Skip to content

Commit 9550a08

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sanUpdates2
2 parents b4c2d6b + 2f8c4fb commit 9550a08

File tree

7 files changed

+17
-13
lines changed

7 files changed

+17
-13
lines changed

articles/azure-arc/data/managed-instance-high-availability.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ az sql mi-arc create --name sqldemo --resource-group rg --location uswest2 –s
129129

130130
By default, all the replicas are configured in synchronous mode. This means any updates on the primary instance will be synchronously replicated to each of the secondary instances.
131131

132-
## View and monitor availability group status
132+
## View and monitor high availability status
133133

134134
Once the deployment is complete, connect to the primary endpoint from SQL Server Management Studio.
135135

@@ -147,7 +147,7 @@ kubectl get sqlmi -A
147147

148148
### Get the primary and secondary endpoints and AG status
149149

150-
Use the `kubectl describe sqlmi` or `az sql mi-arc show` commands to view the primary and secondary endpoints, and availability group status.
150+
Use the `kubectl describe sqlmi` or `az sql mi-arc show` commands to view the primary and secondary endpoints, and high availability status.
151151

152152
Example:
153153

@@ -157,22 +157,26 @@ kubectl describe sqlmi sqldemo -n my-namespace
157157
or
158158

159159
```azurecli
160-
az sql mi-arc show sqldemo --k8s-namespace my-namespace --use-k8s
160+
az sql mi-arc show --name sqldemo --k8s-namespace my-namespace --use-k8s
161161
```
162162

163163
Example output:
164164

165165
```console
166166
"status": {
167-
"AGStatus": "Healthy",
168-
"logSearchDashboard": "https://10.120.230.404:5601/app/kibana#/discover?_a=(query:(language:kuery,query:'custom_resource_name:sqldemo'))",
169-
"metricsDashboard": "https://10.120.230.46:3000/d/40q72HnGk/sql-managed-instance-metrics?var-hostname=sqlmi1-0",
170-
"mirroringEndpoint": "10.15.100.150:5022",
167+
"endpoints": {
168+
"logSearchDashboard": "https://10.120.230.404:5601/app/kibana#/discover?_a=(query:(language:kuery,query:'custom_resource_name:sqldemo'))",
169+
"metricsDashboard": "https://10.120.230.46:3000/d/40q72HnGk/sql-managed-instance-metrics?var-hostname=sqldemo-0",
170+
"mirroring": "10.15.100.150:5022",
171+
"primary": "10.15.100.150,1433",
172+
"secondary": "10.15.100.156,1433"
173+
},
174+
"highAvailability": {
175+
"healthState": "OK",
176+
"mirroringCertificate": "-----BEGIN CERTIFICATE-----\n...\n-----END CERTIFICATE-----"
177+
},
171178
"observedGeneration": 1,
172-
"primaryEndpoint": "10.15.100.150,1433",
173179
"readyReplicas": "2/2",
174-
"runningVersion": "v1.2.0_2021-12-15",
175-
"secondaryEndpoint": "10.15.100.156,1433",
176180
"state": "Ready"
177181
}
178182
```

articles/container-apps/log-options.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ description: Description of logging options in Azure Container Apps
44
services: container-apps
55
author: cebundy
66
ms.service: container-apps
7-
ms.custom: ignite-2022
87
ms.topic: conceptual
98
ms.date: 09/29/2022
109
ms.author: v-bcatherine
-7.08 KB
Loading
-169 Bytes
Loading
458 Bytes
Loading
17.4 KB
Loading

articles/defender-for-iot/organizations/integrate-with-active-directory.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,8 @@ You can associate Active Directory groups defined here with specific permission
4444
|--|--|
4545
| Domain controller FQDN | Set the fully qualified domain name (FQDN) exactly as it appears on your LDAP server. For example, enter `host1.subdomain.domain.com`. |
4646
| Domain controller port | Define the port on which your LDAP is configured. |
47-
| Primary domain | Set the domain name (for example, `subdomain.domain.com`) and the connection type according to your LDAP configuration. |
47+
| Primary domain | Set the domain name (for example, `subdomain.domain.com`) |
48+
| Connection type | Set the authentication type: LDAPS/NTLMv3 (Recommended), LDAP/NTLMv3 or LDAP/SASL-MD5 |
4849
| Active Directory groups | Enter the group names that are defined in your Active Directory configuration on the LDAP server. You can enter a group name that you'll associate with Admin, Security Analyst and Read-only permission levels. Use these groups when creating new sensor users.|
4950
| Trusted endpoints | To add a trusted domain, add the domain name and the connection type of a trusted domain. <br />You can configure trusted endpoints only for users who were defined under users. |
5051

@@ -59,4 +60,4 @@ You can associate Active Directory groups defined here with specific permission
5960

6061
## Next steps
6162

62-
For more information, see [how to create and manage users](./how-to-create-and-manage-users.md).
63+
For more information, see [how to create and manage users](./how-to-create-and-manage-users.md).

0 commit comments

Comments
 (0)