You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/learn/dotnetcore-quick-start.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,7 @@ Application Insights can gather telemetry data from any internet-connected appli
100
100
When you are done testing, you can delete the resource group and all related resources. To do so follow the steps below.
101
101
102
102
> [!NOTE]
103
-
> If you used an existing resource group the instructions below will not work and you will need to just delete the individual Application Insights resource. Keep in mind anytime you delete a resource group all underyling resources that are members of that group will be deleted.
103
+
> If you used an existing resource group the instructions below will not work and you will need to just delete the individual Application Insights resource. Keep in mind anytime you delete a resource group all underlying resources that are members of that group will be deleted.
104
104
105
105
1. From the left-hand menu in the Azure portal, click **Resource groups** and then click **myResourceGroup**.
106
106
2. On your resource group page, click **Delete**, type **myResourceGroup** in the text box, and then click **Delete**.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/transfer-subscription.md
+11-7Lines changed: 11 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,12 +23,15 @@ Organizations might have several Azure subscriptions. Each subscription is assoc
23
23
24
24
This article describes the basic steps you can follow to transfer a subscription to a different Azure AD directory and re-create some of the resources after the transfer.
25
25
26
+
> [!NOTE]
27
+
> For Azure CSP subscriptions, changing the Azure AD directory for the subscription isn't supported.
28
+
26
29
## Overview
27
30
28
31
Transferring an Azure subscription to a different Azure AD directory is a complex process that must be carefully planned and executed. Many Azure services require security principals (identities) to operate normally or even manage other Azure resources. This article tries to cover most of the Azure services that depend heavily on security principals, but is not comprehensive.
29
32
30
33
> [!IMPORTANT]
31
-
> Transferring a subscription does require downtime to complete the process.
34
+
> In some scenarios, transferring a subscription might require downtime to complete the process. Careful planning is required to assess whether downtime will be required for your migration.
32
35
33
36
The following diagram shows the basic steps you must follow when you transfer a subscription to a different directory.
34
37
@@ -66,17 +69,18 @@ Several Azure resources have a dependency on a subscription or a directory. Depe
66
69
| System-assigned managed identities | Yes | Yes |[List managed identities](#list-role-assignments-for-managed-identities)| You must disable and re-enable the managed identities. You must re-create the role assignments. |
67
70
| User-assigned managed identities | Yes | Yes |[List managed identities](#list-role-assignments-for-managed-identities)| You must delete, re-create, and attach the managed identities to the appropriate resource. You must re-create the role assignments. |
68
71
| Azure Key Vault | Yes | Yes |[List Key Vault access policies](#list-other-known-resources)| You must update the tenant ID associated with the key vaults. You must remove and add new access policies. |
69
-
| Azure SQL databases with Azure AD authentication | Yes | No |[Check Azure SQL databases with Azure AD authentication](#list-other-known-resources)|||
72
+
| Azure SQL databases with Azure AD authentication integration enabled | Yes | No |[Check Azure SQL databases with Azure AD authentication](#list-azure-sql-databases-with-azure-ad-authentication)|||
70
73
| Azure Storage and Azure Data Lake Storage Gen2 | Yes | Yes || You must re-create any ACLs. |
71
-
| Azure Data Lake Storage Gen1 | Yes ||| You must re-create any ACLs. |
74
+
| Azure Data Lake Storage Gen1 | Yes |Yes|| You must re-create any ACLs. |
72
75
| Azure Files | Yes | Yes || You must re-create any ACLs. |
| Azure Active Directory Domain Services | Yes | No |||
77
80
| App registrations | Yes | Yes |||
78
81
79
-
If you are using encryption at rest for a resource, such as a storage account or SQL database, that has a dependency on a key vault that is NOT in the same subscription that is being transferred, it can lead to an unrecoverable scenario. If you have this situation, you should take steps to use a different key vault or temporarily disable customer-managed keys to avoid this unrecoverable scenario.
82
+
> [!IMPORTANT]
83
+
> If you use encryption at rest for a resource like a storage account or a SQL database and the resource has a dependency on a key vault that is *not* in the subscription that's being transferred, you might get an unrecoverable error. In this situation, use a different key vault or temporarily disable customer-managed keys to avoid an unrecoverable error.
80
84
81
85
## Prerequisites
82
86
@@ -212,8 +216,8 @@ Managed identities do not get updated when a subscription is transferred to anot
212
216
213
217
When you create a key vault, it is automatically tied to the default Azure Active Directory tenant ID for the subscription in which it is created. All access policy entries are also tied to this tenant ID. For more information, see [Moving an Azure Key Vault to another subscription](../key-vault/general/move-subscription.md).
214
218
215
-
> [!WARNING]
216
-
> If you are using encryption at rest for a resource, such as a storage account or a SQL database, that has a dependency on a key vault that is NOT in the same subscription that is being transferred, it can lead to an unrecoverable scenario. If you have this situation, you should take steps to use a different key vault or temporarily disable customer-managed keys to avoid this unrecoverable scenario.
219
+
> [!IMPORTANT]
220
+
> If you use encryption at rest for a resource like a storage account or a SQL database and the resource has a dependency on a key vault that is *not* in the subscription that's being transferred, you might get an unrecoverable error. In this situation, use a different key vault or temporarily disable customer-managed keys to avoid an unrecoverable error.
217
221
218
222
- If you have a key vault, use [az keyvault show](https://docs.microsoft.com/cli/azure/keyvault#az-keyvault-show) to list the access policies. For more information, see [Provide Key Vault authentication with an access control policy](../key-vault/key-vault-group-permissions-for-apps.md).
219
223
@@ -223,7 +227,7 @@ When you create a key vault, it is automatically tied to the default Azure Activ
223
227
224
228
### List Azure SQL databases with Azure AD authentication
225
229
226
-
- Use [az sql server ad-admin list](https://docs.microsoft.com/cli/azure/sql/server/ad-admin#az-sql-server-ad-admin-list) and the [az graph](https://docs.microsoft.com/cli/azure/ext/resource-graph/graph) extension to see if you are using Azure SQL databases with Azure AD authentication. For more information, see [Configure and manage Azure Active Directory authentication with SQL](../sql-database/sql-database-aad-authentication-configure.md).
230
+
- Use [az sql server ad-admin list](https://docs.microsoft.com/cli/azure/sql/server/ad-admin#az-sql-server-ad-admin-list) and the [az graph](https://docs.microsoft.com/cli/azure/ext/resource-graph/graph) extension to see if you are using Azure SQL databases with Azure AD authentication. For more information, see [Configure and manage Azure Active Directory authentication with SQL](../azure-sql/database/authentication-aad-configure.md).
227
231
228
232
```azurecli
229
233
az sql server ad-admin list --ids $(az graph query -q 'resources | where type == "microsoft.sql/servers" | project id' -o tsv | cut -f1)
Copy file name to clipboardExpand all lines: articles/spring-cloud/spring-cloud-faq.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,6 +84,12 @@ Yes.
84
84
85
85
It depends on the logic of resource providers that own the extension resources. The extension resources of a `Microsoft.AppPlatform` instance do not belong to the same namespace, so the behavior varies by resource provider. For example, the delete/move operation will not cascade to the **diagnostics settings** resources. If a new Azure Spring Cloud instance is provisioned with the same resource ID as the deleted one, or if the previous Azure Spring Cloud instance is moved back, the previous **diagnostics settings** resources continue extending it.
86
86
87
+
You can delete Spring Cloud's diagnostic settings by using Azure CLI:
88
+
89
+
```azurecli
90
+
az monitor diagnostic-settings delete --name $diagnosticSettingName --resource $azureSpringCloudResourceId
91
+
```
92
+
87
93
## Java runtime and OS versions
88
94
89
95
### Which versions of Java runtime are supported in Azure Spring Cloud?
0 commit comments