Skip to content

Commit 977b633

Browse files
authored
Merge pull request #300500 from MicrosoftDocs/main
5/28/2025 AM Publish
2 parents 2c70961 + 8b5e5e3 commit 977b633

File tree

129 files changed

+467
-350
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

129 files changed

+467
-350
lines changed

articles/azure-resource-manager/templates/deployment-history-deletions.md

Lines changed: 31 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -2,65 +2,76 @@
22
title: Deployment history deletions
33
description: Describes how Azure Resource Manager automatically deletes deployments from the deployment history. Deployments are deleted when the history is close to exceeding the limit of 800.
44
ms.topic: conceptual
5-
ms.date: 04/28/2025
5+
ms.date: 05/27/2025
66
ms.custom: devx-track-azurecli, devx-track-arm-template
77
---
88

99
# Automatic deletions from deployment history
1010

11-
Every time you deploy a template, information about the deployment is written to the deployment history. Each resource group is limited to 800 deployments in its deployment history.
12-
13-
Azure Resource Manager automatically deletes deployments from your history as you near the limit. Automatic deletion is a change from past behavior. Previously, you had to manually delete deployments from the deployment history to avoid getting an error. This change was implemented on August 6, 2020.
11+
When you deploy resources to Azure, the deployment details are recorded in the deployment history at the scope where the deployment occurs. Each scope—whether it's a [resource group](./deploy-to-resource-group.md), [subscription](./deploy-to-subscription.md), [management group](./deploy-to-management-group.md), [tenant](./deploy-to-tenant.md)—can store up to **800 deployments** in its history. Once this limit is reached, Azure **automatically deletes the oldest deployments** to make space for new ones. This automatic cleanup process was implemented on **August 6, 2020**.
1412

1513
> [!NOTE]
1614
> Deleting a deployment from the history doesn't affect any of the resources that were deployed.
1715
18-
## When deployments are deleted
16+
## Overview of automatic deployment history deletions
1917

2018
Deployments are deleted from your history when you exceed 700 deployments. Azure Resource Manager deletes deployments until the history is down to 600. The oldest deployments are always deleted first.
2119

2220
:::image type="content" border="false" source="./media/deployment-history-deletions/deployment-history.png" alt-text="Diagram of deployment history deletion.":::
2321

2422
> [!IMPORTANT]
25-
> If your resource group is already at the 800 limit, your next deployment fails with an error. The automatic deletion process starts immediately. You can try your deployment again after a short wait.
23+
> If your scope is already at the 800 limit, your next deployment fails with an error. The automatic deletion process starts immediately. You can try your deployment again after a short wait.
2624
2725
In addition to deployments, you also trigger deletions when you run the [what-if operation](./deploy-what-if.md) or validate a deployment.
2826

2927
When you give a deployment the same name as one in the history, you reset its place in the history. The deployment moves to the most recent place in the history. You also reset a deployment's place when you [roll back to that deployment](rollback-on-error.md) after an error.
3028

31-
## Remove locks that block deletions
29+
## Permissions required for automatic deletions
30+
31+
The deletions are requested under the identity of the user who deployed the template. To delete deployments, the user must have access to the **Microsoft.Resources/deployments/delete** action. If the user doesn't have the required permissions, deployments aren't deleted from the history.
32+
33+
If the current user doesn't have the required permissions, automatic deletion is attempted again during the next deployment.
34+
35+
## Handling resource locks
36+
37+
If you have a [CanNotDelete lock](../management/lock-resources.md) on a resource group or a subscription, the deployments for that scope can't be automatically deleted. To enable automatic cleanup of the deployment history, you need to remove the lock.
3238

33-
If you have a [CanNotDelete lock](../management/lock-resources.md) on a resource group, the deployments for that resource group can't be deleted. You must remove the lock to take advantage of automatic deletions in the deployment history.
39+
To delete a resource group lock, run the following commands:
3440

35-
To use PowerShell to delete a lock, run the following commands:
41+
### [PowerShell](#tab/azure-powershell)
3642

3743
```azurepowershell-interactive
3844
$lockId = (Get-AzResourceLock -ResourceGroupName lockedRG).LockId
3945
Remove-AzResourceLock -LockId $lockId
4046
```
4147

42-
To use Azure CLI to delete a lock, run the following commands:
48+
To delete a resource group lock, run the following commands:
49+
50+
### [Azure CLI](#tab/azure-cli)
4351

4452
```azurecli-interactive
4553
lockid=$(az lock show --resource-group lockedRG --name deleteLock --output tsv --query id)
4654
az lock delete --ids $lockid
4755
```
4856

49-
## Required permissions
57+
### [REST](#tab/rest)
5058

51-
The deletions are requested under the identity of the user who deployed the template. To delete deployments, the user must have access to the **Microsoft.Resources/deployments/delete** action. If the user doesn't have the required permissions, deployments aren't deleted from the history.
59+
```rest
60+
DELETE https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Authorization/locks/{lockName}?api-version=2016-09-01
61+
```
5262

53-
If the current user doesn't have the required permissions, automatic deletion is attempted again during the next deployment.
63+
---
5464

55-
## Opt out of automatic deletions
65+
## Opting out of automatic deletions
5666

57-
You can opt out of automatic deletions from the history. **Use this option only when you want to manage the deployment history yourself.** The limit of 800 deployments in the history is still enforced. If you exceed 800 deployments, you'll receive an error and your deployment will fail.
67+
You can opt out of automatic deletion to manually manage your deployment history. **Use this option cautiously**, as the **800-deployment limit** remains enforced, and exceeding it causes deployment failures.
5868

59-
To disable automatic deletions at the tenant or the management group scope, open a support ticket. For the instructions, see [Request support](./overview.md#get-support).
69+
> [!IMPORTANT]
70+
> Opting out is available only for subscription scopes, as it's controlled by the subscription-level `Microsoft.Resources/DisableDeploymentGrooming` feature flag. You can't opt out for only a particular resource group. For tenant or management group scopes, open a [support ticket](./overview.md#get-support) to disable automatic deletion.
6071
61-
To disable automatic deletions at the subscription scope, register the `Microsoft.Resources/DisableDeploymentGrooming` feature flag. When you register the feature flag, you opt out of automatic deletions for the entire Azure subscription. You can't opt out for only a particular resource group. To reenable automatic deletions, unregister the feature flag.
72+
To disable automatic deletion at the subscription scope (affects all resource groups within it):
6273

63-
# [PowerShell](#tab/azure-powershell)
74+
### [PowerShell](#tab/azure-powershell)
6475

6576
For PowerShell, use [Register-AzProviderFeature](/powershell/module/az.resources/Register-AzProviderFeature).
6677

@@ -76,7 +87,7 @@ Get-AzProviderFeature -ProviderNamespace Microsoft.Resources -FeatureName Disabl
7687

7788
To reenable automatic deletions, use Azure REST API or Azure CLI.
7889

79-
# [Azure CLI](#tab/azure-cli)
90+
### [Azure CLI](#tab/azure-cli)
8091

8192
For Azure CLI, use [az feature register](/cli/azure/feature#az-feature-register).
8293

@@ -96,7 +107,7 @@ To reenable automatic deletions, use [az feature unregister](/cli/azure/feature#
96107
az feature unregister --namespace Microsoft.Resources --name DisableDeploymentGrooming
97108
```
98109

99-
# [REST](#tab/rest)
110+
### [REST](#tab/rest)
100111

101112
For REST API, use [Features - Register](/rest/api/resources/features/register).
102113

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
title: Manage Vaulted Backup for Azure Data Lake Storage using Azure portal (preview)
3+
description: Learn how to manage vaulted backup for Azure Data Lake Storage (preview) using Azure portal.
4+
ms.topic: how-to
5+
ms.date: 04/16/2025
6+
author: jyothisuri
7+
ms.author: jsuri
8+
---
9+
10+
# Manage vaulted backup for Azure Data Lake Storage using Azure portal (preview)
11+
12+
This article describes how to manage vaulted backup for Azure Data Lake Storage (preview) using Azure portal.
13+
14+
## Monitor an Azure Data Lake Storage backup job (preview)
15+
16+
The Azure Backup service creates a job for a scheduled backup or when you trigger an on-demand backup operation, allowing you to monitor the job progress.
17+
18+
To check the backup job status, follow these steps:
19+
20+
1. In the [Azure portal](), go to the **Backup vault** > **Backup jobs**.
21+
22+
:::image type="content" source="./media/azure-data-lake-storage-backup-manage/monitor-backup-jobs.png" alt-text="Screenshot shows how to monitor the backup jobs." lightbox="./media/azure-data-lake-storage-backup-manage/monitor-backup-jobs.png":::
23+
24+
1. On the **Backup jobs** pane, select the required time range and apply filters to narrow down the list of jobs.
25+
26+
The **Backup jobs** dashboard shows the operation and status for the past seven days.
27+
28+
## Modify the Azure Data Lake Storage backup instance (preview)
29+
30+
After the backup configuration, you can update the policy associated with a backup instance. For vaulted backups, you can also modify the selected backup containers.
31+
32+
To modify the backup instance, follow these steps:
33+
34+
1. Go to the **Backup vault**.
35+
1. On the **Backup Items** tile, select **Azure Data Lake Storage (Preview)** as the **Datasource type**.
36+
1. On the **Backup instance** pane, select the backup instance for which you want to change the Backup policy, and then select **Edit backup instance**.
37+
38+
:::image type="content" source="./media/azure-data-lake-storage-backup-manage/edit-backup-instance.png" alt-text="Screenshot shows the option to modify the backup instance." lightbox="./media/azure-data-lake-storage-backup-manage/edit-backup-instance.png":::
39+
40+
1. On the **Edit backup instance** pane, under **Select policy**, select the appropriate policy from the dropdown list to apply it to the storage account blobs.
41+
42+
:::image type="content" source="./media/azure-data-lake-storage-backup-manage/change-policy.png" alt-text="Screenshot shows how to change the policy for backup." lightbox="./media/azure-data-lake-storage-backup-manage/change-policy.png":::
43+
44+
1. Select **Save**.
45+
46+
## Stop protection for Azure Data Lake Storage (preview)
47+
48+
You can stop the vaulted backup for the storage account as per your requirements.
49+
50+
>[!Caution]
51+
>When you remove backups, the object replication policy is removed from the source. The stop protection operation dissociates the storage account from the Backup vault and doesn’t disable any configured change feed.
52+
53+
To stop backup for a storage account, follow these steps:
54+
55+
1. Go to the **Backup vault**.
56+
1. On the **Backup Items** tile, select **Azure Data Lake Storage (Preview)** as the **Datasource type**.
57+
1. On the **Backup instance** pane, select the backup instance for which you want to stop backup from the list.
58+
1. On the selected backup instance pane, select **Stop Backup**.
59+
60+
:::image type="content" source="./media/azure-data-lake-storage-backup-manage/stop-backup.png" alt-text="Screenshot shows how to stop protection for Azure Data Lake Storage." lightbox="./media/azure-data-lake-storage-backup-manage/stop-backup.png":::
61+
62+
>[!Note]
63+
>After the backup is stopped, you can disable other storage data protection capabilities (enabled for configuring backups) from the **data protection** pane of the storage account.
64+
65+
## Next steps
66+
67+
[Troubleshoot Azure Data Lake Storage vaulted backup and restore errors (preview)](azure-data-lake-storage-backup-troubleshoot.md).
68+
69+
70+

articles/backup/backup-azure-recovery-services-vault-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Overview of Recovery Services vaults
33
description: An overview of Recovery Services vaults.
44
ms.topic: overview
5-
ms.date: 01/17/2025
5+
ms.date: 05/28/2025
66
ms.service: azure-backup
77
author: jyothisuri
88
ms.author: jsuri
@@ -12,7 +12,7 @@ ms.custom: engagement-fy24
1212

1313
This article describes the features of a Recovery Services vault.
1414

15-
A Recovery Services vault is a storage entity in Azure that houses data. The data is typically copies of data, or configuration information for virtual machines (VMs), workloads, servers, or workstations. You can use Recovery Services vaults to hold backup data for various Azure services such as IaaS VMs (Linux or Windows) and SQL Server in Azure VMs. Recovery Services vaults support System Center DPM, Windows Server, Azure Backup Server, and more. Recovery Services vaults make it easy to organize your backup data, while minimizing management overhead.
15+
A Recovery Services vault is a storage entity in Azure that houses data. The data is typically copies of data, or configuration information for virtual machines (VMs), workloads, servers, or workstations. You can use Recovery Services vaults to hold backup data for various Azure services such as IaaS VMs (Linux or Windows) and SQL Server in Azure VMs. Recovery Services vaults support System Center DPM, Windows Server, Azure Backup Server, and more. Recovery Services vaults make it easy to organize your backup data, while minimizing management overhead. Learn about the [types of vault supported for backup and restore](/azure/backup/backup-azure-backup-faq#what-are-the-various-vaults-supported-for-backup-and-restore-).
1616

1717
## Key features
1818

articles/backup/backup-vault-overview.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,19 @@
22
title: Overview of the Backup vaults
33
description: An overview of Backup vaults.
44
ms.topic: overview
5-
ms.date: 09/30/2024
5+
ms.date: 05/28/2025
66
ms.custom: references_regions
77
ms.service: azure-backup
88
author: jyothisuri
99
ms.author: jsuri
1010
---
1111
# Backup vaults overview
1212

13-
This article describes the features of a Backup vault. A Backup vault is a storage entity in Azure that houses backup data for certain newer workloads that Azure Backup supports. You can use Backup vaults to hold backup data for various Azure services, such as Azure Blob, Azure Database for PostgreSQL servers and newer workloads that Azure Backup will support. Backup vaults make it easy to organize your backup data, while minimizing management overhead. Backup vaults are based on the Azure Resource Manager model of Azure, which provides features such as:
13+
This article describes the features of a Backup vault. A Backup vault is a storage entity in Azure that houses backup data for certain newer workloads that Azure Backup supports. You can use Backup vaults to hold backup data for various Azure services, such as Azure Blob, Azure Database for PostgreSQL servers and newer workloads that Azure Backup will support. Backup vaults make it easy to organize your backup data, while minimizing management overhead. Learn about the [types of vault supported for backup and restore](/azure/backup/backup-azure-backup-faq#what-are-the-various-vaults-supported-for-backup-and-restore-).
14+
15+
## Key features
16+
17+
Backup vaults are based on the Azure Resource Manager model of Azure, which provides features such as:
1418

1519
- **Enhanced capabilities to help secure backup data**: With Backup vaults, Azure Backup provides security capabilities to protect cloud backups. The security features ensure you can secure your backups, and safely recover data, even if production and backup servers are compromised. [Learn more](backup-azure-security-feature.md)
1620

65.6 KB
Loading
110 KB
Loading
137 KB
Loading
109 KB
Loading

articles/backup/toc.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -647,7 +647,9 @@
647647
- name: Configure backup
648648
href: azure-data-lake-storage-configure-backup.md
649649
- name: Restore
650-
href: azure-data-lake-storage-restore.md
650+
href: azure-data-lake-storage-restore.md
651+
- name: Manage
652+
href: azure-data-lake-storage-backup-manage.md
651653
- name: Azure Files backup
652654
items:
653655
- name: From the Azure portal

articles/communication-services/concepts/analytics/logs/call-diagnostics-updates-log-schema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ When using the Call Diagnostics Updates Log Schema, always refer to the highest
4242

4343
### More about log versions and data latency
4444

45-
The call diagnostics updates log schema may require approximately 60 minutes following the end of a call to propogate data, most logs may be available within 40 minutes.
45+
The call diagnostics updates log schema may require approximately 60 minutes following the end of a call to propagate data, most logs may be available within 40 minutes.
4646

4747
After a call ends, an initial version (version 1) of the log is sent to the CallSummaryUpdates and CallDiagnosticUpdates tables. Initial versions may contain `null` values, if more information becomes available updated versions of the logs are created with more complete information. For example, client data can be delayed because of network connectivity issues between the client computer and our servers, or something as simple as a user closing the lid on their laptop post-call before their client data was sent and re-opening it hours (or days) later.
4848

0 commit comments

Comments
 (0)