyzing your current monitoring setup with the Log Analytics agent using the [AMA Migration Helper](./azure-monitor-agent-migration-tools.md#using-ama-migration-helper-preview) to find sources, such as virtual machines, virtual machine scale sets, and on-premises servers.
61+
We recommend using [Azure Policy](../../governance/policy/overview.md) to migrate a large number of agents. Start by analyzing your current monitoring setup with the Log Analytics agent using the [AMA Migration Helper](./azure-monitor-agent-migration-tools.md#using-ama-migration-helper-preview) to find sources, such as virtual machines, virtual machine scale sets, and non-Azure servers.
6262

6363
Use the [DCR Config Generator](./azure-monitor-agent-migration-tools.md#installing-and-using-dcr-config-generator-preview) to migrate legacy agent configuration, including data sources and destinations, from the workspace to the new DCRs.
6464

0 commit comments

Comments
 (0)