Skip to content

Commit 8c18903

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-provider-operationalinsights
2 parents a8c7235 + b0251d6 commit 8c18903

File tree

12 files changed

+341
-115
lines changed

12 files changed

+341
-115
lines changed

articles/azure-monitor/containers/prometheus-metrics-scrape-default.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ Two default jobs can be run for Windows that scrape metrics required for the das
188188
- `kube-proxy-windows` (`job=kube-proxy-windows`)
189189

190190
> [!NOTE]
191-
> This requires applying or updating the `ama-metrics-settings-configmap` configmap and installing `windows-exporter` on all Windows nodes. For more information, see the [enablement document](kubernetes-monitoring-enable.md#enable-prometheus-and-grafana).
191+
> This requires applying or updating the `ama-metrics-settings-configmap` configmap and installing `windows-exporter` on all Windows nodes. For more information, see the [enablement document](kubernetes-monitoring-enable.md#enable-windows-metrics-collection-preview).
192192
193193
## Metrics scraped for Windows
194194

@@ -254,7 +254,7 @@ The following default dashboards are automatically provisioned and configured by
254254

255255
## Recording rules
256256

257-
The following default recording rules are automatically configured by Azure Monitor managed service for Prometheus when you [link your Azure Monitor workspace to an Azure Managed Grafana instance](../essentials/azure-monitor-workspace-manage.md#link-a-grafana-workspace). Source code for these recording rules can be found in [this GitHub repository](https://aka.ms/azureprometheus-mixins). These are the standard open source recording rules used in the dashboards above.
257+
The following default recording rules are automatically configured by Azure Monitor managed service for Prometheus when you [configure Prometheus metrics to be scraped from an Azure Kubernetes Service (AKS) cluster](kubernetes-monitoring-enable.md#enable-prometheus-and-grafana). Source code for these recording rules can be found in [this GitHub repository](https://aka.ms/azureprometheus-mixins). These are the standard open source recording rules used in the dashboards above.
258258

259259
- `cluster:node_cpu:ratio_rate5m`
260260
- `namespace_cpu:kube_pod_container_resource_requests:sum`

articles/cosmos-db/how-to-restore-in-account-continuous-backup.md

Lines changed: 303 additions & 86 deletions
Large diffs are not rendered by default.

articles/key-vault/managed-hsm/built-in-roles.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ Azure Key Vault Managed HSM local role-based access control (RBAC) has several b
1717

1818
To allow a principal to perform an operation, you must assign them a role that grants them permissions to perform that operations. All these roles and operations allow you to manage permissions only for *data plane* operations. For *management plane* operations, see [Azure built-in roles](../../role-based-access-control/built-in-roles.md) and [Secure access to your managed HSMs](secure-your-managed-hsm.md).
1919

20+
> [!NOTE]
21+
> Service principal group access is not supported for performing data plane operations. Only user group access is supported for data plane operations. Service principals must be added to the role directly.
22+
2023
To manage control plane permissions for the Managed HSM resource, you must use [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). Some examples of control plane operations are to create a new managed HSM, or to update, move, or delete a managed HSM.
2124

2225
## Built-in roles

articles/logic-apps/connectors/sap.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1207,7 +1207,7 @@ You can control this tracing capability at the application level by adding the f
12071207
12081208
1. On the **Kudu** toolbar, select **Debug Console** > **CMD**.
12091209
1210-
1. Browse to the folder for the parameter named **$ccl/trace/directory** from **CCLPROFILE.txt**.
1210+
1. Browse to the folder for the **$ccl/trace/directory** parameter, which is from the **CCLPROFILE.txt** file.
12111211
12121212
Usually, the trace files are named **sec-Microsoft.Azure.Work-$processId.trc** and **sec-sapgenpse.exe-$processId.trc**.
12131213

articles/modeling-simulation-workbench/modeling-simulation-workbench-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ Storage (both private within chamber, and shared) is persistent with high availa
4141
To use the Modeling and Simulation Workbench APIs, you must create your Azure Modeling and Simulation Workbench resources in the supported regions. Currently, it's available in the following Azure regions:
4242

4343
- East US
44+
- Sweden Central
4445
- West US 3
4546
- USGov Virginia
4647

articles/networking/index.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,12 +32,12 @@ highlightedContent:
3232
- title: Azure Networking blogs
3333
itemType: concept
3434
url: https://azure.microsoft.com/blog/topics/networking/
35-
- title: Define an Azure network topology
35+
- title: Design a hybrid network architecture on Azure
36+
itemType: learn
37+
url: /training/modules/design-a-hybrid-network-architecture/
38+
- title: Network Architecture Design
3639
itemType: architecture
37-
url: /azure/cloud-adoption-framework/ready/azure-best-practices/define-an-azure-network-topology
38-
- title: Azure Network Watcher
39-
itemType: overview
40-
url: ../network-watcher/network-watcher-overview.md
40+
url: /azure/architecture/networking
4141
- title: Apply Zero Trust principles to encrypting Azure-based network communications
4242
itemType: architecture
4343
url: /security/zero-trust/azure-networking-encryption

articles/operator-nexus/concepts-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: "Azure Operator Nexus: Security concepts"
33
description: Security overview for Azure Operator Nexus
4-
author: rgendreau
5-
ms.author: rgendreau
4+
author: scottsteinbrueck
5+
ms.author: ssteinbrueck
66
ms.service: azure-operator-nexus
77
ms.topic: conceptual
88
ms.date: 08/14/2023

articles/operator-nexus/howto-set-up-defender-for-cloud-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: "Azure Operator Nexus: How to set up the Defender for Cloud security environment"
33
description: Learn how to enable and configure Defender for Cloud security plan features on your Operator Nexus subscription.
4-
author: rgendreau
5-
ms.author: rgendreau
4+
author: scottsteinbrueck
5+
ms.author: ssteinbrueck
66
ms.service: azure-operator-nexus
77
ms.topic: how-to
88
ms.date: 08/18/2023

articles/site-recovery/azure-to-azure-common-questions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -380,7 +380,7 @@ Azure Site Recovery creates [replica](./azure-to-azure-architecture.md#target-re
380380
1. Go to the **Networking** tab under the **Settings** options of the disk. By default, the disk is created with *Enable public access from all networks* setting enabled.
381381
1. Change the network access to either **Disable public access and enable private access** or **Disable public and private access** per your requirement, after cancel export is successful.
382382

383-
If you want to change disk network access to **Disable public access and enable private access**, the disk access resource to be used should already be present in the target region within the target subscription. Find the steps to [create a disk access resource here](../virtual-machines/disks-enable-private-links-for-import-export-portal.yml#create-a-disk-access-resource).
383+
If you want to change disk network access to **Disable public access and enable private access**, the disk access resource to be used should already be present in the target region within the target subscription. Find the steps to [create a disk access resource here](../virtual-machines/disks-enable-private-links-for-import-export-portal.yml).
384384

385385
:::image type="content" source="media/azure-to-azure-common-questions/disk-networking.png" alt-text="Screenshot of Disk networking."lightbox="media/azure-to-azure-common-questions/disk-networking.png":::
386386

articles/storage/files/storage-files-migration-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to migrate to SMB Azure file shares and find your migrati
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: conceptual
7-
ms.date: 01/24/2024
7+
ms.date: 04/25/2024
88
ms.author: kendownie
99
---
1010

@@ -61,7 +61,7 @@ Learn more about [on-premises Active Directory authentication](storage-files-ide
6161
The following table lists supported metadata for Azure Files.
6262

6363
> [!IMPORTANT]
64-
> The *LastAccessTime* timestamp isn't currently supported for files or directories on the target share.
64+
> The *LastAccessTime* timestamp isn't currently supported for files or directories on the target share. However, Azure Files will return the *LastAccessTime* value for a file when requested. Because the *LastAccessTime* timestamp isn't updated on read operations, it will always be equal to the *LastModifiedTime*.
6565
6666
| **Source** | **Target** |
6767
|------------|------------|

0 commit comments

Comments
 (0)